Académique Documents
Professionnel Documents
Culture Documents
110
2017
3.95
PROFILING A TERRORIST
78
SPYMASTER
The Changing Traits and Beliefs
of 21st Century Terrorists
RUSSIAS NEW ILLEGALS
A look at Moscows new spy offensive
52
Former SAS soldier reflects on life in the
COMMUNICATIONS & ESPIONAGE most famous army Regiment in the world
FIRST WORD
ISSN 1364 8446 publication date: JULY/AUG 2017
FRONT COVER MAIN IMAGE: GETTY IMAGES
Two more significant terrorist events in the last few weeks in London
have once again dominated the news. Both involved vehicles and were
directed at innocent civilians. The brave actions of various people and
MAJOR CONTENT GUIDE the security services helped keep casualties to a minimum, but this
wont be of much comfort to those who suffered losses. Nor do I sus-
5 ELSA AND OUTLAWCOUNTRY
CIA electronic search programmes exposed in new release of
pect we have seen the last of such appalling acts, with MI5 already
stolen intelligence files engaged in various operations to derail emerging plots by people from
all backgrounds and faiths. Expect arrests in the next few weeks. And
8 THE NEMTSOV SANCTION with this in mind, Eye Spy has prepared an interesting feature on that most dreaded of
Five jailed for assassination of Kremlin critic Boris Nemtsov, but topics and challenges faced by analysts - profiling a terrorist.
controllers and handlers remain unidentified
Away from the darker side of intelligence work, there are numerous warnings that Russias
18 FINSBURY PARK TERROR ATTACK spy agencies are once again on the march. With the passing of a most senior Cold War
Van once again used to bring terror to the streets of London as veteran and KGB man, our editors have pieced together a fascinating series of articles
worshippers targeted in London mosque attack revealing some of Moscows more overt actions and its infamous illegals programme.
30 REALITY WINNER We have also prepared a number of notes on the tradecraft of communications and
NSA contractor arrested for another major breach of security espionage - a look at how contact and the passing and receiving of intelligence has
as US looks to stop future leaks of Top Secret information evolved over the decades.
35 4 JULY
North Korea successfully test fires an ICMB capable of
reaching Alaska. Intel eyes now focussed on Wests response
O
and communications have developed over the centuries. Plus ccasionally an intelligence agency will
the ingenious creativity of the spy acknowledge the loss of documents or secrets to
a foreign adversary, so too material secreted away
62 6 DAYS by one of its own employees who have a private agenda.
Former SAS soldier Rusty Firmin reflects on a new movie
But what happens when such actions continue for a
featuring the Iranian Embassy siege and his life in the Regiment
prolonged period? The answer can be found in the
68 BEYOND FIVE EYES extraordinary case of NSA contractor Harold Martin.
Intelligence counter-measures target untouchable encryption
apps widely used by members of ISIS and criminals He recently pleaded guilty to the largest theft of government
documents in US history. Federal authorities say they found
70 THE DECEPTIVE FACTOR PT9 the equivalent of half-a-billion pages of stolen documents
Mike Finn looks at human conditioning and response stored at his home. His indictment alleges that for as long as
technology used in the intelligence cycle two decades, Harold Martin flagrantly abused the trust placed
EYE SPY is published eight times a year by Eye Spy Publishing Ltd. All rights in him by stealing documents containing highly classified
reserved. No part of EYE SPY may be reproduced by any means wholly or in part, government information. He now faces a 200-year sentence.
without the prior permission of the publisher. Not to be resold, lent, hired out or
disposed of by trade at more than the recommended retail price.
Registered Company No. 4145 963 Registered for VAT. ISSN 1473-4362 33 PRIME SUSPECT
A
lex Vavilov, (born Alexander Foley), the son of two Russian
spies uncovered in the FBI Operation Ghost Stories, has had
his Canadian citizenship restored.
Alex and his older brother Tim, were
born and raised in Canada but were stripped
of citizenship when their parents, Andrey
Bezrukov and Yelena Vavilova (a.k.a. Donald
Heathfield and Tracey Lee Ann Foley), were
arrested in 2010 for espionage.
F
rom web sites such as footsteps of rogue individuals Pompeo said: In some ways I do
WikiLeaks, to individuals such as NSA/CIA Edward think leaking has accelerated.
seeking notoriety, the Snowden. Some people steal American
Edward Snowden
intelligence world has secrets for the purpose of self-
never been more fearful of Pompeo believes Snowdens aggrandisement or money... founder of WikiLeaks who remains
the loss of secrets. Accepting actions have accelerated the whatever their motivation may be, in captivity at the Embassy of
nation states will always seek an culture of leaking, and therefore but it does seem to be on the Ecuador in London, are high
advantage by performing raised the stakes in respect of increase. priority targets of Langley.
espionage (in all its forms), Mike national security. He said there are Responding to Mr Pompeos
Pompeo, CIA Director, has warned those who worship Edward The CIA man appointed by comments, Snowden said: Its no
there is a growing number of Snowden and described the President Trump earlier in the year, surprise. The CIA is baffled to find
people who are following in the situation as very dangerous. categorised WikiLeaks along with the public respects those who
hostile nations in respect of reveal official crimes more than
D/CIA Pompeo espionage, stating both steal those who commit them.
believes the leaks secrets for the sole purpose of WikiLeaks referenced a response
culture threatens undermining the United States and by Assange, who accused
national security democracy. However, he insists Pompeo of waging war on
new measures will deter leakers whistleblowers.
and has promised to punish
those who are caught. Despite the
threats, Pompeo acknowledged
the leaks culture has gained
momentum and has a growing
band of followers - some in the
intelligence community - who
pose an even greater threat.
L
angleys new warning of device attached to the
the culture of leaks (see Internet (Microsoft Win- Scribbles,
opposite), coincided with dows). Using various Weeping Angel
a new release of CIA techniques, some involving
documents by WikiLeaks. Wi-Fi networks and signals,
The material, uploaded at the end the Agency can then secure age), the detection rate and the table name, an operator can
of June, is part of the conspiracy a rough location of the accuracy of a search is much create rules that take precedence
web sites plan to drip drip place of operation. greater than in previous years. over existing netfilter/iptables
intelligence VAULT 7 files secured rules and are concealed from a
from a number of sources, The project, codenamed Intelligence watchers believe Elsa user or even system administra-
including Snowden, of course. Elsa, was initiated four or is used in various situations, one tor.
five years ago, but it hardly of course is to track terrorists.
The documents reflect the work of involves new technology. Others believe security of agents The programme, according to a
a CIA team engaged in direction However, there are certain operating overseas has once number of cyber specialists, is not
finding and electronic surveillance. elements which are most again been compromised. Part of yet fully understood. However,
WikiLeaks said that Langleys secret, including methods to the programme enables the CIA to most agree it is directed at users
programme is directly linked to remove all traces of Elsa. monitor and locate its own of the Linux operating system and
cyber in that a virus is uploaded And, because of the growing operatives, Eye Spy was told. intended to redirect outbound
into a computer or electronic use of Wi-Fi (area cover- Internet traffic to a target com-
Another associated leak identifies puter controlled by the CIA.
a CIA programme called
OutlawCountry. A description Since Spring 2017, WikiLeaks has
attached to the file reads: released a plethora of files on
OutlawCountry allows for the associated CIA projects, including:
redirection of all outbound
network traffic on the target AfterMidnight, Archimedes,
computer to CIA controlled Athena, Brutal Kangaroo, Cherry
machines for exfiltration and Blossom, Dark Matter, Elsa,
infiltration purposes. The malware Grasshopper, Hive, Marble
consists of a kernel module that Framework, OutlawCountry,
creates a hidden netfilter table on Pandemic, Scribbles, Weeping
a Linux target. With knowledge of Angel
F
ormer CIA employee, posed as employment recruiters.
Kevin Patrick Mallory, 60, He held a Top Secret Clearance
of Leesburg, Virginia, (TSC) with the CIA until 2012 and
was arrested and speaks fluent Mandarin. Following
arraigned on charges of his service with the CIA, he
gathering or delivering defense allegedly approached the Chinese
information to aid a foreign and subsequently travelled to
government and making material Shanghai in March and April this
false statements. During his time year where he exchanged
at Langley, Mallory was stationed documents for $25,000. He was
in China, Taiwan and Iraq. given a recording device by
agents and instructions to obtain
Mallory, who is currently a self- more information.
employed consultant with
GlobalEx LLC, is accused of Mallory discussed the situation
selling secret documents to with a former colleague and Mallorys home in Leesburg is surrounded by FBI agents.
Chinese intelligence officers who arranged to meet the Chinese Records show he paid $1,156,000 for the house in 2005
T
he heads of all Frances Renseignement de la Prefecture who left in April 2017. He was These are Counter-Proliferation of
major intelligence and de Police de Paris) the head of replaced by Francoise Bilancini, WMD, Counter-Terrorism and
security services are to intelligence within Paris Police, the first ever female to head an Economic Intelligence - titles
retire: Bernard Bajolet of intelligence agency in France. which remain unchanged.
the DGSE (Direction Gnrale de
la Scurit Extrieure), the foreign Finding experienced replacements
intelligence service; Patrick Calvar, is now one of the highest priorities
Director of the DGSI (Direction of new French President,
Generale de la Interieure), the Emmanuel Macron, who assumed
domestic intelligence service and office in May 2017.
Christophe Gomart of the DRM
(Direction du Renseignement French Intelligence has seen
Militaire), military intelligence. several major structural and
organisational changes in recent
The announcement follows the years, with many previous name
retirement of senior intelligence designations disappearing. The Bernard
officer Rene Bailly, the Director of DGSE for example, now has just Bajolet
DRPP (Direction du four directorates (from five).
Jeffrey Sterling
P
faces life in prison if found guilty. Desk (Near East and Far East akistan Tehrik-e-Insaf January 2011; a shooting he says
Division), denied being the source; (PTI) Chairman Imran was carried out in self-defence.
THE IRAN INTEL LEAKER his prison sentence currently Khan, the countrys He spent 49 days in prison. The
expires in 2018. former cricket captain, affair resulted in a diplomatic
In Richmond, A federal appeals has advised every Pakistan citizen crisis between Pakistan and the
court upheld a three-and-a-half- to read the book The Contractor: United States. He was released on
year prison sentence for a former How I Landed in a Pakistani Prison 16 March 2011, an action which
CIA officer and solicitor found and Ignited a Diplomatic Crisis, Khan believes was orchestrated
guilty of leaking government written by former CIA man by Ahmed Shuja Pasha, after the
secrets to a reporter. Jeffrey Raymond Davis. In a tweet Khan families of two of the killed men
Sterling, was convicted under the wrote: Every Pakistani should received $2.34 million. Davis
Espionage Act in 2015 after being read the book to understand why immediately returned to America.
accused of divulging details to we are treated with so little Khan insists the intelligence and
New York Times journalist James respect internationally. military collaboration allowed a
Risen of a CIA mission (Operation cold blooded killer to walk away
Merlin) aimed at stalling Iranian Davis book details the role of scot free.
nuclear ambitions. Parts of the former Inter-Services Intelligence
covert CIA operation regarding (ISI) chief Ahmed Shuja Pasha PTI is a political party in Pakistan
Irans attempt to build a nuclear and an incident which caused founded in 1996 by Khan. Its rapid
James
weapon, were detailed in Risens major ripples in Pakistan. Davis, a growth has created a tri-party
Risen
2006 book State of War: The CIA contractor, was arrested for system, in which it opposes both
the killing of several men the leftist Peoples Party and the
brandishing weapons in Lahore, conservative PML-N.
Christophe Gomart
DGSE RECRUITMENT
PARIS: Frances
DGSE is boosting is
staffing levels by recruiting
around 1,000 people in the next
two years, to 7,100 by 2019.
T
wo years after the After ten months of hearings, a
assassination of Putin jury convicted Zaur Dadayev, a Boris Nemtsov was shot
critic Boris Nemtsov, 55, former soldier in Chechnya, for dead by hired assassins on
in Moscow, five Chechen firing the six shots and Anzor 27 February 2015
men have been found Gubashev, Shadid Gubashev,
guilty of carrying out the contract Temirlan Eskerkhanov and
killing. Nemtsov was gunned Khamzat Bakhayev guilty of aiding
down as he was walked across and abetting in the killing.
the Bolshoy Moskvoretsky Bridge
in central Moscow. Many in the Solicitors for the Nemtsov family
intelligence world believe he was insist that not all the perpetrators
shot because of his investigative were uncovered in the subsequent
work on a report examining investigation. They say that while
Russias role in Ukraine. there was motive for the perpetra-
tors - $250,000 allegedly
promised for his removal - there
was no real attempt to establish
who instructed the assassins and
the reason why. Colleagues say
that despite the evidence
identifying people close to
Chechen leader Ramzan Kadyrov,
a close personal friend of Putin,
there was little ambition to
explore other more dark evidence.
S
eventy six years after Engelbertus Fukken in the Not having registered with local
the death of Nazi spy Netherlands, Braak was recruited police, suspicions started to
Willem Ter Braak, by the Abwehr to take part in mount and with monies fast
Cambridge authorities Operation Lena - an endeavour to diminishing on 29 March he
have allowed his family send spies to Britain to prepare for deposited a large case in the left
to erect a headstone on his the planned German invasion. luggage office at Cambridge Willem Ter Braak
unmarked grave. Born Railway Station and disappeared.
Braak parachuted into Britain in Braak then made his way to a suicide, using an Abwehr-issued
late October or early November public air raid shelter in Christs pistol.
1940, carrying false papers and a Pieces Park, where he committed
radio transmitter in a small His story was suppressed by the
suitcase. He made his way to government and his body buried
Cambridge and found lodgings in an unmarked grave in the parish
with a couple named Sennitt at 58 cemetery at Great Shelford. After
St. Barnabas Road, who accepted contact by Braaks family in the
his story of having come from Netherlands, the local authority
Holland during the Dunkirk has accepted their request to erect
evacuation. He installed his a headstone on the grave with his
suitcase transmitter in his room name on it. The family is now
but by Christmas the batteries preparing the stone, which will
started running down, and he have a simple inscription:
could only communicate with his Engelbertus Fukken - 28 VIII
Abwehr handlers by letters, 1914 The Hague, 30/31 III 1941
written with secret ink. Cambridge.
A
legal challenge brought overseeing and ruling on secret Theresa Mays government said:
about by civil rights operations performed by all arms We know this secret policy hides
groups Reprieve and of British Intelligence. a large area of covert activity that
Privacy International, is at least as serious and intrusive
could allow access to some of The new action follows three as interrogating detainees unlikely, unless of course the
MI6s most secret inner mecha- directions issued a few years overseas and the mass collection Investigatory Powers Tribunal
nisms of gathering intelligence. ago by former Prime Minister of personal data. We also know agrees to their request.
The groups have formed an David Camerons government. from bitter experience that without
alliance to bring before the These surround regulations basic transparency, British spooks
Investigatory Powers Tribunal concerned with the Intelligence are liable to cross legal and ethical
(IPT), a challenge to activities they Services Commissioners Office red lines. The Prime Minister
describe as highly intrusive. The to supervise highly invasive and needs to stop hiding behind this
IPT is mainly responsible for covert intelligence activities. The secret Third Direction... and tell The Rt Hon Sir John Goldring is
inner working of two of the three the public what her government is the current Intelligence Services
directions were released in the up to. Commissioner. Following his
public domain, though both were appointment in January 2017,
redacted in part. And though the Privacy International Legal Officer he released a statement:
third direction has been Millie Wood added: It is wrong in
referenced in public, it was principle for there to be an entire As Commissioner I provide
redacted in its entirety thus area of intelligence activity about independent external oversight
disallowing analysis by interested which the public knows nothing of the use of the intrusive
parties who believe it is just as about. powers of the UK intelligence
services and parts of the MOD. I
intrusive and controversial as
will undertake this duty rigor-
the other two. Both Reprieve and Privacy
ously and entirely independently
International want the government
of government, Parliament and
Maya Foa Reprieve Director Maya Foa, in to publish in full the Third the intelligence agencies.
relation to current Prime Minister Direction, though this is highly
ANATOMY OF A TERRORIST
A HIDDEN ADVANTAGE
SNAPPERJACK OF LONDON
Just two weeks after a terrorist killed over 20 people leaving Manchester
Arena, a small ISIS-supportive London-based cell killed eight people in
another terrorist incident in London. Three attackers were shot dead
ST ATTACK
The van used in the initial stage of a terrorist attack in central London
which left eight people dead and 50 injured
A
s pages of Eye Spy 109 rolled number of primary points which British in relation to the mind of a terrorist, and why
off printing presses containing Intelligence officials are now examining behind seemingly ordinary people embark on a
details of the appalling closed doors, suffice it to say, when the folder journey that for most, has an inevitable
Manchester Arena terrorist is finally filed, not all its content will be conclusion. Even former supporters of ISIS
attack, details flashed across revealed. For its part, MI5 has acknowledged and al-Qaida have joined the debate. And
international newswires of an internal overview of the case is being despite some highly qualified commentary
another outrage unfolding on pursued, primarily to see if anything was already imparted, it is blatantly obvious that
the streets of London. Much has already been missed or if better analysis and procedures this burning question will remain open to
written about the 3 June incident involving could have prevented the attack. Also being debate, conjecture and speculation.
three men intent on bloodshed, but to recap, assessed - intelligence sharing methods,
their callous actions resulted in the deaths of analysis and a little used term called preven- BRIEF OVERVIEW OF ATTACK
eight innocent people - a further 50 were tive strike authority.
injured. In the aftermath, the media focussed Three ISIS-inspired terrorists opted to mimic
on the background of the terrorists, and Similarly, experts in the fields of psychology, the actions of Khalid Masood (born Adrian
apparent intelligence failures. In this compact religion, counter-terrorism, security and public Elms) as he drove a rental car over people on
feature, our editorial team has selected a liaison have all attempted to answer questions Westminster Bridge on 22 March, and then
Attack organiser -
Khuram Shazzad Butt
stabbed police officer Keith Palmer to death into pedestrians on London Bridge, striking at The area is popular with locals and visitors
near the entrance to the Parliament building. least a dozen people. Several people jumped alike and well known for its busy nightlife and
(See Eye Spy 109). The attackers, Pakistan- into the River Thames to avoid the car and at many restaurants and bars. By now, the
born Khuram Butt, 27, an asylum-seeker, least one drowned. The body of French citizen security services had been alerted and were
Moroccan-born Rachid Redouane, 30, and Xavier Thomas was not discovered for five already searching for the rogue vehicle. CCTV
Youssef Zaghba, 22, a Moroccan-Italian who days. Three people died in the incident. recorded the terrorists as they stabbed several
worked in a London restaurant, had studied more civilians, some who fought back bravely.
advice provided for by the terrorist group and Following the bridge attack, the terrorists One attacker shouted, this is for Allah. In a
freely available on the Internet. made their way to Borough Market by foot, series of stabbings, five people died.
after crashing their car at the southern end of
At around 10.00pm, the men, travelling in a the bridge. During their journey, the men At 10.16pm, around a dozen armed central
low-cost hire van, drove their vehicle at speed slashed and stabbed a number of civilians. London New Scotland Yard counter-terrorism
FOCUS ON IDENTITY
GABRIELE SCIOTTO
By 10.20pm, police had effectively nullified the Nevertheless, analysts were satisfied the trio
threat, but neither MI5 or New Scotland Yard had played out the end game of a fairly basic
knew if all the attackers were dead, nor did attack alone, but one that had proven most
they have any idea in respect of a possible effective. But there were a whole host of
support network or a secondary attack. An unanswered questions, not least if the
Butt (foreground) and an associate are
Army helicopter flew a specialist military unit terrorists had connections to other individuals,
shot outside the Wheatsheaf public house
to the scene; the troops were almost certainly cells or were being controlled by a third party.
The fake suicide bomb belts worn by the terrorists - probably intended for use in a siege situation
Forensic specialists outside the Borough Market attack location. The specialists
are probably searching for spent cartridges and damage to buildings. A total of
46 rounds were used to shoot dead the attackers
There was no intelligence to suggest that this was a
attack was being planned. MI5 and the police Moroccan-
had, to all intents and purposes, downgraded
the Butt investigation.
Italian who
worked in a HEATHROW AIRPORT
London ATTACK RELATIVES SUSPENDED
Several people have since come forward and restaurant.
Khuram Butts
advised they had contacted the authorities He was sister, Haleema
about Butt and his underworld connections placed on an Butt, 28, and her
and increasingly intolerant language. international husband, Usman
watch list Darr, have been
ASSOCIATES after being suspended from
stopped by their security jobs
Moroccan-born Rachid Redouane, told friends Italian at Londons
he had ties to Libya. He also went by the security Heathrow Airport.
name Rachid Elkhdar. After a search of his Rachid Redouane services in A Heathrow
body an Irish identification card was found in Bologna in spokesman said:
his wallet. Questions were raised by officials 2016 - this after attempting to reach Syria to Heathrow took
after it was learned that he was a failed join ISIS. Questions have now been raised appropriate
asylum seeker. After arriving in Britain in about just how much was known about the action in close
Haleema Butt
2006, he was ordered to leave three years killer. Officials in Rome state they informed cooperation with
later. In 2012, he married a British woman in London about Zaghba. One Italian police the authorities in relation to two colleagues
Dublin and it is known he was a frequent employed at the airport.
officer who circulated his name, said: I have
visitor to the a clear conscience. Zaghba was placed on at
MI5 reportedly launched an investigation
UK and briefly least two European watch lists.
into the couple in June along with
took up Heathrow security services. The mother-
residence, Therefore, all three persons were known to of-two had her employment terminated
before moving some extent to various government depart- as a result of the probe, and Darr was
back to Ireland ments, but pressure is on the Security suspended, although there is no sugges-
in 2015. Like Service, particularly in the case of Butt, to tion Haleema Butt or Usman Darr are
Butt, he had explain why he was not regarded as a primary considered extremists or knew what Butt
friends and watch target instead being prioritised to the was planning.
associates in lower echelons. Indeed, Foreign Secretary
east London. Boris Johnson said: How on earth could we Heathrow officials declined to release
let this guy... through the net? MI5 must now details of the background security checks
The third man, answer questions over the monitoring of the its staff undergo, although a review of
Anjem Youssef attackers. However, to make such judge- family history is normal for similar
Choudary Zaghba, 22, ments post-event is easy, and no-one has positions in public security fields.
enough, and promised new measures to including heavy decorative stone bags and
tackle crude terrorism on the streets of chairs. Analysts believe these items were
Britain and the single evil ideology of Islamic carried in the event the vehicle was stopped -
extremism. The introduction of tougher an excuse for transportation. Others believe
legislation could prove difficult, however, after the bags were used to add weight to the attack
a general election which dented her prowess of the van (for impact purposes).
governments power. May said it was
important to understand how the terrorists Thirteen Molotov cocktail petrol bombs were
managed to avoid detection. She also called also discovered in the discarded van. These
for more international cooperation to regulate were also certainly intended to be thrown into
the Internet, which she said was being used to pubs and restaurants, though in the end, the
spread extremism. Her views were shared by terrorists opted to use knives.
Home Secretary Amber Rudd who said, ISIS
is using cyber space for enemy propaganda Police released several photographs of the
purposes. Civil liberty groups have already bomb belts worn by the attackers. They were
voiced concerns in this area, warning against simply plastic bottles covered with silver
new CT and prevention tactics. masking tape and threaded together with a
leather belt.
ADDITIONAL INFORMATION
SELECTING TARGETS
As the days passed, MI5 and NSY specialists
continued to widen the investigation. Some Critics of MI5 seem oblivious to the many
200 people were interviewed from 20 difficulties faced by those working in the field
countries, and more arrests followed - of detection and prevention. However, a salient
any idea yet, on the intelligence MI5 or NSY suggestive of a wider network of people point to remember surrounds the sheer
had on these individuals. Only now, following engaged in support activities. It transpired Butt number of people whose name has been
the deaths of the terrorists, is further informa- had attempted to hire a larger 7.5 tonne van entered into a sliding scale watch list. The
tion being secured and presented by those on the morning of the attack, but his credit government recently admitted, some 20,000
calling the London Bridge attack an MI5 card declined. This could have resulted in individuals are now regarded as persons of
intelligence failure. more casualties on the bridge. The effects interest. That is a staggering figure consider-
could have been even worse, said Com- ing a proper surveillance and investigative unit
Prime Minister Theresa May, after chairing an mander Dean Haydon of NSY. Inside the operated by MI5 can number between 30-40
emergency COBRA meeting, said enough is vehicle police discovered various items, officers and analysts. Deciding which
7
individual to engage with vigour is a task that
requires much analysis and personal angst.
People showed
incredible 4
bravery... we have
stories of people
armed with
chairs, bottles,
2
anything they
could to prevent 3
the attackers
from hurting
people...
