Documente Academic
Documente Profesional
Documente Cultură
113 2018
2018
£3.95
Collusion, Dirty
Tricks & Covert
OUT OF TIME
Liaisons THE SPY WHO SAVED
48 THE WORLD 56
THE 30% SOLUTION UK EYES ONLY
MI6 officer who wrote the ‘Trump Dossier’ concedes
some of its explosive content may not be accurate...
22
THE LIVES OF OTHERS
SOE 61
Exploding
Rats and WWII
Assassins NEW THREATS TO THE
Tools
DEFENCE OF THE REALM
CYBER SEAS & CONTROL 70
Hackers and rogue traders seek maritime targets
15
10 NEW SERIES
COMMUNICATION
METHODS
10 MOSCOW’S FAVOURITE MI6 SPY Another country that continues to be watched by the intelligence world is Iran. Recent
British Cold War traitor George Blake heaps praise on today’s protests against the government were quickly dismantled by blocking social media
Russian spies as he nears his 100th birthday and various communications tools - and a blanket ban was imposed on media outlets
which were ordered not to report on demonstrations. Whilst the ploy seemingly worked,
15 CYBER SEAS Iran could not hide a most clever and covert operation to send weaponry to militant and
Intelligence concerns as cyber hackers and criminals focus terrorist factions elsewhere in the Middle East and parts of northern Africa. Intelligence
on maritime operations, vessels and port cargo collectors from several countries have secured physical evidence that weaponry is being
exported by Iranian factories to the groups. These stories and more, including the
20 INTELLIGENCE COLLECTION sentencing of a Mossad agent who allegedly identified a number of key Iranian scien-
Russia launches new wave of intelligence operations on tists assassinated a short time ago, continue to make Iran a key intelligence target.
NATO’s eastern flanks as suspected agents detained
MARK BIRDSALL, MANAGING EDITOR
22 UK EYES ONLY
British Intelligence initiate counter-terrorist programmes to
combat increasing threat of ISIS attacks
44 UNIVERSAL EXPORTS
Middle East intelligence agencies secure evidence that Iran is
H E A D L I N E R S
arming terrorist factions in Yemen and elsewhere
I
premier domestic counter-intelligence organisation n recent weeks there has been much discus-
sion about an area of the Internet called the Dark
70 10 - COMMUNICATION TRADECRAFT Web (just one of a number of descriptions). From
NEW SERIES - Eye Spy looks at 10 secret methods of the moving of monies to the illegal purchase of
communications used by past and present spies weapons, drugs and even the hiring of contracted
assassins, this murky and seemingly impenetrable area
78 THE ADVENTURER has come under much scrutiny by the intelligence world.
One of life’s great intelligence adventurers and friend of Eye And let’s not forget its use by the spying community; as a key communication
Spy, Captain Leonard LeSchack, sadly passed away shortly tool and payment system for those willing to engage in the world’s second
before Christmas 2017. A look-back at his splendid career oldest profession, it is proving more than useful.
In this edition cyber specialist Kevin Coleman engages on a journey revealing
EYE SPY is published eight times a year by Eye Spy Publishing Ltd. All rights
reserved. No part of EYE SPY may be reproduced by any means wholly or in part, and explaining in simplistic and chilling terms, its function, uses and users, and
without the prior permission of the publisher. Not to be resold, lent, hired out or why it’s best to avoid its darkest corridors.
disposed of by trade at more than the recommended retail price.
Registered Company No. 4145 963 Registered for VAT. ISSN 1473-4362 •36 THE DARK WEB
I
ntelligence sources claim
around 300 retired intelligence
operators, including some 70
MI6 personnel and 200 from
GCHQ have been rehired by their
former respective agencies. The
decision was reportedly taken to
help the UK agencies tackle
increasing threats to security.
However, the move has been
questioned by some observers
who note all three major agencies,
MI6, MI5 and GCHQ, are in the
midst of securing new staffers in such as the CIA, are now inviting
on-going recruitment drives. experienced staffers to return
(some part time) to help support
Another contentious point is that operations and pass on vital
several of the senior spies now experience to new recruits.
INTELLIGENCE
back in service, are said to have
received redundancy packages • Documents related to the
worth around £100,000. funding of British Intelligence in
the past 12 months, show a little
REVIEW•NEWS•DIGEST However, the move mirrors recent over £1 billion ($1.3 billion) was
events in America where agencies spent on outside contractors.
C
ounter-espionage Volodymyr Groysman of “acting Interestingly, Yezhov was part of a
officers from Ukraine’s on behalf of the interests of a Ukrainian Government delegation
SBU intelligence service, hostile state for a long time.” which visited Downing Street in
have detained a senior Intelligence sources are satisfied the summer of 2017. It is believed
interpreter acting for that Russia’s SVR was his intelligence people were present
some of the country’s most controlling agency, indeed, during that meeting. British
prominent government officials. Groysman himself publicly stated officials have been reluctant to
Stanislav Yezhov, 39, has been as such when asked which enter the debate on Yezhov. When Volodymyr Groysman
accused by Prime Minister country was involved. asked about his alleged spying
activities, Prime Minister Theresa after he was asked if he would
May said: “I am aware of the raise the subject during a planned
reports in respect of a Ukrainian meeting with Russian Foreign
national who attended Downing Minister Sergei Lavrov.
Street earlier in the summer.”
Foreign Secretary Boris Johnson The SBU searched various
said: “I think the matter is one for addresses and offices linked to
the Ukrainians to deal with,” this Yezhov and allegedly removed
R
ussia’s FSB has foiled two detained and both plots involved
advanced bomb plots in the use of suicide bombers.
the city of St. Petersburg -
one to coincide with New One of those arrested, 18-year-old
Year’s celebrations, the other Evgeny Efimov told investigators:
targeting the city’s famous Kazan “I was supposed to make the
Cathedral. Seven suspects were explosives and pack them into
bottles and other projectiles. My
FSB CT specialists raid safe house and detain suspected
task was to perform a terrorist act
ISIS cell members
in the city of St. Petersburg.”
overseas ISIS controller using the
Video released by the FSB shows encrypted Telegram messenger
investigative officers raiding a app.” The communications
shipping container which was provider has been embroiled in a
used to store and manufacture bitter battle with the FSB over
explosives. Assault weapons and privacy concerns, including its
ISIS literature were also recov- refusal to hand over voice data
ered. Two suspects were detained. related to two suspects linked to
the April 2017 Metro bombing in Alexander Bortnikov
Intelligence officials said the cell which 14 people died.
was “being directed by an Syria, many of its Russian-based
FSB Director Alexander Bortnikov supporters are now returning
New Year’s Eve target - held a meeting with senior home. “They are planning terrorist
Kazan Cathedral officials from the National Anti- attacks including some to disrupt
Terrorism Committee. He warned the 2018 presidential election,” he
that following the defeat of ISIS in said.
R
epercussions following the (FETO), designated a terrorist
2016 coup attempt in group which the government
Turkey continue, and now claims led the coup.
a former CIA officer has
become the latest intelligence The charges seem linked to earlier
figure caught up in its aftermath. accusations blaming US-based
Legal officials in Istanbul’s cleric Fethullah Gulen of being the
Prosecutor Office have issued an ‘prime mover’ behind the bloody Grand National Assembly building in Ankara following
arrest warrant for Graham Fuller, events. He has vehemently denied the failed 2016 coup
former Vice Chairman of the any involvement.
National Council at the CIA, Henri Barkey, an academic, and
accusing him of “violating Part of Turkey’s enormous post- former Turkey opposition
Turkey’s constitution, attempting coup investigation, which has lawmaker Aykan Erdemir. One
to overthrow the government and already seen over 100,000 people media house called Barkey a
obtaining classified documents for linked to the operation lose their “former CIA employee” and that
espionage purposes.” News jobs and thousands jailed, has he met Fuller in the Palace Hotel in
media in Turkey allege he had also referenced two other US- Istanbul in July 2016 - shortly
links to the Fethullah organisation based figures, American national before the coup. Gulen was
allegedly discussed.
Asked about the alleged ‘liaison’, practices, but said claims of CIA
he dismissed the false stories, involvement in Turkey’s coup
stating that he has not been in which he described as “pathetic,
Turkey for five years and that he ill-conceived and amateurish,”
met Gulen only once... 15-years were wrong.
ago. However, he acknowledged
why Turkey is suspicious because Turkey continues to claim Gulen is
Graham Fuller and Fethullah Gulen of previous US Government head of the ‘FETO terrorist group’.
A
ustralian Prime Minister whistleblowers and perhaps even
Malcolm Turnbull has journalists. All those convicted
announced new legisla- could now face up to 20 years in
tion that will ban foreign jail for disclosing classified
political donations which could be information.
used to manipulate aspects of
government. “Foreign powers are The secrecy law, which if passed
making unprecedented and could be introduced as early as
2017. Prime Minister Malcolm Turnbull (left) with US Admiral
increasingly sophisticated July 2018, now applies to anyone,
Harry Harris and Joint Chiefs of Staff General Joseph Dunford
attempts to influence the political (including serving and retired
process,” he said. intelligence people). Human
rights’ watchers warn they could also be subject to the new capacity as a journalist engaged
The new laws come amidst major easily apply to journalists and offences. in fair and accurate reporting’. It
spying concerns that Chinese organisations like WikiLeaks that is my understanding they are
Intelligence are attempting to ‘communicate’ or ‘deal’ with EDITOR’S NOTE: Journalists will broadly similar to those already
infiltrate the higher echelons of information. They will also close a continue to have some protection functioning in the UK. Neverthe-
government, and follow proposed long-standing gap around if publication of information is less, if charged, a journalist will
secrecy legislation intended to contractors working on behalf of considered to be in the public still have to prove they acted in
target government and intelligence government agencies, who will interest and is ‘in the person’s the aforesaid manner.
I
ran has blamed infiltration
agents from the CIA and Anti-government protests
Mossad for organising a spate were held throughout Iran
of anti-government demon-
strations in the country which
began on 28 December 2017 in
Mashad. Initially events focussed Abdolreza Rahmani Fazli
on economic policies, but
attention soon turned to the blamed “improper use of social
country’s leadership and the media” saying it was “causing
capital Tehran. Around 20 people violence and fear.” Interestingly,
died, and over 1,000 were state media were banned from
arrested at various events which covering the protests.
called for the overthrow of the
government. Two police officers In Tehran, government officials
also died in numerous violent said the CIA and Mossad were
clashes. behind the trouble, which allegedly
included attempts to occupy
Iranian Intelligence blocked social including exchanging imagery of services, whilst Instagram was government and military buildings.
media apps to thwart supporters the rallies. Internet usage was also temporarily blocked. Interior The allegations were not sup-
organising further events, affected with a 50% drop in Minister Abdolreza Rahmani Fazli ported by any evidence.
T
he Australian Secret national interest.”
Intelligence Service (ASIS)
said it is looking to Applicants using the Service’s
diversify its candidate pool. website are asked to take part in
Foreign Minister Julie Bishop said an online game where they are
the organisation is recruiting tested on their abilities to notice
people who are “smart, perceptive small details, read faces and
and empathetic...” the same skills assess the reliability of informa- Foreign Minister Julie Bishop
required by those in the teaching tion.
and customer service profes- outcomes that have the potential
sions. The job advert uses the tagline to save Australian lives’.
Nick Warner Director- ‘Be part of more human, human
“What we are looking for is people General ASIS intelligence’. ASIS is looking for The selection process reportedly
from a diverse range of back- those who ‘are highly motivated, takes approximately seven months
grounds. People who have got a obviously intelligent - it’s an have an innate sense of curiosity - a figure comparative to MI6, for
curious outlook, who are intelligence service,” Bishop said and a love of travel to ‘reach example.
I
ntelligence sources in cooperate with state media
Moscow have confirmed that houses focussing on the current
Russia’s Federal Security and past work of intelligence
Service (FSB) is set to services in Russia - the objective
participate in a series of television being to provide an insightful
shows and documentaries, overview.
highlighting 100-years of secret particularly that of the special with the blood of their officers
service in Russia. FSB PB Chairman Vasily Titov services, as well as diminish their who fulfilled their duties until the
said: “Undoubtedly we should pay role in distorting history. Their very end, both in times of war and
The FSB’s Public Board released a more attention to countering century-long history includes peace.”
statement saying that it will attempts to distort history, many heroic pages, some written
D
r Ahmadreza Djalali, an Iranian-born Scholars at Risk (SAR), before Djalali was
Swedish resident and specialist in convicted, his solicitor was dismissed and a
emergency medicine, who was defence solicitor appointed on instruction of
arrested during a trip to Iran in April the court. A time delay then ensued and his
2016, has been told by the court family discovered that no appeal was
that his execution will go ahead because no submitted. As a 20-day ruling on submissions
appeal was submitted before a designated passed, the sentence now stands.
deadline. Dr Djalali was accused of passing
information to Israel’s Mossad intelligence Djalali, who teaches disaster medicine at
service during negotiations that led to Iran’s universities in Italy and Belgium, was arrested PROFILE: DR AHMADREZA DJALALI is a
nuclear deal with world powers in 2015. while visiting Iran to participate in a series of medical doctor and lecturer at the
academic workshops. He was accused of Stockholm Medical University, Karolinska
Amnesty International said the Supreme Court “collaborating with the enemy state,” tortured, Institute, Sweden, and a research
in Iran upheld his death sentence in a and was asked to spy for Iran but refused, associate in disaster medicine at the
summary manner without granting defence according to CCS sources. Translation of a Centre for Research and Education in
note written by Djalali inside Evin Prison, and Emergency and Disaster Medicine at the
lawyers an opportunity to file submissions.
