THE SUNDAY TIMES MAGAZINE (UK)
January 24, 2021 Sunday 1:01 AM GMT

Interview by Matthew Campbell


<https://advance-lexis-com.ezproxy.cul.columbia.edu/document/?pdmfid=1516831&crid=050c3310-a20d-4ac6-8f13-073dc82c12ac&pddocfullpath=%2Fshared%2Fdocument%2Fnews%2Furn%3AcontentItem%3A61V7-WF91-JBNF-W52M-00000-00&pdcontentcomponentid=382503&pdteaserkey=sr0&pditab=allpods&ecomp=5bq2k&earg=sr0&prid=07f21161-028d-4160-b1c4-a70e79aaa506#>
Highlight: EliotHigginsled a team of online sleuths who proved the would-be assassins of Sergei Skripal were Russian agents. Matthew Campbell meets the shy Star Trek fan who outfoxed Putin

EliotHigginsdoes not mind coronavirus lockdowns. He has never much enjoyed going out, producing all his best work, his world-beating scoops about Syrian or Russian skulduggery, from a sofa at home in the East Midlands.

“When I was younger I had this really terrible anxiety. It cast a shadow over my life,” he tells me. “When I went outside I always felt everyone was kind of looking at me, judging me. I hated interacting with people.” Things have improved since then, although he says he’s “still not somebody who likes going down the pub”.

Celebrity as one of the world’s most influential internet sleuths has boosted his confidence. Investigative triumphs, including the identification of the Russian spies who tried to kill the defector Sergei Skripal in Salisbury, have turned his Bellingcat investigative news website into a giant of the new media landscape.

This is my first (virtual) meeting with Higgins, 41, a pioneer of “open source” reporting, in which data freely available on the internet is used to build a story. For all his talk of anxiety, and as someone who has repeatedly embarrassed the Kremlin, he seems perfectly relaxed. And I am surprised by the bushy black beard; he has always been clean-shaven in photos. It adds to a professorial aura as he peers at me over Zoom from his home in Leicester, where he lives with his Turkish wife and two young children. Besides identifying the Salisbury attackers, who smeared the lethal nerve agent novichok on Skripal’s door knob, Bellingcat last month published the names and photographs of several Russian agents believed to have poisoned Alexei Navalny, Russia’s leading opposition activist, last year. In another coup Higgins identified the Russian truck that fired a missile that brought down a Malaysian civilian airliner over Ukraine in 2014, killing 298 people; Russia has always denied being responsible and likes to dismiss Higgins and Bellingcat as an arm of western intelligence.

Russian television has doorstepped his mother in Leicester and suspected Russian hackers have tried to break into his computers. So how worried is he about his personal safety?

It may go against his instincts as an introvert, but he now believes a high profile is his best defence. “If I stubbed my toe, people would assume Russia was behind it,” he says. In any case, “if someone is going to rub something on your door handle, there’s not much you can do about it.”

As a painfully shy youth he was an obsessive gamer who could spend hours immersed in

World of Warcraft

. His father was a Royal Air Force engineer who worked on various UK bases. Higgins dropped out of a media studies course to do a variety of administrative jobs. He found housing for refugees and processed payments for a lingerie firm. “So you’ll read on Russia Today that I was an underwear salesman — they’ve turned it into some weird narrative about me.”

He tried for a conventional journalism career, but was rejected by the BBC and ITN — much as they may regret it now. By then he had started blogging under the name Brown Moses, a pseudonym from a Frank Zappa song. With an interest in military matters — perhaps thanks to the paternal influence — he began examining conflicts in the Middle East, studying thousands of videos posted by citizens caught up in conflict. This coincided with a dramatic expansion of social media and access to tools such as Google Earth. Suddenly it was possible to see what was happening in a faraway war zone without having to go anywhere near it. “You’ve got this mass of information from satellite imagery, videos and photos that is being shared,” he explains. “The skill is piecing it all together and understanding what it shows you.”.

His family thought his “weird hobby” was a dead end. “Then when I was, like, ‘I’m going to start doing this as a job,’ they were slightly horrified.” And then came a big breakthrough when he identified weapons from Croatia in a video posted by a jihadist group in Syria. The story he wrote on his blog was picked up by

The New York Times

on its front page. He went on to document the Syrian regime’s use of chemical weapons, and in 2014 launched Bellingcat. The name came from a cat and mouse fable in which the mice decide to put a bell on the cat’s neck as an early warning system to avoid being eaten. The shy science-fiction enthusiast — he likes

Star Trek

— who was once dismissed as “just some blogger” by some, now has his own media operation and staff. “We’re a real organisation now and I’m the executive director,” he says proudly.

