Israel releases findings of internal probe into October 7 intelligence disaster

Hamas GazaTHE OFFICIAL INTERNAL INVESTIGATION into the performance of Israel’s Military Intelligence Directorate (MID) during the run-up to the Hamas attack of October 7, 2023, has been released. Known as The Road to War, the report addresses the central question of: how did the MID –the main military intelligence body of the Israel Defense Forces, or IDF– miss all the signs of the pending Hamas attack, and how did all the available warnings go unheeded?

To compline the report, the Intelligence Directorate of the IDF investigated how the most significant intelligence failure in the history of the State of Israel occurred, as well as how the MID analysts and other members of the intelligence community failed to notice the attack that Hamas had been planning.

According to the findings of the investigation, Hamas began planning its attack between seven and eight years ago, which means that Israeli intelligence should have been able to observe the relevant warnings as early as 2016. However, the IDF’s intelligence division missed the early signs.

It appears that the MID assumed Hamas had been deterred by Israel. There was also a prevailing assumption that the group’s military wing, led by Yahya Sinwar, had settled on improving the economic situation of Gaza Strip residents while securing its internal sovereign status in the Gaza Strip. The MID intelligence analysts were uniformly immersed in the concept that Hamas “did not want to and could not” go to war against Israel.

The main findings of the investigation are as follows: Read more of this post

At least four Russians released in prisoner exchange with West are verified ‘illegals’

SVR hqAT LEAST FOUR OF the eight Russians released by the United States and its allies last week, in exchange for 16 people held in Russian prisons, are verified ‘illegals’ —the term used to describe Russian non-official-cover intelligence personnel. All four operated using third country identity documents, including passports. In every case but one, these identity documents had been illegally acquired.

In intelligence parlance, the term ‘illegals’ emerged during the Cold War to describe Russian intelligence personnel who operated without any formal association with Russian diplomatic facilities. In many cases, these operatives used third country passports. This enabled them to operate with an unusual degree of flexibility and evade the attention of rival intelligence services. At the same time, however, the absence of diplomatic credentials prevented these operatives from claiming diplomatic immunity if caught. It thus exposed them to the possibility of lengthy prison terms upon discovery.

THE TWO GRU ILLEGALS

Among the prisoners exchanged last week was Pavel Alekseyevich Rubtsov. Rubtsov was born in the Soviet Union as the grandson of a Spanish evacuee, who had been taken to Moscow as a child by the leftist Spanish Republic during the Spanish Civil War. At the age of 9, Rubtsov moved with his mother to Spain, where he had his name legally changed to Pablo González Yagüe and grew up in Catalonia and the Basque Country. He was arrested in Poland in 2022 and charged with participating in foreign intelligence activities against Poland on behalf of the Main Directorate of the Russian Armed Forces’ General Staff, which is commonly known as GRU.

IntelNews has previously reported on the case of Mikhail Valeryevich Mikushin, who was also released and returned to Russia on Thursday. Mikushin lived for several years in Canada and Norway using a Brazilian passport under the name of José Assis Giammaria. When he was arrested by Norwegian authorities, Mikushin was working as a researcher on arctic security affairs for the Arctic University of Norway. Among other things, Mikushin was a volunteer researcher for a UiT GreyZone, a scholarly project that studies contemporary hybrid threats and grey zone warfare. Like Yagüe, Mikushin is also believed to have been employed by the GRU.

THE TWO SVR ILLEGALS

Arguably the most unusual case of illegals among those unveiled last week is that of Artem Dultsev and Anna Dultseva. The couple moved from Argentina to Ljubljana, the capital of Slovenia, in 2017. They brought with them their two young children, a boy and a girl, both of whom appear to have been born in Argentina. Artem Dultsev’s Argentinian passport bore the name Ludvig Gisch, born in 1984 in the West African country of Namibia. Dultsev posed as an information technology executive. His wife, Anna Dultseva, who operated an art gallery, used the cover name Maria Rosa Mayer Munos and went by Mayer. Read more of this post

South Korea’s top HUMINT agency probes potentially catastrophic data breach

North South KoreaIN A HIGHLY UNUSUAL move, authorities in Seoul have publicly acknowledged a data leak that may have resulted in the outing of a number of South Korean undercover human intelligence (HUMINT) operatives abroad. The South Korean Ministry of National Defense said on Sunday it was investigating an alleged link of highly sensitive data belonging to the Korea Defense Intelligence Command (KDIC).