University of Eastern Piedmont in Novara,
circulated by a close contact, indicates Djalali
Italy. He also teaches at the Vrije
According to statements by the international believes he was arrested for refusing to spy
Universiteit Brussel in Brussels, Belgium.
Committee of Concerned Scientists (CCS) and for Iran’s Ministry of Intelligence (MOI).
B
ritain’s Foreign Secretary
Boris Johnson travelled to
Iran in a bid to help secure
the release of UK national
Nazanin Zaghari-Ratcliffe, 37. She
was arrested in April 2016 by
officers of the Iranian Revolution-
ary Guard whilst visiting relatives
in Iran. Ministry of Intelligence
officials accused her of spying,
and involvement in a plot to topple
the regime, charges ridiculed by
most intelligence watchers.
Nazanin and Richard with daughter Gabriella Boris Johnson
Her case was somewhat to reference her work for the BBC
complicated by Mr Johnson World Service Trust.
himself, who just weeks earlier
said she was “teaching journalists Asked if he thought his visit had *BBC Persian
in the country.” been successful, Mr Johnson Te l e v i s i o n ,
said: “It was worthwhile, but I launched in
The remark was seized upon by don’t want to raise false hope. It’s 2009, has the
potential to
Iranian Intelligence because in too early to be confident of the
reach over 100
October 2017, the Prosecutor outcome.”
million people and is focussed
General in Tehran said part of the
on the Persian-speaking coun-
charge against Zaghari-Ratcliffe Nazanin’s husband, Richard said: tries of Iran, Afghanistan,
related to her alleged involvement “I wasn’t presuming that she Tajikistan and Uzbekistan. In
in an on-line BBC Persian* would come back on the plane 2017, Iranian Intelligence seized
journalist course. Iran believes with him [Johnson]. It was always the [Iranian] assets of 150 con-
this endeavour involves training the best case scenario that his tributors. In the past three years,
and recruiting journalists who going would unlock the door and there have been a number of
Mahmoud Alavi Director
would then engage in propaganda then days later she might be able suspected attempts by the MOI
of Ministry of Intelligence
against the country. Iran continues to come home.” to jam the signal of the station.
A
hmed Abu Khattala, 46, has been found not guilty in a US services and other US-supportive
the man charged with court of the most serious charge - militias to reach the attack zones.
various terrorist crimes in
connection to the 2012
storming of the US Consulate and
murder. However, he has been
found guilty of four other terrorist
charges, some of which carry a
Acting Assistant Attorney General
for National Security Dana Boente
PANAMA
CIA compound in Benghazi, Libya, lengthy prison sentence. And said: “Our work is not done. We Assassination
despite the lesser charge, will not rest in our pursuit of the
prosecutor Michael DiLorenzo had
argued that Khattala was a “stone-
cold terrorist... who attacked
others who attacked our facilities
and killed four courageous
Ameri-
PAPERS
VALLETTA: Three men have been
mission facilities and was there to cans who charged in connection with the car-
kill Americans.” perished bomb murder of Maltese investigative
that day.” journalist Daphne Caruana Galizia
The jury found that Khattala, Another (see Eye Spy 112).
whilst not directly involved attack
(physically) in the killing of Galizia focused her research on
suspect,
corruption, drug trafficking and
Ambassador Christopher Stevens, Mustafa
scandals involving Malta’s elite and
information officer Sean Smith, al-Imam,
wrote about links to offshore finan-
CIA contractors and former US was cial havens in Panama and elsewhere.
Dana Boente
Navy Seals Tyrone Woods and captured
Glen Doherty, was instrumental in in 2017 and will also face trial. The killing of Galizia, using a remote-
the planning and orchestration of controlled IED, shocked the island
the attacks. Evidence showed he Following the verdict, CIA Director nation and led to the European
Ahmed Abu Khattala follow- had directed operatives using cell Mike Pompeo told staffers at Parliament sending a delegation on a
ing his capture in June 2014 phone communications and had Langley: “A small measure of fact-finding mission related to the rule
by US Special Forces thwarted efforts by emergency justice was meted out.” of law in Malta. The EU delegation
expressed concerns and issued a
Y
evgeny Vasiliev, 39, a moment he became a ‘spy’; the
evidence” that led to the suspects;
farmer from the village of GPS tracker, it transpired, had a
including triangulation data of the call
Lopatki in Russia’s Kurgan small microphone, which can and exited the building, the FSB that triggered the bomb that killed
region faces a spell in allegedly be turned on remotely. servicemen approached,” said Galizia.
prison or a fine, for buying a GPS These devices are outlawed in Vasiliev. He was notified his
tracker from China to ‘spy’ on… Russia, but he had no idea that he purchase was illegal and asked for The three suspects in custody all had
his cow. The farmer, who suffers was buying something illegal, for an explanation. previous criminal records. Two of
from asthma, wanted to make it its description, written in poor them, Vincent Muscat, 55, and Alfred
easier to find the animal as it Russian, failed to mention the With nothing to hide, he showed Degiorgio, 52, nicknamed il-Fulu,
moved across fields. microphone. the officers his computer and his were acquitted in 2004 on armed
on-line order. Vasiliev explained robbery charges while Degiorgio’s
Mr Vasiliev bought the device from Incredibly, as soon as Vasiliev left that he had intended to use the brother George, 54, nicknamed
China’s AliExpress which cost him the post office with his package, device to keep track of a wander- ic-Ciniz, was charged with
390 rubles (£5.50) at the officers from the FSB detained ing cow. Not satisfied, the FSB possession of unlicensed weapons
beginning of 2017. After waiting him. “When I received the tracker charged him for acquiring ‘special and tools used to pick locks.
months, he received the parcel in technical equipment for sourcing
September but did not realise that unofficial information’. If found
under Russian law, at this very guilty, he could face a fine of upto
200,000 rubles (£3,000) or four
years in jail.
NO REGRETS
COMRADES AND COMPATRIOTS: RUSSIAN INTELLIGENCE
PROGRAMME CONTINUES TO ENGAGE WITH PUBLIC
British engineers watched by MI6
officers in the Berlin tunnel - an
endeavour exposed by Blake
O
n the occasion of his 95th birthday,
former MI6 officer and KGB spy,
George Blake, reiterated his
support for Russia’s burgeoning
intelligence services, especially in
the growing area of counter-
B
ritish Prime Minister Theresa May London described her comments as a ‘lengthy
launched a vociferous attack on charge sheet’.
Russia’s spy agencies accusing
them of “endangering global security, The premier also referenced an increase in
election meddling, cyber hacking and Russian Air Force surveillance flights which
spreading fake news.” Armed with intelligence routinely breached national airspace bound-
from MI6 and friendly overseas organisations, aries, and its ‘hidden hand’ in the continuing
May said that Moscow was behind cyber conflict in the Ukraine. She also pointed to
breaches within offices of Denmark’s Ministry bogus imagery which was ‘stage managed’ to
of Defence and Germany’s Bundestag spread disinformation in “an attempt to sow
(parliament), to name but two. The Times of discord in the West and undermine UK
institutions.”
Bundestag
building, Speaking to Russia directly, May said: “We
Germany know what you are doing... and you will not
succeed. We do not want to return to the Cold
War or be in a state of perpetual confronta-
tion.” She also used a phrase which is
becoming commonplace in the continuing HMS Liverpool escorts Russian
fractious relationship between the Media and aircraft carrier Admiral Kuznetsov
Intelligence world - “weaponising informa- near British territorial waters
tion.” As a caveat to her powerful attack,
B
ritain’s search for new cyber special- year’s government-sponsored Cyber Security
ists continues apace, amidst current Challenge final was therefore linked to the
and emerging threats. All manner of world of maritime security.
attacks on vital industries, including
government offices, commerce, communica- Set in the historic Trinity House, London, the
tion and transport have been reported in the ‘home’ of British shipping, the Masterclass
last 12 months. It was therefore apt that this final was the culmination of a year-long
endeavour of nationwide events to source the event to identify the loss of secrets from
very best candidates - all keen to engage in fictitious shipping company - Fast Freight Ltd -
the future world of cyber security. Forty-two to a rogue cyber-crime group called Scorpius.
candidates participated in a realist three-day This outfit, the candidates were informed,
CYBER SEAS
munications began in 2010, and interestingly,
I
t’s not surprising organisers of the UK BANGS, BUMPS AND DEATH appeared one of steering failure; over
Cyber Challenge chose a nautical theme confidence and crew complacency, the very
for the competition. Worldwide, In August 2017, the USS John S. McCain fact that the official even considered a cyber
intelligence analysts estimate as many collided with the merchant ship Alnic MC, a intrusion was revealing.
as 200,000 vessels are exposed to Liberian-flagged tanker near Singapore. Ten
possible cyber attacks, a worrying sailors lost their lives. Chief of Naval Opera- Nevertheless, others have sided toward the
statistic considering 90% of all trade goods tions Admiral John Richardson acknowledged cyber theory, including former US Navy
are transported by sea. It’s also relevant that his investigators were looking at a variety of information warfare officer Jeff Stutzman.
numerous cyber attacks on shipping and causes, including the possibility the incident “When you are going through the Strait of
maritime organisations, including military was the result of a cyber attack. And though
vessels have increased by 1,000% in the last the real reason, according to an official report,
decade alone.
the USS Fitzgerald and an oil tanker east of US Naval Intelligence discovered Somali
Singapore. pirates selected some maritime targets by
viewing navigational displays on-line; a
For the record, in 2017, five US warships were computer system in the Port of Antwerp was
involved in significant incidents in Asian hacked allowing cyber criminals to identify the
waters, the latest occurring on 18 November. content of containers. A cyber attack was also
Here a Japanese tug boat apparently lost reported by A.P. Moller-Maersk’s IT system in
power and drifted into the USS Benfold during June. Port operations were disrupted
a towing exercise in Sagami Bay. worldwide.
Main: Damage suffered by the USS Fitzgerald is evident. Inset: Many of the US
Navy’s cyber elements now fall under command of Naval Information Forces Radar display showing
maritime traffic
USS Antietam
• 31 January. USS Antietam ran aground near Yokosuka Naval Base in Japan •9 May. USS Lake Champlain collided with South
Korean fishing boat •17 June. USS Fitzgerald collided with merchant vessel near Japan •21 August. USS John S. McCain
collided with merchant vessel east of the Straits of Malacca and Singapore •18 November. USS Benfold is struck by a tug during
a towing exercise in Sagami Bay
Freight containers at the Port of Antwerp
finding alterna-
tive reasons -
including cyber
attacks.
Examples of
such happenings
occurred in the
summer of
2017, all
coincidentally in
one location. Twenty ships complained to the
US Coast Guard Navigation Center that their
GPS systems had suffered disruption in the
Black Sea area. Analysts suspect cyber
interference - not the weather.
3 4
1. False reading failed to show how close to land the ship really was • 2. Radar failed to show all the vessels in
proximity • 3. Engine room pumps were shut down but display shows just one out of action • 4. Cyber attack on
control system could have resulted in fuel spillage, pollution and caused the vessel to overturn
CYBER PIRATES
STEERING A VESSEL FOR PROFIT
I
n 2017, CIA analysts examined
an incident whereby cyber
hackers reportedly took control
intelligence sector to be able to provide the advice we need to develop
of the navigation systems of a
concise and effective guidelines for preventing system and data container ship enroute from
security breaches at sea.” Cyprus to Djibouti. According to
sources, the ‘pirates’ had control of
Parts of the system use cyber defence software already utilised by the the ship for 10 hours and intended
world’s leading intelligence agencies. Naval Dome integrates with to steer it into an area where they
existing systems and software providing real-time cyber alerts and would be able to board the vessel
blocks malicious files to prevent access to critical parts of a system. and take control for kidnap and Somali pirate
ransom. The source, who did not
Chief Executive of Naval Dome and former Israeli Navy Commander, Itai want to be identified, said: there isn’t, particularly as now
Sela said: “A lack of standard “Suddenly the captain could not everything is connected and the
guidelines for creating a more manoeuvre; the IT system of the telemetrics of ships are fed back to
secure maritime environment is vessel was completely hacked.” shore.”
the shipping industry’s Achilles
heel.” As an example of the The crew attempted to regain Biggs also said: “There have also
danger of a focussed cyber attack control of the navigation system but been suspected cases of mass-
had to bring IT experts aboard, who spoofing, where the GPS systems of
on a vessel, Sela said that his
eventually managed to get them 20 ships were giving false locations,
company had performed a series
running again after hours of work. some inland and some at airports.”
of cyber attacks on a ship’s live
The IT team installed a specialised Unconfirmed reports of the attacks
navigation systems, engines and Itai Sela programme designed for the were first posted by the US
other machinery control systems. maritime industry that blocks Department of Transportation’s
They were able to shift the vessel’s reported position, mislead radar attacks from the outside, but said Maritime Administration (MARAD).
displays, turn on and disable machinery, override fuel control, steering the incident should serve as a
and ballast systems. The rogue virus managed to enter the ship’s warning to the industry. ‘Ethical hacker’ Ken Munro,
computer system via an “innocent e-mail sent to a crew member.” previously revealed hacking
Emma Biggs, business director at vulnerabilities in major maritime
Once Naval Dome software was uploaded, the same cyber attack was security brokerage firm ASKET, communications and was able to
performed. “We were unable to penetrate any of the ship’s systems,” said: “There are vulnerabilities on all precisely pinpoint a named vessel,
said Sela. vessels. People still talk about there identify a staff member and
being a difference between what potentially attack the ship through
happens on board and on shore, but communication boxes aboard ships
No room for error - US that were running outdated firmware
warships refuel at sea and using default passwords.
