More stories

  • in

    Kremlin Confirms Assassin Vadim Krasikov Is an Agent for Russia’s FSB

    Vadim Krasikov, who was returned to Russia in the big prisoner swap, received a hero’s welcome from President Putin, along with others who were freed.The convicted assassin who was the linchpin of the biggest prisoner swap in decades is a member of the most powerful security agency in Russia, the Kremlin acknowledged on Friday, and had served in a special unit with some agents who now guard President Vladimir V. Putin.The ties help explain Mr. Putin’s determination to free the assassin, Vadim Krasikov, from the German prison where he was serving time for murder. The effort culminated on Thursday when Mr. Krasikov and seven other former prisoners returned to Moscow after an exchange with Western nations that involved 24 adults and seven countries.This was the first time that Moscow had admitted that Mr. Krasikov had been working for the Russian state in the Federal Security Service, or F.S.B., an agency that is a successor to the Soviet K.G.B., in which Mr. Putin served in the early stage of his career. The F.S.B. was also the agency that was at the center of the negotiations with the C.I.A. about the swap, Dmitri S. Peskov, the Kremlin spokesman, said.Mr. Putin has not hid his admiration for Mr. Krasikov, who had been jailed in Germany since 2019 for the murder of a Chechen former separatist fighter in Berlin. In an interview in February, Mr. Putin referred to Mr. Krasikov as “a patriot” who was doing his duty by eliminating an enemy of the Russian state.When the freed prisoners arrived at Vnukovo International Airport in Moscow at about 10:30 Thursday night, Mr. Putin hugged Mr. Krasikov, the first of the freed to disembark the plane.In a photo released by Russian state media, President Putin is shown at the airport welcoming Russians released in a big prisoner swap with the West.Pool photo by Mikhail Voskresenskiy/EPA, via ShutterstockWe are having trouble retrieving the article content.Please enable JavaScript in your browser settings.Thank you for your patience while we verify access. If you are in Reader mode please exit and log into your Times account, or subscribe for all of The Times.Thank you for your patience while we verify access.Already a subscriber? Log in.Want all of The Times? Subscribe. More

  • in

    South Korea Reports Leak From a Top Intelligence Agency

    It’s highly unusual for the nation’s authorities to publicly acknowledge a leak from the command​, which is one of South Korea’s top two spy agencies.South Korea was investigating a leak from its top military intelligence command​ that ​local news media said had caused a large amount of sensitive information, including personal data on the command’s agents abroad, to end up in North Korea, its military said Saturday.The military said in a brief statement that it planned to “deal sternly with” those responsible for the leak. But it declined to confirm the local media reports, pending its investigation of the Korea ​Defense Intelligence Command,​ where the leak took place.The command, a secretive arm of the South Korean military, specializes in gathering intelligence on North Korea, a heavily militarized country that often threatens ​its southern neighbor with nuclear weapons.It’s highly unusual for the South Korean authorities to publicly acknowledge a leak from the command​, which is one of South Korea’s top two spy agencies, along with the National Intelligence Service.The intelligence command runs a network of agents, including those disguised ​as South Korean diplomats or using other undercover identities, in China and other parts of Asia.The agents often spend years recruiting North Koreans overseas as their contacts. The information they collect augments the intelligence that the United States and its allies collect on North Korea through spy satellites or by intercepting electronic communications.If personal data about the agents ended up in North Korea, that could seriously damage South Korea’s ability to gather intelligence on the North.The last time a major breach of security was reported at the command was in 2018, when an active-duty military officer affiliated with the command was found to have sold classified information to foreign agents in China and Japan through a retired ​South Korean intelligence officer. The information he sold reportedly included data on the command’s agents in China or data on North Korean weaponry.North and South Korea run vigorous intelligence and counterintelligence operations against each other. South Korea still occasionally ​arrests people accused of spying for North Korea. In recent years, North Korea has also used an army of hackers to attack computer networks in the United States, South Korea and elsewhere to steal information or cryptocurrency.On Thursday, the United States, Britain and South Korea issued a joint advisory warning that North Korea​’s hackers have conducted a global cyber espionage campaign to steal classified military secrets to support​ its nuclear weapons program​.The U.S. Justice Department said ​on Thursday that a North Korean military intelligence operative had been indicted in​ a conspiracy to hack into American health care providers, NASA, U.S. military bases and international entities, stealing sensitive information and installing ransomware to fund more attacks​. A reward of up to $10 million has been offered for information that could lead to ​the arrest of the alleged North Korean operative, Rim Jong Hyok​. More

  • in

    After CrowdStrike Causes Outage, Are U.S. Networks Safe?

    With each cascade of digital disaster, new vulnerabilities emerge. The latest chaos wasn’t caused by an adversary, but it provided a road map of American vulnerabilities at a critical moment.In the worst-case scenarios that the Biden administration has quietly simulated over the past year or so, Russian hackers working on behalf of Vladimir V. Putin bring down hospital systems across the United States. In others, China’s military hackers trigger chaos, shutting down water systems and electric grids to distract Americans from an invasion of Taiwan.As it turned out, none of those grim situations caused Friday’s national digital meltdown. It was, by all appearances, purely human error — a few bad keystrokes that demonstrated the fragility of a vast set of interconnected networks in which one mistake can cause a cascade of unintended consequences. Since no one really understands what is connected to what, it is no surprise that such episodes keep happening, each incident just a few degrees different from the last.Among Washington’s cyberwarriors, the first reaction on Friday morning was relief that this wasn’t a nation-state attack. For two years now, the White House, the Pentagon and the nation’s cyberdefenders have been trying to come to terms with “Volt Typhoon,” a particularly elusive form of malware that China has put into American critical infrastructure. It is hard to find, even harder to evict from vital computer networks and designed to sow far greater fear and chaos than the country saw on Friday.Yet as the “blue screen of death” popped up from the operating rooms of Massachusetts General Hospital to the airline management systems that keep planes flying, America got another reminder of the halting progress of “cyber resilience.” It was a particularly bitter discovery then that a flawed update to a trusted tool in that effort — CrowdStrike’s software to find and neutralize cyberattacks — was the cause of the problem, not the savior.Only in recent years has the United States gotten serious about the problem. Government partnerships with private industry were put together to share lessons. The F.B.I. and the National Security Agency, along with the Cybersecurity and Infrastructure Security Agency at the Homeland Security Department, issue bulletins outlining vulnerabilities or blowing the whistle on hackers.President Biden even created a Cyber Safety Review Board that looks at major incidents. It is modeled on the National Transportation Safety Board, which reviews airplane and train accidents, among other disasters, and publishes “lessons learned.”We are having trouble retrieving the article content.Please enable JavaScript in your browser settings.Thank you for your patience while we verify access. If you are in Reader mode please exit and log into your Times account, or subscribe for all of The Times.Thank you for your patience while we verify access.Already a subscriber? Log in.Want all of The Times? Subscribe. More

  • in

    Evan Gershkovich’s Conviction in Russia Won’t Stop Journalists From Seeking the Truth

    The only surprise in the guilty verdict against Evan Gershkovich, a Wall Street Journal correspondent who was arrested in Russia last year on phony charges of espionage, was that it came so quickly. The charge itself was a farce. No evidence was ever made public, the hearings were held in secret, and Mr. Gershkovich’s lawyers were barred from saying anything in public about the case.Mr. Gershkovich’s arrest, trial and conviction all serve President Vladimir Putin’s goal of silencing any honest reporting from inside Russia about the invasion of Ukraine and of making Russians even warier of speaking with any foreigner about the war.Independent Russian news outlets have been almost entirely shut down and their journalists imprisoned or forced to leave the country, so foreign correspondents are among the few remaining sources of independent reporting from inside Russia. Mr. Gershkovich’s last published article before his arrest, on March 29, 2023, was headlined “Russia’s Economy Is Starting to Come Undone” — just the sort of vital independent journalism that challenges Mr. Putin’s claims of a strong and vibrant Russia fighting a just war.Russian prosecutors claimed that Mr. Gershkovich, acting on instructions from Washington, used “painstaking conspiratorial methods” to obtain “secret information” about Uralvagonzavod, a Russian weapons factory near Yekaterinburg, where he was arrested and tried.The existence of this massive industrial complex is well known, but the charge of espionage allowed Russian prosecutors to keep the entire proceeding secret while fueling Mr. Putin’s propaganda about efforts by the United States and Europe to destabilize Russia.Mr. Putin’s crackdown on free expression, especially about the war in Ukraine, is unrelenting. According to the Committee to Protect Journalists, Russia is the world’s fourth-worst jailer of journalists, with at least 22 in detention, including Mr. Gershkovich and Alsu Kurmasheva, a U.S.-Russian dual citizen and an editor with the U.S.-government-funded Radio Free Europe/Radio Liberty.We are having trouble retrieving the article content.Please enable JavaScript in your browser settings.Thank you for your patience while we verify access. If you are in Reader mode please exit and log into your Times account, or subscribe for all of The Times.Thank you for your patience while we verify access.Already a subscriber? Log in.Want all of The Times? Subscribe. More

