US agencies in turf battle over classification level of COVID-19 meetings

Department of Health & Human ServicesA number of United States government officials have expressed dismay about the White House’s treatment of top-level meetings about the coronavirus (COVID-19) as classified, a move described by some as “not normal”. On Wednesday the Reuters news agency cited “four Trump administration officials” in claiming that several dozen meetings to discuss COVID-19 were held in top-secret settings. This, they say, was unnecessary and posed barriers to coming up with an effective response to the contagion. Other sources, however, claim that the meetings had to be classified because they included secret information on China.

The meetings in point have been held since mid-January at a high-security conference room located at the headquarters of the Department of Health & Human Services (HHS) in Washington, DC. The HHS is largely in charge of the US government’s response to COVID-19, as it oversees several relevant agencies including the US Centers for Disease Control and Prevention. From the very beginning, the National Security Council —a White House decision-making body chaired by the president— ordered that the meetings be treated as classified. This meant that participants had to have top-secret security clearances in order to attend.

This decision allegedly excluded several government officials from these meetings, including leading US government biosurveillance and biosecurity experts who should have had a place at those meetings. “We had some very critical people who did not have security clearances who could not go”, one source said. Reuters quotes an unnamed “high level former official […] in the George W. Bush administration” who describes the decision to limit access to these discussions “about a response to a public health crisis” as “not normal”. But another government source told Reuters that the meetings were classified because they “had to do with China”. Yet another source said that the small number of participants was necessary to prevent potentially damaging leaks to the media.

Meanwhile, Time magazine alleged on Wednesday that a timely report by the Office of the Director of National Intelligence (DNI), which includes a section on pandemics, has been delayed. In previous years, the report, entitled Worldwide Threat Assessment, has warned that the world is not prepared for new strains of influenza that could prompt a pandemic. The report was scheduled to be released to Congress on February 12, but it remains unaccounted for. Members of the intelligence committees in Congress told Time that they did not expect the report to be released any time soon.

Author: Joseph Fitsanakis | Date: 12 March 2020 | Permalink

Militaries around the world scramble to contain impact of COVID-19

COVID-19 ChinaMilitary forces around the world are scrambling to contain the impact of COVID-19 on military readiness, as the virus continues to infect troops and commanders at an alarming rate. On Tuesday, the Polish government announced that General Jaroslaw Mika, who serves as general commander of Branches of the Armed Forces, had tested positive for the coronavirus. General Mika is believed to have contracted the virus during a military conference that took place in the German city of Wiesbaden, where North Atlantic Treaty Organization commanders gathered to plan an American-led military exercise.

Also on Tuesday, the United States Department of Defense said that the commander of the US Army in Europe, Lieutenant General Christopher Cavoli, participated at the Wiesbaden conference, along with several other US Army staff members. They are currently being tested for exposure to COVID-19. Meanwhile the Reuters news agency reported that the US Pentagon acknowledged that “the US military’s official tally of servicemembers and related personnel who have been infected by the coronavirus likely undercounts the actual total”. Sources told the news agency that the low age and good health of American troops was “a mixed blessing of sorts”, since it allows US servicemembers to survive the virus but at the same time reduces their symptoms that would normally trigger testing for COVID-19.

The government of Taiwan said on Tuesday that over 400 members of its armed forces had entered self-imposed quarantine in order to prevent a possible COVID-19 outbreak among military personnel. This brings the total number of Taiwanese servicemembers who are currently in quarantine to over 2,000, which includes two generals. The country’s Minister of Defense, Yen De-fa, insisted on Tuesday that the virus had not impacted Taiwan’s military readiness.

Chinese officials have not provided information about the effect of the coronavirus on the country’s military. The Chinese-language website of The Epoch Times said last week that, according to unnamed insiders, the Chinese People’s Liberation Army had “forcibly isolated” tens of thousands of servicemembers this month. There are no reports of specific numbers in the Chinese media or non-Chinese news outlets.

Finally, according to Daily NK, a South Korean website that specializes on news from North Korea, approximately 180 North Korean soldiers have died as a result of contracting COVID-19 in the past month. The website cited “a source inside the North Korean military”, who said that Pyongyang had forcibly quarantined at around 3,700 soldiers of all ranks to prevent the spread of COVID-19 in the country’s military.

