Foreign spies target Australians on dating websites, messaging apps, report warns

ASIO AustraliaAUSTRALIAN CITIZENS WITH ACCESS to sensitive information are being targeted for recruitment by foreign spies, who are increasingly using social media platforms, including dating applications, according to a new government report. The report, known as the Annual Threat Assessment, was issued on Wednesday by the Australian Security Intelligence Organisation (ASIO), which operates as the nation’s counter-terrorism and counterintelligence agency.

Speaking in conjunction with the release of the Annual Threat Assessment, ASIO Director Mike Burgess said on Wednesday that foreign intelligence operatives are carefully cultivating online relationships with Australian citizens, who are believed to have access to sensitive information. These individuals are then targeted with “innocuous approaches” on social media, which can lead to actual recruitment pitches. These techniques have become more elaborate and wider in scope during the COVID-19 pandemic, Burgess said.

According to the Annual Threat Assessment, the ASIO has been detecting systematic “suspicious approaches” on a variety of messaging platforms, such as WhatsApp, which Burgess described as an “easy way for foreign intelligence services to target employees of interest”. However, relationships with carefully targeted Australians are also cultivated through dating platforms, such as Tinder, Hinge and Bumble, according to ASIO.

Other social media platforms, such as LinkedIn, are used to target “current and former high-ranking government officials, academics, members of think-tanks, business executives and members of diaspora communities”, Burgess said. Pitches begin with “seemingly innocuous approaches”, such as offers for well-paid consultancies or even full-time employment. The job offers then progress to “direct messaging” on various encrypted platforms, such as WhatsApp. In some cases, these approaches lead to in-person meetings, “where a recruitment pitch is made”, said Burgess.

Author: Joseph Fitsanakis | Date: 10 February 2022 | Permalink

Israel busts alleged Iranian spy ring made up of middle-aged women

Shin BetAUTHORITIES IN ISRAEL CLAIM they busted a ring of spies for Iran, which was composed solely of middle-aged Jewish women. The Israel Security Agency, known as Shin Bet, said on Thursday that it had arrested four Jewish women, all of them Iranian-born Israeli citizens. The four women were charged with espionage against the state of Israel. The Shin Bet described the case as “serious” and as part of a broader plan by Iran to build a sophisticated espionage network inside the Jewish state.

According to news reports, the women were recruited via the Facebook social networking platform by a user using the name Rambod Namdar. Namdar claimed to be a Jewish man living in Iran. After recruiting the women, Namdar operated as their handler, and provided them with regular payments in exchange for taking photographs of sensitive military sites and civilian government buildings. According to the Shin Bet, these included the buildings of the Ministry of Interior and the Ministry of Welfare and Social Affairs. The women were allegedly also asked to take photographs of the embassy of the United States, as well as commercial facilities, including shopping malls.

At least two of the women were asked to befriend Israeli politicians and government officials, according to the Shin Bet. The agency also claims that the women were asked to convince their sons to serve their mandatory military service by joining military intelligence units. In one case, according to the indictment, the son of one of the women did serve in an intelligence post in the Israeli military, which allowed his mother to pass a number of military documents to her Iranian handler.

Reports in the Israeli media and the BBC mention that Namdar communicated with the four women “for several years” using the encrypted messaging service WhatsApp. WhatsApp is owned by Meta, the same company that owns Facebook and Instagram.

Author: Joseph Fitsanakis | Date: 14 January 2022 | Permalink

Turkish pro-government newspaper publishes interview with alleged Mossad spy

Ram Ben-BarakA POPULAR TURKISH NEWSPAPER has published an interview with a member of a network of spies who were allegedly recruited by the Israeli agency Mossad to spy on Palestinian students living in Turkey. As intelNews reported last week, Turkish intelligence announced the arrests of 15 members of an alleged spy ring for the Mossad. Turkish media said that the 15 individuals were arrested on October 7 during simultaneous raids that took place across four different provinces. The counterintelligence operation to arrest the alleged spies took nearly a year and involved more than 200 officers of Turkey’s National Intelligence Organization (MİT).

Last Friday, Turkey’s Sabah newspaper published a lengthy interview with one of the 15 alleged spies. The paper, which is politically aligned with the government of President Recep Tayyip Erdoğan, referred to the alleged spy using the initials “M.A.S.”, and claimed he is a Turkish citizen who was recruited by the Mossad. The alleged spy told the paper that he was first contacted in December 2018 by “an agent called A.Z.” through the WhatsApp phone application. After providing this individual with information about Turkish universities, he was sent funds via Western Union wire transfers. Other times he was paid by a man he met in a market in Istanbul, after showing him his identity card, along with a receipt that had been sent to him by A.Z.

