Donald Trump’s home in Mar-a-Lago is a spy magnet

In early August, the Mar-a-Lago (Florida) home of the former US president was raided by the FBI. More than 11,000 government documents, some classified, that Donald Trump failed to return after leaving the White House.have been captured. Among them, information about military forces and A foreign country’s nuclear capabilitiesThe Washington Post revealed on Wednesday.

According to former US intelligence officials, the house was an obvious target for foreign intelligence services. “I know national security experts in government, my former colleagues, are shaking their heads at the damage that can be done.”Former CIA director John Brennan said. on MSNBC. “Mar-a-Lago has been a target of Russian intelligence and other intelligence for the last 18 or 20 months, and I’m sure if they could get people into that house, they would have access to the rooms where these documents are. Copy them, that’s what they would have done.”

“All foreign intelligence services, whether it’s from China, Iran or Russia, are certainly interested in accessing Mar-a-Lago.”Peter Ströck, former deputy director of the FBI’s counterintelligence division, told MSNBC.

A month ago, Organized Crime and Corruption Reporting Programme, a group of investigative journalists posed as Anna de Rothschild, the heir to a banking dynasty, attending Mar-a-Lago with family and friends of Donald Trump, a Russian-speaking immigrant from Ukraine. In fact, Inna Yashshishin, the daughter of a truck driver who immigrated to Canada, was associated with fraudulent enterprises. The young woman attests to a photo of herself on the golf green, saying she met the former president in person.

Trump’s home at Mar-a-Lago ©AP

There’s no evidence that she’s a spy, but this episode highlights how easily Mar-a-Lago can be cracked. When Donald Trump was president, two Chinese women were caught breaking into his Palm Beach home multiple times.

See also  War in Ukraine: Currently on the Ukrainian front, Russian commanders are exposing themselves

One of them was Yujing Zhang, several mobile phones, a laptop, an external hard drive and a USB key were later found to contain the malware. In his hotel room, investigators found nine USB keys, five SIM cards and a “signal detector” device to detect hidden microphones or cameras. He was charged with making false statements, trespassing on a secure site, and illegally entering a building with restricted access and was extradited to China in 2021.

Leave a Reply

Your email address will not be published.