List of Participants for Fusion GPS and Smear Mission

Senator Grassley is on the case. He listed names asking for all communications from the following people: For the period from March 2016 through January 2017, please provide all communications to, from, copying, or relating to: Fusion GPS; Bean LLC; Glenn Simpson; Mary Jacoby; Peter Fritsch; Tom Catan; Jason Felch; Neil King; David Michaels; Taylor Sears; Patrick Corcoran; Laura Sego; Jay Bagwell; Erica Castro; Nellie Ohr; Rinat Akhmetshin; Ed Lieberman; Edward Baumgartner; Orbis Business Intelligence Limited; Orbis Business International Limited.; Walsingham Training Limited; Walsingham Partners Limited; Christopher Steele; Christopher Burrows; Sir Andrew Wood, Paul Hauser;4 Oleg Deripaska; Cody Shearer; Sidney Blumenthal; Jon Winer; Kathleen Kavalec; Victoria Nuland; Daniel Jones; Bruce Ohr; Peter Strzok; Andrew McCabe; James Baker; Sally Yates; Loretta Lynch; John Brennan. Details here.

Image result for fusion gps hillary What happened? Hey Hillary how about you tell America who coordinated all these people and who was the architect and save a LOT of misery and resources….

*** The political wheels go round and round and given the anti-Trump envoy that has been mobilized, this operation and army of people will continue through the 2020 general election. AG Jeff Sessions and his Justice Department along with his Inspector Generals and Congressional committees are not likely to complete all these investigations any time soon….so remember these names as we head into the mid-term election and to the general election. And we have not even gotten to the whole FBI equation….

1. Shall we start with Kamala Harris? The sister of Sen. Kamala Harris, the California Democrat who has been floated as a potential presidential candidate in 2020, and the political director for the American Civil Liberties Union (ACLU) are also involved with the group.

The Democracy Forward Foundation, a D.C.-based 501(c)3 nonprofit with a 501(c)4 arm called Democracy Forward, describes itself as a “nonpartisan” group that “scrutinizes Executive Branch activity,” according to its mission statement. Anne Harkavy, the group’s executive director, was a senior legal advisor to the general counsel of Obama for America, Obama’s former campaign committee. Corey Ciorciari, its policy and strategy director who oversees Democracy Forward’s policy, research, and communications teams, was a policy advisor for Clinton during her 2016 campaign.

Javier Guzman, the legal director, came from the Department of Justice. Alex Hornbrook, Democracy Forward’s operations director, served as director of scheduling and advance for Hillary for America, Clinton’s campaign committee.

Democracy Forward’s board of directors also features a number of liberal power players.

Elias chairs the board that includes Podesta. Maya Harris, Sen. Kamala Harris’s sister who helped craft Clinton’s agenda for the failed campaign and is a political analyst for MSNBC, is also a member of its board.

Faiz Shakir, who became the national political director of the ACLU in January; Ronald Klain, a Democratic operative who was President Obama’s “Ebola Czar”; Matthew Miller, an MSNBC justice and security analyst; and Scott Nathan, a senior fellow at the Center for American Progress, which was founded by Podesta, also sit on the board of directors. More here.

2. Congressional documents and recently leaked texts between Sen. Mark Warner (D-Va.) and a registered foreign agent for a Russian aluminum oligarch indicate that Daniel J. Jones is intimately involved with ongoing efforts to retroactively validate a series of salacious and unverified memos produced by Christopher Steele, a former British intelligence agent, and Fusion GPS. Jones, a former Feinstein staffer who wrote a controversial top-secret report on alleged torture by the Central Intelligence Agency (CIA), currently runs the Penn Quarter Group, which bills itself as a “research and investigative advisory” and is inconspicuously named after the downtown Washington DC neighborhood where its office is located.

3. How about Shailagh Murray, a former journalist who served as senior adviser to Obama and as former Vice President Joe Biden’s deputy chief of staff? Murray’s husband is Neil King, a former Wall Street Journal reporter who worked at the newspaper at the same time as Fusion GPS’s three co-founders, Glenn Simpson, Peter Fritsch, and Tom Catan. Murray also worked at The Journal until 2005. She joined the Obama administration in 2011. Devin Nunes also sent a letter and questionnaire to Colin Kahl, who served as national security adviser to Biden.

4. Okay, what about CNN ad Evan Perez? Perez covers the Justice Department for CNN. Glenn Simpson, the Fusion co-founder most often associated with the dossier, is used to working on stories with Perez. As reporters at The Wall Street Journal, Perez and Simpson regularly co-authored stories on national security. Another Fusion founder, Tom Catan, worked as a reporter for the Journal at the same time as Perez and Simpson. The third Fusion co-founder, Peter Fritsch, worked above Perez and Simpson as the senior national security editor. Details and evidence is here.

5. Seems Marc Elias as the chair of Perkins Coie’s Political Law Group, was/is the grand marshal of this operation. Marc served as general counsel to Hillary for America, Hillary Rodham Clinton’s presidential campaign in 2016. He served in the same role for John Kerry’s presidential campaign in 2004. His political committee clients include the Democratic National Committee, Democratic Senatorial Campaign Committee, Democratic Congressional Campaign Committee, Democratic Governors Associations, National Democratic Redistricting Committee, Priorities USA, Senate Majority PAC, House Majority PAC and EMILY’s List. He currently serves as the chair of two organizations: Democracy Forward and We the Action. He serves on the board of directors of Priorities USA and on the advisory board of Let America Vote and Access Democracy. Marc is the former co-chair of the bipartisan Committee to Modernize Voter Registration. Marc served on the American Bar Association’s Standing Committee on Election Law and as an adviser to two American Law Institute projects: Principles of Government Ethics and Principles of Election Law: Resolution of Election Disputes.

Hillary Clinton’s campaign lawyer Marc Elias, allegedly denied media reports that the Clinton campaign had any connection to the controversial Russian Dossier.  After the Washington Post ran an extensive story on how the Clinton Campaign and Democratic National Committee hired controversial research firm Fusion GPS to dig up dirt on Donald Trump in Russia in the “Russian Dossier” matter.  Reporters at the New York Times have accused Elias of lying in past categorical denials of any connection to Clinton or the DNC.  The reports indicate that not only did the Clinton team fund the opposition research but that Elias may have been the person handling much of the arrangements.  Now Elias’ position has worsened after a report out of Congress that he was present in an interview when campaign chairman John Podesta denied any campaign role in the funding or acquisition of the dossier.

Here is the nut of the report:
“Podesta was asked in his September interview whether the Clinton campaign had a contractual agreement with Fusion GPS, and he said he was not aware of one, according to one of the sources. Sitting next to Podesta during the interview: his attorney Marc Elias, who worked for the law firm that hired Fusion GPS to continue research on Trump on behalf of the Clinton campaign and DNC, multiple sources said. Elias was only there in his capacity as Podesta’s attorney and not as a witness.”
If this and the earlier report is true, Elias not only falsely denied any connection between the Clinton campaign and the dossier to two New York Times reporters but sat silently as Podesta gave false information to congressional investigators.

 

Space Warfare, the New Battlefield

Image result for military space warfare photo

Primer: The Pentagon is considering creating a combatant command for space warfare, the latest step by the Defense Department to respond to Chinese and Russian militarization high above Earth.

The move — one of several under consideration — is mentioned in a new Pentagon report sent to Congress last week. Right now, space forces are dispersed throughout the military and intelligence community.

There are two kinds of combatant commands. Geographic cocoms oversee military operations in six regions of the world. Functional ones — like U.S. Strategic Command and U.S.Transportation Command — oversee operations that span multiple geographical commands. U.S. Cyber Command is considered a subunified command under STRATCOM, but is being elevated to a functional command.

The Pentagon is looking into whether space should have its own combatant command or subunified command (like Cyber Command), the report says. Space forces were grouped under U.S. Space Command, a unified combatant command, until 2002.

Image result for u.s. space command

***

The Pentagon is preparing for war should China, Russia, or other adversaries attack vital American satellites and other space systems, a senior Pentagon official told Congress on Wednesday.

The Pentagon has requested $12.5 billion in funding for the fiscal year 2019 that begins Oct. 1 for building up what he termed a “more resilient defendable space architecture.”

The request is $1.1 billion more than funding for last year on military space.

Rood, and Air Force Gen. John Hyten, commander of the Omaha-based Strategic Command, testified on the command’s budget request of $24 billion.