Formed under American tutelage in 1946, KDIC is today considered South Korea’s most secretive intelligence agency. It operates under the Defense Intelligence Agency (DIA), which makes it part of the Ministry of National Defense’s chain of command. Unlike DIA’s civilian counterpart, the National Intelligence Service, KDIC rarely surfaces in unclassified news reporting, and it almost never issues press releases. Its operations primarily involve HUMINT activities, thus making it South Korea’s most active HUMINT-focused agency.

Predictably, KDIC’s primary intelligence target is North Korea. The agency gathers much of its intelligence on the North through an extensive network of undercover officers operating with diplomatic credentials. KDIC also handles non-official cover (NOC) operatives, who are located mostly in Asia. There have been periodic claims in the unclassified literature that some KDIC NOCs have operated inside North Korea at times –though such claims remain speculative.

On Saturday, the Seoul-headquartered Yonhap News Agency alleged that classified information relating to KDIC had been “leaked”. According to Yonhap, the leak included personally identifiable information about KDIC official and non-official cover personnel stationed abroad. The report claimed that the leak was discovered by South Korean authorities a month ago, and that the discovery had resulted in the recall of several KDIC undercover operatives serving overseas “due to concerns over their identities being exposed”.

The Yonhap report claimed that, according to an ongoing probe, the leak may have originated from a personal laptop computer belonging to a civilian KDIC employee. The employee has since claimed that the laptop had been hacked, but some investigators believe the suspect may have “intentionally left the laptop vulnerable to hacking by North Koreans”.

According to an official statement released on Sunday by the Ministry of National Defense, the case is “currently under investigation by military authorities”.

Author: Joseph Fitsanakis | Date: 29 July 2024 | Permalink

Ex-CIA analyst accused of spying for South Korea had prior warnings from FBI, CIA

NIS South KoreaA FORMER INTELLIGENCE ANALYST for the Central Intelligence Agency (CIA), who is married to a high-profile columnist for The Washington Post, remains under arrest for allegedly spying for South Korea. According to an indictment unsealed last Tuesday in the Southern District of New York, the former CIA analyst is Sue Mi Terry, 54, of New York. Terry is a naturalized American citizen born in Seoul, South Korea, who grew up in Virginia and received a PhD from Tufts University in Massachusetts.

Terry joined the CIA in 2001 but resigned in 2008, allegedly “in lieu of termination” because her employer “had ‘problems’ with her contact with” officers from South Korea’s National Intelligence Service (NIS). After leaving the CIA, Terry worked briefly for the National Security Council and the National Intelligence Council, before transitioning to academia. Her most recent post was that of a senior fellow at the Council on Foreign Relations, where she became known as an exert on East Asian affairs with a focus on the Korean Peninsula. For over a decade, Terry has made frequent appearances on television and radio, as well as on several podcasts. She is married to the Washington Post columnist Max Boot.

The Department of Justice accuses Terry of failing to register under the Foreign Agents Registration Act and deliberately conspiring to violate that law, thus effectively operating as an unregistered agent of a foreign power. The indictment claims that Terry was gradually recruited by the NIS, beginning in 2013, two years after she stopped working for the United States government. Terry allegedly continued to work for the NIS for a decade, during which she was handled by NIS intelligence officers posing as diplomats in South Korea’s Washington embassy and permanent mission to the United Nations in New York.