About one third of funding, he says, comes from the workshops Bellingcat organises around the world to encourage more open source reporting as an antidote to dictatorships. The rest is from private foundations such as the National Endowment for Democracy, a nonprofit organisation set up in America in the 1980s. Higgins insists he does not take money from any government.

“It’s quite annoying because people say Bellingcat is funded directly by the US State Department, and we’ve turned down loads of money from them because we don’t want to take direct funding — like, literally millions and millions.”

Many remain sceptical, though, about Bellingcat and its successes. Besides the Russians, “there’s a big group of people who’ve decided we’re obviously working for the CIA or GCHQ or whichever abbreviation you prefer,” he says.

For its supporters, though, Bellingcat is beating western intelligence services at their own game. “I’ve occasionally met people who know people who do this [intelligence] stuff,” he adds. “Back in 2013 and 2014, when I was first doing this before Bellingcat, they’d say that I was their dirty little secret: they’d steal all the work I was doing and put it in their own reports.”

Bellingcat’s success in Russia has been facilitated, Higgins admits, by rampant corruption, the “rot at the core of Russian society”, as he puts it. It might seem paradoxical in a country with a reputation for state control, but Russia is one of few countries where home addresses, car registrations and passport records can be acquired, for a modest fee, over the internet.

“Any information that is gathered by the government is basically available for sale to anyone who knows how to find it,” he says. “It’s not even the dark web. On any old internet forum you can find someone who says, ‘Give me $100 and I’ll get you the passport details of this person.’ ”

This helped Bellingcat to unmask the Salisbury poisoners — the two outed agents have since been reassigned. “They’ve been sent to Siberia,” Higgins laughs. Not that Putin seemed to care much about being found out — some analysts believe, on the contrary, that he wanted the world to know his country was behind the poisoning.

The Russian leader has learnt that he can get away with such malevolent behaviour, Higgins argues, because of our lack of retaliation in the West: “We don’t really do anything except expel some diplomats and do some really targeted sanctions that no one really cares about. Until Russia feels they’re paying a price that they’re unwilling to pay, they’re going to keep doing this stuff.”

Experts believe the Kremlin has been infuriated by Bellingcat’s ability to identify state security agents suspected of poisonings: Higgins says there are signs of a crackdown on internet information-peddlers. In the end, though, Bellingcat may matter little to Putin. Polls show the vast majority of Russians do not believe Putin was involved in Navalny’s poisoning — and those who do may well approve.

What is Higgins working on now? We are talking just before the storming of Congress in Washington and Bellingcat is already on the case. He and his team are investigating the growing influence on politics of QAnon, a far-right conspiracy theory whose adherents — including many of the Washington rioters — believe in a deep-state plot led by a paedophile and Satanist cult involving the Democrats.

Higgins believes this bizarre movement and its unfounded claims proliferating over the internet are like a “brain parasite”. For one who has spent much of his life on the internet — and built his career on it —he makes a compelling sermoniser: “The internet is fantastic for making you find stuff that reinforces your beliefs,” he says, but it also “drives you as crazy as you can be”.

How we exposed the Salisbury poisoners

By Bellingcat founder EliotHiggins

In early 2018 British government ministers hurried into an underground conference room in central London for a Cobra crisis-response meeting. A chemical weapons attack had taken place on British soil; it looked like an assassination attempt. On March 4 that year Sergei Skripal, a former Russian intelligence officer who had defected to Britain, and his daughter were found slumped on a bench in Salisbury, both on the verge of death. They had been poisoned with the nerve agent novichok. Though the Skripals survived, Dawn Sturgess, an innocent victim accidentally poisoned by the novichok, later died.

Moscow denied responsibility, yet the Kremlin had been implicated in revenge poisonings before. Though British detectives gathered and watched 11,000 hours of local CCTV footage, pored over credit-card payments and studied mobile-phone usage in the area, they struggled to identify the attackers.

At Bellingcat we watched, awaiting a point of entry. Scattered around the globe, our online collective began hunting for clues on the internet — in social media postings, in leaked databases, in free satellite maps. This is what has become known as “open source” reporting — paradoxically, in this age of online disinformation, facts are easier to come by than ever. We have no agenda but we do have a credo: evidence exists and falsehoods exist, and people still care about the difference.