Neither elaborated on what space warfare capabilities are being developed. The Pentagon also has not said how it would deter and defend satellites from attack.

Space defense so far has involved development of intelligence capabilities to identify and assess if an incident in space is an attack, or the result of a malfunction or disruption due to collision with space debris.

Military space “resilience” also calls for the Pentagon to rapidly replace or restore satellites after attacks or other disruptions.

The Pentagon’s Defense Science Board, in a report last year, warned that the vulnerability of U.S. satellites to electronic attack was “a crisis to be dealt with immediately.”

The Joint Staff intelligence directorate warned earlier this year that China and Russia will have fully developed space attack weapons in place by 2020 that will threaten all U.S. satellites in low earth orbit—100 miles to 1,200 miles in space.

“Space is a warfighting domain just like the air, ground, maritime, and cyberspace domains,” Hyten said.

Currently, a defense and intelligence center called the National Space Defense Center, located at Schriever Air Force Base, Colorado, runs 24-hour operations for rapid detection, warning, and defense from space attacks.

War games involving space war also are held regularly with U.S. military forces and allies, including Asian and European allies.

China has conducted at least seven tests of hypersonic vehicles and Russia as well has conducted several hypersonic missile tests.

The hypersonic vehicles are designed to defeat missile defenses. More here.

***

February 2018: The Pentagon put Advanced Extremely High Frequency satellites in orbit to ensure communication in the event of a nuclear attack. But those spacecraft could also play a role in the rapid militarization of space.

  • Advanced Extremely High Frequency (AEHF) satellites will be able to keep the U.S. military in communication even after a nuclear attack.
  • They’re also more resistant to electronic jamming, which is a growing concern as tensions with China and Russia heat up.
  • In the war of the future, nations may try to physically destroy other nations’ satellites to disrupt communications and navigation.

Your phone is not going to work on the day nuclear war starts. But the U.S. President, National Security Council, and combat commanders count on being able to communicate. This doomsday connection relies on what we call Advanced Extremely High Frequency (AEHF) satellites that sit in geostationary orbit.

“We need systems that work on the worst day in the history of the world,” says Todd Harrison, director of the Aerospace Security Project at the Center for Strategic and International Studies.

There are four AEHF sats in orbit today. The proposed 2019 U.S. Air Force budget shows about $29.8 million in funding to complete two more, which would launch in 2019 and 2020. Air Force staffers say more money has been set aside in 2019 to ready the software and databases for the pair of new sats.

The Air Force talks about the AEHF satellites as part of its new focus on modernizing America’s nuclear abilities. “We must concurrently modernize the entire nuclear triad and the command and control systems that enable its effectiveness,” says Air Force Secretary Heather Wilson. The Trump administration has its eye on nuclear weapons, but these satellites also sit at the nexus of another big defense trend: Space warfare.

The Department of Defense is also investing in new jam-resistant GPS satellites. It is pouring money into future satellite programs, including AEHF, to the tune of $677 million for research and development in 2019. As orbital threats grow, new potential users—especially the U.S. Army—are taking interest in what the doomsday spacecraft can do. Preparing for post-apocalyptic communication may be just the beginning. More here.

Do the Russians have the Voting Machines Source Codes?

On February 28th, the Senate asks what NSA and Cyber Command are doing about Russian election interference. Admiral Rogers’s answer, in brief, is that his organizations lack the authorities to do much (that he can openly discuss, that is).

US senator grills CEO over the myth of the hacker-proof voting machine
Nation’s biggest voting machine maker reportedly relies on remote-access software.

WASHINGTON (Reuters) – Two Democratic senators on Wednesday asked major vendors of U.S. voting equipment whether they have allowed Russian entities to scrutinize their software, saying the practice could allow Moscow to hack into American elections infrastructure.

The letter from Senators Amy Klobuchar and Jeanne Shaheen followed a series of Reuters reports saying that several major global technology providers have allowed Russian authorities to hunt for vulnerabilities in software deeply embedded across the U.S. government.

The senators requested that the three largest election equipment vendors – Election Systems & Software, Dominion Voting Systems and Hart Intercivic – answer whether they have shared source code, or inner workings, or other sensitive data about their technology with any Russian entity.

They also asked whether any software on those companies’ products had been shared with Russia and for the vendors to explain what steps they have taken to improve the security of those products against cyber threats to the election.

The vendors could not immediately be reached for comment. It was not immediately clear whether any of the vendors had made sales in Russia, where votes are submitted via written ballots and usually counted by hand.

“According to voting machine testing and certification from the Election Assistance Commission, most voting machines contain software from firms which were alleged to have shared their source code with Russian entities,” the senators wrote. “We are deeply concerned that such reviews may have presented an opportunity for Russian intelligence agents looking to attack or hack the United States’ elections infrastructure.”

U.S. voters in November will go to the polls in midterm elections, which American intelligence officials have warned could be targeted by Russia or others seeking to disrupt the process.

There is intense scrutiny of the security of U.S. election systems after a 2016 presidential race in which Russia interfered, according to American intelligence agencies, to try to help Donald Trump win with presidency. Trump in the past has been publicly skeptical about Russian election meddling, and Russia has denied the allegations.

Twenty-one states experienced probing of their systems by Russian hackers during the 2016 election, according to U.S. officials.

Though a small number of networks were compromised, voting machines were not directly affected and there remains no evidence any vote was altered, according to U.S. officials and security experts.

Related reading:

Top intel official says US hasn’t deterred Russian meddling (Fifth Domain) “I believe that President (Vladimir) Putin has clearly come to the conclusion that there’s little price to pay and that therefore, ‘I can continue this activity,‘” Adm. Mike Rogers, director of both the U.S. Cyber Command and the National Security Agency, told Congress.

Senators: Cyber Command should disrupt Russian influence campaigns (Fifth Domain) Senators pressed Cyber Command on how they can use their national mission force to combat Russian cyber intrusions.

Rogers: CyberCom lacks authority, resources to defend all of cyberspace (FCW) The outgoing NSA and U.S. Cyber Command chief told lawmakers CyberCom is not sitting on its hands when it comes to potential Russian cyber interference, but it lacks the authority to do more absent additional presidential direction.

NSA: Trump’s Lukewarm Response on Russia Will Embolden Putin (Infosecurity Magazine) NSA: Trump’s Lukewarm Response on Russia Will Embolden Putin. Expect more election interference, Cyber Command boss warns

Decoding NSA director Mike Rogers’ comments on countering Russian cyberattacks (Washington Examiner) It’s not as simple as ‘I’m not authorized to do anything.’

*** Footnotes:

Electronic Systems and Software:

1. In 2014, ES&S claimed that “in the past decade alone,” it had installed more than 260,000 voting systems, more than 15,000 electronic poll books, provided services to more than 75,000 elections. The company has installed statewide voting systems in Alabama, Arkansas, Georgia, Idaho, Iowa, Maine, Maryland, Minnesota, Mississippi, Montana, Nebraska, New Mexico, North Carolina, North Dakota, Rhode Island, South Carolina, South Dakota, and West Virginia. ES&S claims a U.S. market share of more than 60 percent in customer voting system installations.

The company maintains 10 facilities in the United States, two field offices in Canada (Pickering, Ontario; and Vancouver, British Columbia) and a warehouse in Jackson, Mississippi.

2. Dominion Voting Systems is a global provider of end-to-end election tabulation solutions and services. The company’s international headquarters are in Toronto, Canada, and its U.S. headquarters are in Denver, Colorado. Dominion Voting also maintains a number of additional offices and facilities in the U.S. and Europe.

Dominion’s technology is currently used in 33 U.S. states, including more than 2,000 customer jurisdictions. The company also has 100+ municipal customers in Canada.

3. Hart InterCivic Inc. is a privately held United States company that provides elections, and print solutions to jurisdictions nationwide. While headquartered in Austin, Texas, Hart products are used by hundreds of jurisdictions nationwide, including counties in Texas, the entire states of Hawaii and Oklahoma, half of Washington and Colorado, and certain counties in Ohio, California, Idaho, Illinois, Indiana, Kentucky, Oregon, Pennsylvania, and Virginia.

Hart entered the elections industry in 1912, printing ballots for Texas counties. (Side note: As Republican and Democratic state legislators hustle to pass a law moving Georgia toward paper ballot voting technology, election integrity advocates said they’re concerned a bill that already cleared the state Senate could lead to a new vulnerability in Georgia’s next voting system, if it becomes law.

One way a new system might work is through a touchscreen computer similar to those currently used in Georgia. It would print a paper ballot with a visual representation of a voter’s choices so they themselves can check for accuracy.

In some systems, counting the votes means scanning an entire image of the ballot that may include a timestamp and precinct information.

In other systems, barcodes or QR codes on a ballot would correspond with the voter’s choices, which can make counting easier and faster for election officials, said Peter Lichtenheld, vice president of operations with Hart Intercivic, one of several election technology companies that hired lobbyists at the statehouse this year.)

*** The text of the letter to the three vendors is below:

The full text of the senators’ letter is below:

Dear Mr. Braithwaite, Mr. Burt, and Mr. Poulos:

Recent reports of U.S. IT and software companies submitting to source code reviews in order to access foreign markets have raised concern in Congress given the sensitivity of the information requested by countries like China and the Russian Federation. As such, we write to inquire about the security of the voting machines you manufacture and whether your company has been asked to share the source code or other sensitive or proprietary details associated with your voting machines with the Russian Federation.

The U.S. intelligence community has confirmed that Russia interfered with the 2016 presidential elections. As a part of a multi-pronged effort, Russian actors attempted to hack a U.S. voting software company and at least 21 states’ election systems. According to the Chicago Board of Elections, information on thousands of American voters was exposed after an attack on their voter registration system.

Foreign access to critical source code information and sensitive data continues to be an often overlooked vulnerability. The U.S. government and Congress have recently taken steps to address some cyber vulnerabilities, including by banning the use Kaspersky Lab, a Moscow-based cybersecurity firm that has maintained a relationship with Russia’s military and intelligence sectors, from all U.S. government computers. Now, we must also ensure the security of our voting machines and associated software.

Recent reports indicate that U.S. based firms operating on U.S. government platforms gave Russian authorities access to their software. In order to sell their software within Russia, these companies allowed Russian authorities to review their source code for flaws that could be exploited. While some companies maintain this practice is necessary to find defects in software code, experts have warned that it could jeopardize the security of U.S. government computers if these reviews are conducted by hostile actors or nations. U.S. tech companies, the Pentagon, former U.S. security officials, and a former U.S. Department of Commerce official with knowledge of the source code review process have expressed concerns with this practice.

In addition, Russia’s requests for source code reviews have increased. According to eight current and former U.S. officials, four company executives, three U.S. trade attorneys, and Russian regulatory documents, between 1996 and 2013 Russia conducted reviews for 13 technology products from Western companies, but has conducted 28 such reviews in the past three years alone.

As the three largest election equipment vendors, your companies provide voting machines and software used by ninety-two percent of the eligible voting population in the U.S. According to voting machine testing and certification from the Election Assistance Commission, most voting machines contain software from firms which were alleged to have shared their source code with Russian entities. We are deeply concerned that such reviews may have presented an opportunity for Russian intelligence agents looking to attack or hack the United States’ elections infrastructure.  Further, if such vulnerabilities are not quickly examined and mitigated, future elections will also remain vulnerable to attack.

In order to help the security and integrity of our systems and to understand the scope of any potential access points into our elections infrastructure, we respectfully request answers to the following questions:

  1. Have you shared your source code or any other sensitive data related to your voting machines or other products with any Russian entity?
  2. To your knowledge, has any of the software that runs on your products been shared with any Russian entity?
  3. What steps have you taken or will you take in order to upgrade existing technologies in light of the increased threat against our elections?

The 2018 election season is upon us. Primaries have already begun and time is of the essence to ensure any security vulnerabilities are addressed before 2018 and 2020.

Thank you for your attention to this matter, and we look forward to working with you to secure our elections.

Sincerely,

 

Susan Rice Unmasked the Names in the Seychelles Meeting

Who is George Nader? 