US Navy
counter-piracy
specialist
INTELLIGENCE COLLECTION
Spy Games Continue on Europe’s
Eastern and Northern Flanks
T
he Romanian government has handler though few details of the ‘exchange’
expelled a suspected Russian spy have been released.
banning him from the country for 15
years. Pro-Russian Serbian national Zivkovic calls himself a ‘commander’ of
Bratislav Zivkovic, 42, was accused Serbia’s Chetniks, a paramilitary force which
of sourcing intelligence on various fought alongside pro-Russia forces in the
NATO bases in the southeast of the country, 2014 annexation of Crimea. He was identified Complete with medals - Bratislav
and obtaining classified information. Zivkovic again by intelligence agencies operating in Zivkovic hardly reflects the archetypal
then allegedly provided this to a Russian eastern Ukraine with similar pro-Russian image of a spy - but his activities were
a ‘menace’ to Romanian Intelligence
fighters. He is known to the CIA and MI6.
and a danger to NATO
His activities in Romania were viewed with made to label him a ‘spy’ and ban him from
concern by NATO, as he is alleged to have entering the country.
shown much interest in securing a variety of
documents on troop deployment, military MKAB ROMANIA
objectives and of the country’s critical
infrastructure. Romanian Intelligence (SRI) Though much information remains classified
spokesman Ovidiu Marincea said agents had about his activities, Zivkovic is said to have
exposed his activities before he could “gather visited the country on four occasions in 2017,
any classified information.” However, he each time journeying to the strategically
Docks at Constanta Sea Port
posed an ongoing risk thus a decision was important Black Sea port of Constanta.
Evseev, Director of the Center for Public Policy Romania is a sponsor nation of the recently
and Military Research in Moscow warned the opened NATO Counter Intelligence Centre of
base and its activities have already been Excellence in Poland. (See Eye Spy 112).
TERRORISM AND
When officers from CTC (New Scotland Yard
Counter Terrorism Command) searched
Rahman’s home, he reportedly had two IEDs
on his person. He is also accused of assisting
HORIZON THREATS
Imran, who MI5 believe was planning to join
ISIS by obtaining a fake passport in the hopes
of reaching Libya.
MI5 ANALYSIS
Theresa May Assassination Plot Foiled T
his latest court case linked to terrorism
involving ISIS supporters, coincides with
an independent review of MI5’s own
A
s MI5 Director-General Andrew The alleged plot, which some security internal investigative probe* examining if any
Parker spoke about the threat to specialists believe was ill-conceived, was for of the significant UK terror attacks to have
the UK from ISIS and again Rahman to blow up the gates protecting taken place in Britain in 2017, could have been
referenced the foiling of nine Downing Street using an improvised explosive prevented. In his publicly available 66-page
significant terrorist plots
in 2017, two men The suspects
arrested on 28 November, appeared are driven into
in court charged with terrorist court
offences, including a plan to
assassinate UK Prime Minister
Theresa May. Details of the plot were
disclosed by Mr Parker in a briefing to
Cabinet officials, but details soon
began to trickle into the wider media.
Salman Abedi
sooner, his plot
may well have
and especially focussed on events between
March and June when a combined total of 36 SUBJECTS OF INTEREST (SOI)
been exposed. It was not - MI5 mistook him people were killed and over 300 injured in MI5 PRIORITISATION SYSTEM
for someone else and the case was closed. various attacks. However, MI5 recently PRIORITY 1: Investigations into
disclosed that 20,000 people are being
individuals or networks where there is
The theme of surveillance, hindsight, analysis monitored with a further 3,000 registered as
“credible and actionable intelligence” of
and procedures was projected several times,
significant or smaller scale attack
planning
Flowers and
tributes for PRIORITY 2: Investigations relating to
victims of the individuals involved in travel overseas to
Manchester join Jihad, fundraising, training and
attack supply of false documents
PRIORITY 3: Investigations or
networks that require further action to
determine whether they pose a threat
‘elevated targets’. Ultimately Mr Anderson said to return to the were misrepresented in some quarters. His
there was no real knowing if the Manchester country - are full response can be found on the Independent
plot could have been prevented if MI5 had flawed. Reviewer of Terrorism Legislation website.
acted differently. However, he did say: “With Williamson said:
the benefit of hindsight, intelligence was
misinterpreted in early 2017.”
“Quite simply, my
view is a dead
RECORD NUMBER
terrorist can’t OF ARRESTS
DEAD TERRORISTS cause any harm to
I
Britain. We should n the year ending September 2017, Britain’s
POSE NO THREAT do everything we security services arrested a record 400
can to destroy and people on terrorism-related offences. Of
U
K Defence Minister Gavin Williamson Max Hill QC eliminate that [the] these, 115 were charged, 60 were released on
has spoken out on the threat posed by threat.” His comments follow a suggestion bail pending further investigation, and 11
returning UK nationals who have fled made by Max Hill QC, Independent Reviewer faced alternative charges. Interestingly,
ISIS fighting forces in the Middle East. He said of Terrorism Legislation that some young ISIS intelligence sources said 58 were female.
not a “single British citizen who has fought for people who travelled to the fighting zones be Security Minister Ben Wallace said the figures
Islamic State should be allowed back in allowed to return and rejoin society. His focus reflect the menace of terrorism and show a
Britain.” He believes that a number of was on those who had been brainwashed and “shift” rather than a “spike in terror arrests.”
initiatives being discussed - resettlement of an could be categorised “immature and vulner- MI5 D-G Parker said the scale of terrorism is
estimated 300 UK nationals who may attempt able teenagers.” Other comments he said evolving as never before: “Today, there is
UK Secretary of Defence Gavin William and USA Defense Armed police in Manchester
Secretary James Mattis meet to discuss homeland security
MI5 headquarters
NOTES:
communications spycraft
COMMUNICATION
& ESPIONAGE
ADVENTURE IN TIME
T
here was a time, not too long ‘connoisseurs of espionage’, and this often
ago, many leading intelligence means overcoming hurdles, each one capable
TRADECRAFT
academics predicted the ‘spy- of tripping spies and the recipient of secrets.
in-the-sky’ satellite and To guarantee maximum security, intelligence
advances in the interception of agencies will use all manner of ‘cloak and
electronic signals and messages, would put dagger’ to conceal activities, from couriers
pay to the activities of the human spy on the and cleverly written features or notices in the
ground. On the contrary, quite the opposite world’s press, to the passing of instructions or
has happened, and those who operate in notices contained within radio broadcasts.
today’s world of intelligence have even more And for a good example of the use of radio as
reason to celebrate and trust the tradecraft of a very strong and secure method - look no
their predecessors. For as one former MI5 further than the UK’s very own British
agent told Eye Spy, “despite CCTV, 24-hour Broadcasting Corporation (BBC).
sky surveillance and tools to intercept e-mails
and telephone calls, spycatchers and counter-
terrorism chiefs often struggle to see the
bigger picture... and you still can’t intercept
and record a conversation if the participants
are beyond a microphone.”
THE DICE ARE ON THE TABLE
VISUAL, AUDIBLE, TOUCH
Throughout much of WWII, the BBC broadcast
No matter how many methods can be used to all manner of secret messages across Europe,
pass information to a third party, it can only be and in particular France. Designed specifically
No information if targets are
absorbed three ways: by sight, sound, and in for a chosen few, some broadcasts carefully
beyond the limits of a listening or
some cases by touch. Yet it is all that has concealed (unrecognisable) lines prepared by
recording device
gone on before that interests so many military intelligence specialists and agent
WTC - ‘faculty of
town planning’
Known to MI6 as the ‘codemaker’, the successfully investigated and derailed several letters would be written back also containing
university graduate used a constant ‘rolling terrorist operations where cell members chose secret instructions and messages. Occasion-
alphabet’ that was only known to his trusted to conceal plots using language of hidden ally secreted in food parcels, MI9 managed to
inner circle, and those engaged in operations. meaning. conceal maps and guidance on where best to
exit Germany in respect of escape routes.
His capture stemmed more from good fortune Many examples of this tradecraft exist,
than detection. The ISI had discovered a cell perhaps one of the most famous being the MARATHONS AND FLAGS
phone attached to an IED intended to explode operation run by MI9 in WWII. Here captured
on a roadside in Karache. The CIA joined the British troops sent letters back home to loved Communication is an art thousands of years
investigation and after careful examination of ones... who duly deposited them with MI9 in old. And adaptations of some historical
the cell phone an address was discovered. London. For the communications contained methods continue to this day. In Ancient
Here Pakistan Inter Services Intelligence hidden messages about German military Greece, troops would communicate using fire
Agency (ISI) officers arrested Mussad Aruchi, strengths, positions and armaments. In return, (beacons) at the top of hills and mountains.
the nephew of a known AQ agent. He talked
and identified Khan as an “agent controller.”
Located and placed under surveillance, Khan
was arrested at Lahore International Airport on
13 July 2004, by the ISI. He had driven to the
airport to collect a package. At associated
addresses laptop computers and 50 CD-Roms
were discovered containing full details and a
comprehensive listing of the so-called Al-
Qaida Alphabet.
the 26 miles distance in around three hours fighting forces, as it was to the Greeks two
giving Athens valuable time to prepare. Sadly thousand years earlier.
for the ‘Marathon runner’, he died from
exhaustion. And of course today, the Marathon SIGNALS, DRUMS AND SMOKE
race is recognised and run throughout the
world (long distance). In the 1700s, the French used a signalling
system also called Semaphore to pass
For the record, it was also the Ancient Greeks information great distances. In this case Abbot
who first utilised the ‘services’ of pigeons as Claude Chappe invented an early signalling
couriers. Enough has been recorded about
This speedy method allowed armies time to be their involvement as a rapid communication
assembled and villages to be readied for device in espionage and military matters! And
evacuation in the event of invasion. One the origins of ‘flag signalling’ is also thought to
communication event involving the Greeks will have originated in Greece (450BC). This of
be forever etched in the history of Mankind course evolved over the years, and many
and spylore. In 490BC the Greeks defeated the navies opted to utilise flags to send coded
Persians in the Battle of Marathon. Fearful that messages, instructions and general informa-
the retreating Persian army would make their tion, especially in time of conflict or as a
way to Athens and attack the city, its military warning notice. Today, maritime flag signalling
commander gave a man called Phidippides a (semaphore) has evolved into the International
message to take back to the city. Contained Code of Signals (ICS).
within, news of the victory, but a warning to
prepare for possible action. Phidippides ran RUNNERS AND RELAYS
Matches -
once upon a
time used by
spies
Clothes and
buttons -
used as
secret
signals
The KGB used drawings and chalk to convey messages and various
case files exist reflecting this ‘art’. One former MI5 operative told Eye
Spy how, in conversation with contacts in pubs, he used to leave a
calculated number of cigarette filters (butts) in an ashtray to signify
how much he was prepared to pay for information. Of course in all
cases, the end user must also be familiar with what each event or
object actually represented. Spy trade is limited only by the imagination
of each user, and often simple tactics are far more beneficial, and in
most cases, safer and secure. Word of mouth is a good example,
though this by necessity means the engagement of two parties.
INFORMATION OASIS
MI5 Director-General Andrew Parker, Release sling Move Hold hover Land
a counter-terrorism specialist, load rearward
believes there should be nowhere on
the Internet where those intent on
terrorism and underworld activities
should be able to communicate, safe
in the knowledge that they are
protected by a ‘digital oasis’. And
this was one reason (amongst MI5
many), why the actions of NSA Director-
General
contractor Edward Snowden, so Move left Move right Move downward
Andrew
incensed US Intelligence. Parker
JERUSALEM
US Recognises Jerusalem as Israel’s Capital
July 2017. Israel’s Prime Minister Benjamin Netanyahu with Admiral Michelle
Howard, Commander Naval Forces Europe, aboard the USS George H.W. Bush.
Netanyahu welcomed the decision to recognise Jerusalem as Israel’s capital
It wasn’t just
Muslims who
protested the
Jerusalem deci-
sion. Archbishop
Pierbattista (right)
and 12 senior
Christian leaders
December 2017. Palestinian President Mahmoud Abbas and President in the city sent a
Recep Tayyip Erdogan at the OIC summit letter of protest to the US President, say-
ing it would lead to even deeper divisions
O
n 12 December, Bangladeshi officials confirmed the incident was one of
national Akayed Ullah, 27, detonated terrorism.
a pipe bomb, attached to his person
with velcro and zip ties. The The lone wolf terrorist moved to the USA in
explosion occurred in a busy 2011 and lived in Brooklyn where he worked
subway station walkway at New York’s Port as a taxi driver and electrician. He sourced
Authority at 7.20am - when thousands of city instructions for the IED from the terror
residents were making their way to work. Four magazine Inspire. The crude device was made
people suffered injuries but Ullah, who from hundreds of matchstick heads, a sugar
suffered extensive burns, survived. Within two composite and fairy lights. of people had gathered to vent their disap-
hours, Mayor Bill de Blasio and security proval over President Trump’s declaration
The location chosen by Ullah links the Port recognising Jerusalem as Israel’s capital.