FINSBURY PARK
Terrorist Strikes in London
ATTACK
S
hortly after midnight on 19 June, Police were called at 12.20am and the
police received several telephone calls attacker, named as Darren Osborne, 48, was
concerning a white van which had duly arrested. Im going to kill all Muslims,
struck a number of people near you deserve it... I did my bit, he shouted. He
Finsbury Park Mosque, London. Eye- faces various charges under the Prevention of
witnesses said the driver had deliberately Terrorism Act, murder and attempted murder.
targeted a group of Muslim men on the Eight people in total were injured and the
pavement who had just departed the mosque. incident is being investigated by New Scotland
Yards Counter Terrorism Command (CTC).
They were attending to a person, later named Prime Minister Theresa May described the
as Makram Ali, 51, who had collapsed just incident as terrorism and compared it to the
prior to the incident outside the nearby Muslim recent Westminster and London Bridges
Welfare House, on Seven Sisters Road. He attacks. Hatred and evil will never succeed,
later died from what police described as she said. He chose the same terrorist path,
multiple injuries. a police spokesman added. Darren Osborne - not known to MI5
Following the incident, the driver was Those who know Osborne, a father of four the UK. Another branded him a psycho
confronted and held by angry worshippers. living in Cardiff, Wales, though originally from known for his bad temper and a penchant for
Moments later, Mohammed Mahmoud, the southern England, said he had become very wanting to fight.
Imam of the mosque, interjected, shielded the anti-Muslim and appeared troubled. A
attacker and calmed a volatile situation. His neighbour said he had taken more and more Few would disagree with the incident being
actions were commended by police. to drink following recent terrorist attacks in labelled terrorism. Osborne wanted to make a
counter-terrorism
strategy.
Religious leaders from all faiths met to discuss the attack with
senior police officers - an event to display unity
CHAMPS-ELYSEES
Oussama
Zarioush
SPYMASTER
THE NEW ILLEGALS
As General Yury Ivanovich Drozdov - a thorn in the side of Western
counter-intelligence agencies passes - US and British Intelligence warn
Russian espionage activities have surpassed Cold War levels
T
he Soviet Unions former chief of undercover intelligence
operations during the Cold War, known in Russia as the Directorate S. This element, made up of at least a dozen branches was
Special Period, General Yury Ivanovich Drozdov, has died at the ultra-secretive wing of the KGB responsible for its global illegals
the age of 91. He was director of Soviet covert (operations); programme. Its name distinguished it from the agencys legal spy
architect and commander of the Vympel reconnaissance and programme, in which overseas officers and agents operated under
sabotage unit of the USSRs external intelligence service; head of the diplomatic cover using various bogus titles, including attache. Most of
Press Bureau and a key figure of the KGBs powerful Directorate S. these operatives served in embassy positions, and whilst registered,
were in fact little more than tentacles of Moscows worldwide spy
Drozdov came to the United States in 1975, where he took charge of network. The illegals (NOCs - non-official cover) were far more
the Soviet Intelligence Station in New York before being named head of dangerous - engaged in long-term programmes - they often
sought residency and legitimate work. This has written several splendid books on
meant that an agent could stay in place and espionage, including The Kremlins Candidate,
avoid the radar of counter-intelligence and likened their activities and life-style to that
domestic spy agencies such as MI5 and the portrayed in the popular US spy drama - The
FBI. Others were not called upon until required Americans. He too referenced the often long-
(sleeper agents), sometimes remaining term role of illegals. Can you image the CIA
obscure and uncalled upon for years. telling a Western [intelligence] officer you have
to travel to China and live with a women weve
From 1979 until 1999, Drozdov ran agents selected as your wife for 20 years!
(men and women) who adopted cover
Jason Matthews - spent 30 years
identities using birth details of the dead, and For two decades Drozdovs agents lived with the CIA
who quietly gathered intelligence for the Soviet quietly in non-descript American suburbs
Union during the long years of the Cold War. gathering intelligence about nuclear weapons, mundane, whilst a number of operations
Jason Matthews, a former long-time CIA missile systems and Western intelligence almost certainly involved much darker
officer with Langleys clandestine service who efforts. Some work was of course more activities - murder comes to mind. The
Anna Chapman (Anna Vasilevna Kushchenko) pictured in 2011 - a year after her role with the SVR and an American-
based spy ring was exposed. Inset: FBI mugshot of Chapman following her arrest. She was exchanged along with
around ten colleagues for four prominent US and UK intelligence contact people
Mist shrouds the Bridge of Spies - Glienicke Bridge, Berlin. It was here that
General Yury Ivanovich Drozdov oversaw the exchange of KGB spy Rudolf Abel KGB photograph of
and CIA U2 pilot Gary Francis Powers on 10 February 1962 Gary Powers
companys true motives - believing it could imperative. We want to build our relations with Even aged 85 he continued to operate in the
have been a front company. the world correctly, move forward. And for shadows and retain his connections to the spy
that [reason] were also obligated to possess world: My wife is still trying to convince me -
In an interview on the occasion of his 85th a well-equipped illegal intelligence service with enough... quit. And I constantly answer... if I
birthday in 2010, he was asked about the multifaceted training. leave, Ill die.
future of Intelligence:
A SECRET OCCUPATION?
take counter actions.
Moscow is set to
block use of a
KREMLIN REJECTS AMBASSADOR SPY TALK country house
and a storage
WASHINGTON: Russias Ambassador to the except one. facility used by
United States is Sergey Kislyak. He has become Describing him as the US Embassy
embroiled in the on-going saga about Russian effective and in Moscow.
interference in the 2016 US General Election. experienced,
This has led to suspicion the ambassador is McFaul added:
much more than a diplomat. Youre never believes that whilst Kislyak may have been
confused about posted as a diplomat, he believes he was either
Kislyak has lived in Washington DC for nine what country hes a KGB officer or reported to the spy agency on
years. Former representing. American affairs. Allegations vehemently denied
US Ambassa- Jack Barsky by officials in the Kremlin.
dor to Russia, Current and former KGB spy
Michael former US Russian Foreign Ministry spokeswoman Maria
McFaul, said of Intelligence officials have described Kislyak as a Zakharova responded sarcastically: Ill reveal a
Kislyak: He senior spy and recruiter of spies, a viewpoint top secret - diplomats do work, and their job is
held all the dismissed by Russian officials. Jack Barsky is to establish contacts with people.
most important one such person who believes the Russian has
jobs in the spy links - dating back to his first engagement in In late June, it was reported Kislyak had been
Foreign the USA in the early 1980s. Barsky, a former spy recalled back to Russia. It was widely believed
Sergey Kislyak
Ministry - with the KGB who was turned by US Intelligence, his next posting would be the United Nations.
advantage by rebuilding his spy networks and wanting to operating with diplomatic cover) are routinely
has once again created a powerful intelligence Preet Bharara antagonise breaking the requirement to notify authorities
collection network across America. Moscow due to the of travel outside a 50 mile radius of their
tenuous diplomatic consular base. Most go unchallenged and are
Due to its size and complexity, the FBI and situation over blase about travel restrictions.
counter intelligence officials are finding it Syria. As a result,
difficult to contain. One US intelligence official Russian diplo- As an example of Russian Intelligence focus
said, the Russians have just got so many mats (some and apparent freedom to roam, one classified
bodies and are able to evade FBI surveillance. undoubtedly agents report described extensive Russian activity
Like the UK and other countries, the primary RUSSIAN SPY ACTIVITY: In 2015, then US Attorney
focus of many US intelligence agencies is now Preet Bharara warned: Russia spies continue to seek
on countering terrorism. Some analysts also to operate in our midst. He was sacked by President
believe Washington has been hesitant - not Donald Trump on 11 March 2017
O
n the occasion of the 95th especially concerning the SVRs illegals
anniversary of Russias secretive programme.
Directorate S, President Vladimir
Putin discussed his intelligence All my work in the USSR foreign intelligence
work on state-owned Russia-1 agencies was connected not just to the SVR
television channel. And whilst his (Foreign Intelligence Service), but specifically
service with the KGB and FSB is with illegal intelligence, he said. Putin
fairly well documented, he did reveal for the highlighted the dangers of operating in
first time some previously unknown facts, overseas environments and praised the work
of the illegals programme: To give up their
life, their nearest and dearest and leave the
country for many years, and to dedicate ones
life to the Fatherland, not everyone is capable SEAL of the SVR
of doing that. In general terms, and according to the SVRs
website, Directorate S (operatives) engage
Though he claimed he never operated as an with only one official at the Service - its
illegal himself, his work often meant collabora-
tion with its parent office - Directorate S. He
also said that he personally headed a number
of illegals programmes.
L
members of the Russian Duma. t. General Vadim Kirpichenko, a
former Director of Directorate S in the
A great many details of the inner working of 1970s, was asked about the training
the department were revealed in 1991 by of those selected for the illegals
Alexander Kouzminov a former member, who programme. He referenced the
wrote the book, Biological Espionage: Special enormous sacrifice of operatives: During
Operations of the Soviet and Russian Foreign training an illegal acquires wide-ranging
Intelligence Services in the West. Kouzminov, knowledge, in particular on [the target
who reportedly worked in Department 12 country] political and economic matters, a few
within Directorate S, stated that department professions, foreign languages. In such
carried out and directed all special operations conditions its difficult to arrange family
in target countries, using illegals. He acknowl- affairs.
edged that the work of illegals is fundamen-
tally important to the SVR and lays at the And on the point of family life, whilst this is
heart of many operations. problematic, securing a wife or husband and
having children helps support the mission
Kouzminov said: Our (cover and illusion), and also provides the
tools for these actions operatives with at least some semblance of a
included, first and normal life. We always tried to compensate
foremost our illegals, the loss of contact of young illegals from
whom we had planted in remaining [serving colleagues] officers with
the target country. These the creation of a friendly microclimate where Lt. General Vadim Kirpichenko
were the most reliable, people would be psychologically compatible,
well trusted special as in a space crew on a long flight, he said. cultivating, development and recruitment of
agents. We succeeded in creating a friendly, family agents (usually citizens in target countries).
atmosphere around our illegals. We also planned and prepared for acts of
biological terrorism and sabotage on the
Kirpichenko admitted that an illegal is trained territory of target countries, carrying them out
and run by a very small number of people, in an event of war or military conflict with the
and that communications with a handler are west. While supporting existing Russian
limited. This helps avoid compromise, he biological programmes.
said.
The SVR has a unit called Line N - supporting
Another Russian Intelligence officer with illegals. Their tasking was to support the
intimate knowledge of the illegals programme operations of Directorate S carried out by
is former Department 12 operative Alexander illegals. That included logistical support -
Kouzminov: We prepare our illegals to work arranging clandestine meetings, their
in target countries 15-20 years maybe more. surveillance, financial support, contacts,
Our key tasks in Department 12 was interna- covers, legends and spy craft. Line N officers
Alexander Kouzminov tional biological espionage, running illegals, preformed tasks such as approaching,
G
eneral Nikolai Leonov, 88, joined the KGB in 1956 during the
height of the Cold War, and three decades later became the
organisations second-in-command between 1985 and 1990.
cultivating potential agents and recruiting them. I also assessed And it was during this period that a young Vladimir Putin was
intelligence information from our sources (illegals) in target countries. posted to Dresden, East Germany (GDR).
Department 12, along with Department 8, controlled acts of sabotage Leonov has recently provided an insight into Putins early years working
and terror on enemy territory, participating in so called Direct Actions: for the KGB. Speaking to Brazilian newspaper, Folha de S.Paulo, Leonov
military targets, classified biological warfare ammunition, stockpiles, said: When we had a cadet fluent in German, as was the case with
military garrisons, bases and military (and other) defense commands, Putin, if he was good he would be posted to West Germany or Austria.
like those which surveillance of biological weapons activities. Civil But he was sent to the eastern side, which of course was Communist.
targets included public drinking water systems, food stores and
pharmaceutical and biotechnological plants, also the economy. Casting a little doubt on Putins intelligence qualities, he added: Only
promising officers would be sent to Berlin to work with the STASI - the
In May, former Director of the CIA, secret police of the East German regime and not Dresden.
John Brennan discussed the
recruiting tactics of Russian Leonov, who also served as interpreter for Fidel Castro during the
Intelligence. Speaking to the Senate Cuban leaders famous visit to Moscow in 1963, said of Putins
Intelligence Committee in connec- timekeeping: He was often late for appointments - a habit that was
tion with the on-going investigation strange and scandalous at the time for KGB officers.
into Russian interference in the
2016 US General Election, Brennan Today, Putin himself acknowledges that he held only a minor position
said: They try to get individuals in the KGB, though this is not reported upon by todays state media in
including US persons to act on their Russia, which often comments about his derring-do and brave
behalf either wittingly or unwittingly. exploits operating for the KGB.
