https://spyscape.com/article/spy-inc-the-secretive-front-companies-run-by-intelligence-services

For more than 50 years, the US and Germany spied on foreign governments through a Swiss company called Crypto AG, a firm secretly controlled by the intelligence agencies.

The company sold encryption devices - machines supposedly built to send secure communications - but the devices could also spy on Crypto's clients. Their customers included Pakistan, India, Syria, Saudi Arabia, and even the Vatican.

Crypto AG isn’t the first - and certainly won’t be the last - firm run by spies, however. Here are a few of the companies set up by cheeky covert operators.

https://s3-us-west-2.amazonaws.com/secure.notion-static.com/acb3f57c-6ff7-4426-aae8-e97b611f5cd1/60cb2135cd9150857c535f9f_Lgmhm_aq3iWpgGXthiukdnvmPkiJIJDeBVD6mOos1x2ooUY_uDI45H3ARAzQZKmzCU61JcWE317LDBjCvFulidsi2MsHfW1io8Nh01rNxrNrFRj43PFYJhrm4MRDRUYuEmlOCVVi.jpeg

Brewster Jennings & Associates

The CIA set up the Boston-based Brewster Jennings & Associates in 1994 as a front for officers including Valerie Plame, ex-head of operations for the Iraq Joint Task Force. Plame, later outed as a spy in 2003, listed the company as her employer for tax purposes, although the Boston Globe described it as a telephone number and a PO Box. Dun & Bradstreet lists Brewster Jennings as a ‘legal services office’ with annual sales of $60,000 and one employee: CEO ’Victor Brewster.’ The US administration admitted it was a front. The CIA also used the company to investigate an alleged foreign intelligence ring, including Pakistan's ISI, which was attempting to recruit moles to obtain US nuclear secrets, The Sunday Times reported. ‍

https://s3-us-west-2.amazonaws.com/secure.notion-static.com/4dd1e8e5-2ab1-4ebf-b7bc-a2e2520ef0b8/60cb2135087df15d40da4daf_Tyz8FcVrJOZXDFZjtsM1od7Wj-z5ZVAcVKHN2kyQRuaDV2PevV5FIGt7J_bzalXJsYlWwlauLyMDJIFnqhtSpITCCsxeDzfTtwY4pAbGGm9Wyz-h8Fw-P_7mK2MSryxm6cbNYsCY.jpeg

Anom

The FBI and Australian police were enjoying a few beverages in 2018 when they came up with a plan to catch criminals by creating Anom, an encrypted app company. The FBI reportedly offered a supergrass $100,000 and a reduced prison sentence to help build the tech, using a Trojan master key to decrypt and store data that passed through the app. Anom was used by more than 300 criminal syndicates including Italian organized crime, outlawed motorcycle gangs, and international drug traffickers. Some 800 suspects were arrested in 2021. “Some of the best ideas come over a couple of beers,” said Australia’s top cop Reece Kershaw.

https://s3-us-west-2.amazonaws.com/secure.notion-static.com/dc0428dd-be0d-43a2-963b-f9667aba3098/60cb2136d93b3f2c6c67ef48_WM0-U9GRcDV083_A8E3vvywft4z6UQspSu_nKohX3HQA0A8lZ6pLquqtcpUGbLMN_5pZsGzn4AIEO33ShYmhklrHbKrjgmPJ8_K8YRBZDzOF2wTTZ5t-3g2l5W3Sv32t3OFa27V9.jpeg

Load cars

Anom wasn’t the Bureau’s first corporate venture, of course. In the late ‘80s, Michael R. McGowan was an FBI case agent in Philadelphia working in a drug area known as ‘The Badlands’. Traffickers were building hidden compartments inside vehicles to hide drugs from sniffer dogs and the police, so the FBI hired a company to build the Bureau’s own ’load’ cars. They rented a warehouse to use as a showroom and got the word out using an informant. Pretty soon business was booming. The vehicles enabled the FBI to track trafficking routes used by drug gangs all along the Eastern Seaboard. “We probably turned down seven out of every 10 traffickers because we simply had too much business and we could pick and choose which group we wanted to investigate,” McGowan told SPYSCAPE’s True Spies.

https://s3-us-west-2.amazonaws.com/secure.notion-static.com/692c4c16-5b33-459b-87d0-f4ceecca52e1/60cb21375cc286697bc91dcf_5SCYglqj33PCHpJEdsnO9z8_zqx7KSaplNWha8lO9q3LqOyQeMbcRuWnczd81oE9ppytYJDt2vE-hanwNkcVd-xrS7NYvSwrQLfpkEY9rBpZl3a47PJXdOoRxAqxWNKJHSwukUFl.gif

Omnisec AG

Crypto may not have been the only Swiss company linked to US spies. Swiss broadcaster SRF alleged in 2020 that Omnisec AG, Crypto’s main competitor, had ties to the US National Security Agency (NSA) and may have also sold manipulated devices. Swiss cryptologist and professor Ueli Maurer told SPYSCAPE that the NSA approached him in 1989 when he was a young researcher. “I declared that I had no influence on Omnisec's products and that I would not support any kind of manipulations,” Maurer said, adding that he immediately contacted Omnisec’s CEO to warn him. “Afterwards, there was a meeting between NSA representatives, the Omnisec CEO, and me, at which the CEO categorically ruled out any cooperation and very clearly and definitively ended the contact.” Maurer added that he had no information or circumstantial evidence indicating the CEO had further contact with the NSA. Omnisec was liquidated in 2017. The NSA declined to comment. ‍

https://s3-us-west-2.amazonaws.com/secure.notion-static.com/f03a53ca-93c0-40a9-9750-dd4060a0ef4e/60cb213788dee78512b3ab90_LQdnSxVZeHzyzzDAhdTvsSsGi4QEtsttBe1LxaMbw69DchMEYqKTlLWykK7fOQ7pCOXLcjBDPULrgR9OVQneHxdNOy9HmD1A4p0MFSVJn2RRRGInTkXpmkGYTSBM67MEQUEG-19F.jpeg

Rana

The US isn’t the only entrepreneurial government. The US Treasury imposed sanctions in 2020 on Iranian cyber threat group APT39, 45 tech staff, and a company known as Rana. “Masked behind its front company, Rana Intelligence Computing Company, the government of Iran employed a years-long malware campaign that targeted Iranian dissidents, journalists, and international companies in the travel sector,” the Treasury said. “Rana advances Iranian national security objectives and the strategic goals of Iran’s Ministry of Intelligence and Security by conducting computer intrusions and malware campaigns against perceived adversaries, including foreign governments and other individuals.”