Authority Bus Terminal to Times Square and is Ullah told detectives his actions were in
one of the busiest in the world - serving about response to the Jerusalem announcement,
225,000 commuters a day. It is considered a events in Gaza, and attacks against ISIS. “I
‘soft target’ by police officials because it does have been following ISIS on the Internet,” he
not have the same security as an airport. allegedly said, “I did it for them.” Former
NYPD Commissioner Bill Bratton confirmed
ANALYSIS that the suspect “supposedly set the device
off in the name of ISIS.” Also of note,
Of relevance, the failed attack came just days investigators discovered a message Ullah had
after the ‘Muslim Day of Rage’ protests in posted just hours before the attack - ‘Trump
Dhaka, Bangladesh’s capital, where thousands you failed to protect your nation’.
There was much speculation in the media that President Trump blamed lax immigration
Ullah was heading towards a target in Times policies and again urged Congress to “enact
Square itself, and that the device had exploded legislative reforms to protect the American
prematurely. Investigative officers from people.”
NYPD’s Joint Terrorism Task Force and the FBI
rejected this scenario after Ullah told them he
deliberately chose his location because it was
full of Christmas decorations and advertising.
“Ullah was aware of previous ISIS attacks at
Christmas markets in Europe, and he knew
exactly where he wanted to detonate his
bomb,” a police source told Eye Spy associ-
ates in the city.
Subway walk-
way close to
where the blast
occurred. Inset:
New York Port Authority officers Sean Gallagher, Drew Preston, Jack Collins and
Akayed Ullah Anthony Manfredini attended the bomb scene immediately and detained Ullah
E
spionage and all manner of covert Specialists participated in a study to estimate Since these studies were published, the
activities, many illegal, exist and the size of the DarkWeb; resultant analysis DarkWeb has likely grown (some say
thrive in the expansiveness of the suggests that it is about 4% of the total significantly). There is no accurate accounting
DarkWeb. A large number of users Internet. It should be noted that not everyone for the DarkWeb and even less information
of the Internet have not even heard accepts this figure. Another circulated figure about the value of the commerce that occurs
of the DarkWeb, whilst those that contends that the DarkWeb is about 500 times in it; in truth, no one knows how big the
have, may not fully understand this deep, dark the size of the known Internet indexed by DarkWeb actually is or how fast it grows.
connected world. search engines. Researchers speculate the
size of the DarkWeb approximates 7.5 Some specialists have predicted the demise
DarkWeb is a massive area that remains a petabytes - this represents a very large and the eventual collapse of the DarkWeb.
great mystery and challenge for security amount of information. Others say it will continue to evolve. “Those
services and the intelligence community; a who talk of the downfall of the DarkWeb
huge portion is clandestine and lies hidden in clearly do not understand the magnitude of
cloaked networks of the World Wide Web. It is this revolution,” a senior source said.
also referred to (rightly and wrongly) as
Darknets, Hidden Web, Deep Web, Deep Net, ACCESS
Invisible Web, and Undernet that use the
Internet for connection and communications. INTEL: The first step in accessing the
Each requires specific (highly guarded and DarkWeb is thought to be installing and using
restricted) software, encryption, as well as the TOR browser - [www.torproject.org]. It
special authorisation and configurations for should be noted that not all DarkWeb sites use
access. Basically, this includes all the the Tor Browser tool, whilst other sites require
websites and systems that are connected to specific configuration. There are also
the Internet that are not readily visible to you unconfirmed reports that some sites actually
and me, available or known, or indexed by require special hardware. Those who engage
recognised search engines. this area of the Internet can purchase just
about anything with a few mouse clicks. The
INTEL: The DarkWeb has its own Wikipedia- DarkWeb is the premiere global marketplace
like site to assist those trying to navigate its for the sale and purchase of illegal goods,
shadowy world. products and services.
An Intelligence Perspective
36 EYE SPY INTELLIGENCE MAGAZINE 113 2018
Those attempting to enter the DarkWeb sites of FBI graphic identifying the number of users on AlphaBay
AlphaBay and Hansa were greeted with this notice and the type of services provided
Now let’s take a look at five of the most the police, plus so much more. While it has
problematic issues confronting the intelligence been the prime source for cyber weapons and
and security world that are found on the exploitation kits, it has branched out signifi-
DarkWeb. cantly. All these ‘services’ are payable via a
cryptocurrency.
CYBER ESPIONAGE & RELATED ACTIVITIES
STOLEN INTELLIGENCE AND INFORMATION
In terms of hacking, you can anonymously
purchase (hire) the services of a hacker to The DarkWeb has been used by
spy/track a person, conduct cyber espionage, whistleblowers who acquire classified
place illegal content on a computer and tip-off information (some top secret) and usually put All major cyber intelligence agencies
now monitor the DarkWeb
it up for sale or hold it for ransom. There are
also reports that some major media players
(news desks) actually have a DarkWeb web
address (URL). A so-called ‘strong box’ is
located there that allows individuals to upload
documents without the fear of being tracked
and identified.
POLITICAL INFLUENCE
NO HIDING PLACE
Following the closure of AlphaBay and
Hansa, Ian Cruxton, Deputy Director of the
NCA, said: “Two of the most significant
DarkWeb criminal marketplaces are now
permanently offline, seriously affecting the
capability of several criminal networks.
Law enforcement agencies will now
begin to sift through the forensic material
gathered during the strikes. The criminals
who used these sites would be right to fear
the outcome of those investigations.
A
lphaBay operated for the site and stop the flow of
more than two years illegal goods. “Vendors were
and had transactions shipping illegal items from
exceeding $1 billion in Speaking about the interna- places all over the world,”
Bitcoin and other digital tional intelligence and
currencies. The site, which security effort (Operation
operated on the anonymous Bayonet) resulting in its
Tor network, was a major closure, FBI Acting Director
source of heroin and fentanyl, Andrew McCabe said: “This
and sales originating from was a landmark operation.
AlphaBay have been linked to We’re talking about multiple Andrew
multiple overdose deaths in servers in different countries, McCabe
the United States. hundreds of millions in
DARK WEB
said FBI Special Agent firearms, and fraudulent
Nicholas Phirippidis who services.
worked on the case
By comparison, the Silk Road
AlphaBay, an outgrowth of dark market - the largest such
earlier DarkWeb sites like Silk enterprise of its kind before it
Road - but much larger - went
online in December 2014. At
was shut down in 2013
following an operation
Law Enforcement Agencies
the time of its closure, the site codenamed Onymous - had Worldwide Are Fighting Back
had more than 250,000 approximately 14,000 listings.
listings for illegal drugs and Its creator, Ross Ulbricht, who GOING UNDERCOVER: Security and intelligence agencies all over the
toxic chemicals, and more used the pseudonym ‘Dread world are deploying techniques to identify and ultimately convict
than 100,000 listings for Pirate Roberts’ was arrested DarkWeb illicit users. Taking advantage of the protections of anonymity
stolen and fraudulent identifi- in 2014, convicted and offered by browsers like Tor, agents are going undercover to expose
cation documents, counterfeit sentenced to life in prison operators - you never know the identity of government people.
goods, malware and other without the possibility of
computer hacking tools, parole.
HACKING: One way to
circumvent Tor is to attack
the endpoint; that is, the
computers of users
themselves. The FBI
targeted users of a
DarkWeb child pornogra-
phy site called Playpen: the
Bureau deployed malware,
so that when a user clicked
on a child pornography related forum, their real IP address was sent to
investigators, revealing their likely location. (The FBI seized Playpen
after the administrator had misconfigured the site, exposing its IP
address to the normal Internet). As part of the operation, the FBI
harvested over 1000 US-based IP addresses, and Europol generated
3,229 of its own cases.
DEADLY END GAME OF DARKWEB OPERATOR
On 5 July 2017, Canadian Alexandre Cazes, the 25-year-old
founder of DarkWeb site AlphaBay was arrested in Bangkok,
Thailand. In addition, his wife was arrested for money laundering.
At the time of his arrest investigators valued his personal estate at
around $23 million.
One week later Cazes committed suicide inside his jail cell at the
Narcotics Suppression Bureau in Laksi district. He was found dead
hanging with a towel around his neck from the ceiling of his cell.
OPEN SOURCE: Even if a criminal’s business arresting another vendor who stored details of
exists primarily on the DarkWeb, it’s likely they his customers, German authorities recently
will have left digital ‘breadcrumbs’ - in forum fined a seller around £3,000 for purchasing
posts or public documents, for example. This small quantities off the now defunct Silk Road
helps investigators identify suspects. (see sidebar page 40).
ALERTERNAT
National Crime Agency (NCA) and Govern- with no link to the buyer or seller’s real
ment Communications Headquarters (GCHQ) identity. US Homeland Security Investigations
Joint Operations Cell (JOC) was launched in (HSI), part of the Department of Homeland
November 2015, and was initially engaged in Security, however, has set up a dedicated task
online child sexual exploitation. According to a force for tracking down those who launder
government document: ‘Bulk data has their proceeds with Bitcoin and other
F
supported the disruption of over 50 child cryptocurrencies. ormer Bosnian Croat General
sexual exploitation offenders in the UK in the Slobodan Praljak, who in 2004 was
last 30 months alone’. Because evidence THE POSTAL SYSTEM: For all its technological sentenced to 20-years in prison for
obtained by interception alone is not admis- sophistication, the DarkWeb illicit trade relies war crimes during the break-up of
sible in UK courts, people caught by this on postal systems and ordinary couriers. Yugoslavia in the 1990s, committed
method are unlikely to ever have a chance to Dealers have to properly package products in suicide at the Hague when a judge
contest its legality. order to defeat suspicious customs officials rejected his appeal. Praljak had already served
who may seize the package. However, once two-thirds of his sentence, but it appears he
SEIZED DATA: An arrest of a vendor or the detected, investigators will probe for further could not face serving a further six years in
seizure of a marketplace can generate a details, including the identity of seller and jail.
mountain of new leads for investigators to recipient.
follow. Prominent German vendor Shiny Flakes When the ICTY (International Criminal Tribunal
was recently targeted uncovering a staggering CONCLUSION: Criminals and even those for the former Yugoslavia) judge explained his
320 kilos of drugs. Fortunately for investiga- engaged in intelligence and espionage
tors, Shiny Flakes had kept a tidy spreadsheet activities always try to stay one step ahead. Bodies of murdered victims are
of all orders which is being used to track New technologies have revolutionised how exhumed from a mass grave near
down buyers, according to local and state illegal goods are traded or sourced. But when Srebrenica
police sources. drugs, guns, espionage and paedophilia
moved onto the DarkWeb, the security
Buying narcotics on the DarkWeb can come services soon entered this very dark world.
back to haunt people years later. After
DarkWeb vendors
must still use postal
services and
couriers
TIVE OPTION
smuggled inside a suit he had dry-cleaned for in his cell on 11
the trial. March 2006 at
the height of the
General Praljak was a suspect in the long- trial. Non-
running UN war crimes trial, and he joins a prescription
number of other notorious figures who took tablets were Slobodan Milosevic
their own lives whilst attending the Hague trial. found in his
Slavko Dokmanovic had been jailed for secure cell and investigators could not
genocide and other crimes - he was found confirm he had taken the pills himself. This
hanged in his cell in 1998. Milan Babic, who sparked conspiracy theories.
declared himself the leader of the Serb
Republic of Krajina (Croatia), killed himself on Interestingly, in Croatia, Slobodan Prajak still
5 March 2006 after being found guilty of commands a great deal of respect, and in
crimes against humanity. Parliament, ministers and politicians began a
session honouring him with a minute’s
Perhaps still the silence. Parliament’s President, Goran
most controver- Jandrokovic read a statement supported by all
sial death is that parties regarding the decision of the Hague:
of former leader “The [2004] verdict does not honour historical
of Yugoslavia truth, facts and proof... as such it was unjust
General Slobodan Praljak Slobodan and unacceptable.”