Eventually, M.A.S. said he was instructed to travel to Switzerland, having first secured a visa for his trip through a company called European Student Guidance Center. Sabah claims the M.A.S.’ trip to Switzerland was paid for by the Mossad. While in there, M.A.S. met his alleged handlers, who taught him how to use strong encryption for sending documents and other information via secure email applications. However, even at that point he did not realize he was working for a foreign government, having been told by his handlers that they were employees of an “intelligence-like organization” in the private sector. According to Sabah, other members of the alleged spy ring met with their handlers, abroad, mostly in Switzerland and Croatia. Most were paid with cryptocurrency, conventional international money transfers, or sometimes in gold jewelry or foreign currency.

Importantly, Sabah did not say how its reporters were able to gain access to M.A.S. after his arrest by the Turkish authorities. The Turkish government has made no official statement about these arrests. Also on Friday, a number of Israeli public figures, including Ram Ben-Barak (pictured), former deputy director of the Mossad and current chairman of the Knesset’s Committee on Foreign Affairs and Defense, said that “none of the published names [in Turkey] were [of] Israeli spies”. Ben-Barak also cast doubt on the professionalism and capabilities of Turkish counterintelligence.

Author: Joseph Fitsanakis | Date: 25 October 2021 | Permalink

Catalan pro-independence leader’s phone hacked using Israeli spy software

Roger TorrentThe personal smartphones of leading Catalan pro-independence politicians were hacked using a highly invasive software built by a controversial Israeli firm, according to an investigative report by two newspapers. The revelation is likely to reignite a tense row between Madrid and pro-independence activists in one of the country’s wealthiest regions, which led to a major political crisis in 2017.

An estimated 50 percent of the population of the autonomous Spanish region of Catalonia wishes to secede from Spain. However, Madrid refused to recognize the legitimacy of an independence referendum organized by secessionist activists in 2017. The stalemate led to massive protests throughout the country, which were marred by violence and thousands of arrests, as Spain faced its deepest political crisis since the 1970s. In response to the protests, the central government suspended Catalonia’s autonomous status and arrested many of the independent movement’s leaders. Many of them have been given lengthy jail terms, while others remain abroad and are wanted by the Spanish government for promoting insurrection.

On Monday, British newspaper The Guardian and Spanish newspaper El País revealed the results of a joint investigation, according to which the smartphones of senior Catalan pro-independence politicians were targeted by hackers in 2019, and possibly even earlier. Among them was Roger Torrent, who serves as the speaker of the Parliament of Catalonia. The newspapers said he had been alerted to the hacking by cybersecurity employees of WhatsApp, a Facebook-owned company whose application was allegedly used by the hackers to take control of Torrent’s phone.

The software that was allegedly used to hack the Catalan politicians’ phones was Pegasus. It was built by NSO Group, an Israeli software development company that specializes in surveillance technologies. According to WhatsApp, which sued NSO Group in 2019, NSO Group specifically developed the Pegasus hacking platform to enable its users to exploit flaws in WhatsApp’s servers and to gain access to the telephone devices of targeted individuals. Pegasus allegedly allows its users to covertly operate a compromised phone’s camera and microphone. Read more of this post

US arrests Mexican man for spying for Russia in mystery case involving informant

FBI MiamiThe United States Federal Bureau of Investigation has arrested a Mexican man, who is accused of spying in the city of Miami on behalf of the Russian government. Local media reports suggest that the target of the man’s spying was a Russian defector who gave American authorities information about Russian espionage activities on US soil.

In a news release issued on Tuesday, the US Department of Justice identified the man as Hector Alejandro Cabrera Fuentes, a Mexican citizen residing in Singapore. The statement said that Fuentes was arrested on Monday and was charged with “conspiracy” and “acting within the United States on behalf of a foreign government”.

According to the statement, Fuentes was recruited in April of 2019 by an unnamed Russian government official. His first assignment was to rent an apartment in Miami-Dade County using fake identification. One he carried out the assignment, Fuentes allegedly traveled to Russia, where he briefed his handler. He was then asked to return to Miami and drive to an apartment complex, where he was to observe a vehicle belonging to an individual that the Department of Justice statement describes as a “US government source”. Fuentes was tasked with providing his Russian handler with the vehicle’s license plate number.

Having been given a detailed physical description of the vehicle by his Russian handler, Fuentes drove to the apartment complex in Miami, but was stopped at the entrance to the complex by a security guard. While Fuentes was speaking with the security guard, Fuentes’ wife allegedly exited the car and took a photograph of the vehicle in question. According to the FBI, she later shared the photograph with Fuentes’ Russian handler on the mobile phone application WhatsApp. The photograph was discovered by US Customs and Border Protection agents on the smartphone of Fuentes’ wife on Sunday, as the pair tried to board a flight to Mexico City.