Author: Joseph Fitsanakis | Date: 10 March 2020 | Permalink

Google removes Iranian government’s COVID-19 app amidst claims of espionage

Iran Ministry of Health and Medical EducationAn Android application developed by the Iranian government to assist in coordinating the country’s response to the COVID-19 epidemic has been removed by Google amidst accusations that it may be used to track Iranian dissidents. The application, named AC19, was released several days ago by Iran’s Ministry of Health and Medical Education. Its release was announced through a text message sent by the Iranian government to every mobile telephone subscriber in the country. The text message urged citizens to download the application through a dedicated website or third-party app stores, including the Google Play Store. Millions have since done so.

The purpose of AC19 is to help coordinate the nationwide response to COVID-19, known as coronavirus, in a country that is experiencing one of the world’s most prolific outbreaks of the disease. App users can register using their unique phone number and determine whether their flu-like symptoms resemble those of COVID-19. The app’s developers argue that it can help keep people from flooding local hospitals throughout the country, which are already overwhelmed.

But some users have raised concerns that the app also requests access to the real-time geolocation data of users, which it then stores in remote databases. As technology news website ZDNet reports, some have accused the government in Tehran of using the AC19 app in order to track the movements of citizens. An expert consulted by ZDNet to examine the app’s technical details said that it did not appear to contain unusually intrusive features or functions.

However, the company used to develop the app, called Smart Land Strategy, has previously built apps that, according to ZDNet, were used by the Iranian intelligence services and were subsequently removed from the Google Play Store. Some Iranians claim that, given the connection between AC19 and Smart Land Strategy, it is possible that the new app may be used in the future by the Iranian government to spy on citizens, despite the fact that it may be presently useful in efforts to contain the COVID-19 epidemic.

The app continues to be available through Iranian government websites and app sites other than Google’s.

Author: Ian Allen | Date: 10 March 2020 | Permalink

US Pentagon insists it can continue to function despite COVID-19 outbreak

PentagonThe United States Department of Defense has insisted that it can continue to function uninterrupted, despite claims by some media outlets that American military readiness may soon begin to degrade as a result of the coronavirus (COVID-19) outbreak.

During a press conference on Thursday, US Secretary of Defense Mark Esper said he was “fully confident” that the Pentagon could perform its functions uninterrupted by the spread of the coronavirus. He added that he was expecting to receive a proposal early next week about how the Pentagon —the world’s largest office building, staffed by 20,000 employees— could prevent or mitigate the spread of the virus. Meanwhile, he said, the Pentagon’s National Military Command Center —designed for a nuclear attack— would be able to sustain the Department of Defense’s employees “for weeks at a time, if they have to be locked down inside the building if we have some type of outbreak”.

He did not comment on reports from last week, according to which senior American military commanders expressed concerns about the state of the country’s military readiness by the end of March. Late on Thursday, the US European Command announced the early termination of a joint military exercise that was underway in Israel, as a precautionary measure against COVID-19. A few days earlier, Pentagon officials canceled a joint military exercise in South Korea. Meanwhile, leading US defense contractor Lockheed Martin announced on Thursday that it had halted production at its F-35 plants in Italy and Japan. The company said that production at its factories in Texas continued uninterrupted.

Defense Secretary Esper said yesterday that the US military’s worldwide efforts on COVID-19 were being coordinated by US Norther Command, which was preparing for “short- and long-term scenarios, domestic and international situations”. He did not elaborate on that statement. Also on Thursday, the Pentagon announced that it had started administering coronavirus screenings to all new and potential recruits for all branches of the Armed Forces.

Author: Joseph Fitsanakis | Date: 05 March 2020 | Permalink

Chinese cybersecurity firm accuses CIA of 11-year cyberespionage campaign

CIA headquartersA leading Chinese cybersecurity firm has accused the United States Central Intelligence Agency of using sophisticated malicious software to hack into computers belonging to the Chinese government and private sector for over a decade.

The accusation against the CIA comes from Qihoo 360, a prominent cybersecurity firm headquartered in Beijing. On Monday, company published a report of its investigation on its website, written in both Chinese and English. The report identifies the hackers as “the CIA Hacking Group (APT-C-39)”, and says that the group has carried out activities against “China’s critical industries” for at least 11 years.

The report claims that APT-C-39 targets included China’s energy and civilian aviation sectors, Internet service providers, scientific research universities and organizations, and various government agencies —which it does not name. The majority of the hacker group’s targets were located in Beijing, and also in China’s Zhejiang and Guangdong provinces.

According to Qihoo 360, APT-C-39 must be a “state-level hacking organization”, judging by the hacking tools that it used. These tools, such malware named by forensics experts as Grasshopper and Fluxwire, are believed to have been designed by the CIA. They were leaked in 2017 by the international whistleblower website WikiLeaks. American authorities have charged a former CIA programmer, Joshua Schulte, with leaking the malware. Schulte denies the charges.

The Qihoo 360 report also claims that the hours during which APT-C-39 hackers appear to be active correspond to the working hours of the East Coast of the United States. It also suggests that one goal behind the hacking operations against airline industry targets was to access the travel itineraries of senior figures in China’s political and industrial circles.

Author: Ian Allen | Date: 04 March 2020 | Permalink

Swiss government files criminal complaint over Crypto AG scandal involving CIA

Crypto AGSwitzerland’s Federal Department of Finance has filed a criminal complaint “against persons unknown” over media reports that a leading Swiss-based cryptological equipment manufacturer was secretly owned by the United States Central Intelligence Agency (CIA).

The complaint relates to Crypto AG, the world’s leading manufacturer of cryptologic equipment during the Cold War, whose clients included over 120 governments around the world. Last month, The Washington Post and the German public broadcaster ZDF appeared to confirm reports that had been circulating since the early 1980s, that Crypto AG was a front for American intelligence. According to the revelations, the CIA and West Germany’s Federal Intelligence Service (BND) secretly purchased the Swiss company in the 1950s and paid off most of its senior executives in order to buy their silence. The secret deal, dubbed Operation RUBICON, allegedly allowed the US and West Germany to spy on the classified government communications of several of their adversaries —and even allies, including Austria, Italy, Spain, Greece, Jordan, Saudi Arabia and the United Arab Emirates.

The revelation about the secret deal has shocked Swiss public opinion and embarrassed the government of a nation that bases its national identity and international reputation on the concept of neutrality. For this reason, the Swiss Federal Department of Finance has filed a criminal complaint about the case. The complaint was announced by the Office of the Swiss Attorney General on Monday, following reports in the Swiss media. It said that it received a criminal complaint by the State Secretariat for Economic Affairs (SECO), which is the part of the Finance Department that authorizes exports of sensitive software or hardware. SECO officials argue that they were deceived into authorizing the export of Crypto AG’s products without realizing they had been compromised by the company’s secret agreement with the CIA and the BND. Accordingly, the secret agreement violates Swiss federal law governing the regulation of exports, SECO officials claim.

The Office of the Attorney General said it would review the criminal complaint and decide whether it warrants criminal proceedings. Meanwhile, a probe into the alleged Crypto AG-CIA-BND conspiracy, which was launched by the Swiss government last month, is already underway, and is expected to conclude in June. The Swiss Federal Assembly (the country’s parliament) is also expected to launch its own investigation into the alleged affair.

Author: Joseph Fitsanakis | Date: 03 March 2020 | Permalink

DR Congo military intelligence chief found dead hours before court appearance

Delphin KahimbiThe head of military intelligence of the Democratic Republic of the Congo was found dead on Friday, just hours before he was due to testify before the country’s National Security Council. General Delphin Kahimbi, Deputy Chief of Staff of the DRC Armed Forces, and director of its military intelligence wing, was facing accusations of involvement in an alleged plot to depose the country’s new President, Félix Tshisekedi.

Tshisekedi took over from Joseph Kabila in January of 2019, in what was hailed at the time as the first peaceful transition of power in the DRC since the 1960s. Kabila, who headed the country from 2001 until 2019, has remained a powerful figure in Congolese politics, and participates in a governing coalition with Tshisekedi. But many of Kabila’s supporters want to see Tshisekedi removed from power, and accuse him of assuming the presidency after a fraudulent election. General Kahimbi was among Kabila’s supporters who voiced disagreements against Tshisekedi’s presidency.

Kahimbi rose through the ranks of the military in the 1990s and became a popular military figure after leading a bloody counterinsurgency campaign against secessionist rebels in the eastern DRC. But many accused him of carrying out human rights violations and subverting democratic politics in Africa’s second-largest country. Earlier this year, the European Union placed General Kahimbi in its sanctions list for alleged violations of human rights. Around the same time the United States began pressuring the Tshisekedi government to bring Kahimbi to justice for his role in alleged human rights abuses under the Kabila regime.

On Wednesday, General Kahimbi was briefly arrested by police and was subsequently released on bail. He was summarily suspended from duty and was due to appear before the DRC’s National Security Council on Friday morning. But local reports said he was found dead at his home in the Congolese capital Kinshasa, just hours before he was due to appear before the Council. His wife, Brenda Kahimbi, told the Reuters news agency that he had suffered a heart attack and was pronounced dead in hospital. There are rumors in Kinshasa that he committed suicide, but this is disputed by his family and supporters.

The DRC Armed Forces Council confirmed General Kahimbi’s death, but refused to comment on the cause of his death, or on the precise accusations that he was facing. Late on Friday, the Council released a statement praising General Kahimbi’s contribution to the national security of the DRC. It also announced the launch of an investigation into the general’s death.

Author: Joseph Fitsanakis | Date: 02 March 2020 | Permalink

US intelligence agencies using ‘wide range’ of spy tools to monitor coronavirus

CDC AtlantaUnited States intelligence agencies are using “a wide range” of tools, ranging from open-source collection to communications interception and human intelligence, to collect desperately needed data about the spread of the coronavirus, according to sources. As of late last week, some of the most dependable data on the spread of the virus, known as COVID-19, came from military channels of information, according to Yahoo News’ National Security and Investigations Reporter Jenna McLaughlin.

Writing last Friday, McLaughlin cited “two sources familiar with the matter”, who said that the Office of the Director of National Intelligence and the Central Intelligence Agency’s Global Issues Mission Center were collecting and analyzing real-time data on the coronavirus. The spread of the disease was also being monitored by the National Center for Medical Intelligence, which assesses the impact of disease outbreaks on American and foreign military personnel, said McLaughlin. She added that the intelligence generated by these agencies was being channeled to the Centers for Disease Control and Prevention and the Department of Health and Human Services, which lead the White House’s Task Force on COVID-19.

A major concern of the US Intelligence Community is that the Chinese, Iranian and other governments around the world may not be sharing comprehensive data on the spread of the virus and its impact. “No data means spying”, one unnamed source told McLaughlin. According to Reuters’ Mark Hosenball, US intelligence agencies have been using “a wide range of intelligence tools”, including human intelligence and electronic communications interception to track the spread of COVID-19. A major question that US intelligence agencies are trying to answer is whether governments like China’s or Iran’s have effective “continuity operations” plans in place, which relate to preserving the main functions of government during a major national disaster.

According to Hosenball, there is pessimism among US intelligence experts about the ability of developing countries around the world to respond to a massive COVID-19 outbreak. One example is India, whose dense population and rudimentary public-health infrastructure raises serious concerns about the government’s ability to protect the country’s population from a major pandemic. The report adds that there “deep concern” in US government circles about the possibility that Iran may be covering up the details about the spread of COVID-19.

Author: Joseph Fitsanakis | Date: 28 February 2020 | Permalink

US-Taliban peace deal will empower ISIS in Afghanistan, say insiders

ISIS Islamic State AfghanistanAn imminent peace agreement between the United States government and the Taliban will inadvertently empower the Islamic State in Afghanistan, according to a number of insiders, who warn that the soon-to-be-announced deal may have grave unintended consequences for the war-ravaged country.

After nearly two decades or war, the United States is close to concluding a peace agreement with the Taliban, the Pashtun-based Sunni group that has waged an Islamist insurgency against the American-supported government of Afghanistan since 2001. The two sides have said that they will be signing a peace settlement on February 29, providing that an ongoing agreement for a week-long reduction in armed violence holds. If the current reduction in violence continues unabated, the United States has agreed to remove most of its troops from the country, while the Taliban have agreed to initiate peace negotiations with the Afghan government.

But a team of journalists with the American television program Frontline, who are working on the ground in Afghanistan, report that the impending peace deal may bear unintended consequences. They report that numerous sources in Afghanistan are warning that the peace deal will result in an increase in membership for the Islamic State forces in the country. This will happen, they say, because Taliban fighters who object to a peace treaty with Washington will abandon the Taliban and join the Islamic State. Some Frontline sources claim that the majority of the Taliban’s foot soldiers are preparing to join the Islamic State if a deal is struck between Washington and the Taliban.

The Frontline team quotes one Islamic State commander in Afghanistan, who claims that the peace deal will “make the caliphate rise”, as “Taliban fighters have promised to join us”. The United States is trying to pre-empt this expected trend, according to reports. The Pentagon expects that, as soon as the peace treaty with the Taliban is signed, it will need to redirect its remaining troops in the country to focus their attention to the forces of the Islamic State.

Author: Joseph Fitsanakis | Date: 27 February 2020 | Permalink

Russian spy who tried to kill Bulgarian arms dealer is now a diplomat, report claims

Emilian GebrevA Russian intelligence officer, who was allegedly involved in an attempt to kill a Bulgarian arms dealer in Sofia in 2015, is now a diplomat, according to report published on Tuesday by the investigative website Bellingcat. The website also claimed that there is a possible connection between the intelligence officer and the attempted assassination of Russian intelligence defector Sergei Skripal in England in 2018.

In January, prosecutors in Bulgaria charged three Russian men with attempted murder. The men were identified as Sergei Fedotov, Sergei Pavlov and Georgy Gorshkov, all of them residents of Moscow, according to Bulgarian prosecutors. They were charged with attempting to kill Emilian Gebrev (pictured), a wealthy Bulgarian defense industry entrepreneur and trader. Gebrev was hospitalized for several days for signs of poisoning, along with his son and one of his company’s executives. All of them eventually made a full recovery. Gebrev’s lawyers claim that he suffered from “intoxication with an unidentified organophosphorus substance”.

The case had been shelved for several years, but the Bulgarian state revived it following the attempted assassination of Skripal, which British officials blamed on the Russian state. British authorities charged two men, Anatoly Chepiga and Alexander Miskin —both of them allegedly Russian military intelligence officers— with attempting to kill Skripal. In February of 2019, Bulgarian officials claimed that there might have been a link between the attacks on Skripal and Gebrev. Last December, Bulgaria’s chief prosecutor announced that his office was investigating the alleged link between the two cases.

Now Bellingcat has said that it has discovered the real name of one of the three Russian men who were allegedly involved in the attempted killing of Gebrev. According to Bellingcat, the man, identified by Bulgarian authorities as Georgy Gorshkov, is in fact Yegor Gordienko, who is currently posted under diplomatic in Switzerland. According to the investigative website, Gordienko, 41, is currently serving as third secretary at the Russian Federation’s mission to the World Trade Organization in Geneva. State prosecutors in Bulgaria and the United Kingdom are investigating reports that Gordienko/Gorshkov was present in those countries when the attacks against Gebrev and Skripal took place, said Bellingcat.

Author: Joseph Fitsanakis | Date: 26 February 2020 | Permalink

More spies today in Australia than at the height of the Cold War, says intel chief

ASIO AustraliaThere are more foreign spies and their proxies operating today in Australia than during the height of the Cold War, according to the director of the Australian Security Intelligence Organisation (ASIO). This claim was made on Monday by Mike Burgess, who in 2019 was appointed director of the ASIO —Australia’s primary domestic security agency. Burgess added that the level of threat Australia faces from foreign espionage and other foreign interference activities is “currently unprecedented”.

Burgess made these comments during the AFIO’s Annual Threat Assessment, a new project that aims to inform Australians about counterintelligence activities against their country and highlight AFIO’s response. The agency’s director said that Australia is being targeted by “sophisticated and persistent espionage and foreign interference activities” from “a range of nations”, which “are affecting parts of the community that they did not touch during the Cold War”.