Joining the dots

Six months after the Skripal attack the police at last provided what we needed. Images showed two Russian men arriving at Gatwick airport a couple of days before the poisoning, travelling together by train from London to Salisbury on consecutive days and lurking near the defector’s home. The authorities needed help identifying these two, so they published images of the suspects, who had travelled under the names “Alexander Petrov”and “Ruslan Boshirov”. Scotland Yard hoped someone might recognise them. The Kremlin certainly did.

The following day, September 13, 2018, the two suspects materialised in an interview on the Kremlin’s international news channel, RT. The two men proclaimed themselves innocent, merely two friends who had taken a last-minute holiday to Britain to admire a provincial cathedral. “Petrov” glared as if furious about appearing in public. “Boshirov” winced, a sheen of sweat on his face. They were not assassins, they protested, just fitness entrepreneurs.

We got to work. At first, we uploaded pictures of “Alexander Petrov” and “Ruslan Boshirov” onto search engines, seeking reverse image matches [a search using an uploaded image rather than a search term]. Nothing came back. We searched through Skype handles, seeking variants of their supposed names. Nothing. We scanned Russian news reports for clues and dredged Twitter for insights.

Unable to track the suspects through standard open-source methods, we went deeper, digging into a stash of leaked databases. Over the past 20 years hundreds of these have ended up on Russian “torrent” sites — the kind of webpages that illegally share copyrighted movies via a multitude of users, thereby preventing the authorities from shutting down any single source. The leaked Russian databases included passport data, residential address data, car ownership data, often on a city-by-city basis. Some included Russian flight manifests.

By the time of the Skripal investigation, Bellingcat had downloaded about a thousand of these databases. But rarely are they up to date, and we lacked check-in details for March 2018, when “Petrov” and “Boshirov” had travelled from Moscow to London.

On the Russian internet on-demand queries are possible too — a black market where personal information is for sale. Going down that route pushed the boundaries of the Bellingcat method. We always prefer open sources; usually that is all we need. Previously we had crowdsourced the purchase of satellite imagery in our investigations into Mhl, the airliner shot down over Ukraine in 2014: we bought material from an established vendor and posted the results online for all to see. Yet the source of this flight manifest would not be an established retailer.

We have had internal debates about such dilemmas before, and they help demarcate the ethical edges of the Bellingcat method. All our investigations, we believe, must be founded on open-source information. But in carefully judged situations we will build upon that base.

In the case of the passenger manifest for the Moscow-London flight, we found somebody online with access to the Russian airlines’ booking-data system and paid about £180 for the file. The flight manifest added two crucial data points: the suspects’ purported birthdates and passport numbers. Suspiciously the latter were only three digits apart. From here we needed to cross-reference the data against identification documents that the Russian state holds on every citizen. As part of a previous case we had come across someone else online who boasted of accessing such dossiers through a personal connection at a government agency. In our Slack chats we joked that the online braggart’s “personal connection” was probably his grandmother working in a dismal ministry office, rifling through filing cabinets after hours. From this we came to nickname our source “the Babushka”, Russian for “Granny”. Yet the Babushka was not helping for free. We would need to pay about £90 per identification dossier.

The name Boshirov is so odd in Russian that it would have drawn instant suspicion if we had requested that identification file; but the other suspect’s purported name, Alexander Petrov, was common. From the Aeroflot passenger list we also had the claimed birthdate of Alexander Petrov. So we asked the Babushka if the government system contained files on anyone with this combination of name and birthdate.

Four matches came back. To see the dossiers themselves meant paying yet again. We hesitated. But the Kremlin disinformation machine provoked us — namely, that RT interview of the two supposed sports-nutrition salesmen, claiming they had visited Salisbury Cathedral to admire its spire.

Christo Grozev, who had worked in Russia in the Nineties and later become a key figure in Bellingcat, was in a business meeting, furtively checking his phone, when the four dossiers arrived. He clicked on the first one and scrolled down to the ID photo. No, this was not our Petrov. He clicked the second dossier. Down he scrolled. He thumbed in the words “Found him” onto our Slack chat and uploaded the ID photo. Unmistakable: this was him.

“There are two odd things on his file,” Christo messaged us, uploading an official stamp found in the Petrov dossier: Do not provide any information. Also, the page of biographical data was blank, except for a handwritten note stating, “There is a letter. SS” — an abbreviation for

sovershenno sekretno

, Russian for “top secret”.

“This shouts spy,” Christo explained. “This person’s existence begins in 2009. This is a fake identity . . . I think we have the story.”

According to the dossier, this man in his late thirties, “Alexander Yevgeniyevich Petrov”, had appeared in official files only in 2009. The office that issued his ID was not just another dusty bureaucratic outpost, but the special Moscow office that grants papers to Kremlin insiders and agents.

Putin had said of the suspects: “They are civilians, of course . . . I can assure you that there is nothing special, nothing criminal there.” He had lied, and we could prove it.

Cutting through Kremlin lies

In Washington it was morning and our newest staff employee, the editor Natalia Antonova, was sleepily reading Twitter. Everyone, she discovered, was abuzz about the suspects’ interview on RT. Natalia had known Russian military officers like these. Though raised mostly in the US, she had been born in Kiev with a grandfather who was a Soviet general. Natalia could see that “Petrov” and “Boshirov” did not want to be on TV. When the RT interviewer suggested an innocent explanation for their trip — perhaps they were just a gay couple on vacation? — “Petrov” and “Boshirov” seemed barely able to contain their indignation. Natalia had to pause the video, she was laughing so hard. Little motivates an open-source investigator as much as blatant lies. In this case they spoke of the trip to Salisbury as long planned. Yet the Aeroflot passenger manifest showed they had booked their tickets and checked in online at 10pm the night before their flight.

Our first published piece on the Skripal suspects caused news organisations around the world to cover our work, stirring renewed concern about Moscow’s lawless actions abroad. We expected the Russian media to gloss over it, but we were wrong. Both pro-Kremlin and anti-Kremlin media jumped on the case. This was blowing up faster than we had expected.

One Russian news outlet — not a state-controlled one — acquired the dossier of the other suspect, “Ruslan Timurovich Boshirov.” It also had the “Do not provide any information” stamp and the “Top secret” annotation. And it had a series of digits that looked like a phone number. Russian reporters called it and the Russian Defence Ministry answered.

The Insider, a courageous investigative website based in Russia, acquired border-crossing data for “Petrov” and “Boshirov”, showing their travels in various countries in Europe from 2016 to September 2018. These were not sports-nutrition salesmen, and Petrov and Boshirov were not their real names. Our hypothesis was that they were GRU officers, carrying out clandestine acts in western Europe. So we reached out to former Russian military officers to ask where future GRU agents might have been trained 15 to 20 years earlier, when “Boshirov” and “Petrov” would probably have started their careers.

During that period the Far Eastern Military Command Academy had an excellent reputation for training overseas covert operatives. On social media we found incomplete yearbook photos and reunion galleries from the time, but no certain matches. A 2018 article on the history of the academy mentioned seven graduates who had gone on to receive the prestigious Hero of the Russian Federation award.

We also found a photo of graduates deployed on snowy ground in Chechnya. In the top row there was one man who looked a little like “Boshirov”. The resemblance was not enough to go on, but it inspired us to try adding “Chechnya” into online searches, along with “Hero of the Russian Federation”. This landed us on the website of a state-run civil-defence force, which mentioned a colonel by the name of Anatoliy Chepiga.

We ran his name through Google as well as Russian search engines, but found nothing. No social-media profiles. No images. The Hero of the Russian Federation is the country’s highest state award, personally decreed by the president. Most are presented in public. The man’s online invisibility was suspicious.

We went through our leaked databases and found two references to Anatoliy Chepiga including contact information listed as “в/ч 20662” — a Russian abbreviation for Military Unit 20662, the elite Spetsnaz unit of GRU’s 14th Brigade. A listing from 2012 showed Anatoliy Vladimirovich Chepiga, born April 5, 1979, residing in Moscow. What we needed was an image of Chepiga. No matter how we searched, no picture of the man appeared in open sources. We had not wanted to ask Babushka for a dossier in the unusual name Boshirov because it would have set off alarm bells, but as yet the public associated nothing with the name Chepiga. So we took the chance; we bought his dossier. And we had him: his photo, dated around 2003. “Boshirov” was Colonel Anatoliy Chepiga.

A Salisbury hit team: the proof

When we published our report, it caused the biggest stir of any Bellingcat article to date, with headlines around the world marvelling that a bunch of citizen investigators had somehow outed a Russian “hit team”. Online, conspiracy theorists and state propaganda machines raged against us. Putin’s spokesman Dmitry Peskov insisted there was “no data” that anyone called Anatoliy Chepiga had ever received the Hero of the Russian Federation award. He also denied that “Boshirov” and Chepiga looked identical. But five separate news outlets tracked down people who had known Chepiga — they confirmed that the Boshirov who appeared in the RT interview was indeed Anatoliy Chepiga.