By the time I left office in January, I John Brennan
had unresolved questions in my Leonov, 88, is pessimistic about Russias future under Putin and thinks
mind as to whether or not the Russians had been successful in getting the Russian president is not as secure in power as most people believe
US persons involved in the campaign. because he is dominated by the powerful oligarchies. He said: We
[Russia] are a stranded boat and many countries are going ahead of us,
like Brazil and Mexico, and we do not have a map of the way out. Where
will we be in five, 10 or 15 years?
OR INTELLIGENCE LOSER?
NSA Contractor in New Leaks Case
R
eality Leigh Winner, a six-year Winner, 25, allegedly leaked a classified report
USAF staffer and National Security about Russian election interference to the
Agency contractor with Top Secret online publication The Intercept. This
clearance, faces ten years in publication, of course, was co-founded by
prison, a $250,000 fine as well as Glenn Greenwald an associate and colleague
a further three years of supervised of NSA leaks man Edward Snowden.
release after being accused of gathering, According to court documents, the FBI
transmitting or losing defense information discovered that Winner was one of only six
under the Espionage Act. people who had printed out the secret
documents and the only person who con-
tacted the publication via e-mail. The FBI said
Winner has admitted the leak.
President Trump. Investigators found postings tion including Edward Snowden and Harold
such as: The orange fascist we let into the Martin, both from contracting organisation
white house and in response to perceived Booz Allen Hamilton.
negative US policy towards Iran: There are
many Americans protesting US govt.
aggression towards Iran. If our Tangerine in
NSA GEORGIA
Chief declares war, we stand with you!. She
also once tweeted that being white is
CRYPTOLOGIC CENTER
terrorism and called US Attorney General Jeff
Sessions a Confederate General who
encourages racism. On the Iran point, its
interesting to note she was also a former
USAF linguist qualified in the Iranian language
of Farsi and well versed in other Middle East
and Far East languages. Officials have
launched a probe into how such social
commentary was missed by intelligence
watchers.
Opened in 2012, the National Security
She now joins a growing list of other intelli- Agencys Georgia Cryptologic Center,
gence contractors who have abused their sometimes referred to as Sweet Tea is a
US Attorney General Jeff Sessions $286 million, 604,000 square foot complex
security clearances to leak classified informa-
that utilises state-of-the-art tools to
conduct signals intelligence operations,
train the cryptologic workforce, and enable
global communications. The Center,
dedicated in the name of John Whitelaw,
the first Deputy Director of Operations for
NSA, is said to house a 17,000 square foot
data complex and a large communications
hub, both complete with redundant power
Some US
and network links. One of the buildings is
officials believe
actually named after Whitelaw.
Edward
Snowdens NSA/Central Security Service (CSS) has
actions have had a presence in Georgia for over 16
started a years on Ft. Gordon, when 50 people
dangerous trend arrived to establish one of NSAs Regional
within the more Security Operations Centers.
conscientious
intelligence Earlier this year the NSA opened a new
contracting facility in Hawaii, and said the agency is
community also upgrading its cryptologic operations
in Texas and Denver.
detailed, takes longer, and is more thorough Solari also said Winner told her mother that
than contractor security reviews. she wanted her to tell the media that she was
afraid for her life. Play up that angle, the 25-
Rajesh De, who served as NSA General year-old said to her mother. Winner also
Counsel during the Snowden affair said: I warned that she would go nuclear to the
think that leaks can be dangerous in a lot of press if [she] I dont get what I want, and
ways that arent readily apparent. A lot of us use the media as it worked for Manning.
think more information should be made public,
but the solution cant be individuals putting out A federal grand jury indicted Winner on only
titbits of information haphazardly without one charge, but prosecutors are likely going to
appreciating how much damage can be done. add several more to the list. Winner was
denied bond after entering a not-guilty plea.
In addition to not knowing her actions could She will remain behind bars until trial - and
be traced within the NSA facility, Winner was has not yet gone nuclear to the press.
Richard Clarke,
former National It is estimated between 1.5 and two million civilian contractors work in the
Security Adviser US defence and intelligence community. The number of those operating in sensitive
positions where classified material is handled is secret. In 2015, the
US Department of Defense issued a statement saying it works with 50,000
Contractors make up an increasingly large companies and has an overall contracting base of 641,000 people
section of the US Intelligence Community and
officials have warned they are not subject to
the same scrutiny as government employees.
Seventy per cent of the US Intelligence budget
goes to outside intelligence sector firms. A
recent study notes 1,931 private companies
work on programmes related to counter-
terrorism, homeland security and intelligence
work in approximately 10,000 locations
across the United States with a value of $42
billion.
S
everal months ago former NSA stealing documents containing highly
contractor Harold Thomas Martin III, classified information.
52, pleaded not guilty in a federal
courtroom to what is believed to be the Federal authorities say they found the
largest theft of government documents equivalent of half-a-billion pages of stolen
in US history. Martin faces up to 200 years in documents stored at his home in Glen
prison; 10 years for each of 20 criminal Burnie, Maryland, as well as in the boot of
counts. US Attorney for Maryland Rod his car and in an unlocked garden shed.
Rosenstein, Law enforcement officials recovered dozens
said: The of computers and digital storage devices
Besides a huge amount of electronic
indictment holding at least 50 terabytes of data; one
data, investigators recovered
alleges that terabyte is the equivalent of 500 hours worth
documents from his residence that
for as long of movies, and thousands of hard-copy
filled six bankers boxes
as two documents that filled six bankers boxes.
decades,
Harold NO DIGITAL FOOTPRINT In addition to
Martin Secret, Top
flagrantly Authorities said the devices seized show he Secret/
abused the made extensive use of sophisticated encryp- Sensitive
trust tion and anonymisation technologies. He also Compart-
placed in used a sophisticated software tool that runs mentalised
him by the without being installed on a computer and Information
govern- provides anonymous Internet access leaving (TS/SCI)
Harold Thomas Martin III ment by no digital footprint on the machine. classified
documents
containing the
names of
intelligence
officers, one Rod Rosenstein
recovered document, prosecutors said,
contained a warning, in capital letters, that
said: This conop (concept of operations)
contains information concerning extremely
sensitive US planning and operations that will
be discussed and disseminated only on an
absolute need-to-know basis. Extreme opsec
(operational security) precautions must be
taken. Martin was not involved in this
Martins trial has begun operation, the government said, nor should he
at Baltimore Court have possession of the document or know of
its specifics.
4 JULY
T
he stakes have been raised in the
international stand-off over North
Koreas nuclear weapons
programme. This follows the
successful test-firing of the Commu-
nist states first intercontinental ballistic
missile on 4 July - Americas Independence
Day.
NK NEWS
Intelligence analysts have urged caution,
noting that there are a plethora of technical
issues still to overcome, including scaling a
warhead to fit into the carrier. Also referenced,
a key thermal insulation problem. This vital South Korean President Moon Jae-in said the
element stops a warhead from overheating allies need to demonstrate their missile
and igniting as it re-enters the atmosphere defence posture with action, not just a
over any potential target. statement.
The launch, which triggered a spate of Russian President Vladimir Putin and Chinas
warnings from the USA and South Korea, was President Xi Jinping, issued a joint statement
followed by questions regarding North Koreas
T
he inquest into the death
of Russian businessman
and whistleblower,
Alexander Perepilichnyy
has begun at the Central
Criminal Court (Old Bailey) in
London. Perepilichnyy uncovered
a $230 million (150 million)
Russian money-laundering
operation before he collapsed and
died near his home in Weybridge,
England, in 2012. His death was
originally attributed to natural
causes, but traces of a chemical
that can be found in the poisonous
plant Gelsemium elegans were Alexander Perepilichnyy
later found in his stomach. The
poison has been used in the past of life insurance and applied for
by Russian and Chinese assas- another 5 million worth of
sins. The 44-year-old, who had policies before his death.
been consistently threatened since
REVIEWNEWSDIGEST he revealed the scandal in 2010,
had taken out 3.5 million worth
The inquest first drew international
attention when a series of
T
he head of Special deep reconnaissance division In April, Lt. Colonel Oleksandr
Forces, Chief Director- and was engaged in collecting Colonel Kharaberiush, a senior SBU
ate of Intelligence of evidence of Russias involvement Maksym (Security Service of Ukraine)
the Ministry of Defence in armed aggression against the Shapoval counter-intelligence officer was
of Ukraine (HUR MOU), Ukraine, according to Ukrainian killed in a similar car bombing in
Colonel Maksym Intelligence. He had just returned the eastern port city of Mariupol.
Shapoval, was killed in a car to Kiev after conducting infiltration He had participated in various
bombing on 27 June in the centre operations in the east of the operations in the volatile
of Kiev. Shapoval, along with his country which has seen numerous Donetsk region of the country,
driver, died instantly in the blast. engagements with pro-Russian parts of which have been under
Police said the bomb had been forces. the control of Russian-backed
placed under the drivers seat. forces. Kharaberiush was
It was thanks to him that Ukraine
Colonel Shapoval was com- was able to substantiate its
mander of a unit described as the position in The Hague on Russias Investigators
at the scene
of Shapovals
death
involvement in armed aggres-
sion, a police official said.
A
lliance forces have taken back 700 airstrikes to help liberate Mosul. Three
the ISIS-controlled Grand al- years on from when Daesh declared its so-
Nuri Mosque in Mosul, Iraq - called caliphate in Mosul, this evil death cult
Abu Bakr al-Baghdadi at the
the building where its leader faces its end game in the city. In Syria, there is
Grand al-Nuri Mosque in Mosul.
Abu Bakr al-Baghdadi - now irreversible momentum and progress
Russia and Iran say he is dead
declared the creation of a towards Daeshs defeat in Raqqa, with the
caliphate on 4 July 2014. As Syrian Democratic Force (SDF) already
Iraqi troops secured the district around the controlling nearly 15% of the city. However, Ali Shirazi, a representative of Irans
mosque, Brigadier General Yahya Rasool Islamic Revolutionary Guard, said: I am
announced: Their fictitious state has fallen. US and UK analysts, together with their Middle confident the terrorist Baghdadi is definitely
Eastern colleagues, say that as a result of dead. Some intelligence sources in Syria
The seizing of the mosque, though not Operation Inherent Resolve, ISIS has now lost support this claim, and point to an incident at
important in a military land or strategic 70% of its territory in Iraq, and 51% in Syria. a sermon hosted by Abu Qutaiba, an aide to
perspective, is seen as a major symbolic Abu Bakr Al-Baghdadi. He broke down in tears
victory. Much of the building, built in 1172, DEATH OF ISIS LEADER and mumbled a few words suggesting his
had been deliberately blown-up by ISIS as death, according to reports. In a separate
Alliance troops neared. ISIS blamed the USAF Rumours of Abu Bakr Al-Baghdadis death speech at the same location, another preacher,
for the damage, a claim rejected by Operation continue to gain pace. Russian officials Abu Baraa al-Mawseli, is said to have
Inherent Resolve spokesman Colonel John claimed it had killed the Daesh leader in an admitted defeat for ISIS in its struggle to
Dorrian. airstrike on Raqqa in northern Syria. However, defend Mosul from the Iraqi army.
military officials in the West have urged
News that ISIS has lost virtually all previously caution, for previous reports of his death have Although ISIS faces imminent collapse in the
held territory in the city, coincided with an been inaccurate. Similarly, other military Middle East, its campaign and influence
announcement by UK Defence Secretary Sir experts fighting in the region insist he is still abroad continues to prove a menace, as
Michael Fallon. He revealed the RAF launched alive and in hiding. evidenced by the terrorist attacks in the UK.
US and
Iraqi
soldiers
near Mosul
Grand al-Nuri Mosque in Mosul, Iraq (left) and a USAF aerial photograph showing the mosque after it was blown up
by retreating ISIS forces. Inset: Operation Inherent Resolve spokesman Colonel John Dorrian
R
eports have surfaced from Malay-
sian officials that Kim Jong-nam, the
assassinated half-brother of North
Koreas leader Kim Jong-un, met
with a CIA case officer shortly
before he was killed. Jong-nam died minutes
after two women approached him at Kuala Kim Jong-nam - killed in an audacious
Lumpur International Airport on 13 April 2017, assault at Kuala Lumpur Airport in April
and splashed his face with liquid poison. He
was about to board a flight to Macau, where CCTV still showing Jong-nam (left) American left Malaysia on 13 February - the
he had been living in self-exile with his family with alleged CIA officer same day Jong-nam, who had reportedly
since 2007. survived previous attempts to kill him, was
reportedly met with a man believed to be assassinated. However, despite the supposed
According to reports, Jong-nam arrived in working for US Intelligence. The un-named liaison, few doubt he was murdered by North
Kuala Lumpur on 6 February and travelled to a man was a Korean-American with US Korean agents, who almost certainly used the
resort island near the Thai border two days citizenship living in Bangkok. CCTV footage women, named as Doan Thi Huong and Siti
later. A day after he arrived at Langkawi, he from the hotels security cameras show Jong- Aisyah as proxies. In a Malaysian court, both
nam and the American entering a suite in insisted they thought they were participating in
which they remained for two hours. a television prank, but officials believe they
were far more complicit than they admit.
