Follow TV Tropes

Following

Espionage

Go To

Ominae Since: Jul, 2010
#126: Mar 27th 2019 at 8:08:34 AM

More news on the NK News site is suggesting NIS may have known that the embassy was about to be raided...

Kinda murky that it’s hard to see who’s telling the actual story.

TerminusEst from the Land of Winter and Stars Since: Feb, 2010
#127: Mar 27th 2019 at 8:44:24 AM

NIS being shady, say it ain't so.

Si Vis Pacem, Para Perkele
Ominae Since: Jul, 2010
#128: Mar 27th 2019 at 6:12:50 PM

Regardless, CCD's gonna have a hard time operating any time soon.

Ominae Since: Jul, 2010
#129: Apr 8th 2019 at 3:34:55 AM

https://www.csis.org/analysis/was-she-spy-probably-not

An essay regarding the arrest of a Chinese woman in Mara Lago with a USB thumb drive with malware on whether she's a patsy or someone hired by the MSS.

eagleoftheninth In the name of being honest from the Street without Joy Since: May, 2013 Relationship Status: With my statistically significant other
In the name of being honest
#130: Apr 8th 2019 at 10:37:44 PM

Looks like she had tons of fishy electronics on her person. If it's a centrally-directed op, it's an incredibly amateurish one. There's still the possibility of her being a private actor or hired by a field operative who got cocky and wanted to impress their handler.

Also, with the US designating the IRGC as a terrorist organisation, it might be a good time to revisit this story from 2017 on the Trump Organization's involvement with an Azerbaijani developer connected to the IRGC.

Echoing hymn of my fellow passerine | Art blog (under construction)
eagleoftheninth In the name of being honest from the Street without Joy Since: May, 2013 Relationship Status: With my statistically significant other
Ominae Since: Jul, 2010
#132: Apr 19th 2019 at 6:21:00 PM

Getting word from a BBC TV report that a Korean-American marine was arrested for being involved in the DPRK embassy raid.

Ominae Since: Jul, 2010
#133: Apr 24th 2019 at 6:22:07 PM

https://citeam.org/whose-apartment-russian-journalists-were-likely-greeted-by-an-impostor-at-salisbury-suspect-address/?lang=en

Looks like some investigators used the OSINT info used by CIT to check on a potential Salisbury suspect/accessory.

Edited by Ominae on Apr 24th 2019 at 6:22:14 AM

Ominae Since: Jul, 2010
#134: May 5th 2019 at 5:54:56 PM

Jerry Lee pleaded guilty for being a MSS asset while living in Hong Kong and provided info that smashed the CIA's mainland Chinese network.

Ominae Since: Jul, 2010
#135: May 16th 2019 at 3:54:52 AM

Huawei has mentioned that they're willing to sign NDAs to prove that they won't allow the MSS to use their equipment for spying purposes.

This was in the wake of Trump making a ban on them for use by American government agencies, but the news doesn't say that.

DeMarquis Since: Feb, 2010
#136: May 17th 2019 at 7:50:30 AM

The flip side of this, that US media generally doesnt discuss, is that US phone coms are suspected of doing the exact same thing.

Ominae Since: Jul, 2010
#137: May 19th 2019 at 6:06:11 PM

https://www.bbc.com/news/world-us-canada-48319058

The BBC has a historical timeline of how the CIA began to run into problems with the mainland Chinese spy network being compromised and the major events that led to the network being taken out by the MSS.

Ominae Since: Jul, 2010
#138: May 21st 2019 at 9:03:54 PM

I'm gonna lose count on how many Japanese nationals are sentenced in China.

From NHK World

A court in Beijing has sentenced a Japanese man to six years in prison for spying, in the latest ruling on Japanese citizens detained for alleged espionage.

Sino-Japanese sources say Hideji Suzuki, the head of a Tokyo-based organization promoting youth exchanges between the two countries, was sentenced on Tuesday.

He was also ordered to pay 50,000 yuan, or nearly 7,400 dollars, in penalties.

Suzuki was taken into custody in the Chinese capital three years ago on suspicion of undermining national security. He is one of at least nine Japanese who have been indicted on spying charges in China since 2015, a year after the country enacted an anti-espionage law.