Milosevic
himself. Mystery • The ICTY was established by the UN
ruling, he shouted “Slobodan Praljak is not a surrounds the Security Council on 25 May 1993. Since then,
war criminal... I am rejecting your verdict... circumstances 161 people have been indicted
your contempt,” he tilted his head backwards
and took a drink from a small vial. He then Typical cell at the ICTY
announced, “I have taken poison.” He was
taken to hospital but died shortly after. Above: Poster of
Milan Babic
IRAN
UNIVERSAL
EXPORTS Joint Base Anacostia-Bolling, Washington DC. US Ambassador to the
U
S Department of Defense officials United Nations Nikki Haley discusses evidence of Iran’s destabilising
have presented convincing activities in the Middle East and its effort to cover up continued violations
evidence that Iran continues to of UN resolutions. Behind her - various recovered Iranian weaponry
provide weaponry to terrorist
groups fighting in Yemen and Airport, and is part of a new strategy: by US partners in the region. The four
surrounding areas. In a hangar at “Addressing the totality of Iranian threats and systems are a short-range ballistic missile, an
Joint Base Anacostia-Bolling, three intact malign activities: nuclear; ballistic missile antitank guided missile, an unmanned aerial
Iranian weapon systems and debris from a development and proliferation; counter- vehicle and exploding boat technology. “All
fourth, were shown to the media as “proof of maritime operations; cyber; and support to four include parts made by [the] Iranian
covert arming of Houthi rebels.” The weap- terrorism and unconventional warfare,” said government-run defense industry, and all
onry was recovered from a number of sites in Laura Seal, a DOD spokesperson. “Part of the could have only come from Iran,” Seal said.
the region, where fighting forces from Gulf strategy is to show how Iran continues to defy Pieces of two Iranian Qiam missiles were
nations, including Saudi Arabia and the UAE, the international community by violating shown - both launched from Yemen into Saudi
continue to confront terrorists. United Nations resolutions.” Arabia. One targeted the Yanbu oil facility, the
other King Khalid International Airport. “Only
The US chose to display the weapons The weapons systems on display were Iran makes the Qiam,” Seal said.
following a missile attack targeting Riyadh retrieved from battlefields in the Middle East
Signature stamp
of the Iranian
company Shahid
Bagheri Indus-
tries on a
ballistic missile
fragment fired
into Saudi
Arabia from
Yemen by Houthi
rebels
Imagery of recovered Iranian weaponry and technology remnants, including missiles fired into Saudi Arabia from
Yemen’s Houthi rebels in 2017. They form part of a multinational collection of evidence displayed at Joint Base
Anacostia-Bolling proving Iranian weapons proliferation in violation of UN resolutions
Another piece of equipment referenced was an The guidance system from an Iranian Shark-
Iranian-made anti-tank guided missile 33 boat was also featured. This originated
codenamed Toophan. “This was obtained by from an explosive-laden, unmanned boat used
Saudi Arabia on the battlefield,” Seal said. The in an attack against Saudi Arabian frigate HMS
missile is a high-precision, direct-fire weapon al Madinah. “What makes the Shark-33 so
with a range of about 2.4 miles. “The Houthis dangerous is a guidance system allowing it to
in Yemen use the weapon to target infrastruc- track and hit a moving target without an
ture and vehicles,” officials said, noting the operator on board, so the boat can be
group does not have the technology to Qasef-1 UAV deployed to blow up a ship without sending
manufacture such weapons. someone on a suicide mission,” Seal said.
attack UAV - diving on targets Kamikaze-style
The display also showcased a Qasef-1 UAV and detonating its warhead upon impact,” Seal Tehran’s role in missile proliferation and
(unmanned aerial vehicle) operated by Houthi said. “Only Iran makes the Qasef-1. It is a backing terror groups has increased since
forces, which was recovered by Saudi Arabia. member of the Ababil UAV family, designed 2015 when it signed a nuclear deal with the
“The Qasef-1 can be used as a one-way and produced by the Iranian government.” West, Russia and China.
Qiam class
ballistic missile
fragment
F
ollowing defeat of ISIS in Raqqa, 6,000 heavily armed ISIS terrorists and their
newswires carried reports that families were allowed to leave the city on 10-
Alliance fighters had allowed a few 11 October 2017 in a convoy stretching an
dozen remaining and trapped ISIS astonishing five miles.
operatives to leave the Syrian city, When Syrian Democratic Forces (SDF)
thus ensuring no further fatalities in Unfortunately for international intelligence announced ‘victory’, observers were of the
the battle for the so-called de facto capital of agencies engaged in a programme to identify opinion that back-channels of communication
the terrorist group. Since then, all manner of ISIS fighters (in the event they return home), had been created between ISIS and govern-
odd reports and stories have emerged, some most have since disappeared; some have ment forces. Some of the contacts were
provided for by intelligence officials and made their way to other fighting units, cemented by ‘third parties’, allegedly
reporters attached to various fighting units. hundreds have reached the Turkish border and controlled by the CIA and Russia’s GRU. And
many have sworn to return to their home contrary to the official line that only a handful
Perhaps the most concerning and bizarre of all nations to continue the fight. A tiny number of ISIS fighters were allowed to depart, the
- a disturbing BBC essay that as many as have been detained. ‘tall tale’ seems absolutely authentic.
Few intelligence and military personnel were happy, but the secret deal,
offered to ISIS heads was made by city officials - and it didn’t apply to
foreign fighters - who would not be given safe passage - coded speak
for detention or worse. And despite assurances that ISIS fighters would
depart only with their sidearms, hidden in larger trucks was a cargo of
heavy weaponry, explosives and other munitions. Some fighters chose
to wear suicide explosives’ belts and departed holding their weaponry Film stills from residents of Raqqa and a BBC crew show
aloft in plain sight. Intelligence analysts dubbed the operation ‘Raqqa’s departing ISIS fighters and their final drop-off point
dirty secret’, because the entire event was to be kept hidden away from
the prying eyes of watching journalists.
THE 30% S
members. Throughout its journey, the convoy
was monitored by surveillance aircraft and
UAVs. And interestingly, during nighttime
hours, illumination flares were dropped from Major General James B. Jarrard
the air allowing drivers to see the road ahead.
fighters.” Eye Spy understands of these,
biometric data was secured. Dillon also said a
Former MI6 officer who
ISIS’s band of foreign fighters secured their
freedom, and checks via the hired drivers have register containing the identity of 26,000 wrote the intelligence-
identified numerous foreign nationals - from fighters had been compiled by 70 nations. based Trump Dossier
Britain, France, China, Yemen, Pakistan,
Turkey and Saudi Arabia to name but a few. Despite the controversy of allowing a shielded concedes some of its
Others spoke “good English.” force of ISIS fighters to depart, Eye Spy explosive content may
sources said the entire operation was to limit
Forced to acknowledge that the operation casualties - both civilian and SDF troops. not be accurate...
opposed the claim of US Defense Secretary Major General James B. Jarrard commander
A
James Mattis, who had said no fighters would of Special Operations Joint Task Force new book titled Collusion: How
be allowed to return to Europe and elsewhere, Operation Inherent Resolve, hailed the victory Russia Helped Donald Trump
the heads of Operation Inherent Resolve have in Raqqa but avoided discussing the secret Win by Guardian journalist and
now acknowledged the convoy secreted out a convoy. “ISIS has no capital or caliphate and Russian specialist Luke Harding
large fighting force of terrorists. US Colonel is running out of places to hide,” he said. threads its way through the
Ryan Dillon said that although an OIR official “Their leaders are hiding, Raqqa was freed by many stories linking President
was part of the back-channel team led by Syrians and Syrians will govern Raqqa.” The Trump’s advisors, backers and confidants, to
Raqqa Civil Council officials, he did not have US has an estimated force of 4,000 troops in the powerful political underworld machinery of
input into the “safe passage negotiations.” He the country. Moscow. All the usual figures are referenced,
insists only a handful of foreign fighters including former MI6 officer Christopher
departed and were eventually detained. “In the The operation to retake Raqqa, which began in Steele, who like many ex-intelligence men and
course of the screening there were four June, had ended. A parting comment was women, now ply their trade in private security.
fighters identified by the SDF,” said Dillon. “Of made by an ISIS terrorist to one of the convoy
3,500 civilians, approximately less than 300 drivers. “Let us know when you have rebuilt November 2017. US President Trump
were identified and screened as potential ISIS Raqqa, we will be back...” in South Korea. He has consistently
rejected claims of Russian liaisons
and secret meetings
EYE SPY
and allow the crux of the
story to ferment and cause
mistrust. This covert
NOW INCLUDES popular intelligence media
FREE ELECTRONIC element has for decades
BACKGROUND
E
ye Spy’s major investigative
research feature into the original ‘C’
- Sir Mansfield Cumming (See Eye
Spy 99 and 100), proves that the
Spencer name and its legacy has its
origins dating back to the 1920s
and beyond. Cumming used it as his own in
the offices of MI6 in Whitehall Court after Sir Mansfield Cumming - first MI6 ‘C’
sourcing it from various Spencers, including The document also records that monies were
ship names. Most were historically connected injected (donated) from ‘well-wishers’ of the mechanism perfectly. And even today, the
to a southern area of England used by Service, “including a particularly large sum secret financing of deep-cover operations by
shipbuilders (where he lived and worked) - from an American,” said Bennett. “Maybe this agencies does take place - ‘Dark Money’ is
though this hardly begins to explain why he could have come from an American who was the term used in the language of spies.
chose the name, concerned about future threats and wanted to
thus readers are make sure MI6 was adequately funded in case However, what makes the Spencer account
advised to of emergency.” More than likely it was a US unique is that it appears it could only be
source our Government donation. accessed by Menzies himself; some have
original story. speculated it’s possible that each time a new
Gill Bennett, And whilst the actual amount in the Spencer MI6 Chief was installed, this ‘route’ to its
former chief account discovered by Dr Cormac is signifi- coffers was passed down. However, Dr
historian at the cant - £1.4 million (around £38 million in Cormac, does not think this is the case with
Foreign Office today’s money), such accounts operated by the Spencer account. He told Eye Spy: “I’m
(1995-2005) British Intelligence via front companies are not fairly confident that this tradition died off with
acknowledged unique. Used to augment operations and Dick White. He closed the various accounts
the account may funded by the Treasury (at that time) they and formalised reserve spending in a way
Dr Rory
date back to were however, most secret. A glimpse into which probably left little need for the name
Cormac
Cumming. Peter Wright’s book Spycatcher explains the Spencer.” Dr Cormac’s discovery is
trade separately. In 1939 Glyn, Mills & Co trade as a separate entity until the 1960s
was itself acquired by The Royal Bank of with military-linked accounts.
R
eleased MI5 files reveal another secret
relationship surrounding one of
Britain’s best known and infamous
post-WWII political figures - former
SURVEILLANCE
John Profumo (right)
N
drop-over (for comfort) and superb glass ewly released British Intelligence documents reveal Sir
Kingsley Amis, one of Britain’s best known writers, was
lenses. They also come in a tough smart
probed by MI5 shortly after Germany was defeated in WWII,
black carry case. Don’t confuse these for his ‘left-leaning’ (Communist) mannerisms and politics
glasses with other cheap models that are while serving in the Royal Corps of Signals.
easily spotted, or others that carry the Eye
MI5 discovered he joined the Communist Party as an Oxford student
Spy name. The reflective mirror in our and was a ‘recipient of Communist literature and a very promising
glasses is actually embedded into the lens member of the Oxford Branch of the Communist Party’ the documents
and impossible to detect show. The file has been likened to numerous others surrounding
Establishment fears of the secret growth of Communism in Britain.
Other entries note his liaisons with senior figures at the Communist
Party newspaper the Daily Worker.
The material shows MI5 continued to surveil the writer, but in actuality,
investigators acknowledged he never hid his socialist views and they
did not consider him a national security risk. Indeed, his views are said
to have changed following the Soviet invasion of Hungary in 1956. A
year later he wrote to the
Daily Worker stating he
‘utterly rejected Marxism’.
A decade on, Amis even
signed a letter to the
London Times showing his
support for US forces
fighting in the Vietnam
Order code: War.
TX-RVS
UK £30.00 The analysts of MI5 were
proven right in their belief
USA $35.00
that Amis should not be
ROW £35.00 bracketed with other
prolific Communist-friendly
figures, including those
Please use order form on page 82 or visit: spies belonging to the
www.eyespymag.com infamous KGB-operated
Sir Kingsley Amis
Cambridge Spy Ring.
Russian intelligence officer Ivanov and Stephen Ward met in this London
building where they frequently played cards together
background and placement silos in
inside story of many Europe - this by
events associated liaising with the
with this period, and likes of Profumo
also provides a better and Ivanov. If this
personal understand- is true, then her
ing of the central bedroom and
characters involved. secret liaisons
However, there have were not just
been so many films, social, but
plays, books, radio perhaps purpose-
and television ful. “She knew
documentaries on the spy scandal, that her exactly what she MI5 Director-General
J
ust a week-or-so following release work and honest reflections have been was doing,” our Sir Roger Hollis
of documents surrounding John strangled and consumed by intelligence source said.
Profumo and Nazi spy Gisela historians, playwrights and authors. Many Continued on page 82
Winegard, one of the women at the believe the book did not receive the acclaim it
centre of the later 1960s Profumo should have.
Affair, Christine Keeler, 75, passed away. Her
London socialite life and affairs with Profumo, One MI5 agent who knew Christine Keeler
Russian diplomat and military attache Eugene personally during the 1960s, told Eye Spy
Ivanov, plus MI5 contact man Stephen Ward editor Mark Birdsall, that she was regarded as
and other Establishment figures have been an “intelligence source and a person of
well documented. Suffice it to say, the scandal interest.” Not for her work, but for her lifestyle
almost toppled the Harold Macmillan govern- and associates. Her friend, Stephen Ward,
ment of the day. osteopath to many famous people, including
Winston Churchill, Frank Sinatra and Elizabeth
Keeler’s early 2000s memoir The Truth at Last, Taylor, to name but a few, killed himself just
is truly an engaging book revealing the before he was due to be sentenced for his
involvement in the murky business, though a
charge of ‘living off immoral earnings’ hardly
suits the tale. “Ward was MI5,” said our
source. “Not an officer, nor an agent, but he
passed commentary and materials to the
Service - not
just our’s, but
sadly, probably
the KGB as
well.”