Malaysian counter-intelligence officials report
that they had been tracking the movements of
the alleged American each time he entered the
country from Thailand and that they had been
surveilling him for quite some time, believing
him to be a CIA case officer. The same
authority said that Jong-nam had met the man
several times before.
B Chinese motorcyclist
attempted to avoid a traffic
offence in Nanjing in
Jiangsu province by showing a
fake document and claiming he
by Chinese social media: Thats
how foreign intelligence agencies
are cracked in China one person
joked. Another wrote: Isnt he
Police said the man had been
punished for violating relevant
regulations, but gave no details.
the State Opening of Parliament in
her official car, an emergency call
came into the 999 (911 in the US)
dispatch centre - the Queen was
reported to police for not wearing a
was a CIA special agent. seat belt. The caller was reminded
that under UK law, civil and
Police stopped Mr Dan Du initially criminal proceedings cannot be
for riding a low-powered moped taken against the Queen.
on an expressway which is illegal
in China. It was then found to be
unlicensed. When asked for proof
of identity, Du showed a CIA
pass and said he was an IMF
field agent. IMF is a fictional US
government agency in the
television version of Mission
Impossible and an acronym for
Impossible Mission Force.
RED FLAGS
Gulf Eyes on Qatar
S
audi Arabia, the UAE,
Bahrain and Egypt
have cut diplomatic
relations with Qatar
over its funding of
terrorism, harbouring
Free Syrian Fighter (FSA)
terrorists, destabilisation of the
region and ties with Iran. Chad, of the United States Navy, thus would discuss legitimate issues
Senegal, Mauritania, Yemen, the Washington has urged all parties with Arab states to end the
Maldives and Libyas eastern- to seek a diplomatic solution. regional crisis. It has also asked
based governments all later Saad bin Saad Al Kaabi Some CIA intelligence analysts the UN to intervene over the
recalled their ambassadors from features on a United Nations have warned if the dispute airspace dispute.
Qatar. Only Kuwait and Oman have sanctions list - charged with continues indefinitely, Qatar will
not followed suit. In addition to collecting funds on behalf of be forced into the arms of Iran. If Qatar fails to comply with
cutting diplomatic ties, Qatars al-Qaida terrorists in Syria demands made by the Gulf states,
neighbours closed their airspace Qatar government officials deny other sanctions may be consid-
to Qatari carriers and blocked the who were designated by Washing- the accusations listed but said it ered.
emirates only land border used ton as terrorists - Wajdi Ghoneim,
for food imports. Saad bin Saad Al Kaabi and Abdul
Rahman Bin Umair Al Nuaimi. Al
Qatar was given a list of 13 Kaabi is suspected of channelling
demands some of which include funds to al-Qaida in Syria. Egypt,
cutting ties with the Muslim Saudi Arabia, Bahrain and the UAE
Brotherhood, ISIS, al-Qaida and labelled 59 individuals and 12
Lebanons Iran-backed Hezbollah, organisations with ties to Qatar on
as well as closing the broadcaster their terrorism watch lists.
Al-Jazeera and reducing ties with
Iran. INTELLIGENCE CONCERNS
Qatar hosts the only diplomatic US President Donald Trump, has Al-Jazeera studios in Qatar
bureau of the Taliban in the region made statements aligning himself
and a recent report by American with Saudi Arabia in the crisis.
counter-terrorism experts assert However, the situation is made
that it is now the largest financier more complex because Qatar is
of terrorists in the Middle East. home to the largest US base in the
The report also accuses the region, Al-Udeid Air Base, and
country of hosting three figures Bahrain is home to the Fifth Fleet
Charles Lister, a
senior researcher
at the Middle East
Institute said:
Al-Qaida has
methodically
enhanced its
standing in Syria
and finds itself in
2017 as arguably
the most influential,
Charles Lister explicitly anti-
regime actor in the
conflict. Lister argues that al-Qaida has far
more experience in survival techniques and
has learned from defeats in the past.
Combined Air Operations Center (CAOC)
Al-Qaidas affiliate
in Syria, Al-Nusra,
resisted attempts
by ISIS to absorb
the group in 2014,
and despite vari-
ous off-shoots and
claims of indepen-
dence from al-
Qaida, most of its
followers remain
loyal only to its
Ayman al-Zawahiri leader, former
Osama bin-Laden deputy Ayman
al-Zawahiri.
A
ccording to historian and writer Historical documents and a search of MI5
Henry Hemming, author of Maxwell staffers employed in the early decades of
Knight: MI5s Greatest Spymaster, MI5s growth, show officers were drawn from
Knight, who colleagues referred to all parts of society, including many from the
as M, specialised in hiring recruits upper echelons of society, but Knight also
who came from traumatic backgrounds. wanted people who were slightly off kilter with
Hemming believes Knights thinking was that everyday life.
recruits who lost a parent at an early age had a
greater sense of loyalty. A spymaster Hemming argues: M was looking for
becomes this father figure in your life and fills watchers: people who pick up unusual details
the void, he said. It could be a mother as that other people might not. And in his
well, its just losing a parent. experience, usually these are people who have And for the record, Flemings Bond was
been held back in some way in childhood or characterised as a damaged young man who,
had some physical handicap meaning they as a child, lost both of his parents in a
hadnt been able to join in with games when climbing accident in the French Alps. He too
they were growing up, so they were literally on was an orphan.
the side-lines. He believes by joining an
organisation such as MI5, orphans, for
example, were given a sense of community
and belonging they never had in their younger
years.
L
ast year, Nadir Syed, 23, of a brutal and barbaric venerable religion for its own
was jailed for life with a organisation [ISIS] that sought to purposes.
minimum term of 15 years hijack and corrupt an ancient and
after being found guilty of Prosecutors provided evidence
plotting to carry out a beheading that Syed considered several
of a serviceman around Remem- locations including Oxford Street Nadir
brance Sunday in 2014. Now his and tried to buy weapons and Syed
brother, Haroon Syed, 19, has explosives on the Internet. He had
been sentenced to life in prison been introduced to a radical
with a minimum of 16 years for contact man named Abu Yusuf, by
preparing terrorist acts whose another jihadist fighting overseas
potential targets included called Abu Isa. It transpired
Buckingham Palace and an Elton Yusuf was actually a cover name
John concert on the 15th for a unit of British intelligence
anniversary of 9/11. At Londons agents.
Central Criminal Court, judge
Michael Topolski said: Sayed is Sayed told the contact: So after
deeply committed to the ideology Haroon Syed some damage with machine gun
B
ritains Parliament Internet following the recent UK General
mechanism was targeted Election. A probe conducted by
by cyber hackers in what government specialists from
was described as a GCHQ, said hackers were
sustained and determined attack Cyber experts continue to warn governments over a
searching for weak passwords
seemingly lack of preparedness
reportedly compromising up to 90 giving rise to blackmail fears. The
MPs (Members of Parliament), attack follows reports that
peer and staff email accounts. A passwords for MPs and officials systems in place to protect payments through Bitcoin
senior Whitehall source said a were being sold online by member and staff accounts and demands. Most operating
foreign state is thought respon- hackers. are taking the necessary steps to systems disabled were Windows.
sible adding it was inevitable that protect our systems. Cyber security firm Kaspersky
information has been stolen. One A House of Commons spokesper- Labs labelled the virus NotPetya
MP tweeted: Sorry no parlia- son said: The Houses of In June, a major worldwide cyber noting slight differences to a
mentary email access today - Parliament have discovered attack struck numerous govern- similar virus created in 2016.
were under cyber attack from unauthorised attempts to access ment and business operations in
Kim Jong Un, Putin or a kid in his parliamentary user accounts. We 64 countries, disabling systems.
moms basement or something. are continuing to investigate this Ukraine was particularly affected.
incident and take further mea- The ransomware cyber attack
Most cyber security experts sures to secure the computer froze accounts and demanded
believe the attack was timed to network, liaising with the National money in return for removing the
coincide with major staff changes Cyber Security Centre. We have virus called Petya. The attack was
similar to the recent WannaCry
incident (see Eye Spy 109).
However, the latest security
breach may have focussed more
on testing viruses to source data, Screen symbol signifying
rather than obtain currency Petya virus
A
ndrew Otto Boggs, 23,
from North Carolina, has
Elton been found guilty of
John hacking US intelligence
do martyrdom... thats what Im
planning to do. You have to find agencies and sentenced to two
out the price for the machine gun, years in prison. Boggs, known as
any gun. I might put the bomb in Incursio was part of a hacking
group called Crackas With Attitude
the train and then Im going to
(CWA), and was arrested along
jump out so the bomb explodes
with Justin Gray Liverman, 24, also
on the train. I was thinking of of North Carolina, known online as
Oxford Street... If I go to prison, I D3f4ult.
go to prison. If I die, I die, you
understand. The group hacked the personal
Former DNI
AOL account of then CIA boss
Haroon Syed was arrested in James Clapper
John Brennan, and accessed
September 2016. An investigator personal or work email accounts
asked him for the password to for FBI Deputy Director Mark 9,000 DHS employees, and 20,000
unlock his phone. Syed provided it Giuliano, US National Intelligence FBI staffers on the Internet.
accordingly... I.S.I.S. You like Director James Clapper (ODNI),
that?, he said. and President Barack Obamas Other members of the group have
Senior Advisor on science and also been detained. US authorities
After pleading guilty, the judge told technology John Holdren. In say CWA targeted four US
Syed: You were not lured, you addition, the group posted the government agencies and ten
were not enticed, you were not details of 2,400 US Government individuals, causing damage
Oxford Street, London officials, 80 Miami police officers, amounting to $1.5 million.
entrapped.
I
standard practise to try and get the
backing of the media, at least those with
a sense of responsibility and public
appeal. However, President Trump in the
early weeks of office, lost no time in
throwing away the rule book and creating a
chasm between the White House and some Stalin also used identical wording. Nor is fake
major media houses. Few can forget the news a modern term - it was used almost
rowdy press conference in February, which 150 years ago by journalists. And some
included a less than friendly journalistic intelligence watchers have been quick to point
gathering. President Trump, in a very out that in many cases, there is little to
controversial tweet, described the New York distinguish fake news from the intelligence
Times, NBC, ABC, CBS and CNN as the tradecraft of disinformation.
enemy of the people. Collectively they were
the fake news media. However, he was A DARTBOARD
careful to add that they were not his enemies.
President Trump believes that during his
Its not the first time the enemy of the people election campaign there was a concerted
phrase has been used by powerful leaders. effort by the media to attack him at every
Every dissenting voice was the enemy of the opportunity. One intelligence analyst likened
people, Chinas Chairman Mao once him to a dartboard. Trump also believes this
famously said. His fellow Communist Joseph policy has rolled on into his presidency and
of an impartial news gathering organ. scribed it as holistic jihad, and that Trump was
Speaking on the show, Trumps Deputy is determined to beat and bloody the press launched,
Assistant Sebastian Gorka, a former military whenever he finds himself in a hole, and thats this would
intelligence analyst said, it was only weird to unique. The CIA and other intelligence involve
journalists like yourself who are biased, services believe this prickly situation is not in intelligence
describing the BBCs wording as pathetic. the best interests of both parties or national work.
Gorka is not alone in his sentiment, the BBC security and few doubt this played a part in Officials,
has been accused of anti-Trump sentiment by the demise of Mr Comey. especially
several leading UK commentators. those with
Eye Spy understands that in February, Trump good
A DANGEROUS LIAISON requested analysts to ascertain just how working
much personal hostility there was towards relations with
Few US operators in the intelligence world him - against that levelled at his policies. He the media,
have ever experienced such hostility between has also asked senior intelligence officials if fear that an
the media and the White House. Rice there was a combined effort by major US undercover
University historian Douglas Brinkley de- media players to help topple him. If a probe investigation CIA Director Mike
could Pompeo
damage
relations between the Fourth Estate and the
United States Intelligence Community (USIC).