On Monday, a man in his 50s was given a 15-year prison sentence for stealing state secrets. He had reportedly conducted hot spring surveys.

Suzuki is the eighth Japanese defendant who has been handed down a ruling in the first trial.

The Chinese authorities did not give details of why they were detained and what actions were deemed illegal.

HallowHawk Since: Feb, 2013
#139: May 26th 2019 at 11:35:27 PM

Has cyberwarfare already been adapted by all intelligence agencies or not yet? I mean, would countries like Peru, Kenya, and Singapore began programs to have their intelligence agencies utilize cyberwarfare?

eagleoftheninth In the name of being honest from the Street without Joy Since: May, 2013 Relationship Status: With my statistically significant other
TerminusEst from the Land of Winter and Stars Since: Feb, 2010
#141: May 27th 2019 at 4:27:27 AM

Same here. The ability has existed for a while, but now we actually have laws governing it.

Edited by TerminusEst on May 27th 2019 at 4:27:40 AM

Si Vis Pacem, Para Perkele
Ominae Since: Jul, 2010
#142: Jun 1st 2019 at 7:26:46 AM

https://www.bbc.com/news/world-asia-48472238

Buncha Pakistanis in the military are given life and death sentence for spying for foreign networks. Analysts suspected that ex-officer Lieutenant General Javed Iqbal secretly helped the CIA. The other two didn't have the names of the agencies/networks that recruited them.

Ominae Since: Jul, 2010
#143: Jun 10th 2019 at 6:53:24 PM

WSJ broke news that Kim Jong Nam was a CIA asset in Asia.

The agency is not talking about it.

eagleoftheninth In the name of being honest from the Street without Joy Since: May, 2013 Relationship Status: With my statistically significant other
In the name of being honest
#144: Jun 22nd 2019 at 10:41:37 PM

Pentagon secretly struck back against Iranian cyberspies targeting U.S. ships

WASHINGTON — On Thursday evening, U.S. Cyber Command launched a retaliatory digital strike against an Iranian spy group that supported last week’s limpet mine attacks on commercial ships, according to two former intelligence officials.

The group, which has ties to the Iranian Revolutionary Guard Corps, has over the past several years digitally tracked and targeted military and civilian ships passing through the economically important Strait of Hormuz, through which pass 17.4 million barrels of oil per day. Those capabilities, which have advanced over time, enabled attacks on vessels in the region for several years.

Though sources declined to provide any further details of the retaliatory cyber operation, the response highlights how the Persian Gulf has become a staging ground for escalating digital — as well as conventional — conflict, with both the United States and Iran trying to get the upper hand with cyber capabilities.

The retaliatory cyber response follows several weeks of mounting tension in the region, which appeared set to boil over after last week’s attacks on two oil tankers in the Gulf. U.S. officials blamed Iran for the attacks and threatened to strike back if U.S. interests in the region were harmed. Then, on Thursday, Iranians shot down a $240 million U.S. military drone.

In response, President Trump initially authorized — but then decided against — targeted military strikes on Thursday night. He said in a series of tweets Friday morning that he pulled back before any missiles were launched when he learned 150 Iranians might die.

Meanwhile, multiple private U.S. cyber intelligence firms have reported attempts by Iranian hackers in recent weeks to infiltrate American organizations. U.S. officials told the Wall Street Journal they fear heightened escalations not only in physical space but in cyberspace as well.

The National Security Council declined to comment on the Iranian cyber group or the U.S. Cyber Command response. The National Security Agency, U.S. Central Command and the Navy all directed Yahoo News to U.S. Cyber Command for comment. Cyber Command did not immediately respond to a request for comment. Heather Babb, a Pentagon spokeswoman, told Yahoo News that “as a matter of policy and for operational security, we do not discuss cyberspace operations, intelligence or planning.”

Iran’s cyber capabilities are not the most sophisticated, at least compared to the United States’, but they are getting better. Tehran’s ability to gather information and unleash offensive operations has developed significantly in the last decade or so, particularly after Iranian centrifuges at the Natanz uranium enrichment plant were struck by a malicious computer worm created by U.S. and Israeli intelligence and first revealed in 2010.