The US Department of Justice news release does not identify Fuentes’ alleged espionage target. But an article in The Miami Herald claims that the target is an FBI informant who has provided the Bureau’s counterintelligence division with critical information about Russian espionage operations in the Miami area. Fuentes is scheduled to appear in court for a pretrial detention hearing this coming Friday. His arraignment has been scheduled for March 3. The press release does not explain why Fuentes’ wife was not arrested.

Author: Joseph Fitsanakis | Date: 20 February 2020 | Permalink

WhatsApp sues Israeli firm for enabling spy attacks on 1,400 users worldwide

NSO GroupThe Facebook-owned company WhatsApp has filed a lawsuit against a leading Israeli technology firm, accusing it of enabling governments around the world to spy on 1,400 high-profile users, including politicians and diplomats. The Reuters news agency said it spoke to “people familiar” with the investigation into the spy scandal, which it says was launched “earlier this year”.

What is interesting about the case, says Reuters, is that a “significant” proportion of the hundreds of WhatsApp users who were targeted by governments worldwide are “high profile” officials. The victims reportedly serve in various government agencies, including the armed forces, of at least 20 countries on five continents. They allegedly include politicians, diplomats, military officers, academics, journalists, lawyers and human-rights activists in countries such as the United States, India, Mexico, Bahrain, the United Arab Emirates and Pakistan.

WhatsApp alleges that the spy activities against these individuals were enabled by NSO Group, an Israeli software development company that specializes in surveillance technologies. The Facebook-owned company alleges that NSO Group specifically developed a hacking platform that allows its users to exploit flaws in WhatsApp’s servers in order to gain access to the telephone devices of targeted individuals. At least 1,400 of WhatsApp’s users had their telephones compromised between April 29 and May 10, 2019, says WhatsApp.

NSO Group, whose clientele consists exclusively of government agencies worldwide, denies any wrongdoing. The company claims that its products are designed to “help governments catch terrorists and criminals”, says Reuters. But WhatsApp and Citizen Lab, a research initiative based at the University of Toronto, which worked with WhatsApp on the NGO Group case, claim that at least 100 of the 1,400 victims were news journalists, political activists and the lawyers who defend them. There was no overlap between ongoing criminal or terrorism investigations and those targeted by NSO Group’s software, they claim.

The names on the list of espionage victims are not known. But Reuters said that, depending on how high-profile the victims are, the WhatsApp-NSO Group spy scandal could have worldwide political and diplomatic consequences.

Author: Joseph Fitsanakis | Date: 01 November 2019 | Permalink

Joint US-Iraqi intelligence operation used cell phone app to trap senior ISIS figures

Abu Bakr al-BaghdadiAn joint operation conducted by American and Iraqi intelligence officers employed a popular messaging app on the phone of a captured Islamic State commander to apprehend four very senior figures in the organization, according to reports. The Reuters news agency said on Thursday that the ambitious intelligence operation began in February, when Turkish authorities captured a close aide to Abu Bakr al-Baghdadi, the Iraqi-born leader of the group known as Islamic State of Iraq and Syria (ISIS). According to Hisham al-Hashimi, security advisor to the government of Iraq, the ISIS aide was Ismail al-Eithawi, also known by his alias, Abu Zaid al-Iraqi. Iraqi officials claim that al-Eithawi was appointed by al-Baghdadi to handle the secret transfer of ISIS funds to bank accounts around the world.

It appears that al-Eithawi had managed to escape to Turkey when the United States-led coalition shattered ISIS’ self-proclaimed caliphate. But he was captured by Turkish counterterrorism forces and handed over to Iraqi authorities. Baghdad then shared the contents of al-Eithawi’s cell phone with US intelligence officers. The latter were able to help their Iraqi counterparts utilize the popular messaging app WhatsApp, a version of which was installed on al-Eithawi’s cell phone. According to al-Hashimi, the Iraqis and Americans made it seem like al-Eithawi was calling an emergency face-to-face meeting between senior ISIS commanders in the area. But when these Syria-based commanders crossed into Iraq to meet in secret, they were captured by Iraqi and American forces.

According to al-Hashimi, those captured include a Syrian and two Iraqi ISIS field commanders. More importantly, they include Saddam Jamal, a notorious ISIS fighter who rose through the ranks to become the organization’s governor of the Euphrates’ region, located on Syria’s east. Al-Hashimi told reporters on Thursday that Jamal and al-Eithawi were the most senior ISIS figures to have ever been captured alive by US-led coalition forces. The Iraqi government advisor also said that al-Eithawi’s captors were able to uncover a treasure trove of covert bank accounts belonging to ISIS, as well as several pages of secret communication codes used by the militant group.

Author: Joseph Fitsanakis | Date: 11 May 2018 | Permalink

%d bloggers like this: