North Korea asked Israel for $1 billion to stop giving missile technology to Iran

Thae Yong-HoNorth Korea offered to stop selling missile technology to Iran and other enemies of Israel in exchange for $1 billion in cash from the Jewish state, according to former senior North Korean diplomat who has now defected. The account of the offer can be read in Password from the Third Floor, a book published earlier this year by Thae Yong Ho. Thae, a member of a prominent North Korean family, defected with his wife and children in 2016, while he was serving as a senior member of the diplomatic staff of the North Korean embassy in London. News of Thae’s defection emerged on August 16, 2016, when a South Korean newspaper reported that he had disappeared from London after having escaped with his family “to a third country”. Thae later emerged in Seoul, from where he publicly denounced the North Korean regime.

Now Thae has written a book about his experiences as a North Korean diplomat from a family that is close to the country’s ruling Kim dynasty. In his memoir, Thae claims that he acted as a translator during a series of meetings between Son Mu Sin and Gideon Ben Ami, respectively North Korea’s and Israel’s ambassadors to Sweden. The alleged meetings took place in secret in the winter of 1999 in Stockholm, says Thae. During the first meeting, Son allegedly told Ben Ami that Pyongyang had a series of agreements to sell ballistic missile technology and know-how to Israel’s adversaries, such as Syria, Pakistan and Iran. However, the North Korean government would be willing to scrap the agreements in exchange for $1 billion in cash from Israel, said Son. Ben Ami reportedly told his North Korean counterpart that he would pass along his offer to the Israeli government. Three days later, says Thae, the two men held another secret meeting, during which the North Korean ambassador was told that Israel was not willing to pay Pyongyang $1 billion in cash. However, it could offer humanitarian aid of equal value. But according to Thae the North Koreans refused and “the talks ended without an agreement”.

It is believed that North Korea then went ahead and supplied both Syria and Iran with missile and nuclear technology. On Sunday, The Wall Street Journal reported that it contacted the government of Israel with several questions stemming from Thae’s account of the alleged diplomatic exchange of 1999. However, it received no response. The paper also tried to elicit responses from Ben Ami and Son, but had no success. According to The Journal, Ben Ami said during a television interview last week that he held three meetings with a group of North Korean officials in 1999. But he did not name the diplomats, nor did he discuss the subject of his conversations with them.

Author: Joseph Fitsanakis | Date: 10 July 2018 | Permalink

Holland expels two Iranian diplomats, but stays silent on reasons

Iran embassy HagueHolland has expelled two Iranian diplomats without saying why, leading to speculation that the expulsions may be related to the arrests of members of an alleged Iranian sleeper cell in Belgium, Germany and France last week. On Friday, a spokesperson from Holland’s General Intelligence and Security Service (AIVD) told reporters that “two persons accredited to the Iranian embassy” in the Hague “were expelled from the Netherlands on June 7”. The spokesperson continued saying that, although the AIVD was able to confirm that the two unnamed persons had been expelled from the country, they would “not provide any further information”. When journalists contacted Holland’s Ministry of Foreign Affairs, they were told that there would be no comment on the matter from the Dutch government.

Late on Friday, the Reuters news agency cited an unnamed “European government official and a Western intelligence source” who said that the two Iranian embassy personnel were expelled from Holland “up to two months ago”. But Holland’s state-owned Dutch Broadcast Foundation (NOS) reported that the expulsions took place on June 7. No further information appears to be publicly available. However, assuming that the expulsions took place last week, and not two months ago, they appear to have coincided with the arrests of members of an alleged Iranian sleeper cell on June 30 and July 1. As intelNews reported last week, the arrests began on June 30, when members of Belgium’s Special Forces Group arrested a married Belgian couple of Iranian descent in Brussels. The couple were found to be carrying explosives and a detonator. On the following day, July 1, German police arrested an Iranian diplomat stationed in Iran’s embassy in Vienna, Austria. On the same day, a fourth person, who has not been named, was arrested by authorities in France, reportedly in connection with the three other arrests.

All four individuals appear to have been charged with a foiled plot to bomb the annual conference of the National Council of Resistance of Iran (NCRI) that took place on June 30 in Paris. The NCRI is led by Mujahedin-e Khalq (MEK), a Marxist militant group that has roots in radical Islam and Marxism. Until a few years ago, the MEK was designated as a terrorist group by the European Union and the United States, but has since been reinstated in both Brussels and Washington. There is also speculation that last week’s expulsions in Holland may be related to the assassinations of dissident Iranian expatriates in Holland in 2015 and 2017, which have been blamed on the government in Tehran.

On Saturday, the Iranian Ministry of Foreign Affairs summoned the Dutch ambassador to protest against the expulsions of its diplomats, while a ministry spokesperson warned that “the Islamic Republic reserves the right to retaliate”. Reuters quoted an unnamed “senior Iranian official” who said that “all these arrests and expulsions are part of our enemies’ attempts to harm efforts to salvage the nuclear deal”, a reference to the Joint Comprehensive Plan of Action.

Author: Joseph Fitsanakis | Date: 09 July 2018 | Research credit: M.K. | Permalink

Iran sleeper cell agents, including diplomat, arrested in three European countries

National Council of Resistance of IranAn Iranian diplomat and members of what authorities described as an “Iranian sleeper cell” were arrested this week in Belgium, Germany and France, as they were allegedly planning to a bomb a high-level meeting in Paris. The arrests came after a complex investigation by several European intelligence agencies and were announced by Belgium’s Minister of the Interior, Jan Jambon.

The operation against the alleged sleeper cell began on Saturday, June 30, when members of Belgium’s Special Forces Group stopped a Mercedes car in Brussels. The car was carrying a married Belgian couple of Iranian descent, named in media reports as Amir S., 38, and Nasimeh N., 33. According to the Belgian Ministry of the Interior, Nasimeh N. was found to be carrying 500 grams of triacetone triperoxide (TATP) explosive and a detonator inside a toiletries bag. On the following day, Sunday, July 1, German police arrested Assadollah A., an Iranian diplomat stationed in Iran’s embassy in Vienna, Austria. According to reports, the diplomat was driving a rental car in the southeastern German state of Bavaria, heading to Austria. On the same day, a fourth person, who has not been named, was arrested by authorities in France, reportedly in connection with the other three arrests.

The four detainees were in contact with each other and were allegedly working for the Iranian government. All four have been charged with an alleged foiled plot to bomb the annual conference of the National Council of Resistance of Iran (NCRI) that took place last Saturday, June 30, in a Paris suburb. The National Council of Resistance of Iran is a France-based umbrella group of Iranian dissidents, led by Mujahedin-e Khalq (MEK), a militant group that has roots in radical Islam and Marxism. Between 1970 and 1976, the group assassinated six American officials in Iran and in 1970 tried to kill the United States ambassador to the country. It initially supported the Islamic Revolution of 1979, but later withdrew its support, accusing the government of Ayatollah Khomeini of “fascism”. It continued its operations from exile, mainly from Iraq, where its armed members were trained by the Palestine Liberation Organization and other Arab leftist groups.

Until 2009, the European Union and the United States officially considered the MEK a terrorist organization. But the group’s sworn hatred of the government in Iran brought it close to Washington after the 2003 US invasion of Iraq. By 2006, the US military was openly collaborating with MEK forces in Iraq, and in 2012 the group was dropped from the US Department of State’s list of foreign terrorist organizations. Today the group enjoys open protection from the EU and the US. According to Belgian authorities, the four members of the Iranian sleeper cell were planning to bomb the MEK-sponsored NCRI meeting in Paris under instructions by the Iranian government. Conference participants included over 30 senior US officials, including US President Donald Trump’s personal lawyer, Rudy Giuliani, who addressed the meeting. Stephen Harper, Canada’s former prime minister, also spoke at the conference.

Speaking in Brussels this week, Belgium’s Interior Minister Jambon praised the country’s intelligence, security and law enforcement agencies for foiling the alleged bomb plot in Paris. But Mohammad Javad Zarif, Iran’s Minister of Foreign Affairs, dismissed claims of an Iranian sleeper cell as “fake news” and described reports of a foiled bomb attack as “a sinister false flag plot”.

Author: Joseph Fitsanakis | Date: 06 July 2018 | Permalink

Judge rules that Trump’s tweet did not disclose top-secret CIA operation in Syria

Free Syrian ArmyA United States federal judge ruled on Monday that a tweet by President Donald Trump did not inadvertently disclose a top-secret program by the Central Intelligence Agency to aid rebel groups in Syria. The lawsuit, brought by The New York Times, centered on news reports published in 2017 by Reuters, The Washington Post, and others, claiming that the US president had terminated an extensive CIA program that provided assistance to rebel forces engaged in the Syrian Civil War. The program was reportedly initiated by US President Barack Obama, who in 2015 instructed the CIA to assist armed groups operating under the umbrella of the Free Syrian Army. Aside from training, the CIA assistance reportedly included the provision of light and heavy ammunition, such as antitank missiles, mines and grenades.