Image result for george nader lebanese

A Lebanese-American businessman, Nader currently serves as an adviser to Emirati Crown Prince Mohammed bin Zayed Al-Nahyan, who has developed a close relationship with Jared Kushner. For years, Nader has been a well-known, if somewhat off-the-radar, figure in certain political circles. According to the Times, Nader worked with the Bill Clinton administration in its attempt to broker a peace deal between Syria and Israel, convincing the White House that he could leverage his influential contacts with the Syrian government. After the 2003 invasion of Iraq, Nader worked with Prince’s private security company, Blackwater—which is now known as Academi—as a “business-development consultant,” according to a 2010 deposition. At the time of the 2016 election, he was serving as an adviser to Prince Mohammed, and was a frequent visitor to the White House during the early months of the Trump administration, where he met with Kushner and former chief strategist Steve Bannon.

***

George Nader, a Middle East expert connected to several associates of President Donald Trump, is now cooperating with the special counsel Robert Mueller and has testified before a grand jury in the Russia investigation, The New York Times reported Tuesday.

FBI investigators approached Nader when he landed at Washington Dulles International Airport in January and served him with search warrants and a grand jury subpoena, the report said. At the time, Nader was en route to Mar-a-Lago to meet with President Donald Trump and his associates to celebrate the anniversary of Trump’s first year in office.

The meeting was said to have raised red flags within the US intelligence community because the government was not notified of Crown Prince Mohammed’s visit. The Obama administration felt misled by the UAE as a result, which prompted then-national security adviser Susan Rice to request that Trump associates’ names be unmasked in intelligence reports detailing the meeting.

A senior Middle East official acknowledged to CNN last year that the UAE did not inform the US of the crown prince’s visit in advance but denied that the UAE had misled the Obama administration. The official said that the December Trump Tower meeting was merely part of an effort to build a relationship with the incoming administration.

Mueller’s prosecutors have repeatedly questioned Nader about the meeting, as well as his meetings in the White House with Kushner and Bannon following Trump’s inauguration.

That same month, Kushner met with Sergei Kislyak, then Russia’s ambassador to the US, and reportedly proposed setting up a secure back-channel of communication between Trump and Moscow using Russian facilities.

Shortly after, Kushner had a separate meeting with Sergei Gorkov, the CEO of the sanctioned Russian state-owned bank Vnesheconombank, which was reportedly orchestrated by Kislyak. The interaction piqued investigators’ scrutiny as the FBI began examining whether Russian officials suggested to Kushner that Russian banks could finance Trump associates’ business ventures if US sanctions were lifted or relaxed.

Kushner’s meeting with Gorkov came as he was looking for investors to shore up financing for a building on Fifth Avenue in New York that his family’s real-estate company had purchased.

Prince told the House Intelligence Committee last year that he knew Kirill Dmitriev was a Russian fund manager but did not know it was a sanctioned fund that was controlled by the Russian government.

Image result for seychelles map photo

Image result for seychelles photo

 

After the Seychelles meeting, Dmitriev also met with Anthony Scaramucci, who would later become the White House communications director, at the World Economic Forum in Davos, Switzerland.

Russian state media quoted Scaramucci as saying, after his meeting with Dmitriev, that the Obama administration’s new sanctions on Russia — which were imposed that month to penalize it for interfering in the 2016 election — were ineffective and detrimental to the US-Russia relationship.

Dmitriev’s company, the Russian Direct Investment Fund, was included on the list of Russian economic entities that were penalized as part of that decision.

An RDIF spokesperson reached out to Business Insider to clarify that the fund was included on the US sanctions list because of its status as a former subsidiary of Vnesheconombank. More here.

When it comes to the Russian Direct Investment Fund, Americans and people with ties to the U.S. have held some of the top spots at RDIF. For years, a deputy CEO at the fund was Sean Glodek, a Stanford alum and Wharton MBA graduate who previously worked at Deutsche Bank and Lehman Brothers. The current deputy co-director for RDIF’s Russia-China investment fund is Oleg Chizh, a Brandeis and Columbia graduate. Other Americans have served in top investor relations and advisory roles.

Part of its mission is to make outsiders more comfortable investing in Russia by pairing their capital with RDIF funds. It was formerly part of VEB, the bank that doubles as Russian President Vladimir Putin’s “private slush fund,” according to Atlantic Council fellow Anders Aslund. More here.