Another poll conducted in December 2016 by However, several MI6 men discussed the
Pew Research revealed 64% of US adults reports, including Bruce Lockhart. He
noted that the journalists stories were
believed fake news had caused confusion
being deemed credible in some circles.
about current events. And importantly, 23% of
And as history shows, King Edward VIII,
people had gone on to share a suspected abdicated the
bogus story - passing the material through throne to marry
various media and social platforms. Wallis Simpson
(who divorced
Researchers at Northwestern University her husband in
sought to discover where most fake news 1936) thus
originates. Its researchers claimed 30% of proving the
fake news traffic could be linked to tittle tattle
Facebook. Interestingly, following the US surrounding an
General Election, Facebook warned of affair was
inaccurate news and for followers to take care Brendan Bracken indeed correct.
before sharing material.
Interestingly, Lockhart, an intelligence
AN EVOLVING INTEL VIEWPOINT officer and diplomat who became
Director-General of Britains powerful
The Presidents view on intelligence collection, WWII Political Warfare Executive (PWE),
Not all news is good! writing in his diary once said this of
information delivery and opinion, which he
intelligence reports: No intelligence
report[s] can be taken at more than twenty
per cent of the truth.
Patrick
Murray,
Monmouth
Journalists use electronic media to University
submit stories in seconds - a simple Polling
error can result in editorial problems Institute
The Presidents anger towards, what can be an unforgiving media, President Trumps use
appears to be lessening, as evidenced by a remark he made at an of the phrase fake
event recognising the work of US emergency services. He turned news and social media
towards a press gathering, waved and said: You know these folks has certainly caused
back here... theyre very famous most of them. The media, they are discussion amongst the
very honourable people. intelligence community
EYE SPY
I N T E L L I G E N C E
M A G A Z I N E
BRITISH TABLOIDS
24 Hours a Day
stations, plus the likes of Gorenc were
mentioned, editorials opted to devote much
copy. Eye-catching headlines such as
Electronic Bomb capable of paralysing the
entire US Navy soon appeared. And even
eyespymag.com
though the editor of the Sun newspaper issued
a word of caution - highlighting fears it could
be propaganda, another UK newspaper (Daily
Express) stretched the readers imagination
again, warning WWIII might be at hand.
US MEDIA REPORTING
JOIN US ALSO ON
the television station said its reporting was not
considered as a serious report on Russias
military capability, but rather as another
www.facebook.com/EyeSpyMagazine example of Russian media hyperbole. Foxs
feature on the entire episode has all but been one that could be used in a first strike
removed from its website. capacity. Its prowess was circulated around
the world via social media. And soon those
A CONSPIRACY BONANZA commentators playing down the event were
drawn into a myriad of government conspiracy Nazi propaganda poster showing the
Nevertheless, the damage had been done, and theories. All of this drawn from a proper DOD execution of Polish troopers. The banner
the prominence and menace of the dated newswire report and the hand of Dmitri reads: Forest of the Dead of Katyne
Khibiny elevated from a fairly basic system, to Sedovs imaginary US sailor.
version. And it
O
where 10,000 Polish officers have been committed another
WWII was consumed and concealed in murdered by the Soviet Secret State Police. The war crime.
what could be described as a fake news German authorities went to a place called the
story. Reports of the massacre of Hill of Goats, a Russian health resort situated However, even in
around 4,500 Polish troopers, whose twelve kilometres west of Smolensk, where a 1943, some Polish
bodies were discovered in a mass grave at Katyn gruesome discovery was made. government figures
Wood, Russia, by German soldiers, came in April in exile were
1943. Though killed elsewhere, they were buried Moscow responded by claiming the atrocity was unconvinced and
at Katyn in 1940, after the NKVD had performed committed by German troops, and because called for an independent inspection of Katyn.
numerous executions - permission being granted Russia was an ally of the West, it was this This action caused a major diplomatic row
by Stalin. version of events that was believed. Similarly, it between Russia and Poland. However, the
didnt help that the broadcasts were made after German atrocity thread, supported by bogus
On 13 April 1943, a German radio station information had been imparted by Goebbels eye-witness testimony, false reports and a
broadcast: A report has reached us from propaganda ministry. myriad of unconfirmed official documents
Smolensk to the effect that the local inhabitants remained for decades. That is until 1990, when
have mentioned to the German authorities the On 14 April 1943 Moscow responded, an official following the fall of Communism, Moscow
existence of a place where mass executions said: The Polish prisoners in question were acknowledged the NKVD secret police was
have been carried out by the Bolsheviks and interned in the vicinity of Smolensk in special behind the
camps and were employed in road construction. incident and
It was impossible to evacuate them at the time of had embarked
the approach of the German troops and, as a on a lengthy
result, they fell into their hands. If, therefore, they and secretive
have been found murdered, it means that they programme of
have been murdered by the Germans who, for concealing the
reasons of provocation, now claim that the crime truth.
was committed by Soviet authorities.
Letter to
This storyline was absorbed by the one media Stalin
station which had a global audience - the BBC. proposing
On 15 April, British information officials through that Polish
BBC radio, announced that the Germans had officers are
told lies and that it accepted the Russian executed
PART 1
COMMUNICATION
& ESPIONAGE
Eavesdropping has come a long way since the
word was actually created - this referring to a
person listening from a buildings wooden
eves. Eye Spy investigates the changing
dynamics of an intelligence tradecraft that
now affects billions of people worldwide...
ADVENTURE IN TIME
Introduction: Whilst the objective of intelligence collection has changed little over
time, the actual methods and means by which it is achieved is moving at a pace that
has surprised even those deployed at the technical level. Little wonder the gadget
creators involved in developing new ways in which to watch, bug, listen and steal
are finding todays espionage theatre a spys playground...
A
hundred years ago and a little grams may have been a speedy way to send
over one year into the Great War, information, but they were vulnerable and
those on opposing sides were in liable to interception. A good example being
dire straights about learning the note sent by German Foreign Minister
about their adversaries military Arthur Zimmerman to Heinrich von Eckhart,
strengths, objectives and Berlins representative in Mexico 1917.
weaponry. Germany for its part struggled, but Zimmerman was effectively proposing a
it did manage to place a few observers in the military alliance between the two countries. In
UK and international ports and locations it return for Mexicos support, Germany would
perceived were important. Britain did likewise help it recover vast areas of the southern
and utilised its empire posts, friendly forces, United States. Britains Admiralty Room 40
existing contacts and proxies to report and codebreakers secured the communication and
infiltrate. quickly deciphered its content. It was then
handed to officials in Washington and after
Communication was limited, time sensitive viewing, America duly declared war on
and in many cases laboriously slow. Tele- Germany. The immense importance of
interception was evident in
this one act alone.
mechanical affair; today, with a little know- have operated - messages carried by one
how it can be achieved - legally or otherwise. person or delivered through neutral countries
Secure lines and countermeasures apart, if a making reporting difficult. This was all well
telephone line or the actual unit can be and good if the material was not time sensi-
physically reached it can be breached. And tive.
once underwater cable lines stretching
thousands of miles around the world were HOW THINGS HAVE CHANGED
laid, the opportunities for interception and
intelligence collection became even greater. There are still tales of spy pigeons delivering
letters and taking photos using tiny cameras.
PASSING INFORMATION And stories of couriers traversing thousands
of miles to impart information or commands
Speed of messaging in the intelligence world exist. Most famously perhaps, those engaged him to hide in plain sight for a decade.
has always been of great importance - by Osama bin-Laden who allegedly sent his Eventually of course, his couriers were
especially in wartime. Being aware of an operatives across the dangerous borderlands identified and the rest is history.
imminent danger does allow for the prepara- of Afghanistan and Pakistan to deliver by
tion of countermeasures. Henceforth in times mouth messages to his cohorts. Perhaps a Today, organisations like NSA and GCHQ are
of conflict, having a spy network in place is an more effective and speedy way to make engaged in projects to understand and break
invaluable tool. Without access to a communi- contact would have been to make a cell phone an ever-evolving cell phone language which
cation platform delivering, exchanging or call? But this senior terrorist who evaded the is also used to conceal an agents transfer of
receiving information is slow. Indeed, on modern mechanism of US Intelligence for over information and by those engaged in terror-
occasions by the time it had reached the end- a decade opted not to for security reasons. ism. Switching words and meaning: for
user, it was worthless or its value seriously The man who believed the CIA had an all- example, Explosive becomes Having a
downgraded. For thousands of years couriers seeing eye was correct not to do so - enabling Meal... Meeting Point - Holiday. Such
communications can be altered or tampered
with or customised at any point, making an
A never analysts task both difficult and at times
changing rule. frustrating. And of course, the same applies to
If a telephone text messaging. Nevertheless, there have been
line can be several case files where the government has
accessed - successfully prosecuted people using such
conversations techniques to hide their illegal activities.
can be
intercepted An interesting statistic to digest; there are
more cell phone and communication devices
in existence than there are people on this
planet. And this is set to grow. One report
stated such units are multiplying five times
faster than the human race - thus by 2025
there will be over 35 billion gadgets in
existence enabling us to make contact with
anyone in the world. If only the spooks
operating on the Western Front in 1915 could
have secured but a couple of these machines
(and a transmitting mast or communications
satellite of course)!
Together with computers and other digital hard hundreds of thousands of (cell) users were triggering devices thousands of miles away, to
and software, this area and its cyber environ- stolen two years ago leading to no end of adapting lap top computers packed with
ment is easily the most important to those problems and a massive fine for the supplier. explosives and a call-up system, the task of
engaged in intelligence collection today. Sadly, those countering the technology has increased
it is an area being exploited more and more by Similarly, the use of electronic media plat- immensely.
the criminal fraternity. Just ask the officials of forms in bomb making has also become an
Talk Talk in Britain. Personal details of art. From using cell phones as detonators, FROM ANTIQUE TO SPACE AGE
WORLD WAR ONE TIME CAPSULE - PIGEONS! Securing information from specific locations
or covertly from knowing or unknowing
Communications continue to this day to be carried by pigeons. Their role in the game individuals has always been an art, according
of espionage has been well documented in the pages of Eye Spy. These images to those engaged at the sharp end of
relate to WWI. 1. Swiss troopers sending a message by pigeon. 2. Camera-carrying espionage. And even a century ago the early
pigeon used by Germany as a reconnaissance instrument. 3. Leg canisters used on spymasters challenged their technicians to
pigeons by the US Army Signal Corps come up with inventions and methods that
could achieve results. From early reconnais-
1 2 sance cameras attached to aeroplanes to
secreting operatives under the floorboards
with a tube to listen-in to meetings, spy
tradecraft was evolving. However, just like
today, the intelligence world soon found
I
n Eye Spys The Insiders As a friend and associate of
Guide to 500 Spy Sites in future MI5 Director William
London, several pages are Melville, Houdini gave a
devoted to the famous demonstration of his skills by
escapologist Harry Houdini, showing how he could escape
and his little known work for from handcuffs at Scotland
Britains emerging Security Yard.
Service - MI5.
However, its very likely he also
Harry Houdini
revealed the secrets behind a
and his Harlem
number of espionage tricks
performed on his unknowing
house
guests who stayed with him at
his home in Harlem in New When guests arrived and sat For the record, besides an
York - a property he purchased down to supper, he then apartment in London, Houdini
in 1904 for $25,000; a kings amazed them with his super- and his wife Bess lived in the
ransom at the time. natural mind reading tricks - Harlem house until his death in
revealing personal secrets and 1926.
Houdini had the entire house intimate details that he could
wired and installed listening not possibly have known. At It was recently placed on the
devices that allowed him to least thats what his guests market for a sale value of $4.6
listen-in to conversations that thought! He, no doubt, shared million (3.6 million). Bugs not
were taking place around the his tale (and equipment) with included.
William Melville house. his MI5 friend Melville.
F
rom as far back as the American of knits and
Civil War and throughout both world purls in a
wars, the intelligence services have pre-
taken advantage of the stereotype of determined
women knitters. Women were not allowed to pattern, spies
engage in active duty so they were encour- could pass
aged to knit socks, hats, and balaclavas for on a custom
soldiers during many conflicts. Women piece of
knitting either in groups or alone were a fabric and
common sight all over the world, but unbe- read the
known to most people, some were used in the secret
great game of espionage. message,
buried in an
Whether used as a cover for reconnaissance innocent Phyllis Latour Doyle
or knitting codes in wool or fabric, there is a scarf or hat.
long history between knitting and espionage.