It is alleged that throughout that time Terry provided her NIS handlers with access to senior US officials, disclosed “nonpublic US government information” to the NIS, and promoted pro-South Korean policy positions in her writings and media appearances. In return, Terry is alleged to have received luxury goods, free dinners at expensive restaurants, and nearly $40,000 in “covert” funding, nominally to operate a public policy program on Korean affairs. It is worth noting that, according to the unsealed indictment, the Federal Bureau of Investigation warned Terry that she should be wary of being approached by NIS officers seeking to offer her funding. Read more of this post

Military and intelligence officials arrested in Bolivia over coup attempt

Luis Arce

Luis Arce

NEARLY 20 MILITARY AND intelligence officials have so far been arrested in Bolivia, less than a week after a former military commander led a failed coup against the government of President Luis Arce (pictured). Several military units stormed the Casa Grande, the presidential palace in La Paz, the Bolivian capital. An armored vehicle was used to ram the main gate of the palace, allowing soldiers to enter the building. However, soldiers were later seen withdrawing from the plaza in front of Case Grande, and police took back control.

Within hours, Bolivian forces loyal to President Arce had arrested the apparent leader of the coup, General Juan José Zúñiga. Arce had appointed Zúñiga commander general of the Bolivian armed forces in 2022. The commander of the Bolivian Navy, Juan Arnez Salvador, has also reportedly been arrested, as well as over a dozen other military and intelligence officers. According to reports, over 200 military and intelligence personnel participated in the failed coup, including high-ranking officers. A press statement issued on Saturday by the Bolivian government said that the investigation into the coup will continue until all participants in the coup are identified.

Meanwhile, President Arce denied claims made by Zúñiga that he had been secretly asked by Arce to create instability in the country, in order to prompt the Bolivian population to rally around the government. In a press conference held in La Paz on Thursday, the president denied he had any involvement in the planning of the coup or that he had prior knowledge of the coup plot. Earlier on the same day, Bolivia’s Minister of the Interior, Eduardo del Castillo, had said in a radio interview that his ministry had received intelligence about potential attempts to destabilize the government. However, during his press conference, President Arce denied the existence of intelligence reports warning about a coup: “We were never informed about [Zúñiga’s] reports […]. We were surprised”, he said.

Arce, a 60-year-old former minister of economics, rose to the presidency in 2020. The 2020 elections followed a period of widespread political turmoil in Bolivia, which led to the forced resignation of then-President Evo Morales. Arce’s rise to power facilitated the return of Morales to Bolivia after a period of self-exile. However, Morales and Arce, who were once close political allies, fell out after Morales’ return to Bolivia. They now lead rival factions of the once unified Movement to Socialism (MAS).

The United States, China, and Russia, which compete for influence and access to resources in Bolivia, have remained largely silent since the coup. Arce’s government has prompted discontent in Washington by signing agreements with Chinese and Russian firms to exploit reserves of lithium, which are ample in Bolivia. Lithium is essential for the production of batteries for laptops, cell phones and other electronics, as well as electric vehicles.

Author: Joseph Fitsanakis | Date: 01 July 2024 | Permalink

Russia uses merchant navy fleet for intelligence operations in North Sea, study reveals

undersea telecommunications cable

HUNDREDS OF RUSSIAN MERCHANT ships have been utilized by the Kremlin for over a decade to carry out intelligence operations in the North Sea, a major new investigation has revealed. Belgian newspaper De Tijd and the investigative journalism website Follow the Money (FTM) carried out the joint investigation, using data provided by Global Fishing Watch, a Google-based international nonprofit organization that gathers information on commercial fishing activities worldwide.

Encompassing 220,000 square miles, the North Sea lies between France, Belgium, the Netherlands, the United Kingdom, Norway, Denmark, and Germany. It hosts many of the world’s major shipping lanes, an extensive network of energy pipelines, as well as key undersea communication cables. The development of large-scale offshore energy production has further-augmented the significance of the North Sea for the security of Europe in recent years. The strategic value of the North Sea has become even clearer since the onset of the Russo-Ukrainian war in 2014.

According to the De Tijd/FTM study, the Russian government has been highly active in the North Sea through a variety of stealthy means –primarily by deploying civilian vessels to collect intelligence and possibly even carry out sabotage operations. The study focused on 1,012 Russian-flagged non-military vessels that have been active in the North Sea since 2014. These consist of oil tankers, scientific research vessels, fishing boats, cargo ships, and even privately owned yachts.

The study identified 60,000 loitering events involving these Russian vessels. In the shipping domain, the term ‘loitering event’ refers to vessels that deviate from their normal route, reduce speed for no obvious reason, drift aimlessly, or circle around a location that may initially appear arbitrary. Loitering and other such peculiar behavior by merchant ships makes no economic sense, as it requires more fuel and results in added compensation for crews. Notably, close to 1,000 loitering events by nearly 170 different Russian ships were found to have taken place within less than a mile from an underground cable or energy pipeline. Read more of this post

U.S. Pentagon ran secret COVID-19 anti-vaccination campaign to undermine China

Coronavirus COVID-19THE UNITED STATES DEPARTMENT of Defense ran a secret psychological operation on multiple social media platforms, aimed at undermining Chinese-manufactured vaccines against COVID-19. The controversial campaign was met with objections by several U.S. government officials, but continued for over a year, spanning both the Trump and Biden administrations.

According to the Reuters news agency, which uncovered the alleged plot, the psychological operation initially targeted the Philippines in the spring of 2020. During that time, the Southeast Asian nation relied heavily on the CoronaVac, also known as the Sinovac COVID-19 vaccine, which was manufactured by the Chinese biopharmaceutical firm Sinovac Biotech. The CoronaVac vaccine was approved for human consumption by the World Health Organization.

An investigation by Reuters determined that the U.S. Pentagon attempted to undermine the efficacy of the Chinese-manufactured vaccine, in order to sabotage the relations between China and the Philippines. Over time, the Pentagon project morphed into an anti-vax campaign that questioned the quality of Chinese-produced coronavirus test kits and Chinese-supplied face masks. There was also an attempt to stigmatize Chinese-produced medical supplies relating to COVID-19. The campaign argued that the coronavirus had originated in China, which made Chinese-manufactured medical supplies suspect.

The psychological operation utilized hundreds of fake social media accounts on multiple platforms, which were unified under the hashtag #Chinaangvirus —Tagalog for “China is the virus.” By early 2021, the campaign had expanded to the Middle East and Central Asia. Some social media posts claimed that Muslims should not be using the Sinovac COVID-19 vaccine because it contained pork gelatin and should thus be considered forbidden under Islamic law. These tactics raised objections by some U.S. government officials, notably from the State Department, who expressed them in meetings with Pentagon personnel. The secret campaign was terminated in June of 2021.

The Reuters news agency spoke to Greg Treverton, former chairman of the U.S. National Intelligence Council, which ensures that the work of the nation’s intelligence agencies reflect the government’s policy priorities. Treverton told the news agency that getting “as much vaccine in people’s arms as possible” would have been in the national interest of the U.S., adding that the Pentagon’s secret operation “crosses a line”. Reuters said that a senior Pentagon official acknowledged a secret psychological operation was indeed launched, in order to “disparage China’s vaccine in the developing world.” However, the official “declined to provide details” of the operation.

Author: Ian Allen | Date: 17 June 2024 | Permalink

Denmark arrests Russian woman in connection with covert Kremlin legal fund

PET DenmarkA RUSSIAN WOMAN IS under arrest in Denmark, reportedly in connection with a surreptitious legal fund that is allegedly connected to intelligence operations conducted by the Kremlin. The Danish Security and Intelligence Service (PET) said on Tuesday that the Russian national had been detained south of the Danish capital Copenhagen on suspicion of “enabling a foreign intelligence service to operate in Denmark”.

Crucially, the PET press statement noted that the arrest relates to recent reports about a legal defense fund with covert links to the Kremlin, which was uncovered in the press. On June 3, the state-owned Danish Broadcasting Corporation (DR) published information from 40 leaked documents about an alleged sovereign wealth fund known as Fund for Support and Protection of the Rights of Compatriots Living Abroad (Pravfond).

According to the DR report, Pravfond was set up in secret by the Russian authorities in order to finance the Kremlin’s disinformation campaigns in nearly 50 countries around the world. Pravfond also operates as a legal defense fund for Russian intelligence operatives who have been captured abroad while carrying out intelligence operations. For example, it contributed funds for the legal defense of notorious Russian weapons merchant Viktor Bout and Vadim Krasikov, a Russian assassin who is currently being held in a German prison.

The PET said that the Russian woman would be released following questioning, adding that the investigation into the espionage case would continue. The agency did not name the woman. However, according to reports in the Danish media, she is “a central figure in the Russian community in Denmark”.

Author: Joseph Fitsanakis | Date: 12 June 2024 | Permalink

France arrests Russian-Ukrainian dual national with fake passports following explosion

Roissy-en-FranceAN INVESTIGATION HAS BEEN launched in France after a Ukrainian-born Russian national reportedly detonated explosives in a hotel room near Paris, suffering severe burns in the process. Sources from France’s National Anti-Terrorism Prosecutor’s Office (PNAT) said the incident occurred on Monday in a hotel in Roissy-en-France, a small bedroom community located 15 miles northeast of downtown Paris.

At the scene of the explosion police found a severely burned man, who was later identified as a 26-year-old from the Donbas region of eastern Ukraine. Most of the Donbas region has been under Russian military occupation since 2014. The man is reportedly a Russian speaker and holds both Ukrainian and Russian nationalities. He is currently in hospital receiving treatment for severe burns, and is formally under arrest.

The PNAT and the General Directorate for Internal Security (DGSI), France’s counterterrorism and counterespionage agency, are investigating the suspect’s background and activities. According to media reports, the suspect’s hotel room contained “substances and materials intended for the manufacture of explosive devices”. A number of guns and forged passports were also found in the room.

As intelNews reported earlier this week, French police arrested a Bulgarian, a Ukrainian and a German national, who deposited five coffins, draped in French flags, at the base of the Eiffel Tower. The flags reportedly bore the inscription “Dead French Soldiers of Ukraine”. While the investigation is ongoing, French authorities are said to have classified the incident as a Russian psychological operation aimed at affecting French public opinion. It is not known whether the two cases are in any way connected.

Author: Joseph Fitsanakis | Date: 06 June 2024 | Permalink

French police arrest foreign nationals in suspected Russian influence operation

Eiffel TowerFRENCH POLICE ARRESTED THREE foreign nationals on Monday, accusing them of having deposited five coffins draped in French flags at the foot of the Eiffel Tower. The flags bore the inscription “French Soldiers of Ukraine”, while the coffins were found to contain sacks of plaster, according to media reports. The reports quoted French intelligence officials as saying that the stunt was likely a Russian operation aimed at influencing French public opinion against a potential military involvement in Ukraine.

Close circuit television footage led French police to the driver of a van that carried the coffins to the Eiffel Tower at 9:00 a.m. local time on Saturday. The 34-year-old driver, identified as “Georgi F.”, is believed to be a Bulgarian national. He told police he had arrived in Paris from Bulgaria on Friday and had been paid €40 by two other men to help transport the coffins to the iconic Paris monument. The two men, who allegedly paid the Bulgarian national, were arrested shortly afterwards while they were preparing to board a bus to Germany. One of them is believed to be a German national, while the other is said to hold Ukrainian citizenship.

The two men allegedly told French police they had been paid €400 to transport the coffins. French authorities reportedly believe the stunt was “organized from abroad” and that “Russian agents” may be behind it. There are allegations that the individual who paid the men may have been the same person who organized a similar stunt in May. In the early hours of May 14, someone defaced the Wall of the Righteous at the Mémorial de la Shoah, which includes the Holocaust museum in Paris’ 4th arrondissement. The names of nearly 4,000 people who helped save Jews in France are inscribed on that wall.