Putin issued a foul-tempered denial, not sounding terribly innocent when he called Skripal “a scumbag” and “a traitor to the motherland”. Later the Russian foreign minister, Sergey Lavrov, added his disapproval. “Bellingcat is closely connected with the intelligence services, which use it to channel information to influence public opinion,” he said.

We carried on, focusing on finding the true name of the remaining Skripal suspect, “Alexander Petrov”. We pored over social-media photos and videos of graduates of the Far Eastern Military School, in case he had attended it like the other suspect. No luck. So we checked group photos of the Spetsnaz unit that Chepiga once belonged to. Again, nothing.

In the Petrov dossier there was a reference to a previous identity document, issued in St Petersburg in 1999. We searched dozens of leaked databases, but found no sign of the supposed document number, so concluded that this was a faked corroboration. But why was St Petersburg mentioned? When we had previously identified a GRU officer involved in a Montenegro coup plot, we found that his undercover persona had retained his true first name, birthdate and birthplace, changing only his surname. Perhaps the same was true for “Petrov”, whose first name and patronymic were given as Alexander Yevgeniyevich and whose cover birthdate was July 13, 1979.

We took those details and punched them into leaked databases from St Petersburg. The only two matches — from 2003 and 2006 — indicated someone with the last name Mishkin and included a phone number that was out of service. We searched again for that phone number and eight people came up, suggesting a shared apartment. We checked the address. It was across the street from the Military Medical Academy.

The Petrov identity dossier was registered in Moscow, so we sought traces of this new name, Alexander Yevgenyevich Mishkin, in the Russian capital as well. An open-source phone database turned up a mobile number. We fed this number, with his name, into the leaked Moscow databases and found a match to car insurance from 2013 for a Volvo XC90.

From an official Russian database of registration histories we learnt that the car had been imported, registered first in St Petersburg in 2012, then transferred to the Khoroshevsky District of Moscow — the district of the GRU headquarters. That was tantalising but not conclusive. We found a website selling a more recent car insurance database, dated 2014. This had a precise registration address for Alexander Mishkin’s Volvo: Khoroshevskoye Shosse 76B, also known as GRU headquarters.

On Russian social-media networks we contacted hundreds of graduates who had attended the same medical academy in the early years of the century, coinciding with the presumptive period of Mishkin’s study there. Most did not respond. Many said they were not aware of anyone named Mishkin. But one person, who insisted on anonymity, confirmed that Alexander Mishkin had graduated from the academy, and that he was the man posing as “Petrov” . The source said that Russian security services had been contacting those from Mishkin’s class, telling them not to divulge his identity.

With the Kremlin clamping down, we could not risk pressing Babushka for more identity dossiers without endangering the person. But we did manage to obtain a scan of Mishkin’s 2001 identity document from another source. It had a photo of Mishkin, and it was the man from the RT interview.

The Insider investigative website took one last step. Just before publication of our exposé on Mishkin, they dispatched a reporter to the birthplace mentioned in the 2001 identity document: Loyga, a village in northern Russia of about a thousand residents so remote it is reached only by narrow-gauge railway. The reporter spoke to various locals there, and all recognised “Petrov” from the RT interview as local boy Mishkin. Several described him as a military doctor who had received the Hero of Russia award a few years earlier. One person said that Mishkin’s grandmother — an elderly former doctor revered in the village — cherished a photo of Putin bestowing the award on Mishkin and shaking his hand.

Extracted from We Are Bellingcat: An Intelligence Agency for the People by EliotHiggins, to be published on February 4 (Bloomsbury £20)



-=-=-=-=-=-=-=-=-=-=-=-
Groups.io Links: You receive all messages sent to this group.
View/Reply Online (#5833): https://groups.io/g/marxmail/message/5833
Mute This Topic: https://groups.io/mt/80116262/21656
-=-=-
POSTING RULES &amp; NOTES
#1 YOU MUST clip all extraneous text when replying to a message.
#2 This mail-list, like most, is publicly &amp; permanently archived.
#3 Subscribe and post under an alias if #2 is a concern.
-=-=-
Group Owner: [email protected]
Unsubscribe: https://groups.io/g/marxmail/leave/8674936/1316126222/xyzzy 
[[email protected]]
-=-=-=-=-=-=-=-=-=-=-=-


Reply via email to