Additionally, the instigators of espionage operations against Australia have “the requisite level of capability, the intent and the persistence to cause significant harm” to Australia’s national security, said Burgess. The country is being targeted due to its strategic position and its close alliances with the leading Western countries, he said, and added that Australia’s advanced science and technology posture also attracts foreign espionage.

Burgess illustrated his presentation using the example of an unnamed “foreign intelligence service” that allegedly sent what he described as “a sleeper agent” to Australia. The agent, said Burgess, remained dormant for a number of years, quietly building links with the business community. During that time, the agent remained in contact with his foreign handlers and provided “on-the-ground logistical support” for foreign spies who visited Australia to carry out espionage.

The ASIO director did not identify the alleged “sleeper agent”, or the foreign countries that he alleged are spying against Australia. When asked about Burgess’ claims, Australian Prime Minister Scott Morrison said that the government would not name the countries behind the alleged espionage activities. Doing so, said Morrison, would not be in Australia’s national interest. Instead, “we’ll deal with this in Australia’s national interest, in the way we believe that’s best done”, he added.

Author: Joseph Fitsanakis | Date: 25 February 2020 | Permalink

US unable to trace $716 million worth of weapons given to Syrian rebels

Syrian Civil War rebelsThe United States government is unable to account for nearly $716 million in weapons it gave to various Syrian groups during the war against the Islamic State, according to a Department of Defense audit. The weapons were procured under the Counter Islamic State of Iraq and Syria Train and Equip Funds (CTEF) program, which was administered by the US Pentagon in 2017 and 2018. The CTEF program cost the US taxpayer a total of $930 million.

But now an audit by the Pentagon’s Office of the Inspector General, which was released to the public on Tuesday, shows that most of the CTEF weaponry’s whereabouts cannot be verified. The reason, according to the audit, is that officials with the Special Operations Joint Task Force – Operation Inherent Resolve, failed to maintain detailed lists of all military equipment given to Washington’s allies in Syria between 2017 and 2018. Officials did not have a centralized depository facility for dispensing the equipment, and no documentation was kept during the operation, according to the audit. Consequently, thousands of weapons, weapons parts and other military hardware were exposed to “loss and theft”, says the Pentagon report.

There is no speculation in the report about where the missing weapons may have ended up, nor is there any indication that they may have fallen into the hands of the Syrian government, the Islamic State or Iranian-backed Shiite paramilitaries that are active in the region. However, the report notes that the Syrian battlefield is awash with American-manufactured weaponry. Much of the weaponry fell into the hands of pro-Syrian government militias, or the Islamic State, after US-trained rebel groups were defeated by them, joined them or simply surrendered.

Author: Joseph Fitsanakis | Date: 21 February 2020 | Permalink

US arrests Mexican man for spying for Russia in mystery case involving informant

FBI MiamiThe United States Federal Bureau of Investigation has arrested a Mexican man, who is accused of spying in the city of Miami on behalf of the Russian government. Local media reports suggest that the target of the man’s spying was a Russian defector who gave American authorities information about Russian espionage activities on US soil.

In a news release issued on Tuesday, the US Department of Justice identified the man as Hector Alejandro Cabrera Fuentes, a Mexican citizen residing in Singapore. The statement said that Fuentes was arrested on Monday and was charged with “conspiracy” and “acting within the United States on behalf of a foreign government”.

According to the statement, Fuentes was recruited in April of 2019 by an unnamed Russian government official. His first assignment was to rent an apartment in Miami-Dade County using fake identification. One he carried out the assignment, Fuentes allegedly traveled to Russia, where he briefed his handler. He was then asked to return to Miami and drive to an apartment complex, where he was to observe a vehicle belonging to an individual that the Department of Justice statement describes as a “US government source”. Fuentes was tasked with providing his Russian handler with the vehicle’s license plate number.

Having been given a detailed physical description of the vehicle by his Russian handler, Fuentes drove to the apartment complex in Miami, but was stopped at the entrance to the complex by a security guard. While Fuentes was speaking with the security guard, Fuentes’ wife allegedly exited the car and took a photograph of the vehicle in question. According to the FBI, she later shared the photograph with Fuentes’ Russian handler on the mobile phone application WhatsApp. The photograph was discovered by US Customs and Border Protection agents on the smartphone of Fuentes’ wife on Sunday, as the pair tried to board a flight to Mexico City.