“After the Stuxnet event, Iran really cranked up its capability,” said Gary Brown, who served as the first senior legal counsel for U.S. Cyber Command and is currently a professor on cyber law at the National Defense University. Brown cited Iran’s cyberattacks on global financial institutions, Saudi Aramco and the Sands Casino. While unfamiliar with current activities, Brown told Yahoo News that Cyber Command has long been interested in Iranian cyber capabilities and “undoubtedly they’re continuing to track them.”

The Persian Gulf and the Strait of Hormuz, the narrow bodies of water separating Iran from the United Arab Emirates and Bahrain, which is home to the U.S. Navy’s 5th Fleet, are obvious intelligence targets for Iran.

“Frankly it’s going to be standard ops for them to track who’s going in and out of the Gulf, to track all U.S. and allied warships going through, whether it’s the aircraft carriers or whatever, they’re going to track that very, very closely,” said retired Army Maj. Gen. Mark Quantock, who was Central Command’s director of intelligence from 2016 to 2017.

How Iran managed to gather that information, given its lack of traditional military resources, at least compared to the West, has been relatively creative. In recent years, according to John Hultquist, the director of intelligence for threat intelligence firm FireEye, Iranian cyberspies have targeted U.S. Navy sailors, particularly those in the 5th Fleet, to gather information.

One method those operators used was to assume false personas on social media for “honey-potting” or catfishing operations. “They use social media to look for vulnerable sailors on ships ... our Navy ships and probably other people’s navy ships too,” said James Lewis, a cyber expert at the Washington, D.C.-based Center for Strategic and International Studies.

The Iranians would pretend to be attractive young women looking to connect with a “lonely seaman” to gather intelligence about ship movements, according to three former U.S. intelligence officials familiar with the operations. The attempts weren’t limited to Facebook; some of the efforts extended to Pinterest and other niche social networking sites.

There were “many” successful examples of these Iranian cyber honey-pot operations, said one former intelligence official. “They were doing it at scale.”

Naval personnel would divulge information of various levels of sensitivity — such as when and where they were traveling — while ignorant of the true identity of their interlocutors, said the former official. In addition to helping the Iranians track the movement of U.S. ships and personnel, these operations also helped them build out organizational charts of U.S. military units, the former official said.

Iran’s targeting efforts in this area became notably more sophisticated in recent years, according to the former intelligence official. Cruder past efforts — featuring profile pictures of women in bikinis, who would immediately ask U.S. military personnel for information on when they were coming to port — gave way to a subtler, more time-consuming approach. The Iranians employed pictures of attractive, but fully clothed, women who would strike up online conversations with American servicemen over weeks, developing the fictitious relationships in order to nudge them into volunteering the desired intelligence.

“There was a pretty substantial campaign going all the way up to [U.S. Navy] leadership at one point,” said Hultquist. FireEye has analyzed one Iranian group it calls Newscaster that has frequently used fake social media profiles to gather information and has been tied to at least one destructive attack, he told Yahoo News.

The Department of Justice revealed a similar Iranian intelligence-gathering method in its recent indictment against former Air Force Special Agent and counterintelligence officer Monica Witt, who defected to Iran in August 2013.

After Witt defected, Iranian officers targeted current and former U.S. government officials using “fictitious and imposter personas” created on Facebook and through email, according to the indictment. Improvements to Iran’s targeting programs over social media coincided roughly with Witt’s defection, and her insights into U.S. practices almost certainly helped catalyze some of these changes, said two former officials.

However, social media was not the only method the cyberspies used to keep track of ships in the region. For example,they would track U.S. naval movements in the region by hacking into ship-tracking websites as well, according to one former intelligence officer.

Iranian intelligence officers are also capable of hijacking digital systems used in drones, and potentially even in ships, to spoof the GPS location of the device and plug in false coordinates. “They’ve been thinking a lot about drone capture because we’ve been flying drones over them for years,” said Lewis.