Last November, French authorities accused Russia of being behind stenciled images of Stars of David that had mysteriously appeared in the streets of Paris in late October. At least two of those arrested in the ensuing days were Moldovan nationals. The Paris prosecutor said at the time that the culprits had been in contact with a Russian-speaking individual who had offered to pay them in exchange for graffitiing the stars. Some reports speculated that the graffiti may have been part of a campaign by a “foreign actor trying to undermine French social cohesion”.

Author: Joseph Fitsanakis | Date: 04 June 2024 | Permalink

China accuses married couple of spying for Britain’s MI6

MSS China - IATHE SPY CONFLICT BETWEEN China and the United Kingdom escalated last week, as the Chinese government accused a married couple of carrying out espionage missions on behalf of British intelligence. In a rare statement to the press, China’s Ministry of State Security (MSS) said it was investigating the activities of a husband-and-wife team, whom it accused of working as assets for Britain’s Secret Intelligence Service, better known as MI6.

According to the MSS statement, the husband, whose last name is Wang, participated in a student exchange program in the United Kingdom in 2015. While there, he was surreptitiously accosted by MI6 and was invited to dinners and other outings. Eventually Wang was offered part-time employment as a consultant for a British firm that operated as a front for MI6. He was eventually approached by MI6 directly and was recruited as a spy in exchange for substantial monetary rewards.

Wang was allegedly trained in espionage tradecraft and returned to China to collect intelligence on the Chinese government on behalf of MI6. The MSS claims that Wang’s MI6 handlers asked him to recruit his wife, whose last name is Zhou, as a spy. Eventually both Wang and Zhou spied for MI6 in return for money. It is not known whether the alleged spies worked for the MSS or another intelligence-related government agency.

The MSS press statement was issued a few days after the agency unveiled a seemingly unconnected case of espionage involving “a former government employee who was lured by a foreign intelligence agency through the internet” and “stole secrets for money”. The MSS also said that the man’s handler, named Xiao Jing, had been arrested and charged with operating as “a spy working for a foreign intelligence agency”.

Author: Ian Allen | Date: 03 June 2024 | Permalink

German intelligence agencies discuss ongoing espionage and hybrid challenges

Conference AgendaTHE 5TH SYMPOSIUM ON the Law of Intelligence Services (Symposium zum Recht der Nachrichtendienste) took place in Berlin, Germany, on March 21-22. In view of the public criticism that German intelligence agencies have faced in recent times, it was probably a relief for their officials to be able to talk more-or-less among themselves for once.

The event (see agenda in .pdf) was organized by the Federal Ministry of the Interior and the Federal Chancellery Office. This year’s topic was: “Intelligence Agencies and Armed Conflicts”. It included the tried and tested mix of academics —predominantly legal scholars—, practitioners and heads of various government authorities. The majority of the external experts discussed the complicated and, in Germany, arduous parliamentary procedures that would arise in the event of a war.

In view of the controls increasingly being placed on German intelligence agencies by various bodies and authorities —which were also represented at the symposium— a certain discrepancy became apparent repeatedly in the presentations: How can the German intelligence agencies react adequately and quickly to hybrid threats when these types of threat do not concern themselves with administrative-legal subtleties and parliamentary procedures? Although the concept of hybrid threats was generally taken for granted and therefore hardly discussed in terms of content, those present agreed at a minimum that disinformation is part of it. All the more worrying was the statement by one speaker who explained that there was no official definition of disinformation within the German security authorities’ legal codes.

In the discussion, the panel moderated by Center for Intelligence Service Training and Further Education (ZNAF), the common training and study location of the Federal Intelligence Service (BND) and the Federal Office for the Protection of the Constitution (BfV), clearly stood out and underscored that this relatively new institution has made a name for itself in the academic intelligence landscape since its establishment in 2019.

However, the symposium also showed that the German security bureaucracy tends to reach its limits when it comes to current developments in the unconventional domain. This was demonstrated, for example, by a speaker’s demand that hybrid risks ought to be assigned to a “state area of responsibility”. The problem, however, lies precisely in the statelessness of hybrid risks. The existing regulations are also proving to be counterproductive, in view of the challenges: there would simply be highly heterogeneous participants in the so-called Cyber Defense Centre, which would also include police authorities. However, due to the strict separation in the legal domain, personal data cannot simply be passed on from the BND to the Federal Police, for example. Read more of this post

Germany arrests sixth alleged spy in less than a month

MSS ChinaAUTHORITIES IN GERMANY HAVE arrested a sixth person in less than a month, in connection with three separate cases of espionage orchestrated by Russian or Chinese intelligence. Last Tuesday, police in the east German city of Dresden arrested an assistant to a leading politician of the far-right Alternative für Deutschland party (AfD). The assistant, who is a dual German-Chinese citizen, is accused of spying for Chinese intelligence, while the far-right politician who employed him is also being investigated, according to reports.

German news reports have identified the alleged spy as Jian Guo, 43, who lives in Dresden with his wife and children. Guo reportedly entered Germany as a student and stayed there after completing his studies, eventually becoming a naturalized German citizen. In 2019 he joined the staff of the office of Maximilian Krah, a senior AfD politician, who had recently been elected to the European Parliament.

According to the German prosecutor’s office, Guo had begun working for Chinese intelligence prior to joining Krah’s office as an assistant. At least some of his alleged espionage activities involved posing as a critic of the Chinese government and joining dissident groups of Chinese expatriates in Germany. He would then provide information about the activities of these groups to Chinese intelligence, according to his indictment. The latter described Guo’s intelligence activity as “an especially severe case” of espionage.

Meanwhile, German authorities are also reportedly investigating Krah himself over payments he allegedly received from pro-Chinese and pro-Russian individuals or groups. In a statement issued late last week, the AfD politician said he had been informed about Guo’s arrest from media reports and that he had no information about this case. Shortly after Krah’s statement, the AfD described Guo’s arrest as “highly disturbing” and added that party authorities would do “everything possible to aid the investigation”.

During the month of April alone, Germany has arrested no fewer than six individuals in a series of apparently unconnected cases of espionage, connected with Russia or China. Two of these individuals are German citizens of Russian origin, who were allegedly assisting Russian intelligence plan acts of sabotage against military installations located on German soil. Three other German citizens were allegedly planning to provide designs of advanced aircraft engines to Chinese intelligence officials.

Author: Joseph Fitsanakis | Date: 29 April 2024 | Permalink

Poland and Germany charge Russian operatives with assassination, sabotage plots

Rzeszów-Jasionka AirportAUTHORITIES IN GERMANY and Poland have charged three individuals with working on behalf of Russian military intelligence in planning acts of sabotage and assassination on European soil. One of the plots allegedly involved an effort to assassinate Ukrainian President Volodymyr Zelenskyy. Another aimed to sabotage commercial airport facilities that are being managed by the United States military.

Polish and Ukrainian authorities announced last week the arrest of Paweł K., a Polish citizen, who is believed to have been engaged in collecting information about the security of the Rzeszów-Jasionka Airport. Located in southeastern Poland, Rzeszów-Jasionka is a relatively small provincial airport. Its proximity to the Ukrainian border has made it central to efforts by Kyiv’s allies to supply it with war materiel following the expansion of Russia’s occupation of Ukraine in February 2022. Military supplies are transported to Rzeszów-Jasionka from across the world and then transferred across the Ukrainian border with trucks. Additionally, many high-level meetings between Ukrainian and Western officials take place at the airport. The United States military is currently providing security at the Rzeszów-Jasionka Airport.

Polish authorities said last week that Paweł K. was part of a Russian intelligence collection operation that was “intended to assist in the planning of a potential assassination of a foreign state leader”, namely President Zelenskyy. The Security Service of Ukraine (SBU) said it informed its Polish counterpart agency about the assassination plot, which had been foiled “as a result of the close co-operation” between Ukrainian and Polish intelligence. Paweł K. is not a diplomat and thus has no immunity from prosecution in Poland. If convicted, therefore, he could face up to eight years in prison.