One well
publicised task
reportedly
linked to Keeler
was securing
information on
nuclear The story of Stephen Ward and the
MI5 contact man Stephen Ward Profumo Affair was made into a musical
committed suicide in 1963 missiles and Eugene Ivanov
OUT OF TIME
THE SPY WHO ‘SAVED THE WORLD’
Eye Spy Associate Editor Peter Matthews explains how a hesitant Hitler, a fragmented scientific
Paul Rosbaud
community, plus the secret work of an MI6 spy and the Special Operations Executive, stopped
Germany securing the one weapon which could have turned the tides of war in its favour
B
ritain’s Prime Minister Winston THE URANIUM SOCIETY
Churchill had nightmares in the early
months of WWII concerning Hahn began his career in the laboratories of
uncertainty of what was happening New Zealand-born Ernest Rutherford in
in the race to develop nuclear Cambridge, the father of modern nuclear
weapons with Nazi Germany. This physics, who first split the atom but then
was because in the 1920s, Germany had dismissed the possibility of creating an
developed and fostered a burgeoning German awesome source of energy from it as “pure
scientific community giving them a head start moonshine.”
in advanced weapons research.
Within a couple of years Hahn, working in the
Its armed forces could also call on many of Kaiser Wilhelm Institut* in Berlin, published a
the world’s most outstanding physicists, one paper containing the theoretical basis of how
of whom was Professor Otto Hahn. to release the awesome power of the atom.
Following Hahn’s paper over 100 other
By Peter Matthews
scientists and academics (mainly Germans),
published papers discussing ways to split the As the clouds of war gathered, Jewish
atom; one of whom coined the phrase physicists wisely chose to flee Hitler’s
‘Nuclear Fission’. Thereafter, more than 70 Germany. They came to Britain and America to
German scientists gathered together in Berlin work which weakened the intellectual power of
to form the Uranverein (Uranium Society) to Uranveren Society, among the emigres
research the subject. was one Albert Einstein.
OPERATION MUSKETOON
Julius Robert
Oppenheimer
1913. Otto Hahn at the Kaiser Wilhelm Institut in Berlin
Albert Speer
programme contained many Jewish physicists
one of which was Albert Einstien. Research
efforts were further divided into different
locations working on various aspects of the
problem with little communication between
them unlike the American method. The US
Germany failed to keep up in the nuclear race ALSOS programme concentrated their teams
for a number of reasons; the overriding one all in one place and conducted an integrated
was complacency, lack of focus and bad research programme under one inspired
direction of effort. The situation can be leader, Julius Robert Oppenheimer.
compared to the intelligence and code-
breaking work at Bletchley Park. OUT OF TIME
The German intelligence network used two Hitler appointed Albert Speer as Minister for
security services often working against each Armaments and Ammunition later in the war.
other; her nuclear programme was even more Speer was neither a scientist nor a military
divided with nine technical sectors which man, and bizarrely decided to close down
lacked a unified direction. Hitler did not trust Germany’s nuclear research project and its
his intelligence people, nor to some extent the development of the bomb.
Former Kaiser-Wilhelm Institut in Berlin scientific community, as the nuclear
where nuclear fission was first detected
Rosbaud informed London of Speer’s decision
to the great relief of Churchill, his war planners
and intelligence chiefs, as all believed that the
only way Germany could have won the war at
that stage was by dropping an atomic bomb.
O
ne of the most
interesting covert
attack objects ever
conceived by Allied
Special Forces (SOE
The shaved
and OSS) in WWII, was the
exploding
‘explosive rat’. Few of these
rat and pen
objects survive, thus when one French concealing
was auctioned at Bonhams in Resistance a spike
New York in December, there garrote wire
was much interest.*
SUBSCRIBE
A subscription will protect you ELECTRONIC I
against any price increase German Intelligence
identify would-be Chinese
UK, USA, CANADA, EUROPE, ROW spies who are using
modern technology in
I WOULD LIKE TO SUBSCRIBE TO EYE SPY (8 ISSUES A YEAR) - PLEASE TICK APPROPRIATE BOX
conjunction with an
UK 1 YEAR £29.95 USA 1 YEAR $49.99 EUROPE/ROW 1 YEAR £34.00
historical tradecraft
UK 2 YEARS £55.00 USA 2 YEARS $96.00 EUROPE/ROW 2 YEARS £63.00
T
he domestic intelligence agency
Name: _________________________________________ Address: _______________________ BfV (Bundesamt fur
Verfassungsschutz), spent much of
__________________________________________________________________________________________ 2017, analysing numerous
professional and social media
Post/Zip Code: ___________________________________ Country: _____________________
accounts of Chinese nationals on
email: __________________________________________
business websites such as Linkedin. The user
profiles, complete with stylish imagery and
work titles, ranging from consultants,
Cheques must be payable to: ‘EYE SPY PUBLISHING LTD’ headhunters, scholars and political experts,
NOTE: WE ONLY ACCEPT UK, USA AND CANADIAN CHEQUES were all bogus. “The people are little more
than ghosts, they don’t exist,” one intelligence
I enclose Cheque for: ______ / ______
source said. “The ultimate objective is to
For credit card payment by Visa, MasterCard, American Express recruit informants and place its own spies in
vital areas to source high-end information,
Credit Card No: ___________________________________________________ especially from government areas.”
Expiry Date: ________ Three Digit Security Number (the last three numbers on the The BfV consider the Linkedin operation an
endeavour created and managed by Chinese
reverse of the credit card: ______________
PAYPAL eyespy@eyespymag.com ONLINE www.eyespymag.com
INFILTRATION sionals created by Chinese Intelligence who targeted 10,000 German nationals
China Ambassador to
Embassy of Germany Shi Mingde
China, Berlin
V
O
L
U
M
E
10 ISSUE 73 REF: ES/73
UK £3.95 USA/ROW $7.00
ISSUE 74 REF: ES/74
UK £3.95 USA/ROW $7.00
ISSUE 75 REF: ES/75
UK £3.95 USA/ROW $7.00
ISSUE 76 REF: ES/76
UK £3.95 USA/ROW $7.00
ISSUE 77 REF: ES/77
UK £3.95 USA/ROW $7.00
ISSUE 78 REF: ES/78
UK £3.95 USA/ROW $7.00
ISSUE 79 REF: ES/79
UK £3.95 USA/ROW $7.00
ISSUE 80 REF: ES/80
UK £3.95 USA/ROW $7.00
V
O
L
U
M
E
11 ISSUE 81 REF: ES/81
UK £3.95 USA/ROW $7.00
ISSUE 82 REF: ES/82
UK £3.95 USA/ROW $7.00
ISSUE 83 REF: ES/83
UK £3.95 USA/ROW $7.00
ISSUE 84 REF: ES/84
UK £3.95 USA/ROW $7.00
ISSUE 85 REF: ES/85
UK £3.95 USA/ROW $7.00
ISSUE 86 REF: ES/86
UK £3.95 USA/ROW $7.00
ISSUE 87 REF: ES/87
UK £3.95 USA/ROW $7.00
ISSUE 88 REF: ES/88
UK £3.95 USA/ROW $7.00
V
O
L
U
M
E
12 ISSUE 89 REF: ES/89
UK £3.95 USA/ROW $7.00
ISSUE 90 REF: ES/90
UK £3.95 USA/ROW $7.00
ISSUE 91 REF: ES/91
UK £3.95 USA/ROW $7.00
ISSUE 92 REF: ES/92
UK £3.95 USA/ROW $7.00
ISSUE 93 REF: ES/93
UK £3.95 USA/ROW $7.00
ISSUE 94 REF: ES/94
UK £3.95 USA/ROW $7.00
ISSUE 95 REF: ES/95
UK £3.95 USA/ROW $7.00
ISSUE 96 REF: ES/96
UK £3.95 USA/ROW $7.00
V
O
L
U
M
E
13 ISSUE 97 REF: ES/97
UK £3.95 USA/ROW $7.00
ISSUE 98 REF: ES/98
UK £3.95 USA/ROW $7.00
ISSUE 99 REF: ES/99
UK £3.95 USA/ROW $7.00
ISSUE 100 REF: ES/100
UK £3.95 USA/ROW $7.00
ISSUE 101 REF: ES/101
UK £3.95 USA/ROW $7.00
ISSUE 102 REF: ES/102
UK £3.95 USA/ROW $7.00
ISSUE 103 REF: ES/103
UK £3.95 USA/ROW $7.00
ISSUE 104 REF: ES/104
UK £3.95 USA/ROW $7.00
V
O
L
U
M
E
14 ISSUE 105 REF: ES/105
UK £3.95 USA/ROW $7.00
ISSUE 106 REF: ES/106
UK £3.95 USA/ROW $7.00
ISSUE 107 REF: ES/107
UK £3.95 USA/ROW $7.00
ISSUE 108 REF: ES/108
UK £3.95 USA/ROW $7.00
ISSUE 109 REF: ES/109
UK £3.95 USA/ROW $7.00
ISSUE 110 REF: ES/110
UK £3.95 USA/ROW $7.00
ISSUE 111 REF: ES/111
UK £3.95 USA/ROW $7.00
ISSUE 112 REF: ES/112
UK £3.95 USA/ROW $7.00
M
ost US intelligence officers However, in a strange turnaround, CIA Director
have failed to embrace the Mike Pompeo, speaking to a defence
‘tweets’ of President Trump, gathering in California, said that in some
especially those with a cases they actually provide the Agency with
political, security or intelli- important information. “How so?” a delegate
gence agenda - regardless of asked. D/CIA Pompeo responded: “I’ve
their content. And privately, a large percentage actually seen it help us. Things the president
believe they are damaging - a recent example has put on his Twitter account actually have a
being his re-tweeting of far-right UK videos real-world impact on our capacity to under-
and information tabs attacking Muslims. The stand what’s going on in other places in the
result was a diplomatic spat between the two world.
allies forcing premier Theresa May to say it
was “wrong of the president to have done “That is, our adversaries responded to the
this.” tweets in ways that were helpful to us to
understand command and control issues, who
is listening to what messages, how those anonymity said: “Calling NK leader ‘rocket
messages are resonating around the world.” man’ and ‘short and fat’ is not helpful when
the CIA is trying to establish back-channels of
Other intelligence figures remain unconvinced. dialogue with the rogue nation to stop its
One official who spoke on the condition of nuclear ambitions.” Former D/CIA Leon
Penetta agreed, and said, “...you don’t just roll
2013. Former D/CIA Leon Penetta Wreath and memorial for fallen
gives a farewell speech at King’s agents within the courtyard of FBI
College, London headquarters, Washington DC
The tweet was met professionalism and a focus on complying response to the president’s comments. On
with utter dismay in with the law and the Constitution. Instagram he wrote: ‘Three things cannot be
the corridors of this long hidden: the Sun; the Moon and the Truth’.
famous intelligence “This is why the FBI continues to be the
and security premier law enforcement agency in the world. For the record, President Trump’s Twitter
organisation. FBI agents are dedicated to their mission; account can boast a remarkable 44 million
Questioning the suggesting otherwise is simply false.” followers. He says this allows him to
honesty of an officer “circumnavigate fake media” and reach
or even a Less than forty-eight hours after the ex- around 100 million people using Twitter and
directorate’s integrity is one thing, but calling change, ex-intelligence man James Comey various social media sites. Interestingly, the
its entire structure flawed is another. himself used the Internet to post a cryptic president himself only follows 45 accounts.
C
urrent FBI Director Christopher Wray
and observers to provide some sort of
was President Trump’s personal
reasoning. And it cannot help confidence in
choice. Appointed on 2 August 2017,
the ranks and file.” Forced to respond,
this quiet and thoughtful intelligence
Thomas O’Connor, head of the FBI Agents
man lost no time in rejecting statements that
Association (FBIAA) said: “Every day FBI
the Bureau is in turmoil. He also ignored one
Special Agents put their lives on the line to
tweet that urged him to ‘clean house’.
protect the American public from national
security and criminal threats. Agents perform
Wray defended staffers and declared: “There
these duties with unwavering integrity and
is no finer institution, no finer people than the
men and women who work there and are its Christopher Wray is sworn in
FBI headquarters,
beating heart. as FBI Director
Washington DC
“The FBI I see is tens of thousands of brave
men and women working as hard as they can
to keep people they will never know safe from
harm.”
Classified: The Insider’s Guide to 500 Spy Sites in London provides visitors to the UK’s capital with a unique
opportunity to journey to places that are forever embedded in the city’s fantastic spylore. Also included are many
forgotten sites where spies from around the world have conducted their own secret war with MI5 and MI6. Service
headquarters, covert hiding places, secret front companies, agent training locations, mail opening centres, under-
ground venues, safe houses, dead letter drop sites and the darker side of this fascinating ‘cloak and dagger’ world
are explored, including assassination and murder most strange. There’s also a splendid candid commentary about
the history of Britain’s Secret Service from its inception in 1909 to the present day.
This informative work produced by the editorial team of Eye Spy Intelligence Magazine reveals London’s enduring
liaison with the world of espionage. An illuminated history of secret spy games, tradecraft and treachery hosted by
one of the greatest cities in the world... indeed, the spy capital of the world!
• Full colour throughout • 544 pages with complete index • Over 1,900 photographs
• 1,000 specially commissioned images • Large format 210mm x 270mm
THE ULTIMATE SPY SITES
TRAVEL GUIDE OF LONDON
UK £22.50
USA $32.00
WORLD £25.00
PRICE INCLUDES
P&P/AIR MAIL!