  • in

    U.S. and Allies Target Russian Bots Working to Spread Propaganda

    Intelligence officials from three countries flagged a Russian influence campaign that used artificial intelligence to create nearly 1,000 fake accounts on the social media platform X.The Justice Department said on Tuesday that it had moved to disrupt a covert Russian influence operation that used artificial intelligence to spread propaganda in the United States, Europe and Israel with the goal of undermining support for Ukraine and stoking internal political divisions.Working with the governments of Canada and the Netherlands, as well as officials at Elon Musk’s social media platform, X, the department said it seized two internet domains in the United States and took down 968 inauthentic accounts that the Russian government created after its attack on Ukraine began in 2022.In affidavits released with the announcement, officials with the Justice Department, the F.B.I. and the Pentagon’s Cyber National Mission Force linked the effort to Russia’s Federal Security Service and RT, the state television network that has channels in English and several other languages.The disclosure of such a large, global network of bots confirmed widespread warnings that the popularization of rapidly developing A.I. tools would make it easier to produce and spread dubious content. With A.I., information campaigns can be created in a matter of minutes — the kind of work that in the months before the 2016 presidential election, for example, required an army of office workers.The Russian network used an A.I.-enhanced software package to create scores of fictitious user profiles on X. It did so by registering the users with email accounts on two internet domains, mlrtr.com and otanmail.com. (OTAN, perhaps coincidentally, is the French acronym for the NATO alliance). The software could then generate posts for the accounts — and even repost, like and comment on the posts of other bots in the network.Both domains were based in the United States but controlled by Russian administrators, who used the accounts to promote propaganda produced by the RT television network. In a statement, the F.B.I. director, Christopher A. Wray, called it “a generative AI-enhanced social media bot farm.”We are having trouble retrieving the article content.Please enable JavaScript in your browser settings.Thank you for your patience while we verify access. If you are in Reader mode please exit and log into your Times account, or subscribe for all of The Times.Thank you for your patience while we verify access.Already a subscriber? Log in.Want all of The Times? Subscribe. More

  • in

    Julian Assange Pleads Guilty to Espionage, Securing His Freedom

    The WikiLeaks founder, who entered the plea in a U.S. courtroom in Saipan in the Western Pacific, now plans to fly home to Australia.Julian Assange, the founder of WikiLeaks, pleaded guilty on Wednesday to a felony charge of violating the U.S. Espionage Act, securing his freedom under a plea deal that saw its final act play out in a remote U.S. courtroom in Saipan in the Western Pacific.He appeared in court wearing a black suit with his lawyer, Jennifer Robinson, and Kevin Rudd, the Australian ambassador to the United States. He stood briefly and offered his plea more than a decade after he obtained and published classified secret military and diplomatic documents in 2010, moving a twisted case involving several countries and U.S. presidents closer to its conclusion. It was all part of an agreement allowing him to return to his native country, Australia, after spending more than five years in British custody — most of it fighting extradition to the United States.His family and lawyers documented his journey from London to Bangkok and on to Saipan, capital of the Northern Mariana Islands, a U.S. commonwealth, posting photos and videos online from a chartered jet. His defense team said that in the negotiations over his plea deal, Mr. Assange had refused to appear in a court on the U.S. mainland, and that he had not been allowed to fly commercial.His wife, Stella, posted an urgent fund-raising appeal on the social media platform X, seeking help in covering the $520,000 cost of the flight, which she said would have to be repaid to the Australian government. She also wrote on X that watching a video of Mr. Assange entering the courtroom made her think of “how overloaded his senses must be, walking through the press scrum after years of sensory deprivation and the four walls of his high-security Belmarsh prison cell.”In court, Mr. Assange responded carefully to questions from U.S. District Judge Ramona Manglona, who was appointed by former President Barack Obama. He defended his actions, describing himself as a journalist seeking information from sources, a task he said he saw as legal and constitutionally protected. We are having trouble retrieving the article content.Please enable JavaScript in your browser settings.Thank you for your patience while we verify access. If you are in Reader mode please exit and log into your Times account, or subscribe for all of The Times.Thank you for your patience while we verify access.Already a subscriber? Log in.Want all of The Times? Subscribe. More

  • in

    The Other War: How Israel Scours Gaza for Clues About the Hostages

    The rescue of four Israelis in Gaza in a ferocious assault over the weekend offered a glimpse into an ambitious intelligence operation aimed at bringing home those held by Hamas.The hostages in Gaza are being moved around, with Hamas shuttling some from one apartment to another to obscure their whereabouts, while others are believed to be in tunnels underground.All the while, at a “fusion cell” quietly formed in Israel last fall, American and Israeli intelligence and military analysts share imagery from drones and satellites, along with communications intercepts and any other information that comes their way that might offer a hint to the hostages’ locations.More than one war is being waged in the Gaza Strip.For the most part, the world sees the airstrikes and the ground invasion, which Israel says are aimed at dismantling Hamas and have reduced much of the territory to rubble, setting off a humanitarian crisis. But the rescue on Saturday of four hostages was a reminder that Israel and Hamas are engaged in another, less visible battle:The militants are determined to hold on to the hostages they seized during their deadly Oct. 7 attack on Israel, for use as human bargaining chips. The Israelis are determined to bring them home.For more than eight months, the militants have had the upper hand.Israeli and American officials say they do not know where many hostages are being held. And even when they do, in many cases, a rescue mission is simply not possible.To date, Israel has rescued a total of seven hostages, but the stark reality is that since the war began, more hostages have died, either in the fighting or at the hands of Hamas. Israel has recovered far more bodies than living hostages.We are having trouble retrieving the article content.Please enable JavaScript in your browser settings.Thank you for your patience while we verify access. If you are in Reader mode please exit and log into your Times account, or subscribe for all of The Times.Thank you for your patience while we verify access.Already a subscriber? Log in.Want all of The Times? Subscribe. More

  • in

    China Claims Britain’s MI6 Recruited Chinese Couple as Spies

    The accusation from China came a few weeks after Britain charged three men with assisting Hong Kong’s intelligence service.China’s top security ministry accused Britain’s MI6 intelligence agency on Monday of persuading a married couple working for unnamed central Chinese government bodies to become spies for the British government, the latest in a volley of continuing espionage accusations between the two countries.In a post on its official WeChat account, China’s Ministry of State Security said MI6 British intelligence officials had lured a man with the surname Wang, who worked for a Chinese government agency with part-time consulting work that paid him a high salary during his visit to Britain as part of an exchange program.The Chinese ministry said MI6 trained Mr. Wang to become a spy and ordered him to return to China to gather intelligence. It said that his wife, who has the surname Zhou, also agreed to spy for Britain. China said the matter was under further investigation, but it is not clear whether the couple are being detained by the Chinese authorities.This is the latest in a series of back-and-forth espionage accusations between Beijing and London, a source of escalating tension between the two countries.Last month, three men in Britain were charged with gathering intelligence for Hong Kong, a former British colony now under Chinese rule, to pursue pro-democracy activists living in Britain.China has condemned these latest accusations. It said that Britain had leveled a series of “groundless and slanderous” accusations of spying and cyberattacks against Beijing.We are having trouble retrieving the article content.Please enable JavaScript in your browser settings.Thank you for your patience while we verify access. If you are in Reader mode please exit and log into your Times account, or subscribe for all of The Times.Thank you for your patience while we verify access.Already a subscriber? Log in.Want all of The Times? Subscribe. More