Spies have been known to work code AGENT PAULETTE
messages into knitting, embroidery, hooked
rugs, etc, according to the 1942 book A One such person is Phyllis Latour Doyle, a
Guide to Codes and Signals. British Special Operation Executive (SOE) agent
The UK Government said it wants to
in World War II. Doyle, codenamed Paulette,
modernise the law and define legislation
Knitting encoded messages was a form of spent the war years passing information to her
created in 1994 which talks about property.
stenography, a way to hide a message handlers using knitting as a cover. Parachuted
An offshoot of this managed law, according
physically. By making a specific combination into occupied Normandy in 1944, she regularly
to industry specialists, means property will
conversed with German soldiers. All the while,
be translated to cover equipment - smart
she sat knitting innocently, embedding her
phones and computers - even those encrypted
patterns with Morse code of the conversation.
types. Seeking out software vulnerabilities is
An ordinary loop knot can make the equivalent
key and todays intelligence services employ
of a dot and a knot in the figure-eight manner
some very good specialists. The objective is
and will give you the equivalent of a dash, she
of course to listen-in to specially selected
said in an interview in 2009. I always carried
targets - with a warrant. This has been
knitting because my codes were on a piece of
ongoing for the best part of two decades, so
silk - I had about 2000 I could use. When I
its hardly a new endeavour. Critics like
used a code I would just pinprick it to indicate it
Edward Snowden claim the programme will be
had gone. I wrapped the piece of silk around a
all seeing and could be exploited in certain
knitting needle and put it in a flat shoe lace
areas by certain people. The CIAs Vault 7
which I used to tie my hair up.
programme (see Eye Spy 108), is evidence
enough that intelligence services recognise
In total, Doyle passed over 130 messages in
much valuable information can be gleaned
this way. Today, she resides in New Zealand.
from everyday objects used by millions to
Aged 96, this agent has received numerous
SOE agent Phyllis Latour medals for her outstanding bravery, including
The cell phone has
Doyle - codenamed Paulette the French Knight of the Legion of Honour.
transformed communication
and espionage
B
ery Koenders, the Dutch Foreign
Minister, says that suspects involved
in the downing of Malaysia Airlines
flight MH17 will be prosecuted in a
Dutch court. The announcement
Mechanical and electric typewriters and even computerised displays have came just days before the third
been targeted by those engaged in espionage for decades anniversary of the airliner incident. All 298
people on board were killed when the
electronic probe. After Snowdens leaks about aeroplane crashed on 17 July 2014, on a flight
the NSA PRISM programme, there is collective from Amsterdam to Kuala Lumpur.
agreement that terrorists and organised crime
gangs began to change the way they commu- In October 2015, the Dutch Safety Board and
nicate and plan. Former British premier David a joint investigation team (JIT), determined
Cameron said: We just want to ensure that that the Boeing 777 jet was struck by a
terrorists do not have a safe space in which to Russian-
communicate. Human Rights advocates and made BUK
others warn the legislation will be exploited. missile.
Whilst no
A HIDDEN ADVANTAGE suspects
have been
Cell phone interception is big business, so too officially
MI6 had named,
strict rules
engaging tools to search computers or secure
communications and text from word process- Dutch
on using
carbon and ing files and programmes. Just a few short Chief
duplicating years ago the written word was spelled out Prosecutor
paper using an invention that in one form or another Fred Westerbeke Fred
has been with us for over 150 years. Captur-
ing information from typewriters is definitely a
spy trait that evolved in time. In WWII and
even edging towards the early Cold War years,
MI6 warned its staffers to take special care
when using carbon paper to make duplicates
of letters - this before the advent of photocopi-
ers. It was an offence to leave any scrap of
paper on a desk when leaving! The communi-
cation of course visible on the paper.
Images from the Dutch Safety Board Report show impact damage from the missile
V
O
L
U
M
E
10 ISSUE 73 REF: ES/73
UK 3.95 USA/ROW $7.00
ISSUE 74 REF: ES/74
UK 3.95 USA/ROW $7.00
ISSUE 75 REF: ES/75
UK 3.95 USA/ROW $7.00
ISSUE 76 REF: ES/76
UK 3.95 USA/ROW $7.00
ISSUE 77 REF: ES/77
UK 3.95 USA/ROW $7.00
ISSUE 78 REF: ES/78
UK 3.95 USA/ROW $7.00
ISSUE 79 REF: ES/79
UK 3.95 USA/ROW $7.00
ISSUE 80 REF: ES/80
UK 3.95 USA/ROW $7.00
V
O
L
U
M
E
11 ISSUE 81 REF: ES/81
UK 3.95 USA/ROW $7.00
ISSUE 82 REF: ES/82
UK 3.95 USA/ROW $7.00
ISSUE 83 REF: ES/83
UK 3.95 USA/ROW $7.00
ISSUE 84 REF: ES/84
UK 3.95 USA/ROW $7.00
ISSUE 85 REF: ES/85
UK 3.95 USA/ROW $7.00
ISSUE 86 REF: ES/86
UK 3.95 USA/ROW $7.00
ISSUE 87 REF: ES/87
UK 3.95 USA/ROW $7.00
ISSUE 88 REF: ES/88
UK 3.95 USA/ROW $7.00
V
O
L
U
M
E
12 ISSUE 89 REF: ES/89
UK 3.95 USA/ROW $7.00
ISSUE 90 REF: ES/90
UK 3.95 USA/ROW $7.00
ISSUE 91 REF: ES/91
UK 3.95 USA/ROW $7.00
ISSUE 92 REF: ES/92
UK 3.95 USA/ROW $7.00
ISSUE 93 REF: ES/93
UK 3.95 USA/ROW $7.00
ISSUE 94 REF: ES/94
UK 3.95 USA/ROW $7.00
ISSUE 95 REF: ES/95
UK 3.95 USA/ROW $7.00
ISSUE 96 REF: ES/96
UK 3.95 USA/ROW $7.00
V
O
L
U
M
E
13 ISSUE 97 REF: ES/97
UK 3.95 USA/ROW $7.00
ISSUE 98 REF: ES/98
UK 3.95 USA/ROW $7.00
ISSUE 99 REF: ES/99
UK 3.95 USA/ROW $7.00
ISSUE 100 REF: ES/100
UK 3.95 USA/ROW $7.00
ISSUE 101 REF: ES/101
UK 3.95 USA/ROW $7.00
ISSUE 102 REF: ES/102
UK 3.95 USA/ROW $7.00
ISSUE 103 REF: ES/103
UK 3.95 USA/ROW $7.00
ISSUE 104 REF: ES/104
UK 3.95 USA/ROW $7.00
EYE SPY
O
L
U
M
E
14 ISSUE 105 REF: ES/105 ISSUE 106 REF: ES/106 ISSUE 107 REF: ES/107 ISSUE 108 REF: ES/108 ISSUE 109 REF: ES/109
INTELLIGENCE MAGAZINE
UK 3.95 USA/ROW $7.00 UK 3.95 USA/ROW $7.00 UK 3.95 USA/ROW $7.00 UK 3.95 USA/ROW $7.00 UK 3.95 USA/ROW $7.00
6 DAYS
gloves, acted as technical
advisor to the production team
and along with colleagues,
helped in providing unique
insight into the operation
J
ohn McAleese and I first met around passed Commando training and were chosen
1973 when we both turned up at the to go to Lympstone, Devon - home of the
Royal Citadel in Plymouth for whats Royal Marines. John and I duly passed the
known as the All Arms Commando Royal Marines training and were awarded our
Course. John and I hit it off from the green berets. It was a proud moment. John
moment we met and established a great was posted to 59 Commando Royal Engineers
By Rusty Firmin
rapport. We worked and played hard, and in Plymouth, while I headed to 29 Commando
became the best of friends. After a one-month Royal Artillery, also in Plymouth. We saw a
Rusty Firmin fair bit of each other over the next few years
pictured with and of course, we socialised together
Jamie Bell during whenever we could.
filming for the
movie - 6 Days John was posted to Arbroath in Scotland for a
while and we lost contact; no cell phones in
those days! However, in 1976, I decided to
leave 29 Commando and applied for Special
Air Service (22 SAS) selection. Unbeknown to
me, John Mac had done exactly the same
thing.
to my great surprise and delight - John Mac between us. In 1977 John Mac and I entered
and his unit came up from the other side on SAS selection. What a great guy to know; he
the hill! Thats how we met again. was fit, strong and very clever. After six
months of gruelling SAS physical election
SAS SELECTION training, combat survival, jungle training, skill
at arms, etc., we were awarded our SAS
We trained hard throughout the days, and at berets. It was another fulfilling and very proud
night wed find a way to crack some cider moment. We applied to join B Squadron;
Rusty Firmin and Jamie Bell pictured with stunt men and specialists in New Zealand during filming
subsequently applied for 8 Troop, which was Sadly, John McAleese passed away in 2011 inspired by my book GO! GO! GO! released in
mobility, and we both got our wishes. and will not be around to see the film which 2010 on the 30th anniversary. When I first
focuses on the mission - one in which he was learned of this I didnt know if it would be
From 1977 until 1992 we were together in the so instrumental in helping to rescue the really feasible. I met with the producer and I
same Squadron. We saw service in jungles, hostages. subsequently introduced the scriptwriter to a
deserts, Northern Ireland, the Falkland Islands number of colleagues in Hereford who were
and elsewhere. We were best of friends and From years ago being his medic and staying involved in the siege - he made some notes,
got to know each other really well over those with him 48-hours until a helicopter could went back to New Zealand and wrote the
years together. And then came the Iranian airlift him out of the jungle, to delivering his script for the film. I was involved as an
Embassy siege - 30 April - 5 May 1980. eulogy in Hereford Cathedral in 2011 after his adviser/consultant to the film along with other
passing, John Mac played a big part in my ex-B Squadron consultants.
I suppose this was our finest hour together life. I know he would be proud of the movie.
along with the rest of B Squadron. John Mac, The cast was drawn up and Jamie Bell, a
myself along with three colleagues, will 6 DAYS: THE TRUE STORY OF THE British actor, plays myself in the film. Rusty
always be remembered for those scenes IRANIAN EMBASSY SIEGE Firmin is - or was - the man with no gloves
captured on live television as we entered the on that particular assault. I travelled to New
embassy via a balcony to rescue the hos- General Film Corporation New Zealand decided Zealand and met with Jamie during some of
tages. Surreal moments viewed by the whole they would like to make a film about the siege, the filming; I just had to teach him how to
world. Like me, Im sure John would be
surprised that almost four decades later a film
would be made of that iconic rescue mission. Rusty Firmin
pictured
today
Rusty Firmin pictured on top of the SAS holding area at 14/15 Princes Gate. Behind is the Iranian Embassy rooftop
where SAS troops abseiled into the building. Nearby is the Albert Memorial, Hyde Park, where the six terrorists met
on 5 May 1980, to plan the takeover of the embassy
ICON FILMS
EYE SPY INTELLIGENCE MAGAZINE 110 2017 65
Falkland Islands. SAS
soldier Rusty Firmin
pictured with an
Argentinian Air Force
fighter
FOR 2017
GIVE AN
EYE SPY
GIFT SUBSCRIPTION
NOW INCLUDES
FREE ELECTRONIC
SUBSCRIPTION
Fantastic clarity -
optical friendly
A limited
number of
high quality
prints by artist
Andrew Miller
and signed by
Rusty Firmin
are available
from:
LINKS: www.rusty-firmin.com
O
n various electronic platforms, between its controllers and Russian Intelli- received an
supportive web sites and gence. And unlike many recent incidents image of an
propaganda leaflets, ISIS declared which have caused friction between intelli- ISIS fighter
itself owners of the virtual world. gence services in the West and Russia, on this dressed like
The bold announcement followed occasion the agencies seem united. Jihadi John
several reports that its operatives holding a
and supporters had out-manoeuvred security Khalid Masood, the Westminster Bridge and sword in front
services such as NSA and GCHQ by commu- Parliament attacker is one example of of Big Ben. The
nicating using apps with encryption capabili- terrorists using technology to stay off the image - titled
ties. One such app is Telegram Messenger - radar. MI5 discovered he used Telegram Fight Them -
now at the centre of a growing row in Moscow Messenger weeks before the attack and even showed a
fireball and a
torn Union
Khalid Masood
Jack flying
from a flagpole. Other similar imagery was
also circulated just prior to the attack (below
left). And just moments before the actual
attack, Masood had been sending messages
via WhatsApp, another encrypted messaging
service. The recipients and senders of material
linked to Masood remain unknown.
information,
and is the
most
popular
SERGIE KONKOV/TASS
among
members of
international
terrorist
groups.