The US Department of Justice news release does not identify Fuentes’ alleged espionage target. But an article in The Miami Herald claims that the target is an FBI informant who has provided the Bureau’s counterintelligence division with critical information about Russian espionage operations in the Miami area. Fuentes is scheduled to appear in court for a pretrial detention hearing this coming Friday. His arraignment has been scheduled for March 3. The press release does not explain why Fuentes’ wife was not arrested.

Author: Joseph Fitsanakis | Date: 20 February 2020 | Permalink

Russia sent spies to Ireland to check undersea fiber-optic cables: report

Undersea cableThe Russian government sent a team of spies to Ireland to monitor undersea fiber-optic cables, which enable communications traffic between North America and Western Europe, according to a new report. The spies were allegedly sent to Ireland by the Main Directorate of the General Staff of the Russian Armed Forces, which is known in Russia as GU, and formerly as GRU.

Due to its geographical proximity to both North America and Europe, Ireland constitutes a major hub for several of the more than 300 undersea cables that currently cross the world’s oceans. Totaling over 500,000 miles, these cables deliver Internet and telephone traffic across every continent. Nearly all transcontinental communications traffic is facilitated through these cables.

According to the London-based Sunday Times newspaper, the Irish security services believe that the GU spies were sent to Ireland to check the cables for weak points, in case Moscow decides to sabotage them in the future. Others claim that the Russian spies sought physical access to the cables in order to install wiretaps. The Times article also claims that Russian spies were detected by Irish security personnel monitoring the Dublin Port, which is Ireland’s primary seaport. This, said The Times, prompted a security alert in government facilities along the Irish coastline.

The same report claimed that the GU has been using Ireland as a base for operations in northwestern Europe, from where Russian spies can gather intelligence on European targets such as Belgium, the United Kingdom, Holland and France.

Author: Ian Allen | Date: 18 February 2020 | Permalink

Swiss neutrality ‘shattered’ as leading cryptologic firm revealed to be CIA front

Crypto AGSwitzerland is reeling from the shock caused by revelations last week that Crypto AG, the world’s leading manufacturer or cryptologic equipment during the Cold War, whose clients included over 120 governments around the world, was a front company owned by the United States Central Intelligence Agency.

The revelation, published last Tuesday by The Washington Post and the German public broadcaster ZDF, confirmed rumors that had been circulating since the early 1980s, that Crypto AG had made a secret deal with the US government. It was believed that the Swiss-based company had allowed the US National Security Agency to read the classified messages of dozens of nations that purchased Crypto AG’s encoding equipment. These rumors were further-substantiated in 2015, when a BBC investigation unearthed evidence of a “gentleman’s agreement”, dating to 1955, between a leading NSA official and Boris Hagelin, the Norwegian-born founder and owner of Crypto AG.

But the reality of this alleged secret pact appears to have been even more controversial. According to last week’s revelations, the CIA and West Germany’s Federal Intelligence Service (BND) secretly purchased the Swiss company and paid off most of its senior executives in order to buy their silence. The secret deal allegedly allowed the US and West Germany to spy on the classified government communications of several of their adversaries —and even allies, including Italy, Spain and Greece, as well as Austria, Jordan, Saudi Arabia and the United Arab Emirates.

What is more, the secret CIA/BND partnership with Crypto AG was known to senior British and Israeli officials, and information derived from it was routinely shared with them. Government officials in Switzerland and even Sweden were aware that Crypto AG had been compromised, but remained silent.

American and German authorities have not commented on the revelations. But the story has monopolized Swiss media headlines for several days. Some news outlets have opined that the traditional Swiss concept of political neutrality has been “shattered”. Meanwhile, a Swiss federal judge has opened an investigation into the revelations, as the Swiss parliament is preparing to launch an official inquiry. Switzerland’s Prime Minister, Simonetta Sommaruga, said on Sunday that the government would discuss the issue “when we have the facts”.

Author: Joseph Fitsanakis | Date: 17 February 2020 | Permalink