UK: Nerve Agent Used in Assassination Attempt of Russian Spy

Image result for Sergei Skripal

photo

Former foreign office minister Chris Bryant, who now chairs the all-party parliamentary group on Russia, said: “I don’t think the Government will have any choice but to send a significant number of ‘so-called Russian diplomats’ back to Moscow if there is any evidence that the trail from Salisbury goes straight back to the Kremlin.” The Russian embassy in London has dismissed claims that the poisoning was an operation by Russian special services as “completely untrue” and said the allegations were “vilification” attempts on Russia. Theories over who was responsible grew today with one former KGB agent even claiming that the poisoning of Skripal was an operation by Western secret services to harm Vladimir Putin as he seeks re-election this month. More here.

Russian spy: Nerve agent ‘used to try to kill’ Sergei Skripal

A nerve agent was used to try to murder a former Russian spy and his daughter, police have said.

Sergei and Yulia Skripal were found unconscious in Salisbury on Sunday afternoon and remain critically ill.

A police officer who was the first to attend the scene is now in a serious condition in hospital, Assistant Commissioner Mark Rowley, head of Counter Terrorism Policing, said.

Mr Rowley would not confirm the exact substance identified.

He said: “Having established that a nerve agent is the cause of the symptoms leading us to treat this as attempted murder, I can also confirm that we believe that the two people who became unwell were targeted specifically.”

He said there was no evidence of a widespread health risk to the public.

***

Guardian: The biggest question about Sergei Skripal’s suspected poisoning is the timing. Skripal had spent several years in a Russian jail after being convicted of espionage and had presumably been thoroughly debriefed by his former spy bosses. If the Russian security services had wanted him to have an “accident” during those years it would have been very easy to organise.

Sunday’s assassination attempt in Salisbury, if that is what it was, therefore appears to have a demonstrative nature. Suggestions that this could be some kind of vote-winning ploy, coming two weeks before presidential elections Vladimir Putin is certain to win, seem unconvincing. Many Russians are patriotic and have bought into the Kremlin’s aggressive new foreign policy, but it is unlikely that the assassination of a former spy of whom few had heard would do much to whip up popular passions.

More likely, the move is a deterrent, aimed at reminding other Russian operatives of the potential risks of working with foreign intelligence agencies. Every year Russia’s top security officials speak of active attempts by the CIA and other western agencies to recruit Russians. Part of this is propaganda for domestic consumption, but there is no doubt that western spy agencies are active in Russia.

Last January, two of Russia’s top cybersecurity officials were arrested and accused of aiding the CIA, in a case some have linked to US election hacking claims. The British, too, have been active in Russia, most memorably revealed by the “spy rock” scandal, in which a fake rock was used to pass messages back to British intelligence.

While there are fewer ideological reasons than during the Soviet period for Russian spies to become traitors, western agencies can provide financial incentives. Russian prosecutors suggested, during Skripal’s court case, that he was recruited with cash – according to Russian media. Many agents, working in structures in which their superiors are demonstratively corrupt, might be tempted into colluding with friendly foreigners offering cash for secrets.

As such, the demonstrative killing of a traitor could be a warning to junior officers not to follow the same path. Russian officials have often made it clear that traitors will meet a sticky end one way or another. Public threats were made against the officer in the SVR foreign intelligence service who betrayed the Russian sleeper agents swapped for Skripal and others, back in 2010.

“We know who he is and where he is,” a high-ranking Kremlin source told Kommersant newspaper at the time. “You can have no doubt – a Mercader has already been sent after him.” Ramón Mercader was the assassin tasked by the KBG to kill Leon Trotsky in Mexico in 1940.

It is unusual, however, to target spies after they have been swapped. One possible reason is that Skripal was being punished for a continuing relationship with British intelligence, or the suspicion of one.

“My presumption is that if the Russians were behind this, and it does look plausible, then it is because they assumed Skripal was still working for British or other western intelligence and not simply retired,” said Mark Galeotti, a Russia watcher and security analyst. “That is likely what tipped the balance with Litvinenko.”

Many hits on Russians abroad arise from financial warfare and do not necessarily come from the Kremlin – such as the shooting of the banker German Gorbuntsov in London, 2012, and the assassination of the Russian MP Denis Voronenkov in Kiev last year.

Yet the attack on Skripal looks more likely to belong to the category of hits organised and approved by the Russian state. And given the long political fallout of the Alexander Litvinenko murder, it is unlikely that intelligence agencies would risk such a gambit without a signoff at the highest level.

Since you’re here …