10
TRADECRAFT
COMMUNICATION METHODS
SUITS, TIES AND FLOWERS
F
rom the wearing of
flowers in buttonholes on
men’s suits, to hat types,
shoe buckles and
umbrellas, clothing and accesso-
ries have been used as signs,
signals and instructions as covert
THE LIBRARY BOOK
S
messages and prompts. adly today, libraries are selection relatively easy. Similarly,
closing down by the the topic would change regularly,
The ‘sign’ that initiated the score, but there was allowing some degree of protec-
exfiltration of MI6 agent Oleg Iraq’s Naji Sabri addresses once a time before the tion; and to add a layer of
Gordievsky from Moscow in United Nations... with CIA- age of the Internet, when these additional security, operators
1985, was a simple Safeway supplied suit important places of learning were would select obscure subjects.
supermarket bag. In this case MI6 numerous in towns and cities, and
told him if he ever thought his life Another classic example of frequented by the masses. They Today, Eye Spy was informed the
was in peril he should walk down ‘garment tradecraft’ occurred in were also utilised fully by those passing of information, conversa-
a certain street at a certain time 2002, when the CIA made contact engaged in espionage. Messages tion and covert liaison has now
carrying the bag. And then one with Iraq Foreign Minister Naji and information could be left in switched to another instantly
evening he did. MI6 surveillance Sabri - the objective being to specific books and/or exchanged recognisable location. High street
officers were watching, and duly source intelligence on Saddam’s without turning to the spoken gambling outlets dwarf libraries in
organised his escape to Finland. WMD. The CIA, unsure if Sabri word. In virtually all cases, the respect of numbers, and few even
would cooperate, thus delivered a users were conversant with the glance at the writings on betting
suit to his hotel in New York where target book, or subject, making slips exchanged between users.
he was about to speak at the
United Nations. If Sabri was
‘onside’ he would deliver his SECRET WRITING
speech wearing the suit. And he
I
did - whilst also pocketing a n 1839 playwright and ing in the high and dark echelons
covert $1 million payment. novelist Edward Bulwer- of government for thousands of
Lytton wrote ‘The pen is years. They continue to be used in
mightier than the sword’. Few the intelligence world today.
in the game of espionage would
disagree, though often the actions
of collectors and distributors of
information, be it coded or
otherwise, tend to impact sooner
or later on the latter.
T
Other classic ‘time capsules’ of just like any code, once discov- he use of dead letter secure method unless of course
secret writing can also be found in ered it is vulnerable: there still drops or dead drops the ‘collector’ or ‘provider’ is
this category, such as the use of exists counter-intelligence (DD) to pass physical known to an intelligence adversary
invisible ink, and in later times specialists skilled in the art of packages has been who will undoubtedly conduct
bland and meaningless photo- deciphering and codebreaking, covered extensively in Eye Spy, surveillance.
graphs and sketches to depict or and today’s powerful computer yet the utilisation of this tradecraft
impart information. programmes augment such tasks. When one thinks of a dead drop,
continues to this day. However,
naturally the mind conjures up an
like many elements of information
exchange, technology has seen image of a hollowed out tree
SIGNS, SCRIBBLES AND MARKERS stump, or a location which seems
the ‘engineering’ of the DD evolve.
innocuous - beneath a wooden
I
n the high intensity days and he needed to meet his handler, the Today, there are case examples sign post, public toilet, a gap
dangerous period of the Cold spy would draw a simple pink where the genesis of a dead drop between a brick wall etc. Today,
War, spies from both the East circle on a tree or fence near his begins in the hidden regions of the intelligence eyes are also fo-
and West often chose to use London flat. Internet... or DarkWeb to be more cussed on larger targets, such as
unique symbols and seemingly precise. Here operators will ports and the movement of illegal
irrelevant markers or objects to Other odd markers were also used source specific information on weapons, high-end technology
communicate. British naval traitor in Britain’s capital, such as leaving locations in city streets and and other materials - many of
John Vassall is a good example. In train tickets attached to lamp woodland (for example) prompting
1954, he was recruited by the posts or a discarded bottle near a a person to an exact location
KGB in Moscow and soon later bin in a London park. Sometimes where an item can be recovered.
found himself back in London even a simple scratch on a wall or And the tradecraft is a relatively
working for the Admiralty. When the piercing of a milk bottle top
© HELLENIC COAST GUARD
C
annisters, boxes, bolts,
rings, watches, tins,
bottles, newspapers and
virtually any everyday
and recognisable item has been
used in history and adapted to
carry information or project a
Brompton Oratory and nearby Holy Trinity Church, message or signal. Spylore is
London. Both locations were used by the KGB as littered with case files where those
dead drops engaged in the art of espionage
have opted to use objects that
attract little attention and afford
much security, from ‘worry beads’
to Rubik Cubes, the latter being
carried as a signal to those
attempting contact in 2013 with
NSA traitor Edward Snowden. In
this case Snowden asked former
Rudolf Abel and an FBI
Guardian correspondent Glenn
image of the ‘lucky coin’
Greenwald, to make his way to a
hotel carrying the object before - Rudolf Abel. A young newspaper
contact was made. delivery boy - ‘Jimmy’ - had asked
Interior Brompton Oratory. Inset: Behind this pillar KGB a couple for change of a dollar bill.
operatives would conceal and exchange materials The KGB were ardent users of He later dropped the nickel which
hollowed-out coins, but the opened revealing microphone film.
inadvertent discovery of one such This prompted the Bureau to
such items often begins with a coin at a New York address in launch a major investigation. And
simple communication between 1953, dubbed the ‘lucky coin’, of course, Abel was later ex-
supplier and end user, just like eventually led to the downfall of a changed for CIA U-2 pilot Gary
users of ‘traditional’ dead drops. spy ring and arrest of a senior spy Powers in 1962.
And for those engaged in uncover-
ing such actions, it is just as
important to identify all secret
aspects of a warehouse or
container’s use - from assembly
to departure and the eventual
arrival point. Just as important,
the operators of the location, or
those renting a facility.
O
far too big to secret into a tree ne of the more subtle organisations and military bodies
stump or bury. and dangerous spy to identify individuals who have
activities watched more been ‘schooled’ by government
Yet the genesis of a journey or and more intensely by bodies in countries such as China
covert operation (illegal) to move agencies such as MI5 and the FBI, - ultimately to find work in
is the covert placement of
individuals from foreign lands into
places of learning and high-end
technology houses, often with
military threads. Once embedded
into an organisation or company,
information loss is inevitable.
L
ike it or not, and despite a A ‘person of interest’ who exits or
BRUSH PASS AND EXCHANGES plethora of denials from enters a foreign country will
those who run and inevitably be required to impart
I
f ever a tradecraft has oversee spy agencies, exact details of their journey and
survived the passage of time information transfer is often the reason for the excursion, be it
and avoided the pit falls (and performed using ‘ordinary a holiday or business trip.
advantages) of the Internet, people’. Questions will also be raised as to
then it must surely be the his or her’s address or hotel and
‘legendary’ Brush Pass. The the length of their stay.
passing of information and items
utilising environment, objects and At airports and sea ports bag
of course, the skill of participants. searches are a norm, and none
In basic terms this is simply agent more so when the individual is on
contact using sleight-of-hand to a watch list, be they suspected of
exchange materials. This can be working for an intelligence agency,
performed in plain sight, in busy criminal gang or simply a
locations such as a crowded character acting suspiciously. If
street, or even in remote places. It that person is indeed on an
often involves two people simply assignment, then in many cases
walking towards each other and an intelligence agency may opt to
covertly handing over a package. use a decoy to carry information,
Performed in a microsecond, the and in some cases, this involves
exchange is almost invisible to the an innocent person whose
naked eye. Other variants exist, of luggage has been accessed.
course, such as sitting at a park
bench and dropping an item into a Such events are rare, but secret-
bag; or indeed, departing with the ing information or a piece of
other person’s bag. In some technology into a third party’s
O
ne masterspy used a claimed the
simple method to US Army’s
secure secrets... he Chemical
requested them. Often Warfare
intelligence, or a gateway to Service
intelligence, can be acquired by was
non-provocative actions away developing
from the prying eyes of a ‘mysteri-
spycatchers. ous new
gas mask’.
Frederick Duquesne was head of a Duquesne
WWII spyring operating in the realised
United States. He would scan this could be a gateway to clues
military-related features in the on a range of new poison gases
American media, especially the being developed by the same
luggage is possible using airport New York Times for stories which organisation. Access to the top
associates (baggage handlers for he believed would be useful to secret Aberdeen Proving Ground
example), or even at home, prior Germany. where tests were being conducted
to their journey. Thereafter was impossible, so he created a
recovery of the item and delivery By 1939, he had already passed ruse by posing as a ‘well-known
must take place - and two words material on new bombers, flying responsible and reputable writer
come to mind ‘lost luggage’. instruments, range-finders and all and lecturer’. Duquesne wrote to
manner of military hardware, the US Army requesting informa-
The art is uncommon and including blueprints... all available tion: ‘Don’t be concerned if the
dangerous, especially to the services (and underworld through contracting companies. information is confidential,
innocent party. However, when the organisations), will decide that the He simply wrote for them. And his because it will be in the hands of
stakes are high, some intelligence risks outweigh other options. eyes lit-up again when the NYT a good, patriotic citizen’.
K
urt Baron von Plettenberg conspirators. Yet only a few weeks
(right) was the descendant of before the end of the war,
EUROPEAN COUNTER-
a Westphalian aristocratic Plettenberg was
finally
TERRORIST UNITS 1972-2017
family, and a soldier in both world
wars. The expectations, which he denounced and Leigh Neville and Adam Hook SEK - Germany
initially had, along with many of his arrested. Osprey Publishing
fellow conspirators of the 20 July
T
1944 plot to kill Hitler evaporate, This biography he Munich Olympics
when he recognises the true nature shows for the massacre in 1972 was a
of the regime. When he accepted first time how shock awakening to the
the office as general agent of the Kurt von public of international terrorism. In
former Prussian royal house of the Plettenberg, the decades since, European
EACH POSTER -
REF: ICP1, ICP2 & ICP3 -
UK: £6.50 USA: $14.00
EUROPE/WORLDWIDE: £8.50
L
ewis’s SAS Ghost Patrol is the remarkable spies. Hardback 304pp
explosive true story of the day
in 1942 when the SAS donned Available from Eye Spy Ref: ES/1694
UK £22.50 USA $30.00 ROW £24.50
Nazi uniforms to perpetrate the most
audacious and daring mission of the
war. Beyond top secret, deniable in REGINA DIANA: Seductress,
the extreme (and of course enjoying Singer, Spy
Churchill’s enthusiastic blessing), Vivien Newman, David Semeraro
this is one of the most remarkable Pen & Sword History
stories of wartime lawlessness,
MI6 spy
eccentricity and raw courage in the
T
he untold story of Regina
George
face of impossible odds - a Riley escaped internment in Chile Diana tells of the rebellious
Hill
thoroughly British undertaking. during the Falklands War whilst daughter of working-class
engaged in an audacious top-secret French-Italian parents from a run-
attempt to attack the Argentinian had gone missing in the desert. This down area of Geneva who, trained
mainland. He was imprisoned in the was far less extraordinary than the by the most ruthless spymaster of
darkness of the Sierra Leone jungle, truth, which she discovered years them all, Elisabeth Schragmuller
and withstood heavy fire in war-torn later. (A.k.a. Fraulein Doktor), became a
Beirut and Syria. much-adored French cafe-concert
Una’s father was singer, a discreet and highly-prized
In 2015, he was arrested for murder George Hill, a prostitute plying her trade, and a
but all charges were later dropped. British spy who successful German WWI spy.
befriended Leon
In this absorbing memoir, Riley Trotsky (left) Regina’s spy operations were full of
reveals the brutal realities of his during the intrigue: a network spanning four
service, and the truth behind the Russian countries based in the city of
newspaper headlines featuring Revolution, Marseille, with her performing
some of the most significant events smuggled the abilities and sexual charms allowing
in recent British history. His account Romanian her to lure men from privates to
provides informative new evidence crown jewels out of the Soviet generals into giving her vital
on the Iraq war, what Tony Blair Union and was involved in a information.
really knew about Saddam doomed attempt to rescue the
Hussain’s weapons of mass Tsar’s family. During WWII, he was
destruction before the allied the link between Churchill’s Special
What unfolded - the longest mission invasion, and questions the British Operations Executive (SOE) and
ever undertaken by Allied Special Government’s alleged involvement Stalin’s secret service. He was a
Forces - was an epic of daring, in the death of Princess Diana. man capable of great bravery, but
courage, tragedy and survival that little compassion.
remains unrivalled to this day, and Controversial, chaotic, darkly
which rightly became a foundation humorous and at times heart- In this gripping biography, ac-
stone of Special Forces legend. wrenchingly sad, Kisses From claimed writer and journalist Peter
Written with Lewis’s signature Nimbus charts the harrowing real- Day shines a light on the shadowy
authenticity and dramatic verve, the life experiences of a soldier and world of twentieth-century
book is peopled by a cast of the self-confessed spy in the name of espionage. It was the age of
utterly maverick and the extraordi- Queen and country. Hardback 216pp swashbuckling secret agents,
nary. In its quirky eccentricities and
Available from Eye Spy Ref: ES/1693
outrageous rule-breaking, this is a UK £17.50 USA $25.00 ROW £19.00
story that only the British could have
authored, and with such panache
and aplomb! Hardback 352pp TROTSKY’S FAVOURITE SPY:
The Life of George Alexander Hill This book is not just about Regina,
Available from Eye Spy Ref: ES/1692
UK £22.50 USA $34.00 ROW £24.00 Peter Day but also explodes the much-vaunted
Biteback Publishing myth of Swiss neutrality. Switzer-
land, a nest of spies, was riven
KISSES FROM NIMBUS: From na Kroll was 11-years-old between support for Germany and
SAS to MI6 - An Autobiography
P. J. Red Riley
Clink Street Publishing
U when she met her father for
the first time, and was
distraught when, at that same
France; in an extraordinary
penetration of the upper echelons of
Swiss society, the Swiss Army
meeting, he told her he would not be Commander-in-Chief was married to
coming home... he had another life.