But President Trump allegedly terminated $1 billion program soon after he took office. Last July, the president openly disputed an account by The Washington Post’s Greg Jaffe and Adam Entous, which claimed that Trump had ended the program as a concession to Russia. In a tweet, Trump said: “The Amazon Washington Post fabricated the facts on my ending massive, dangerous, and wasteful payments to Syrian rebels fighting Assad”. Shortly afterwards, another newspaper, The New York Times, filed a Freedom of Information Act (FOIA) request, arguing that the president’s tweet had effectively disclosed the existence of the covert CIA program and seeking full details from the government. But the CIA rejected the The New York Times’ rationale, at which point the paper took the case to court.

But on Monday, US District Court Judge Andrew Carter Jr. dismissed the paper’s argument. In a 20-page decision, posted online by the US-based news website Politico, Judge Carter said that President Trump’s tweet had been too vague and ambiguous to be considered as effectively declassifying the secret CIA program. At no point did the US president “make an unequivocal statement, or any statement for that matter, indicating that he was declassifying information”, said the judge. Additionally, Trump’s tweet and other public statements on the matter did not undermine the legal authority of the US government to continue to keep details about the CIA program under wraps. According to Politico, which reported on Judge Carter’s decision, this development will make it difficult for other FOIA filers to use Trump’s tweets as justification for seeking information about secret government programs. Meanwhile, The New York Times said on Monday that it would seek to appeal Judge Carter’s decision.

Author: Joseph Fitsanakis | Date: 04 July 2018 | Permalink

Nazi official Heinrich Himmler’s daughter worked for West German intelligence

Heinrich Himmler Gudrun BurwitzThe daughter of Heinrich Himmler, who was second in command in the German Nazi Party until the end of World War II, worked for West German intelligence in the 1960s, it has been confirmed. Gudrun Burwitz was born Gudrun Himmler in 1929. During the reign of Adolf Hitler, her father, Heinrich Himmler, commanded the feared Schutzstaffel, known more commonly as the SS. Under his command, the SS played a central part in administering the Holocaust, and carried out a systematic campaign of extermination of millions of civilians in Nazi-occupied Europe. But the Nazi regime collapsed under the weight of the Allied military advance, and on May 20, 1945, Himmler was captured alive by Soviet troops. Shortly thereafter he was transferred to a British-administered prison, where, just days later, he committed suicide with a cyanide capsule that he had with him. Gudrun, who by that time was nearly 16 years old, managed to escape to Italy with her mother, where she was captured by American forces. She testified in the Nuremberg Trials and was eventually released in 1948. She settled with her mother in northern West Germany and lived away from the limelight of publicity until her death on May 24 of this year, aged 88.

Late last Thursday, an article in the German tabloid newspaper Bild revealed for the first time that Burwitz worked for West Germany’s Federal Intelligence Service (BND) in the early 1960s. The BND continues to operate today as reunited Germany’s main external intelligence agency. According to Bild, Himmler’s daughter had a secretarial post at the BND’s headquarters in Pullach, where the spy agency was headquartered for most of its existence. The paper said that Burwitz managed to be hired by the BND by using an assumed name. In a rare public statement, the BND’s chief archivist, Bodo Hechelhammer, confirmed Bild’s allegations. The archivist, who serves as one of the BND’s official historians, told the newspaper that Burwitz “was an employee of the BND for a number of years, until 1963”, working “under an assumed name”. She was dismissed once the BND began to purge former Nazis from its staff, toward the end of the tenure of its first director, Reinhard Gehlen. Gehlen was a former general and military intelligence officer in the Nazi Wehrmacht, who had considerable experience in anti-Soviet and anti-communist operations. In 1956, in the context of the Cold War, the United States Central Intelligence Agency, which acted as the BND’s parent organization, appointed him as head of the organization, a post which he held from until 1968.

It is believed that Burwitz remained a committed Nazi until the end of her life. She doggedly defended her father’s name and insisted that the Holocaust was an Allied propaganda ploy. It is also believed that she was a prominent member of Stille Hilfe (Silent Help), an underground group of leading former Nazis, which was established in 1945 to help SS officers and other Nazi officials escape prosecution for war crimes. Several German experts on neo-Nazi groups have alleged that Burwitz continued to attend neo-Nazi events and SS reunions throughout Europe, some as recently as 2014. Burwitz is believed to have died in Munich.

Author: Joseph Fitsanakis | Date: 02 July 2018 | Permalink

More spies now in Brussels than Vienna, Austrian intelligence chief says

Peter GridlingThe head of Austria’s counterintelligence agency has said that Brussels has now replaced Vienna as Europe’s spy capital. For nearly a decade, this blog has published expert commentary that points to the Austrian capital being the world’s busiest spy den. In 2009, German broadsheet Die Welt explained that Vienna had “the highest density of [foreign intelligence] agents in the world”. The reasons for this are partly historic: during the Cold War, the center of Vienna was located less than an hour’s drive from the Iron Curtain, making it a central location for East-West spy intrigue. Additionally, Austria boasted then, and boasts today, an efficient transportation network that connects it to both Western and Eastern Europe.

Furthermore, Vienna hosts the headquarters of several important international agencies, including the Organization of Petroleum Exporting Countries (OPEC), the International Atomic Energy Agency (IAEA), and the Organization for Security and Co-Operation in Europe (OSCE). This gives dozens of countries the opportunity to station in Vienna large numbers of diplomats, in addition to those who staff their embassies there. Consequently, it is estimated that the Austrian capital today hosts nearly 20,000 foreign diplomats, which is a substantial number for such a small country with a permanent population of less than 9 million. Experts believe that around half of these foreign diplomats are in fact connected to a foreign intelligence agency.

But in a rare public appearance on Thursday, Peter Gridling, head of Austria’s main counterintelligence agency, said that Vienna no longer topped the list of preferred destinations for the world’s spies. Gridling heads the Vienna-based Federal Office for the Protection of the Constitution and Counterterrorism, known as BVT. He was speaking during the official presentation of the BVT’s annual Constitutional Protection Report for 2017, which was held at the headquarters of the Ministry of the Interior. Gridling told reporters that the number of foreign intelligence operatives pretending to be diplomats posted in the Austrian capital remained significant, and that Austria as a whole was still “a favored area of operations” by the world’s intelligence agencies. However, he added that Vienna had now been overtaken by the Belgian capital Brussels as the spy capital of Europe. Gridling said that, according to his agency’s calculations, there was now a greater density of spies in Brussels than in any other European capital.

Gridling thus appears to concur with numerous intelligence experts and practitioners, among them Alain Winants, former Director of Belgium’s State Security Service (SV/SE), who have claimed since 2009 that Brussels is home to more spies than any other city in the world. When asked to specify the number of foreign intelligence operatives that are active in Vienna, Gridling said it was “in the neighborhood of hundreds of people, but certainly fewer than 1,000”. The Austrian counterintelligence chief declined calls to provide further elaboration on the mater.

Author: Joseph Fitsanakis | Date: 29 June 2018 | Permalink

Ukraine, Russia, spied on Dutch investigators of MH17 plane disaster, TV report claims

MH17 crashDozens of Dutch security officers, legal experts, diplomats and other civil servants were systematically spied on by Ukrainian and Russian intelligence services while probing the aftermath of the MH17 disaster, according to a report on Dutch television. Malaysia Airlines Flight 17, a scheduled passenger flight from Amsterdam to Kuala Lumpur, was shot down over eastern Ukraine on July 17, 2014. All 283 passengers and 15 crew on board, 196 of them Dutch citizens, were killed. In the aftermath of the disaster, the Dutch Safety Board spearheaded the establishment of the multinational Joint Investigation Team (JIT), which is still engaged in a criminal probe aimed at identifying, arresting and convicting the culprits behind the unprovoked attack on Flight MH17. As part of the JIT, dozens of Dutch officials traveled to Ukraine to initiate the investigation into the plane crash and repatriate victims’ bodies and belongings. Their activities were conducted with the support of the Ukrainian government, which is party to the JIT.

But on Tuesday, Holland’s RTL Niews broadcaster said that members of the Dutch JIT delegation were subjected to systematic and persistent spying by both Ukrainian and Russian government operatives. According to RTL, Dutch investigators found sophisticated eavesdropping devices in their hotel rooms in Ukraine, and believed that their electronic devices had been compromised. Citing “inside sources” from the Dutch government, the broadcaster said that, during their stay in Ukraine, members of the Dutch JIT delegation noticed that the microphones and cameras on their wireless electronic devices would turn on without being prompted. They also noticed that the devices would constantly try to connect to public WiFi networks without being prompted. Upon their return to Holland, Dutch officials had their wireless devices examined by Dutch government security experts. They were told that numerous malware were discovered on the devices.

RTL Niews said that the question of whether valuable information relating to the MH17 investigation was stolen by foreign spies remains unanswered. But it noted that the members of the Dutch JIT delegation were warned about possible espionage by foreign powers prior to traveling to Ukraine. During their stay there, they were not allowed to send messages in unencrypted format and were only permitted to hold sensitive conversations in especially designated rooms inside the Dutch embassy in Kiev. The Dutch government did not respond to questions submitted to it by RTL Niews. But it issued a statement saying that its security experts had briefed and trained the Dutch JIT delegation prior to its trip to Ukraine. Members of the delegation were told that foreign parties would seek to collect intelligence, because the MH17 investigation was taking place in a “conflict area with significant geopolitical interest” for many parties. They were therefore advised to “assume that they were being spied on [and] adjust [their] behavior accordingly” while in Ukraine, the Dutch government’s statement said.

Author: Ian Allen | Date: 28 June 2018 | Permalink

Norway spy agency urges IT firms to be cautious when outsourcing operations abroad

Broadnet NorwayThe Norwegian National Security Authority (NSM) has warned the country’s information technology firms to prioritize national security over cutting costs when outsourcing their operations abroad. The warning follows what has come to be known as the “Broadnet affair”, which, according to the Norwegian government, highlighted the dangers of extreme cost-cutting measures by Norway’s heavily privatized IT industry. The incident is named after Broadnet, Norway’s leading supplier of fiber-optic communications to the country’s industry and state sectors. Among Broadnet’s customers is Nødnett, an extensive digital network used by agencies and organizations that engage in rescue and emergency operations, including police and fire departments, as well as medical response agencies. Although 60% of the Nødnett network is owned by the Norwegian government, Broadnet is a member of the Nødnett consortium, and is thus supervised by Norway’s Ministry of Transport and Communications.

In September of 2015, Broadnet fired 120 of its Norway-based employees and outsourced their jobs to India, in search of cost-cutting measures. The company signed a multimillion dollar contract with Tech Mahindra, an outsourcing firm based in Mumbai. But an audit by the Norwegian government soon discovered several instances of security breaches by Tech Mahindra staff. The latter were reportedly able to access Nødnett without authorization through Broadnet’s core IT network, which was supposed to be off-limits to outsourced staff without Norwegian security clearances. Soon after the breaches were discovered, Broadnet began to bring its outsourced operations back to Norway. By the end of 2017, all security-related IT tasks had been returned to Norway. In the meantime, however, Broadnet had come under heavy criticism from the Norwegian government, opposition politicians, and the NSM —the government agency responsible for protecting Norway’s IT infrastructure from cyber threats, including espionage and sabotage.

The NSM warning —published earlier this month in the form of a 20-page report— makes extensive mention of the Broadnet affair. It recognizes the right of Norwegian IT firms to outsource some or all of their operational tasks as a cost-cutting measure. But it also stresses that the country’s IT firms are required by law to abide to national security protocols when outsourcing part of their IT portfolios to foreign companies. There have been numerous instances in recent years, where “risk management obligations relative to outsourcing decisions by Norwegian [IT] companies have fallen short”, the NSM report states. It adds that IT firms must abide to strict protocols of risk management when making outsourcing decisions. It also states that the firms’ Norway-based senior managers must regain complete overview of outsourced projects at every step of the way.

Author: Joseph Fitsanakis | Date: 27 June 2018 | Permalink

Singapore officials reject rumors of spy devices used at Trump-Kim summit

USB fan espionageSingaporean officials have dismissed reports that a promotional item given away for free during the June 12 summit between the leaders of the United States and North Korea contained an espionage device. Over 2500 reporters from nearly every country covered the meeting between US President Donald Trump and North Korean Supreme Leader Kim Jong-un. Upon arriving in Singapore’s Sentosa Island, where the summit took place, journalists were given a free promotional packet that included novelty items such as pens, notepads, a water bottle, and a USB fan. The USB fan consisted of blades connected to a miniature electric motor, which was in turn connected to a USB cable. The cable allowed the device to be powered by a computer or other electronic device with a built-in USB port.

But rumors soon emerged in the media that the free USB fans, which were made in China, contained malware. As soon as the fans were plugged into an electronic device, the malware penetrated its operating system, allowing hackers to access its contents remotely, said the reports. The allegations were first aired on Radio France Internationale, the French government’s international broadcaster. They were then picked up by the BBC, which said that many reporters covering the historic summit had been warned “not to plug [the USB fans] in to their laptops”. According to the reports, the malware installed on the USB fans was able to steal computer files and turn a laptop’s built-in camera and microphone into remotely-controlled eavesdropping devices.

But the government of Singapore has strongly rejected these reports. In a statement issued in English, Singapore’s Ministry of Communications and Information said that the USB fans had been a gift of the Sentosa Development Corporation, a Singapore government body tasked with promoting tourism in Sentosa Island, where the Trump-Kim summit took place. The ministry added that the USB fans had been produced long before Trump and Kim decided to meet in Singapore and that they had been originally manufactured as gifts for tourists visiting the island. The statement issued by the ministry also said that reporters appreciated the fans, given the tropical climate on Sentosa Island, where the temperature reached 33C (91F) on the day of the summit.

Author: Ian Allen | Date:  25 June 2018 | Permalink

Chinese shipbuilding boss gave CIA aircraft carrier secrets, reports claim

Liaoning aircraft carrier ChinaOne of China’s most senior shipbuilding executives, who has not been seen in public for nearly two weeks, has been charged with giving secrets about China’s aircraft carriers to the United States. Sun Bo, 57, is general manager of the China Shipbuilding Industry Corporation (CSIC), China’s largest state-owned maritime manufacturer, which leads nearly every major shipbuilding project of the Chinese navy. Most notably, Sun headed the decade-long retrofitting of the Liaoning, a Soviet-built aircraft carrier that was commissioned to the Chinese Navy’s Surface Force after the collapse of the Soviet Union.

The ship arrived at the CSIC’s Dalian shipyard in northeastern China in 2002. Work on the vessel was completed in 2012. Today CSIC heads the construction of so-called Type 001A, China’s first home-built aircraft carrier, which is said to be modeled largely on the Liaoning. The company is also spearheading the construction of numerous Chinese Navy frigates, latest-generation destroyers, and numerous other vessels. Earlier this year, it was announced the CSIC would build the Chinese Navy’s first nuclear-powered aircraft carrier.

As the second most senior official of China’s largest and most important shipbuilder, Sun has supervised all of the company’s projects during the past two decades. But Sun effectively disappeared after June 11, when he made his last known public appearance at a CSIC event. On June 17, a brief notice posted on the company’s website stated that Sun had been placed under investigation for “gross violation of laws and [Communist] Party [of China] discipline”. The brief notice said that the probe of Sun’s activities was led by China’s National Supervision Commission and the Communist Party of China’s Central Commissariat for Discipline Inspection, but provided no further details.

It has now been reported by multiple Chinese news websites that Sun is under investigation not simply for graft, but for far more serious activities involving espionage. Specifically, it is claimed that Sun was recruited by the United States Central Intelligence Agency because of his supervisory role in China’s aircraft carrier building programs. He is believed to have provided the CIA with information about the decade-long retrofitting of the Liaoning. More importantly, there are reports that Sun gave the CIA blueprints and other technical specifications of the Type 001A, which is currently under construction at a top-secret facility. The Hong Kong-based English-language news website Asia Times said on Thursday that, given the sensitive nature of the charges against Sun, it is unlikely that the Chinese government would reveal the outcome of the investigation of the CSIC executive.

Author: Joseph Fitsanakis | Date: 22 June 2018 | Permalink

German intelligence chief says Russia tried to hack energy grid

BfV GermanyThe head of Germany’s domestic security agency has publicly blamed the Russian government for a large-scale cyberattack that has targeted German energy providers. The comments follow a June 13 announcement on the subject by Germany’s Federal Office for Information Security (BSI), which is charged with securing the German government’s electronic communications. According to the BSI, a widespread and systematic attack against Germany’s energy networks has been taking place for at least a year now. The attack, which the BSI codenamed BERSERK BEAR, consists of various efforts by hackers to compromise computer networks used by German companies that provide electricity and natural gas to consumers around the country.

The attacks have been mostly unsuccessful, said BSI, having managed to breach just a few office computer networks. Energy grids have remained largely unaffected by BERSERK BEAR, said BSI. But the agency has refused to disclose information about the extent of the alleged cyberattacks and the companies that were targeted. It claims, however, that the situation is now “under control”. On Wednesday, Hans-Georg Maassen, director of Germany’s Federal Office for the Protection of the Constitution (BfV) said in an interview that the Russian government was most likely behind the attacks. There were “numerous clues pointing to Russia”, said Maassen, including the method with which the attack was carried out. The “modus operandi” of the attackers “is a major indicator that points to Russian control of the offensive campaign”, said Maassen.

Earlier this month, the United States imposed for the first time economic sanctions on Russian companies that allegedly helped the Kremlin tap undersea communications cables used by Western countries. One of the companies was identified by the US Department of the Treasury as Digital Security, which Washington said has helped Russian intelligence agencies develop their offensive cyber capabilities. Two of Digital Security’s subsidiaries, Embedi and ERPScan, were also placed on the US Treasury Department’s sanctions list. But the Kremlin fervently denies these accusations. On Wednesday, a spokesman for the office of the Russian presidency said that Moscow had “no idea what [Maassen] was talking about”. A Russian Foreign Ministry spokesman told reporters in the Russian capital that Germany and other countries “should provide facts” to justify their accusations against Moscow.

Author: Joseph Fitsanakis | Date: 21 June 2018 | Permalink

Israel charges former cabinet minister with spying for Iran

Gonen SegevIsrael has charged Gonen Segev, who served as the Jewish state’s Minister of Energy and Infrastructure, with spying for its archenemy, Iran. Segev, 62, was reportedly detained last month during a trip to Equatorial Guinea following a request by Israeli officials. He was then extradited to Israel and arrested as soon as he arrived in Tel Aviv last month, according to a statement by the Shin Bet, Israel’s domestic security service. On Monday it emerged that Israeli authorities had imposed a gag order on the case, forbidding Israeli media from reporting any information about it. The order appears to have now been lifted.

In 1992, when he was 35, Segev was elected as one of the Knesset’s youngest members, representing the conservative Tzomet party. Initially an opposition Knesset member, Segev eventually left Tzomet and joined a governing coalition with the Labor Party, in which he served as Minister of Energy and Infrastructure. After exiting politics, Segev, who is a medical doctor by training, became a businessman and traveled frequently abroad. But in 2004 he was arrested on a flight from Holland, while reportedly trying to smuggle several thousand ecstasy pills into Israel. He was jailed for five years but was released from prison in 2007, after a commendation for good conduct. Shortly after his release, Segev moved to the Nigerian city of Abuja, where he practiced medicine. It was there, the Shin Bet claims, that he was recruited by Iranian intelligence.

In a statement released on Monday, the Shin Bet said that Segev had admitted being in regular contact with Iranian intelligence agents in Nigeria and other countries around the world. He is reported to have said that he was given a fake passport by his handlers, which he used to visit Iran on two separate occasions in order to hold secret meetings with Iranian intelligence officers. He also traveled to several other countries in order to meet with his Iranian handlers and hand them information about Israel’s energy sector and the location of energy-related security sites in the country. The Shin Bet statement added that Segev introduced his Iranian handlers —who posed as foreign businessmen— to Israeli security officials on several occasions.

It is believed that Segev appeared before a court in Jerusalem on Friday. He was charged with “assisting an enemy in wartime” and with “carrying out espionage against the State of Israel”. The judge also charged him with numerous instances of transmitting classified information to a foreign power.

Author: Joseph Fitsanakis | Date: 19 June 2018 | Permalink

Germany arrests Tunisian man for producing biological weapon in his apartment

Ricin investigation GermanyGerman authorities have charged a Tunisian citizen with building a biological weapon, after finding significant quantities of the highly toxic substance ricin in his apartment. The 29-year-old man is referred to in public reports only as “Sief Allah H.”, in compliance with German law that forbids the naming of suspects until they are found guilty in court. German officials said last Thursday that the man remains in custody and has been charged with violating Germany’s War Weapons Control Act (known as Kriegswaffenkontrollgesetz) and “preparing a serious act of violence against the state”.

According to reports, German intelligence services received a tip-off last month that the man had made online purchases of a coffee grinder and 1,000 castor seeds. Processing castor seeds creates a ricin byproduct, which can then be weaponized in the form of a powder, a fine mist, or solid pellets of various sizes. The end product is more powerful than many other toxic substances, such as cyanide. Upon entering the human body, ricin can cause multiple organ failure in less than two days. It has no known antidote.

After receiving the tip-off, German authorities began monitoring the suspect’s movements in the western German city of Cologne, near the Belgian and Dutch borders. By June, German police discovered that he had produced enough ricin to dispense as many as 1,000 lethal doses.

German media reported that “Sief Allah H.” is a sympathizer of the Islamic State. However, investigators have found no direct link between him and any militant organizations in Germany or abroad. Additionally, no evidence has yet been presented that he had planned an actual attack —in Germany or elsewhere— at a specific time. However, officials from Germany’s Federal Office for the Protection of the Constitution said it was “very likely” that the arrest of “Sief Allah H.” had averted a terrorist attack. Late last week, German newsmagazine Der Spiegel said that the suspect had made ricin by following instructions posted online by the Islamic State.

Throughout the weekend, several other apartments in Cologne were searched by German authorities. Search parties consisted of members of the local police, intelligence officers and scientists from the Robert Koch Institute, the German government agency tasked with monitoring hazards to public health.

Author: Joseph Fitsanakis | Date: 18 June 2018 | Research Credit: S.F. | Permalink

Belgium to probe alleged Spanish espionage against separatist Catalan leader

Carles PuigdemontBelgium will investigate whether Spanish intelligence spied on Carles Puigdemont, the separatist Catalan leader who escaped to Brussels after launching an unsuccessful independence bid last year. Puigdemont, 56, served as president of the Spanish region of Catalonia from January 2016 until October 2017. He was forcibly removed from office by the Spanish government, after he led the government of Catalonia in a unilateral declaration of independence from Spain. As soon as the Catalan Parliament declared that the region was independent, Madrid dissolved it, imposed direct rule on the country’s easternmost province, and declared fresh elections.

Amidst the chaos that ensued, Puigdemont, along with several other leading Catalan separatists, fled to Belgium where he requested political asylum. When it emerged that Puigdemont had fled abroad, Spanish authorities issued a European Arrest Warrant against him, on charges of sedition, rebellion against the state and misusing public funds. Fearing that the Belgian authorities might extradite him to Madrid, Puigdemont soon left for Germany, where he was detained by local police on March 25, 2018. He currently remains in Germany, while German authorities are deciding whether to grant Madrid’s request for his extradition.

Now authorities in Belgium are preparing to launch an investigation into whether Spain’s intelligence services carried out espionage against Puigdemont while he remained on Belgian soil. The investigation will most likely be carried out by the country’s Standing Intelligence Agencies Review Committee. Known broadly as Comité permanent R, the committee is an independent body that oversees the activities of Belgium’s security and intelligence apparatus. The investigation is to be launched as a result of an official parliamentary request submitted by the New Flemish Alliance, Belgium’s largest separatist party, which represents the country’s Dutch-speaking minority. The party has come out in support of Catalan independence and of Puigdemont in particular, and has urged Brussels to grant political asylum to the Catalan separatist leader.

Peter Buysrogge, a leading member of the New Flemish Alliance, said that his party wanted to know whether Spanish intelligence operated in Belgium with or without the knowledge of the Belgian government and intelligence services. He added that his party was especially interested in investigating allegations made in Catalan media that Spanish intelligence operatives followed Puigdemont and even installed a Global Positioning System (GPS) device under his car.

Author: Joseph Fitsanakis | Date: 14 June 2018 | Permalink

US imposes sanctions on companies for helping Russian spy agencies

YantarThe United States has for the first time imposed economic sanctions on a number of Russian companies, which it says helped the Kremlin spy on targets in North America and Western Europe. On Monday, the US Department of the Treasury said it would apply severe economic restrictions on a number of Russian firms that work closely with the Kremlin. One of the companies was identified as Digital Security, which Washington says has been helping Russian intelligence agencies develop their offensive cyber capabilities. Two of Digital Security’s subsidiaries, Embedi and ERPScan, were also placed on the US Treasury Department’s sanctions list. Monday’s statement by the Treasury Department named another Russian firm, the Kvant Scientific Research Institute, which it described as a front company operated by the Russian Federal Security Service (FSB).

But the Russian firm that features most prominently in Monday’s announcement is Divetechnoservices, an underwater equipment manufacturer. The US alleges that the FSB paid the company $15 million in 2011 to design equipment for use in tapping underwater communications cables. According to Washington, equipment designed by Divetechnoservices is today used by a fleet of Russian ships that sail on the world’s oceans searching for underwater communications cables to tap. One such ship, according to reports, is the Yantar (pictured), ostensibly an oceanic research vessel, which Washington says is used to detect and tap into underwater communications cables.

In addition to Divetechnoservices, the US Treasury has named three individuals who will face economic sanctions due to what Washington says is their personal involvement with the underwater hardware manufacturer. They are: Vladimir Yakovlevich Kaganskiy, the company’s owner and former director; Aleksandr Lvovich Tribun, who serves as Divetechnoservices’ general director; and Oleg Sergeyevich Chirikov, identified as the manager of Divetechnoservices’ underwater surveillance program. These men —all Russian citizens— will not be able to enter into business relationships with American companies or citizens. On Tuesday, Russia’s Ministry of Foreign Affairs dismissed the latest round of US sanctions as an act of desperation. The White House would fail in its effort to “force the Russian Federation to change its independent course of action in the international arena”, said the Russian Ministry of Foreign Affairs.

Author: Ian Allen | Date: 13 June 2018 | Permalink