France and
several
COUNTER-MEASURES Middle East
Akbarzhon Jalilov
countries Sennaya Ploshchad Station
Roskomnadzor, the countrys communica- have also reported use of Telegram Messen-
tions regulator, may try and block Telegram ger by ISIS terrorists. personally Pavel Durov to carry out the
Messenger. This followed news that it was Russian law... the choice is yours. Russia
used by terrorist Akbarzhon Jalilov and some Telegram was founded by Russian business- has already
of his contacts in the St. Petersburgs Metro man Pavel Durov, 32, and has around 100 imple-
bombing on 3 April, an action that resulted in million users. The service is free and allows mented
the deaths of 15 people. An FSB spokesman groups of upto 5,000 people to communicate, bans on the
said: We have reliable information that the exchange photos and videos all in the messen-
suicide bomber, his allies and the foreign knowledge that such activity is beyond the gers Zello
curator (handler) used the Telegram Messen- watchful eye of government and regulators. and
ger for concealing their criminal plots at all Durov has thus far refused to allow Blackberry
stages of preparation for the terrorist attack. Roskomnadzor access to encrypted mes- for refusing
The Telegram provides terrorists with the sages on the app. Roskomnadzor chief to register
opportunity to create secret dialogue with a Alexander Zharov, in a stern warning to Durov with Rosko-
high level of encryption of transmitted said: I publicly call on the Telegram team and mnadzor.
For his part,
Durov
believes
such an Alexander Zharov
action is not necessary and goes against the
Russian constitution.
MIKE FINN
The
Deceptive
Factor
PART 9
IN THE INTELLIGENCE CYCLE
MCI
Mike Finn examines how a persons response to
everyday situations has become an area of study
for those in Intelligence charged with
MANIPULATION, CONTROL AND INFLUENCE (MCI)
T
he world of intelligence is working investigations into conditioned response.
on exciting new frontiers in Pavlov started from the idea that there are
conditioning and response some things that a dog does not need to learn.
technology as well as related For example, dogs dont learn to salivate
sciences. Earlier in this series we whenever they see food. This reflex is hard
covered areas in which a subjects wired into the dog. In behaviourist terms, it is
cognitive weaknesses were targeted to control an unconditioned response. However, when
the individual or their perception of the Pavlov discovered that any object or event
environment, in order that manipulation could which the dogs learned to associate with food
take place. In this feature we delve into (such as ringing a bell) would trigger the same
unrelated areas of neuroscience research and response, he realised that he had made an
aspects of psychological studies to form a important scientific discovery.
more complete picture of this intelligence-
related jigsaw puzzle. Another person studying in this area was John
Watson (1878-1958), an American psycholo-
To grasp the immense significance of this gist who established the psychological school
series as applicable today, we need to look at of behaviourism. Based on Pavlovs research,
some of the original pioneers in the field. One his hypothesis was that there was no Ivan Petrovich Pavlov
piece of the puzzle can be found in the work of conscious process involved, only that of
Ivan Petrovich Pavlov (1849-1936), who was stimulus and response. In this sense it fell into
a political reactionary to the Bolshevik rise to the category of classical conditioning, which established the law of effect. In this case, if
power. Pavlov, a Nobel Prize winner, was given means that a new behaviour comes about something pleasant influences a specific
a special government decree by Vladimir Lenin through the process of association. In contrast situation, it will encourage repetition. If the
in 1921, allowing him almost unlimited and to the above Edward Thorndike (1874-1940) experience is unpleasant it is less likely to
unhindered research facilities for his scientific was another American psychologist who happen again. Last but not least, Burrhus F.
Ivan Pavlov Memorial Museum in person (if a friendly force) would reciprocate
Ryazan, Russia. Inset: One of Pavlovs with two clicks. The response association was
dogs preserved at the museum to reveal themselves and come forward. In an
ideal world this would have been a useful
communication and instruction tool, much like
Pavlov and the bell principle. Unfortunately,
Skinner (1904- the same click sound was created when the
1990) yet enemy prepared their rifle bolt to shoot. Need I
another say more?
American
psychologist INTELLIGENCE AND HUMAN MANIPULATION
behaviourist
who established Using principles like that described above to
the concept of real effect takes consummate skill and
operant exacting diversity. However, the rewards in
conditioning. He manipulating areas, for example, the political
believed that the theatre, using such precepts, far outweigh the
John Watson mind did play a WWII cricket or clicker risks of failure. Psy-ops studies, for example,
role in the include evaluation, analysis and projections,
processes One concept of stimulus and response was before any such concept is implemented. Its
described above. In essence classic used during WWII. A number of American not easy to appreciate the use of such
conditioning centres on involuntary behaviour, military and intelligence units used a hand held principles in action, especially within the
while operant conditioning involves a mental clicker mechanism when in enemy territory. If intelligence world. Therefore I will use a
aspect of reward and punishment. they thought an Allied trooper was nearby they simplistic illustration, just to show the
would click the mechanism twice. The other crossover from concept to human
PSYCHOLOGICAL WARFARE
W
the Frontline
Victoria Schofield influenced the course of the viewed as a war fought
Head of Zeus Pacific War. Hardback 464pp by armies of millions
living and fighting in trenches,
Available from Eye Spy Ref: ES/1686
ormed into a regiment in aided by brutal machinery that
fortunes through the 2nd South the countrys significant - even death - without any Secret Warriors provides an
African War, two World Wars, the codebreaking and signals- guarantee of being rewarded or invaluable and fresh history of
Troubles in Northern Ireland and intelligence achievements during even recognised. Through in- World War I, profiling a number of
the war in Iraq - up to The Black WWII. depth insider knowledge, Eye Spy the key incidents and figures
SURVEILLANCE
cal and military tension may
contribute to long-term threats to
personal liberties and the rule of
law. Hardback 308pp
See publisher for availability
I
collective madness overtook
Adolf Hitler and his senior
which lead to great leaps forward generals. They convinced
for the twentieth century. Told in a themselves that they could take on
lively and colourful narrative style, and defeat a superpower in the
the author reveals the unknown making - the Soviet Union.
side of this tragic conflict. Foolishly, they thought in a swift
Hardback 464pp campaign they could smash the USED ONLY
Available from Eye Spy Ref: ES/1688
Red Army and force Stalin to sue
for peace, despite dire warnings BY PROFESSIONALS
UK 20.00 USA $30.00 ROW 25.00
that Stalin was amassing a
Eye Spy Intelligence Magazine rear-vision
reserve army of more than one
INTERROGATION: Refugees and million men on the Volga. The end surveillance sunglasses have a black-
Spies in Cold War Germany result would be such carnage that metal designer frame, rubber-backed ear
Keith R. Allen it would tear the German forces drop-over (for comfort) and superb glass
Rowman & Littlefield Publishers apart.
lenses. They also come in a tough smart
his revealing book explores black carry case. Dont confuse these
OVERVIEW
clue to why the attackers probably avoided We were informed the bombs could have
detection. The van was hired at 5.50pm on the been used as threat devices to take hos-
day of the attack and driven away at 6.30pm - tages. Similarly, CT officers may have been
less than four hours before the plan was reluctant to engage the attackers at close
initiated. proximity - fearful of detonation. In the end,
the bravery of armed (and unarmed) police in
SNAPPERJACK OF LONDON
confronting and then shooting the attackers Chancellor Philip Hammond has thus not
must be commended. Commander Haydon officially stated that the attack was a terrorist
said: I have not seen this tactic used in the incident so businesses near the bridge and small
UK before where terrorists create maximum traders at Borough Market who lost an estimated
fear by strapping fake explosives to them- 1.4 million in revenue cannot receive insurance
selves. He too speculated that the intention payouts. A Treasury spokesperson said:
may have been to create a siege situation. It Following an established legal process, we
makes the bravery of those police officers and cer tified the Manchester and Westminster
members of the public who tackled the attacks as terrorist incidents for the purposes
terrorists even more remarkable. of insurance after discussions with the relevant
police forces. We are
The attack, like that just two weeks earlier in currently in active
Manchester, was widely condemned by world discussions with the
leaders and heads of all religious faiths. Many Metropolitan police
security specialists believe the UK incidents regarding the London
will undoubtedly lead to a review in counter- Bridge attack and are
terrorism policy. One fact is also paramount in confident that we will
the minds of those responsible for public be able to provide
safety, despite the best intelligence - not all certainty to insurers
Messages to the deceased and attacks can be prevented... shortly.
injured - plus some designed for the Philip Hammond
attention of ISIS NOTES: PROFILING TERRORISTS...
DETECTION
PROFILING A TERRORIST
Carlos the Jackal - Ilyich Ramirez Sanchez
Terrorist Attack Profile. This has three
dimensions; the attack, highly planned or not
is usually Strategic, Symbolic and Cata-
N
umerous studies have taken place in However, so complex is the subject of new strophic. The same can be said (general) of
the last sixty years in an effort to terrorism, that previous studies are now the attack sequence of a suicide bomber. In
investigate and build a picture of regarded as contributing manuals only, some this case the terrorist or his controller chooses
those intent on terrorism. One of the have even been labelled useless by those the time and place of action, according to the
earliest was carried out by US engaged in todays investigative programmes. prevailing circumstances. The operation is
psychiatrist James Brussel, New York Much of course changed after 9/11. usually low cost - such as recent attacks in
States Assistant Commissioner of Mental London and Manchester; they often require no
Hygiene, following a spate of bombings in A CHANGING CONTENT escape plan; besides identity (bomber
New York. Common sense was a term applied recognition), little information is often sourced
to various aspects and his commentary Certain elements carefully sourced and at the point of attack. All have an immense
helped catch George Metesky - better known studied by a whole manner of specialists, impact on the public and the media - espe-
as the mad bomber. Since then, many ranging from psychologists to counter- cially those carried out in places that are well
experts in this field have added to the debate. terrorism experts still apply. For example. The known such as London or New York. Indeed,
A
cademics and research research presented in Bristol at standardised fear of terrorism
specialists recently the annual conference of the questionnaire. Butcher found that
analysed media British Psychological Societys the participants who had been
reporting that focused Division of Forensic Psychology* given the sensational report to
on the heroic efforts of by Ellie Butcher and Dr Ciaran read recorded a significantly
rescuers. A study showed that OKeeffe from Buckinghamshire higher score on the fear of
such copy can reduce public fear New University. terrorism than those who had read
in the aftermath of terrorist the fact-based or hero reports.
attacks. That is the conclusion of In her undergraduate research, She also found that those who
Ellie Butcher presented 70 had read the factual report had a tests showed there was no
participants with one of three slightly lower fear of terrorism significant difference between
news articles about the 2016 than those who had read the hero- these report styles.
Bastille Day attacks in Nice. The based report, although post-hoc
articles were:
OFFICIAL EYE SPY ORDER FORM 2017 UK, EUROPE AND REST OF WORLD
Ref Price Ref Price Eye Spy Magazine, P.O. Box 10,
Skipton, Leeds City Region, BD23 5US, England
Or Telephone: 01756 770199 (UK) standard rates
Total or $
UNITED STATES OF AMERICA
Name
Eye Spy Magazine, Empire State Building,
Address 350 Fifth Ave, 59th Floor, New York,
NY 10118-0069, United States of America
Or Telephone TOLL FREE 877 309 9243
Post/Zip Code Country
Method of payment [A] Cheque [ ] [B] Credit card [ ] CANADA
Eye Spy Intelligence Magazine,
Cheques payable only to: EYE SPY PUBLISHING LTD
Canadian Bureau, Unit 102,
hotel_islay_110/usukcanada
USA editorial address and head office: Eye Spy Magazine International,
Empire State Building, 350 Fifth Ave, 59th Floor, New York,
NY 10118-0069, United States of America
TOLL FREE: 877 309 9243 SUBSCRIPTION & ORDER LINE ONLY
Office hours: 7.00am - 4.00pm EST Monday to Friday
E-mail: support@eyespymag.com Web Site: www.eyespymag.com
senior editors, consultants and feature writers
Peter Matthews Kevin Coleman Peter Jenkins Mark Birdsall Lynn Hodgson Paul Beaumont Danny King
historical cyber surveillance managing canadian communications security
intelligence consultant consultant editor editor consultant consultant
Kerop Gourdikian Nick Fielding Mike Finn D. Anne Kohl Michael Smith Rusty Firmin John Nomikos Dr Chris
associate senior security associate associate security greece/balkans Northcott
editor consultant consultant editor editor consultant editor associate editor
Christopher
Eger
naval consultant
Spiros Kopitsos
associate
editor
Glenmore
Trenear-Harvey
associate editor
Roger Howard
associate
editor
Hala Al-Ayoubi
tradecraft
consultant
John-Hughes
Wilson
consultant
Perin Bhatt
security
consultant
INTELLIGENCE
EYE SPY INTELLIGENCE MAGAZINE AVAILABLE ON NEWSSTANDS IN 60 COUNTRIES
CRYPTOCURRENCIES
EYE SPY welcomes articles, photographs, case files, special reports, documents and
newsclippings on matters featured or associated with the type of material in this magazine. Text
can be submitted in most formats or hand written. If you require your submission returned,
please enclose a large self addressed and stamped envelope.
The opinions and views expressed by contributors do not necessarily reflect those of the
publisher (ESPL) or editor.