Many have described it as a 'return to dictatorship and Communist times.' The intelligence service is said to have tried to recruit technicians in charge of maintaining the party's IT system, in order to access internal party information and use it to rig the election.
From what I have seen on open-source intelligence, the Israelis had essentially developed a capability to tap existing public CCTV networks in Tehran and then layered on top of that, a bunch of data integration software that enable them to build targeting packages on senior leaders. My sense is that there was a US-sourced piece of humint that was then able to be fed into that model.
Since the war began on February 28, Russia has passed Iran the locations of US military assets, including warships and aircraft, three officials, who spoke on the condition of anonymity, told The Washington Post. It does seem like it's a pretty comprehensive effort, one of the sources told the newspaper.
Dear Secretary Pete Hegseth, I realize that this is a big ask, but would you please invade and take possession of my son and daughter-in-law's apartment? Or maybe you'd like to make them an offer first? Either way, as a concerned mother and patriot who believes that national security begins at home, I feel it's my duty to let you know that Otis and Luna, the co-dictators of Unit 4-C, at 439 Bergen Street, in Park Slope, Brooklyn, must be overthrown.
The International Spy Museum will unveil its newest special exhibit, " Camouflage: Designed to Deceive," on March 1. The museum has previously featured artifacts that used elements of camouflage, like the Aston Martin V12 Vanquish with "adaptive camouflage" that appeared in the 2024 exhibit "Bond in Motion." For the first time, however, the Spy Museum will dedicate an all-new exhibit to exploring the history of camouflage, in an installation that will be on display for the next three years.
Over the past year, waves of federal layoffs have left thousands of government employees and contractor clients suddenly out of work. For foreign intelligence services, that disruption has opened new opportunities. With more former U.S. officials seeking employment or freelance work - often in specialized national security fields - adversaries, namely China, have stepped in, posing as consulting firms, research groups and recruiters.
The scam typically involves state-backed fraudsters applying for remote IT work in the west, using fake identities and the help of facilitators in the country where the company targeted is based. Once hired, they send their wages back to Kim Jong-un's state and have even been known to threaten to release sensitive company data after being fired.
A double agent, by contrast, is an intelligence asset who is knowingly and deliberately directed by one service to engage another in espionage. The controlling service uses that agent to feed information (called feed material) -true, false, or mixed-to the adversary. They do so to simultaneously study the adversary's tradecraft, collection priorities, and decision-making. In the Russian system, double agents also serve a bureaucratic function: they generate statistics, "success stories," and operational narratives that demonstrate effectiveness to political overseers and ultimately to Putin himself.