In 2011, Iran claimed to have achieved this capability and said it redirected an American drone to Iran’s shores. Two former intelligence officials confirmed Iran is capable of doing this and noted that this tactic could be useful in fooling a ship’s automatic tracking system.

Iran collects intelligence on ships passing through the Strait of Hormuz not just to identify their locations, but also to enable attacks, if necessary, according to multiple former intelligence officials. “If I have tactical information about when that ship is coming, I can launch a rocket attack,” said a former intelligence official.

Iran’s cyber operatives facilitated intelligence gathering used in multiple ship attacks over the past several years, including in 2017, when Houthi rebels attached bombs to remote-controlled boats targeting vessels belonging to the UAE and Saudi Arabia, according to multiple former intelligence officials interviewed by Yahoo News.

For Iran, projecting strength into the Strait and keeping a close eye on maritime targets is of utmost importance.

“It doesn’t entirely surprise [me] to find out that there’s yet another way in which Iran is trying to find ways to flex its muscles, in particular regarding shipping in the Gulf,” said Matthew Levitt, director of the counterterrorism program at the Washington Institute for Near East Policy.

“Iran is trying to respond to the U.S. maximum pressure campaign, in particular, now that still tougher measures have been taken to constrict the amount of oil Iran is able to ship and the amount of money it can get for it.”

Edited by eagleoftheninth on Jun 22nd 2019 at 10:42:05 AM

Echoing hymn of my fellow passerine | Art blog (under construction)
TerminusEst from the Land of Winter and Stars Since: Feb, 2010
#145: Jun 28th 2019 at 2:20:21 AM

Germany debates stepping up active cyberoperations

The recent US cyberattack against Iranian weapons systems is just the latest example of how conflicts are spilling into the virtual sphere. Germany, however, is hesitant to join the digital arms race. DW investigates.

Si Vis Pacem, Para Perkele
TerminusEst from the Land of Winter and Stars Since: Feb, 2010
#146: Jul 6th 2019 at 2:38:06 AM

Russians with links to infamous troll farm arrested in Libya

MOSCOW (AP) — Two people with links to an infamous Russian troll farm have been arrested in Libya, their employer, who has been put on the U.S. sanctions list, said on Friday.

The Foundation for the Protection of Traditional Values said in a statement that its employees, including well-known spin doctor Maxim Shugaley, have been kept in custody in Libya since May. It said that it has been working behind closed doors to secure the men’s release.

The obscure think-tank did not explain the charges the men are facing but insisted that its employees did not interfere in any elections in Libya.

“The members of the research group were dealing exclusively with opinion polls and have been studying the humanitarian, cultural and political situation in the country,” the statement said. A brief report on Libyan public opinion is available on the think-tank’s website dated Monday.

Si Vis Pacem, Para Perkele
Ominae Since: Jul, 2010
#147: Jul 7th 2019 at 6:05:15 PM

Tied up with what's happening in Pyongyang, but the detention of Alek Sigley is due to him being accused of filtering information on North Korea to certain organizations, including NK News.

eagleoftheninth In the name of being honest from the Street without Joy Since: May, 2013 Relationship Status: With my statistically significant other
Ominae Since: Jul, 2010
#149: Jul 19th 2019 at 6:37:24 AM

https://www.bellingcat.com/news/uk-and-europe/2019/07/06/gru-globetrotters-2-the-spies-who-loved-switzerland/

While this is an article of a series related to the GRU agents in the Skirpal case, this one highlights the use of Swiss territory.

TerminusEst from the Land of Winter and Stars Since: Feb, 2010
#150: Jul 24th 2019 at 2:58:51 AM

GoFundMe: The Lyubanka Files: The Textbooks for Putin’s Spies

The Interpreter is launching a new Go Fund Me page to support the translation, analysis and presentation of never-before-published KGB training manuals spanning multiple decades.

The goal will be to provide a kind of “living history” of the Cold War, relying almost exclusively on primary sources from the Lubyanka’s own files, similar to The Mitrokhin Archive, but with the added value of bringing this history into the contemporary relevance.

Si Vis Pacem, Para Perkele

Total posts: 486
Top