US imposes sanctions on companies for helping Russian spy agencies

YantarThe United States has for the first time imposed economic sanctions on a number of Russian companies, which it says helped the Kremlin spy on targets in North America and Western Europe. On Monday, the US Department of the Treasury said it would apply severe economic restrictions on a number of Russian firms that work closely with the Kremlin. One of the companies was identified as Digital Security, which Washington says has been helping Russian intelligence agencies develop their offensive cyber capabilities. Two of Digital Security’s subsidiaries, Embedi and ERPScan, were also placed on the US Treasury Department’s sanctions list. Monday’s statement by the Treasury Department named another Russian firm, the Kvant Scientific Research Institute, which it described as a front company operated by the Russian Federal Security Service (FSB).

But the Russian firm that features most prominently in Monday’s announcement is Divetechnoservices, an underwater equipment manufacturer. The US alleges that the FSB paid the company $15 million in 2011 to design equipment for use in tapping underwater communications cables. According to Washington, equipment designed by Divetechnoservices is today used by a fleet of Russian ships that sail on the world’s oceans searching for underwater communications cables to tap. One such ship, according to reports, is the Yantar (pictured), ostensibly an oceanic research vessel, which Washington says is used to detect and tap into underwater communications cables.

In addition to Divetechnoservices, the US Treasury has named three individuals who will face economic sanctions due to what Washington says is their personal involvement with the underwater hardware manufacturer. They are: Vladimir Yakovlevich Kaganskiy, the company’s owner and former director; Aleksandr Lvovich Tribun, who serves as Divetechnoservices’ general director; and Oleg Sergeyevich Chirikov, identified as the manager of Divetechnoservices’ underwater surveillance program. These men —all Russian citizens— will not be able to enter into business relationships with American companies or citizens. On Tuesday, Russia’s Ministry of Foreign Affairs dismissed the latest round of US sanctions as an act of desperation. The White House would fail in its effort to “force the Russian Federation to change its independent course of action in the international arena”, said the Russian Ministry of Foreign Affairs.

Author: Ian Allen | Date: 13 June 2018 | Permalink

Location of UK’s ‘above top-secret’ Middle East spy base revealed

GCHQ's Seeb spy base in OmanBy JOSEPH FITSANAKIS | intelNews.org
The location of a British listening base in the Middle East, which is classified by the British government as “three levels above top-secret”, has been revealed by a technology website. The information had been previously leaked by American defector Edward Snowden to several British newspapers, but the latter refrained from airing it following pressure by the British government. However, the highly classified material was published on Tuesday in online technology review The Register. The author of the revelatory article is Duncan Campbell, a longtime investigative journalist and researcher who has been reporting on intelligence matters for over three decades. In his article, Campbell alleges that the secret British spy base is located in Seeb, in northeast Oman, and is operated by the General Communications Headquarters (GCHQ), Britain’s signals intelligence agency. The base’s primary operational goal is to monitor undersea telecommunications cables serving the Arabian Sea and the Persian Gulf, which pass through the Strait of Hormuz. According to Campbell, the listening facility was initially constructed with British funding as a joint intelligence center with the Omani authorities, with the purpose of intercepting the signals of civilian communications satellites orbiting in the wider region. But it has since developed into one of three high-value GCHQ locations in Oman (referred to as Overseas Processing Centres —OPCs). The three locations, codenamed TIMPANI, GUITAR and CLARINET, form part of a region-wide communications interception program codenamed CIRCUIT. Through CIRCUIT, London has allegedly managed to gain access to nearly a dozen underwater cables passing through the Strait of Hormuz, which link a host of Arab countries, including Iraq, Iran, Saudi Arabia, the United Arab Emirates and Kuwait. Interestingly, GCHQ relies on the close cooperation of several telecommunications service providers to meet its interception targets, says Campbell. These include British Telecom, codenamed REMEDY in internal GCHQ documents, and Vodafone, the world’s second-largest mobile telecommunications company, which GCHQ has codenamed GERONTIC. Read more of this post

Location of massive Israeli eavesdropping site uncovered

Nicky Hager

Nicky Hager

By JOSEPH FITSANAKIS | intelNews.org |
An author and investigative journalist from New Zealand has uncovered one of the world’s biggest government-sponsored eavesdropping sites in a desert in Israel. Writing in French monthly review Le Monde Diplomatique, Nicky Hager reveals that the site acts as a base for the Israel Defense Forces (IDF) Central Collection Unit of the Intelligence Corps, also known as Unit 8200, which is responsible for collecting and decrypting signals intelligence. In his article, written in French, Hager describes the base as one of the world’s largest, and says it is located near the Urim kibbutz, about 30 kilometers west of Beersheba, in Israel’s Negev desert region. Read more of this post

%d bloggers like this: