An affordable price is probably the major benefit persuading people to buy drugs at www.americanbestpills.com. The cost of medications in Canadian drugstores is considerably lower than anywhere else simply because the medications here are oriented on international customers. In many cases, you will be able to cut your costs to a great extent and probably even save up a big fortune on your prescription drugs. What's more, pharmacies of Canada offer free-of-charge shipping, which is a convenient addition to all other benefits on offer. Cheap price is especially appealing to those users who are tight on a budget
Service Quality and Reputation Although some believe that buying online is buying a pig in the poke, it is not. Canadian online pharmacies are excellent sources of information and are open for discussions. There one can read tons of users' feedback, where they share their experience of using a particular pharmacy, say what they like or do not like about the drugs and/or service. Reputable online pharmacy canadianrxon.com take this feedback into consideration and rely on it as a kind of expert advice, which helps them constantly improve they service and ensure that their clients buy safe and effective drugs. Last, but not least is their striving to attract professional doctors. As a result, users can directly contact a qualified doctor and ask whatever questions they have about a particular drug. Most likely, a doctor will ask several questions about the condition, for which the drug is going to be used. Based on this information, he or she will advise to use or not to use this medication.

Obama Cool with Giving up Internet Control, But Wait…

Duffy And Cruz Introduce the Protecting Internet Freedom Act

Jun 8, 2016
Press Release
Bill prohibits Obama administration from unilaterally giving away the Internet

WASHINGTON, D.C. – Congressman Sean Duffy (R-WI) Senator Ted Cruz (R-Texas) today introduced the Protecting Internet Freedom Act, which would prevent the Obama administration from giving the Internet away to a global organization that will allow over 160 foreign governments to have increased influence over the management and operation of the Internet.

The bill would ensure the continued protection of Internet freedom by prohibiting the National Telecommunications and Information Administration (NTIA) from allowing the Internet Assigned Numbers Authority (IANA) functions contract to expire, unless specifically authorized by Congress. The Protecting Internet Freedom Act would also ensure that the United States maintains sole ownership of the .gov and .mil top-level domains, which are vital to national security.

Obama administration backs plan to relinquish Internet control

FNC: The Obama administration is getting behind a plan that would have the U.S. government relinquish its last bit of control over the Internet – a move Republican lawmakers are fighting tooth-and-nail.

The transfer was set in motion two years ago when a Commerce Department agency said it would cede oversight over an obscure, but powerful, Los Angeles-based nonprofit called the Internet Corporation for Assigned Names and Numbers (ICANN).

The agency, the National Telecommunications and Information Administration, announced Thursday that the game plan they got back from ICANN – which would hand over the reins to a “multi-stakeholder” group, and not a single government – is now in line with what they want.

“The Internet’s multistakeholder community has risen to the challenge we gave them to develop a transition proposal that would ensure the Internet’s domain name system will continue to operate as seamlessly as it currently does,” NTIA Administrator Lawrence Strickling said in a statement. AFP first reported on the decision.

ICANN manages some of the most important elements of the Internet, including the domain name system and IP addressing. Domains include those tiny suffixes at the end of Internet addresses, like .com and .org; Internet Protocol addresses are the numerical sequences assigned to devices in a network.

Foreign governments had complained about the U.S. oversight, maintained through contracts with ICANN.

Yet the Obama administration has faced stiff resistance to a hand-off for months from vocal critics on Capitol Hill and in the tech community. One concern is that, in the void left by America’s transfer of oversight, other nations that don’t share the United States’ commitment to free speech and expression could make a grab at Internet influence.

On Wednesday, Republican Texas Sen. Cruz and Republican Wisconsin Rep. Sean Duffy introduced legislation to prevent the transfer of functions related to the Internet Domain Name System unless specifically authorized by Congress.

The Protecting Internet Freedom Act also aims to ensure that the U.S. maintains sole ownership of the .gov and .mil top-level domains.

“The Obama administration is months away from deciding whether the United States Government will continue to provide oversight over core functions of the Internet and protect it from authoritarian regimes that view the Internet as a way to increase their influence and suppress freedom of speech,” Cruz said in a statement. “This issue threatens not only our personal liberties, but also our national security. We must act affirmatively to protect the Internet and the amazing engine for economic growth and opportunity the Internet has become, and I urge my colleagues to support this legislation.”

In a press release, the lawmakers suggested the plan would “allow over 160 foreign governments to have increased influence over the management and operation of the Internet.”

Groups supporting the Protecting Internet Freedom Act include Americans for Limited Government, National Religious Broadcasters and Frontiers of Freedom.

Strickling reportedly is not calling his agency’s endorsement of the plan a formal “approval” yet – but if Washington stamps the plan, AFP reported, the U.S. government contract with ICANN would expire at the end of September. The plan reportedly is meant to prevent any single government from taking control and is not predicted to cause major changes for ordinary Internet users.

The push to transfer oversight dates back years.

In a July 2012 speech at an Internet governance forum, Strickling discussed giving the “global Internet community” more of a “direct say” in the process, and he said the Obama administration was making a “concerted effort” to expand international participation.

The latest push to transition oversight began with a 2009 agreement between NTIA and ICANN. The Commerce agency, though, has noted that the goal of completely privatizing the domain name system dates back to 1997, and that the U.S. government reiterated that goal when it partnered with ICANN a year later.

Two years ago, Strickling responded to criticism of the plan by asserting the transfer plan “in no way diminishes our commitment to preserving the Internet as an engine for economic growth and innovation.”

 

DHS Wont Tell us but UK’s GCHQ Does

Terrorist groups acquiring the cyber capability to bring major cities to a standstill, warns GCHQ chief

 

Terrorists and rogue states are gaining the capability to bring a major city to a standstill with the click of a button, the Director of GCHQ has warned.

GCHQ Director Robert HanniganHostile groups are acquiring the capability to launch devastating attacks, warns Hannigan Credit: TELEGRAPH

Telegraph: In a rare public appearance, Robert Hannigan said the risk to cities like London would increase as more physical objects, such as cars and household appliances, are connected online – the so-called “internet of things”.

developing the kind of cyber programmes that could attack the UK, but that terrorist groups were also looking to take advantage of the technology.

“At some stage they will get the capability,” he said.

“There are certainly states and groups with the intent to do it, terrorist groups, for example, who have no threshold when it comes to the loss of life.

“We’re not quite there yet, but as the world becomes ever more connected that will become a greater risk.”

Speaking as the controversial Investigatory Powers Bill passed its third reading in the House of Commons, Mr Hannigan also defended the surveillance of internet activity by the intelligence services, saying seven attacks against the UK had been foiled in the last 18 months due to bulk data analysis.

******
Simple Explanation of Internet of Things

Islamic State issues anti-hacking guidelines after Anonymous threats

The extremist terrorist group Isil sent out a warning to members on how to protect from hackers like Anonymous

The warning was put out via Telegram, an encrypted instant messaging app, on the Khilafah news channel, which is thought to be an unofficial pro-ISIS news source.

This was discovered by researchers at the International Centre for the Study of Radicalisation, a London think tank which studies extremism and terrorism.

Nick Kaderbhai, a research fellow from the think tank told the Huffington Post UK, “Anyone can subscribe to it (technically) however the more IS channels you subscribe to the more open you are to investigation.”

The message was titled #Warning, and said “The #Anonymous hackers have threatened in new video release that they will carry out a major hack operation operation on the Islamic state (idiots).”

ISIS sent out a message on encrypted chat app Telegram with instructions to avoid being hacked  Photo: Huffington Post UK

Instructions included warnings to use VPN, a tool ot make the user’s location online, and to change IP address constantly. It also told members to avoid using direct messages on Twitter, because is is open to hackers.

“Do not make your email same as your username on Twitter this mistake cost many their accounts…so be careful,” it read.

The hacker collective, which consists of unrelated volunteers, coders and activists from around the world, launched its anti-Islamic State online campaign, called #OpISIS, after the Charlie Hebdo massacre in Paris last January.

Making good on its threats, Anonymous posted a list of roughly 800 Facebook, Twitter and email accounts believed to be related to ISIL on Monday.

To date, according to an in-depth investigation by Foreign Policy, they have taken down 149 Islamic State-related websites and exposed 101,000 Twitter accounts and 5900 propaganda videos.

White House: No Cyber Danger, Really?

White House Fails to Detect a Single Cyber Threat

After ordering ‘national emergency,’ Obama admin finds no cyber danger

FreeBeacon: The White House has been unable to detect a single cyber security threat more than six months after issuing a “national emergency” to deal with what the administration identified as growing and immediate danger, according to a new government report.

Six months after President Barack Obama invoked emergency powers to block the assets of any person caught engaging in “malicious cyber-enabled activities,” the administration has not identified a single qualifying target, according to the Treasury Department, which disclosed in a report that “no entities or individuals have been designated.”

Related: Iranians Hacked From Wall Street to New York Dam, U.S. Says 

The April 2015 directive issued by the White House identified an “increasing prevalence and severity of malicious cyber-enabled activities” among individuals living outside the United States.

Related: Map of Government Hack Activists

These activities were said to constitute “an unusual and extraordinary threat to the national security, foreign policy, and economy of the United States,” prompting Obama to declare “a national emergency to deal with this threat.”

A half a year later, the White House still has not invoked this power to combat growing cyber threats, despite a rise in such activity among rogue nations such as Iran, North Korea, and China.

Related: White House Cyber Security Initiative

“The Department of the Treasury took no punitive licensing actions, and it assessed no monetary penalties,” according to the department’s first periodic review of the president’s emergency order.

The White House has not explained why it has not yet invoked its powers, even following reports that Russian hackers penetrated the State Department and “sensitive parts” of the White House’s computer networks last year.

Related: Cyber attacks against our critical infrastructure are likely to increase

The Pentagon and other branches of the U.S. government also have been the targets of these types of attacks, which officials have traced back to the Russians, North Koreans, and others.

Military organizations tied to the Iranian government also have been identified as hacking into the email and social media accounts of White House officials.

The emergency powers invoked by Obama could be used to sanction individuals tied to these attacks if the administration agrees that such a determination should be made.

Those responsible for the cyber attacks already reported by the media and currently being investigated by federal authorities could quality for designation under these emergency powers.

The cyber threat posed by other nations and foreign criminals continues to grow, according to the White House, which moved to take further action on this front in February.

“Criminals, terrorists, and countries who wish to do us harm have all realized that attacking us online is often easier than attacking us in person,” the White House disclosed in announcing the creation of national plan of action to combat cyber terrorists. “As more and more sensitive data is stored online, the consequences of those attacks grow more significant each year.”

A month after Obama invoked the emergency powers, Congress launched a probe into data breaches at the White House. Some lawmakers suspected that the White House had attempted to downplay the extent of these attacks by Russians and others.

How the Military is Defeating Hackers

Here’s how the US military is beating hackers at their own game

US Soldiers IraqStaff Sgt. Stacy L. Pearsall/USAF

TechInsiders: There’s an unseen world war that has been fought for years with no clear battle lines, few rules of engagement, and no end in sight.

But it’s not a shooting war; not a war where combatants have been killed or wounded — at least not yet.

It’s a war that pits nations against each other for dominance in cyberspace, and the United States, like other nations employing professional hackers as “cyber soldiers,” sees it as a battlefield just like any other.

“It’s like an operational domain: Sea, land, air, space, and cyber,” Charlie Stadtlander, chief spokesperson for US Army Cyber Command, told Tech Insider. “It’s a place where our presence exists. Cyber is a normal part of military operations and needs to be considered as such.”

As US military leaders warn of the growing progress of Russia, China, and North Korea in cyberspace, the Pentagon has ramped up its own efforts in what it calls the “cyber domain” after the release of a new cyber strategy in April 2015.

“This ephemeral space that’s all around us, literally, is a space where operations can be performed against us,” Frank Pound, a program manager who leads DARPA’s “Plan X” cyber warfare platform, told Tech Insider. “And how do we defend against that? How do we detect that?”

Building a cyber army

In its cyber strategy, the military proposed 133 teams for its “cyber mission force” by 2018, 27 of which were directed to support combat missions by “generating integrated cyberspace effects in support of … operations.” (Effects is a common military term used for artillery and aircraft targeting, and soldiers proclaim “good effect on target” to communicate a direct hit).

The cyber mission force will comprise some 4,300 personnel. But only about 1,600 of those would be on a “combat mission team” that would likely be considered to be taking an offensive hacking role. They are up against China’s own “specialized military network warfare forces,” North Korea’s secretive Bureau 121 hacker unit, other nation-states, hacktivists like Anonymous, and criminal enterprises alike.

They have been further tasked with breaking into the networks of adversaries like ISIS, disrupting communications channels, stopping improvised explosive devices from being triggered through cellphones, or even, as one Marine general put it, just “trying to get inside the enemy’s [head].”

Online hacks can lead to offline outcomes, and the military has become keenly aware of that power. In 2009, the US and Israel reportedly infected Iranian computers with the Stuxnet malware that destroyed roughly one-fifth of the country’s nuclear centrifuges. And as recently as February, hackers were used against ISIS as others fought on the ground, quite possibly for the first time ever.

“These are strikes that are conducted in the war zone using cyber essentially as a weapon of war,” Defense Secretary Ash Carter told NPR. “Just like we drop bombs, we’re dropping cyber bombs.”

As one Army officer said during a 2015 training exercise, the cyber war seems to just be getting started: “Future fights aren’t going to be guns and bullets. They’re going to be ones and zeroes.”

soldiers cyber commandBrian Rodan/US ArmySoldiers work together during a training exercise in 2011.

‘Prepping the battlefield’

That the Pentagon would employ specialists to defend itself in cyberspace is not surprising, since government and military systems are attacked regularly by nations trying to read soldier’s email, or others who want to uncover personal details on millions who undergo background checks for security clearances.

But the defense of networks — while still an important function — has been supplanted in some cases by an offensive strategy. That is, soldiers hacking into computers overseas for intelligence or to disrupt the enemy on the battlefield — a kind of digital tit-for-tat.

“If there’s something that you can do to prep the battlefield before a kinetic attack or to disrupt defenses during kinetic attacks, why wouldn’t a combatant commander turn to that?” Stadtlander said.

Stadtlander couldn’t talk about ongoing operations that Army Cyber Command is involved in, mainly due to the unique nature of cyber warfare. An enemy who knows the US is developing a next-generation fighter jet might develop something in response that could take years, but with a cyberattack, a fix can be developed sometimes within days.

“The unique thing about cyber activity and defense is you’re talking about building a couple thousand lines of code or having a certain electronic device, or some sort of cyber capability. And just based on the nature of this space, a lot of times it can only be used once,” he said. “Once it’s known … it’s no longer a viable tool.”

Still, some insight into what the US military is capable of can be found within its own training manuals, presentations, and the few news stories by the military’s own writers. And it’s likely that hackers with Army Cyber Command, subordinate to US Cyber Command and NSA, benefit from top secret initiatives to infect “millions” of computers with malware in an effort aimed at “owning the net.”

“Denying the ability to coordinate, communicate, and assess,” Stadtlander said. “That’s an advantage that we might be able to leverage.”

Inside the Army’s cyber warfare ‘Bible’

Perhaps one of the most important publications on cyber warfare was released with little fanfare in Feb. 2014. Known as Army Field Manual 3-38 Cyber Electromagnetic Activities, it proclaimed itself as the “first doctrinal field manual of its kind,” unifying a number of other publications on network operations, electronic warfare, and intelligence into one 96-page document.

In FM 3-38, the Army defined offensive cyberspace operations as actions “intended to project power by the application of force in or through cyberspace,” while noting they are to be carried out in support of command objectives and within legal frameworks.

But what can soldiers do in cyberspace that can affect what happens on the battlefield? Quite a bit, according to the manual.

us army cyber soldierUS Army

“A cyberspace attack may be employed in conjunction with” other methods of attack “to deceive, degrade, destroy, and disrupt a specific enemy integrated air defense system or enemy safe haven,” it says.

As an example, the manual offers an early warning radar site as a target which, if soldiers can get inside the network, could possibly be destroyed or degraded.

That’s just what students trained for during an exercise in March, according to the Fort Gordon Globe. Acting just as they would on the battlefield, cyber soldiers patrolled to their objective — a simulated enemy air defense control system — then searched for their target’s wireless network so it could be exploited or neutralized.

There’s little need for stealth coating on aircraft when a guy behind a computer can disable the radar site for you. The manual also offers other systems Army hackers may consider breaking into, such as enemy telephone networks, servers, and smartphones.

“Even if you think about the way that IEDs are triggered,” Stadtlander said, using the acronym for improvised explosive devices. “Or an adversary’s [intelligence, surveillance, and reconnaissance], a lot of these are done through electronics and with internet connections.”

Getting into the Army’s ‘hacker university’

Located just southwest of Augusta, Georgia is Fort Gordon, an Army installation that brings together most of the service’s cyber warriors under one roof. In 2013, the Army chose the site as the home base of its Cyber Command after the unit was established in 2010.

Also home to a 604,000 square foot operations center for the National Security Agency, Gordon is where cyber warriors are taught their craft at what the Army calls its Cyber Center of Excellence. But before they get to the military’s “hacker university,” enlisted soldiers need to score high technical scores on the military entrance exam, and sign on for five years of service, instead of the normal four-year tour.

army cyber commandUS ArmyInsider Fort Gordon’s Cyber Operations Center.

Due to the classified nature of their work, cyber training is often conducted in secure compartmented information facilities (SCIFs) where cell phones and other outside recording devices are not allowed, and all soldiers will have to obtain a Top Secret clearance prior to being assigned to their unit.

Soldiers go through a lengthy period of training after basic training: Six months spent at the Navy’s Center for Information Dominance in Pensacola, Florida followed by six months at Fort Gordon.

Army officers go through their own training program at the Georgia base, called Cyber Basic Officer Leader Course. The course takes nearly nine months to complete and is the longest officer training program in the Army.

Enlisted soldiers train with members of all military branches over six months at the Navy’s Cyber Analysis Course, according to Bloomberg. Since students can come from a variety of skill sets and backgrounds, the first two-thirds of classroom time focuses on basic programming, mathematics, and how networks and operating systems function. But later on they learn the steps to research and infiltrate targets, defend networks, and even hack a simulated network with Metasploit, a common tool hackers have used since its release in 2004.

Meanwhile, officers receive similar training, though their position merits other coursework in leading operations as opposed to carrying them out. Though a cyber officer can likely step in and be more than capable, given the certifications they obtain, to include Cisco’s Certified Network Associate (CCNA) and the independent Certified Information Systems Security Professional (CISSP) credential.

“They are really valuably trained after that [schooling],” Stadtlander said.

So valuable in fact that the Army is seeing a challenge in retaining its talent from heavyweights in Silicon Valley.

Is hacking considered an ‘act of war’?

Chinese Army Hackersvia Flickr

“There is no international standing or framework that is binding over any one nation-state in terms of offensive cyber operations,” Bradley P. Moss, a national security lawyer, told Tech Insider. “It’s whatever rules we put in place for ourselves.”

In essence, the US, China, Russia, and others are operating in a sort-of “digital Wild West” with few overarching guidelines outside of the Law of War that predates our interconnected world.

Cyber warfare continues unabated because there is no governing body such as the United Nations telling nations not to hack one another. Not that that would necessarily make a difference, as a 2014 UN report criticized mass surveillance programs employed by NSA and others as violating privacy rights “guaranteed by multiple treaties and conventions,” The Intercept reported.

Still, Moss explained that nations are less concerned with the legalities of hacking each other, and instead, worry about the potential diplomatic and political fallout should they be exposed.

“More or less, we all engage in some manner of warfare these days, we just don’t go to ‘war’ over it,” Moss said.

How foreign nations would likely respond to being hacked by the US is something that is considered before any offensive operation, according to a top secret presidential policy directive leaked by ex-NSA contractor Edward Snowden.

The document, made public in 2013, listed cyber attacks resulting in “loss of life, significant responsive actions against the United States, significant damage to property, serious adverse US foreign policy consequences, or serious economic impact” as requiring presidential approval.

And for US military hackers who may be on a battlefield in Iraq, Syria, or elsewhere, their self-imposed rules for cyber attacks are clear:

“Military attacks will be directed only at military targets,” reads the Pentagon’s cyberspace operations document.

us army cyber commandUS Army

But what of cyber attacks that have potentially devastating effects on foreign nations, such as US-made worms that cause nuclear centrifuges to fall apart, or alleged Russian-made malware that knocks out power and heat to people in the dead of winter?

Are these “acts of war”?

“From a strictly legal matter, you could designate the US Army hacking the Russian Army’s [computer] system as an act of war,” Moss said. “Just as much as if we were to have infiltrated and damaged a Russian bomber, that would be an act of war.”

But, he added: “There’s nothing that necessarily stops us, except the political and diplomatic ramifications.”

Russian Spies and Espionage in NATO and USA

It was not long ago while interviewing a former CIA operative that he responded to my question, ‘do we have a handle on the Russian spies in the United States?’ His answer is no, and they are all over the country and the same goes with China.

2015: Three alleged Russian spies exposed by the FBI are part of the most intense effort by Russia to infiltrate agents onto American soil since the Cold War.

In an affidavit unsealed in federal court on Monday, the Justice Department accused  , also known as “Zhenya,” of posing as a Russian banker in Manhattan to funnel economic intelligence to the SVR, Russia’s foreign intelligence agency.
     
 
Two other Russians, Igor Sporyshev and Victor Podobnyy, were ostensibly diplomats in Russia’s UN mission in New York but are accused of being Buryakov’s SVR handlers. While Buryakov was operating deep undercover and therefore had no diplomatic protection, the other two have immunity and have already left the the United States.
Anecdotes in the affidavit portray the accused spies as bumbling and hapless compared to the stereotype of hard-eyed Soviet-era KGB professionals. Still, news of their existences comes at the most perilous moment in U.S.-Russia relations in decades, with Barack Obama and Vladimir Putin at a standoff over issues ranging from Ukraine to Moscow’s claims it has a right to a “sphere of influence” in its backyard. More from CNN here.
**** Now NATO:

NATO’s Big New Russian Spy Scandal

A Russian mole has been uncovered inside NATO intelligence. What does this mean for Western security?

Frederico Carvalhão Gil, a senior intelligence official was arrested this weekend in Rome.

Frederico Carvalhão Gil was arrested this weekend in Rome. (Photo: Facebook/Frederico.CarvalhaoGil

Observer: Last weekend, in the latest development in the secret espionage struggle between Vladimir Putin’s Kremlin and the West, a major Russian spy was arrested in Italy. On Saturday, Frederico Carvalhão Gil, a senior intelligence official from Portugal, was picked up by Italian police along with his Russian intelligence handler, whom he was meeting clandestinely in Rome.

Although Portugal is hardly a big player in the global spy game, it has been a member of the Atlantic Alliance since its founding in 1949, and Lisbon’s intelligence services are full members of the West’s secret spy network. Finding a mole like Mr. Carvalhão in any NATO security service is a serious matter for the whole alliance.

A career intelligence officer, the 57-year-old Mr. Carvalhão, who went into the espionage business in the late 1980s, had risen to the senior ranks of Portugal’s domestic spy agency, the Security Intelligence Service—SIS for short. He is a division chief in that service, according to Portuguese press reports, what SIS terms an area director. Mr. Carvalhão’s previous assignments have included operational work in counterintelligence and counterterrorism. A philosophy graduate, the suspected traitor is described as highly intelligent—an intellectual. It’s evident Mr. Carvalhão had access to a wide array of NATO secrets thanks to his official position.

Portuguese intelligence suspected it had a mole for some time, and a secret hunt for the turncoat commenced in 2014. With help from spy partners, including the CIA, Lisbon developed a list of suspects. Mr. Carvalhão was high on that list, not least because of his open affection for all things Eastern European, which he made plain on his Facebook page.

He also likes Eastern European women. “Zipper problems” as they are known in the spy trade have been the downfall of many turncoats, and reports of a Georgian woman Mr. Carvalhão was romantically involved with offer hints of a possible honey-trap. That deserves investigation, since such operations are textbook for the Russian intelligence services. One reason he wound up on NATO counterintelligence radar was multiple reports of indiscreet liaisons with women from the former Soviet Union.

Greed seems to have also played a role. Mr. Carvalhão was allegedly charging the Kremlin’s Foreign Intelligence Service, the SVR, 10,000 Euros ($11,100) for each classified document he was selling them—a princely sum by spy standards. We know that the SVR’s main interest in the information it sought from its Portuguese mole were secrets about NATO and the European Union. If the Russians were willing to pay that much per purloined document, it’s evident to any veteran counterintelligence hand that the classified information he was giving the SVR was important. The Kremlin won’t pay that much for junk.

Mr. Carvalhão had been through a divorce, which may have been a motivation as well—both financially and psychologically. Reeling from a divorce that left him financially strapped, the notorious CIA turncoat Aldrich Ames reached out to the KGB, the SVR’s predecessor, in 1985, offering them top secret information in exchange for $50,000. Thus began Mr. Ames’ nine years of betrayal that lasted until his 1994 arrest—a huge success for the Kremlin that cost the lives of several Soviets who were spying for the CIA.

Once SIS realized Mr. Carvalhão may have gone rogue, he was moved to a less sensitive position at work, where he had access to fewer secrets and was placed under surveillance. By last autumn, he was being watched and his phones were tapped as his employer looked for evidence of his betrayal. They soon discovered that Mr. Carvalhão made regular trips across Europe, which SIS assessed were actually clandestine meetings with the SVR to pass secrets to the Russians outside Portugal. That was less risky than meeting Russians on his home turf, as the career spy knew from his own service with Portuguese counterintelligence.

This culminated in the top secret operation in Rome last weekend which led to Mr. Carvalhão’s arrest. In coordination with Italian partners, SIS watched his movements as he took a flight to Rome last Friday, in preparation for the next day’s planned meeting with the Russians. That clandestine rendezvous was spoiled for Mr. Carvalhão when Italian police appeared at the Roman café, downtown on the Tiber, to bring him into custody on espionage charges proffered by Lisbon. He did not resist arrest.

Neither did the Russian he was meeting. In an interesting twist, his SVR handler was not in Rome under official cover, posing as a diplomat or trade representative—the default setting in espionage circles. Rather, his SVR handler was what the Russian term an Illegal, meaning he was operating without any official protection. He therefore was subject to arrest, whereas a Russian spy pretending to work at their embassy could claim diplomatic immunity to avoid police detention.

The identity of the SVR officer in custody has not been released by Italian authorities, but Illegals are an elite cadre in Russian intelligence circles, much less frequently encountered than their counterparts posing as diplomats. They are also much tougher to detect, since they aren’t working at any embassy or consulate, and last year’s FBI arrest of an SVR Illegal in New York City—where he was spying on Wall Street—was a coup for American counterintelligence.

Rome and Lisbon may have unraveled an important spy ring here. Illegals are used to handle high-value agents, for instance moles inside Western spy services like Mr. Carvalhão for whom meetings with SVR officers under official cover—who are often known to the local security service, which watches their movements closely—would pose a serious risk of exposure.

Just what this Portuguese mole gave the Russians is not yet known. Assessing that, and therefore the damage he caused to Western security, is the major task facing investigators in Lisbon and other NATO capitals right now. The Atlantic Alliances have been penetrated by the SVR many times—the most recent big case was Herman Simm, a senior Estonian security official who was arrested in 2008 after spying for the Kremlin for years, during which he had access to countless NATO secrets.

 

The disastrous case of Edward Snowden, the National Security agency IT contractor who defected to Moscow nearly three years ago, was an unprecedented blow to American intelligence and the entire Western spy partnership. In response, NATO has belatedly begun to get serious about the threat posed by Russian espionage. There was a major increase in Kremlin spying against the West beginning a decade ago, reaching and in some cases even surpassing Cold War levels of intensity. Last year, NATO forced the Russians to cut back their official delegation to alliance headquarters in Brussels, since so many of them were actually spies, brazenly stealing NATO secrets.

The SVR is every bit as audacious at stealing our secrets as the KGB ever was. The SpyWar between East and West never ended, and under Vladimir Putin—that onetime KGB officer who values espionage highly—it forms a core component of Kremlin foreign and security policy. The case of Frederico Carvalhão demonstrates that Moscow is still stealing our secrets at every opportunity. The West ignores counterintelligence, particularly against an increasingly aggressive Russia, at its peril.

 

John Schindler is a security expert and former National Security Agency analyst and counterintelligence officer.