In a seemingly unconnected development, police in the southeastern German state of Bavaria arrested two dual German-Russian nationals, who have been charged with planning to sabotage military and industrial facilities on German soil. The plot appears to be part of broader Russian efforts to disrupt the production and delivery of military aid to Ukraine. At least one of the locations that the suspects are accused of targeting is a local military base under the command of the United States. The two suspects have been identified as Dieter S., 39, and Alexander J., 37. Both were arrested in the small city of Bayreuth.

Germany’s Federal Foreign Office, led by Minister Annalena Baerbock, summoned Sergei Nechayev, Russian Ambassador to Berlin, shortly after the arrest of Dieter S. and Alexander J. Some media reports noted the “unusually hasty” way Nechayev was summoned, which may indicate that German authorities have acquired “unequivocal proof of the link between the plot and the Kremlin”. An announcement made by the Russian embassy in Berlin confirmed that Nechayev had been summoned in connection to the arrests, but added that the ambassador had been presented with “no proof” that the two suspects were connected with Russian intelligence or that they had planned acts of sabotage.

Author: Joseph Fitsanakis | Date: 22 April 2024 | Permalink

Interview reveals state of mind of Israeli intelligence prior to October 7 attack

Israeli General Staff MilitaryON MARCH 23, CHANNEL 12 of Israeli television aired a remarkable interview with Sassi Elya, the former director of technology at the Israel Security Agency (ISA). Better known by the acronyms Shin Bet or Shabak, the ISA is Israel’s domestic security service. The interview had initially been scheduled for broadcast as part of the evening news on October 7, 2023. However, its airing was canceled due to the attack on Israel by Hamas, which occurred that morning.

But on March 23, after about 5 months, Channel 12 aired the original interview with Elya. The retired official spoke with glee about the advanced technological capabilities developed by the ISA in order to prevent terrorist attacks against Israel. Elya said Israeli intelligence had built a unique system, known as “the Tool”, which allegedly provided intimate knowledge about the life of every Palestinian living in the West Bank and Gaza. This technologically advanced surveillance system allegedly monitored every move of its targets, all for the purpose of preventing potential terrorist attacks against the Jewish state. Elya claimed that, as a result of this advanced technological system, there was no chance that Israel would be surprised by Palestinian militants. This system was so advanced, he said, that intelligence agencies from all over the world were coming to Israel to learn about it.

Thanks to Channel 12, we can now examine Elya’s interview retrospectively, and especially in light of the ISA’s poor performance on October 7, as well as its failure to warn Israeli authorities about Hamas’ preparations for the attack. Notably, Elya was interviewed again for the same television program. Predictably, he admitted that his prior assessment had been wrong and regretted being so overly confident about the technology.

This case demonstrates the overestimation by Israeli intelligence of its own capabilities, because of arrogance and over-confidence. This approach refutes the basic premise of intelligence work: be skeptical and be modest. Furthermore, this case highlights that Israeli intelligence agencies overly relied on technology (SIGINT) in the lead-up to October 7, while seemingly neglecting the low-tech activity of gathering information through human intelligence (HUMINT).

The system that Elya described in his initial interview as the ultimate counterintelligence tool was reportedly criticized internally by some in the ISA for gathering huge amounts of information without offering sufficient analytical capability. This imbalance between collection and analysis can render an entire surveillance system practically useless. The bottom line is that, almost by accident, we are now aware of the state of mind that the ISA was in before the sudden attack by Hamas on October 7, which cost so many lives as a result of the ISA’s complacency.

► Author: Avner Barnea | Date: 01 April 2024 | Permalink

Dr. Avner Barnea is research fellow at the National Security Studies Center of the University of Haifa in Israel. He served as a senior officer in the Israel Security Agency (ISA). He is the author of We Never Expected That: A Comparative Study of Failures in National and Business Intelligence (Lexington Books, 2021).