S
hot at, bombed, imprisoned former German Chancellor Otto von
and arrested for murder. To explain away the absence of her Bismark’s daughter. Yet exhuming
Captain P. J. ‘Red’ Riley is a mysterious father, the young Una Regina from her unmarked grave
former ex-SAS soldier who served had always told her classmates that involved a tantalising journey -
for eighteen years as an MI6 agent. he was an aviator and explorer who getting past her disavowal by both
T
he infamous Valkyrie the Government’s Chief Whip, David
M
uch misinformation has
assassination attempt on Margesson, play in persuading the been published by those
Adolf Hitler on 20 July 1944 MPs to accept the unpopular who support, as well as
failed to kill the German Führer. It Winston Churchill as Prime Minister, those who are against, the
was a very close call, and has led to and what would have happened if continued deployment of nuclear
endless speculation about what Margesson had been killed when the weapons as instruments of
might have happened if the Gainsborough disappeared? deterrence. The book provides a
briefcase bomb plot had succeeded. descriptive overview on what they
Grounded in actual events, the are, how they are categorised, how
Equally intriguing is the failed various scenarios portrayed in this they would be sent to their targets
assassination attempt on General de collection examine the likely chain of and how their design and potential
Gaulle on British soil. Who, one events that would have followed if application has changed.
wonders, was behind that scheme, the assassination attempts had
and how would Anglo-French succeeded. A few inches, a few This book incorporates a balance of
relations have developed if he had minutes that was all the difference throughout the First World War. After cutaway diagrams, images of
been killed? If the aircraft he was to between life and death, and between the Armistice, Room 40 was hardware and test equipment,
fly on set off just a few minutes the past that we know and one that merged with the British Army’s facilities and delivery systems, and
earlier would it have crashed to the we can only imagine. Hardback equivalent section MI1 to form the traces the evolution of nuclear
ground? 188pp Government Code and Cypher weapons over the past 70 years,
Available from Eye Spy Ref: ES/1696 School (GC&CS). with the emphasis on strategic
In Assassinations Anthology a UK £22.50 USA $30.00 ROW £24.50 nuclear delivery systems today.
number of well-known authors and Initially based in London, from
historians have looked at past August 1939 GC&CS was largely An excellent guide expressed in a
ALASTAIR DENNISTON: Code-
events where key individuals were located at Bletchley Park, with dispassionate and factual manner -
breaking From Room 40 to Berkeley
involved in either attempts on their Alastair Denniston as its Operational information which many people find
Street and the Birth of GCHQ
lives, or strange incidents occurred Director. Denniston was moved in hard or impossible to obtain. Large
which, had they led to their deaths, Joel Greenberg 1942 from military to civilian Hardback 192pp
Frontline Books intelligence at Berkeley Street, Available from Eye Spy Ref: ES/1698
London. Small at first, as Enigma UK £20.00 USA $30.00 ROW £22.50
I
n 1914 Alastair Denniston, who traffic diminished towards the end
had been teaching French and of the Second World War, diplomatic
German at Osborne Royal Navy and commercial codebreaking
College, was one of the first recruits became of increasing importance
into the Admiralty’s fledgling and a vital part of Britain’s signal
codebreaking section which became intelligence effort. GC&CS was
known as Room 40. There a team renamed the Government Communi-
drawn from a wide range of cations Headquarters (GCHQ) in
professions June 1946.
successfully
decrypted Denniston’s death in 1961 was
intercepted largely ignored by major newspa-
German pers and the very British intelligence
communica- organisation that was his legacy -
tions GCHQ. Hardback 308pp
By Susan Lucas
B
orn in Freeport, New York in 1935, either commissioned by the Government or
LeSchack, was encouraged to live had military training. Since the US Navy
a life of adventure. His father was handled most of the logistics, he got to know
a lawyer and his mother a history the Navy officers and men, resulting in the
teacher and they read to him daily Navy’s senior commander in the Antarctic
about explorers, adventurers and agreeing to recommend him for Navy Officer
inventors. By 1957, Len was asked to join the Candidate School after returning to the United
US Antarctic Expedition as an assistant States.
seismologist. Based on the work he per-
formed in the Antarctic, he had a mountain Eye Spy readers are familiar with his work on
range named after him - Mount LeSchack - in one of the most daring and original Cold War
the Wisconsin Range, Horlick Mountains. military operations - Project Coldfeet* (1962).
It was his brainchild to investigate a recently
Early on, he noticed a common denominator abandoned Soviet drift station to determine if
about all his favourite explorers: they were the Russians had the capability to track US
Diagram
showing the
Skyhook
retrieval
system
PENETRATION
Yet history has shown that any communica- The Jefferson Disk, Les Chiffres Secrets Devoiles (The Secret Numbers Unveiled)
tion breach and lack of security in a govern- by Etienne Bazeries and Thomas Jefferson
ment department can have dreadful conse- a cryptograph system used by the USA to Fast forward to 2017, and still government
quences. A world away from Snowden’s communicate with all its overseas embassies departments and major businesses continue
activity, take for example the classic WWII and outposts. Indeed, it transpired the system to use aged security systems and procedures.
case of Hans Thomsen, a career diplomatic was actually first conceived 150 years earlier Numerous warnings have recently been
and Charge d’Affairs at the German Embassy by Thomas Jefferson, the first US Secretary of issued about antiquated (outdated) cyber
in Washington. As early as September 1939, State and thereafter properly developed by security defences and lax monitoring systems.
he had managed to access secrets held at the Etienne Bazeries. Called the Jefferson Disk
US State Department via a friend who (also known as the Bazeries Cylinder) the HUMINT AND COMMUNICATIONS
operated in the code room. The espionage system had never been updated or its
was easy because security was dreadful and mechanism altered. Now Hitler had access to Questions have recently been asked of the
the methods used to protect state secrets had so many secrets concerning America’s (and CIA: why Langley failed to warn of North
not been changed for three decades, despite a other nations - Spain and Portugal, for Korea’s rapid advance towards securing a
number of highly sensitive codebooks and example) wishes to remain neutral. And for the nuclear device? One explanation is the lack of
projections disappearing over the years. record, the German operation continued for an human intelligence (HUMINT). North Korea
Amongst the material stolen by Thomsen, was astonishing 18 months. could be likened to Andrew Parker’s “digital
oasis” in that all Western Intelligence services
Hans Thomsen have found operating in North Korea difficult.
Charge d’Affairs And for those who question why spy satellites
(front right) at a have not been used to collect photo intelli-
diplomatic function gence, the short answer is much of NK’s
and inset quest to built weaponry has been moved to
underground premises. Whilst road and
building infrastructure can provide clues,
infiltrating agents inside the country has been
difficult - and passing qualified information to
friendly agents even more problematic.
109). He is thought to have had contact with office or home. It is especially problematic for
the CIA. Similarly, the South Korean media those whose livelihood and operational status
report that anyone perceived vulnerable to (including spies) depends on instant liaison. In
such liaisons or thought to be working for an the 21st century, people demand immediate
external Western-friendly body (spying), has and instant communication, and often become
been executed, including NK Party members. frustrated when this is not possible. However,
in the intelligence world some experts now
Propaganda too has played its part and recognise that it is occasionally best to resort
citizens are continually warned of [US to old and trusted methods, be it an actual
contested] American ‘atrocities’ committed face-to-face conversation in a secure location,
against its people (Korean War). Indeed, to or the sending of a letter protected by ‘layers’
enhance further this atmosphere of mistrust, those who hold senior positions, have become of secret coded meaning. Or indeed, using a
in 2015 North Korea rebuilt and expanded its blase about information exchange. From public telephone box... if you can find one.
Sinchon Museum of American War Atrocities. experienced businessmen and women who
Here visitors can find all manner of gruesome ignore warnings about WiFi interception, to New methods of electronic espionage are
exhibits. All of this is intended as a barrier presidential candidates such as Hillary Clinton, being developed every day; the loss of
against Western penetration and intelligence whose lack of prowess when it comes to secrets, vital and personal information and
collection. Yet despite this, several intel-related sending and receiving e-mails stunned the embarrassing messaging often lead to
programmes have been enabled, including world, warnings are still being ignored. And for compromise.
some radio-based. The objective here is one the record, many in the CIA, NSA and FBI
of influence by audible content. And there is remain concerned about President Trump’s Despite the development and evolvement of
evidence it is working, with some intelligence continued use of Twitter to communicate. powerful interception and communication
sources admitting a number of key defections agencies such as NSA and GCHQ, high impact
have already occurred. The same lack of thought often rolls down to counter-intelligence services like MI5 and the
those playing the great game, from cell phone FBI, this has not stopped of all manner of
SUMMARY usage and calls (ask the CIA unit involved in electronic private companies, individuals,
the abduction of al-Qaida suspect and Milan underworld entities and foreign spy agencies
For those who work in communications’ Imam Abu Omar in 2003), to e-mails and even intent on mischief operating in plain sight.
security, the task of protecting information is vehicle GPS usage (maps, locators etc.). All
ever changing. New procedures and tighter leave digital footprints. The gateway to secrets has changed little
regulations has also impacted on the activities since the Greeks first lit their fires thousands
and tradecraft of those tasked with stealing The world of communication can be a very of years ago... communication. Understanding
information. But despite warnings aplenty, dangerous theatre with actors and spies and proper use of this tradecraft will always
there is genuine concern that people, even seeking advantages from the comfort of their provide an advantage.
T
‘clients’ and in bustling clubs of not do anything to harm my hree KGB tradecraft and
London where officers from both country.” However, she failed to teaching files have surfaced
sides of the Cold War mixed. mention that just before the in the United States* -
Information like this has a price scandal broke, she tried to sell her reportedly secured from a
tag. Keeler knew the likes of MI5 story to a newspaper. This is an European-based intelligence
head Sir Roger Hollis, where he indication that Keeler was fully agency. One of the manuals dates
socialised and his friends. Plus aware of the importance of the from around the time of the
other spies, including double case. collapse of Communism and is
allegedly still used by Russian Intelligence as a ‘teaching tool’ for
Keeler says she was “recruited by agents and handlers. Their content ranges from agent insertion
a very clever man.” But well over (diplomatic cover) to preferred meeting locations (theatres, museums
five decades later, intelligence etc.) and even how to use disguises. One line reads: ‘You will have
aficionados still debate which opportunities to contact foreigners when situations arise, for example,
agency that recruiter chose to violation of rules, road accidents... agents can be placed in trains and
serve. The answer may still be hotels to make approaches’.
found in documents MI5 and MI6
refused to release in 2014 The documents, written in Russian, are titled: Part 1: The KGB Manual
regarding the Profumo Affair. The for Recruiting Spies; Part 2: The KGB Playbook for Infiltrating the
Services insisted that information Middle East; Part 3: The KGB Playbook for Turning Agents [People]
still relevant to national security of Worldwide Into Agents.
today is contained within, despite
it being 50-years-old. And whilst *Secured and first published by the Daily Beast, it’s likely the material
low-key information on the likes of has been in the hands of UK and US Intelligence for decades - from
John Gisela and Profumo may raise the defectors and recovered archives following the fall of the Berlin Wall.
Profumo eyebrow of the odd intelligence
USA editorial address and head office: Eye Spy Magazine International,
Empire State Building, 350 Fifth Ave, 59th Floor, New York,
NY 10118-0069, United States of America
TOLL FREE: 877 309 9243 • SUBSCRIPTION & ORDER LINE ONLY
HUMINT
Office hours: 7.00am - 4.00pm EST Monday to Friday
E-mail: support@eyespymag.com • Web Site: www.eyespymag.com
senior editors, consultants and feature writers
Peter Matthews Kevin Coleman Peter Jenkins Mark Birdsall Lynn Hodgson Paul Beaumont Danny King
historical cyber surveillance managing canadian communications security
intelligence consultant consultant editor editor consultant consultant
Christopher Spiros Kopitsos Glenmore Roger Howard Hala Al-Ayoubi John-Hughes Perin Bhatt
Eger associate Trenear-Harvey associate tradecraft Wilson security
naval consultant editor associate editor editor consultant consultant consultant
EYE SPY welcomes articles, photographs, case files, special reports, documents and
newsclippings on matters featured or associated with the type of material in this magazine. Text
can be submitted in most formats or hand written. If you require your submission returned,
please enclose a large self addressed and stamped envelope.
The opinions and views expressed by contributors do not necessarily reflect those of the
publisher (ESPL) or editor.
Available
for the first time
since 2001!
EYE SPY
I N T E L L I G E N C E M A G A Z I N E