logo
James Bond fanatic shared Grant Shapp's details to fake Russian spies

James Bond fanatic shared Grant Shapp's details to fake Russian spies

Independent6 days ago
A British man who loved James Bond films has been found guilty of trying to spy for what he believed to be Russian intelligence service agents.
Howard Phillips, 65, from Harlow, Essex, intended to help two apparent Russian agents called 'Sasha' and 'Dima', including by passing on personal information about former defence secretary Sir Grant Shapps, helping with travel logistics and booking hotels.
But 'Dima' and 'Sasha' were in fact undercover British intelligence officers, Winchester Crown Court previously heard.
A jury found Phillips guilty of assisting a foreign intelligence service under the National Security Act on Tuesday, following a trial at the same court.
The jury reached a unanimous verdict after four hours and four minutes of deliberations.
Phillips, wearing a dark suit and tie, silently shook his head in the dock as the verdict was given.
Prosecutors said Phillips intended to assist Russian agents from the end of 2023 until May last year.
Phillips offered to pass on Sir Grant's contact details as well as the location where he kept his private plane in order to 'facilitate the Russians in listening on British defence plans', the trial heard.
He was heard telling the men he wanted to work for Russia in exchange for financial independence from the UK.
The defendant's ex-wife, Amanda Phillips, told the court during the trial that he 'would dream about being like James Bond', and that he watched films to do with MI5 and MI6 as he was 'infatuated with it'.
Mrs Phillips told the court she was aware the defendant had applied for a job at the UK Border Force in October 2023, which prosecutors said was part of his bid to assist Russia's intelligence service.
Phillips previously claimed he had contacted the Russian embassy in early 2024 in a bid to track and expose Russian agents to assist Israel.
He told jurors he ascertained 'from the onset' that 'Dima' and 'Shasha' were 'definitely not Russian' and were undercover individuals, but that he carried on 'playing a role' around these agents in order to 'test the waters'.
Mrs Justice Cheema-Grubb remanded Phillips in custody and adjourned sentencing to the 'earliest available date' in the autumn.
The judge said she wanted a full pre-sentence report on the defendant ahead of sentencing as the conviction was for a 'relatively new' offence.
Addressing the jurors, she said: 'Thank you very much for the important work that you have done on this very important case.
'We are trying, as a system, to get to the right answers in these situations.'
Bethan David, head of the Crown Prosecution Service's counter terrorism division, said: 'This conviction sends a clear message to anyone considering spying for or assisting Russia.
'Howard Phillips clearly outlined the services he was willing to provide for a hostile state. From gaining employment within the civil service and applying for security clearance, to providing the personal details of the Secretary of State for Defence – Phillips was brazen in his pursuit for financial gain and unbothered about the potential detriment to his own country.
'It is a criminal offence to assist a foreign intelligence service, regardless of your motive or whether or not you succeed.
'We will always seek to prosecute anyone who poses a threat to the UK.'
Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

Pershore missing mother and daughter found
Pershore missing mother and daughter found

BBC News

time6 minutes ago

  • BBC News

Pershore missing mother and daughter found

A mother and daughter who were missing from their home for nine days have been Mercia Police had appealed for help in finding Hannah Sheehan, 45, and Lydia Sheehan, 14, who were last seen in Pershore, Worcestershire, before disappearing on 18 search spread further afield as the pair had links to Redditch, Stratford, Leamington Spa and Wellesbourne in Warwickshire, with people urged to call they were "found safe and well" on Monday, the force confirmed. Officers thanked everyone who shared information about the police appeal. Follow BBC Hereford & Worcester on BBC Sounds, Facebook, X and Instagram.

Four people injured after two cars crash in Devon
Four people injured after two cars crash in Devon

BBC News

time6 minutes ago

  • BBC News

Four people injured after two cars crash in Devon

A woman has been taken to hospital with life-threatening injuries following a crash in and Cornwall Police said officers were called to the two-vehicle crash on the B3178 Knowle Hill in Budleigh Salterton at 16:15 BST on Sunday, which left four people force said a woman, 67, suffered life-threatening injuries and a man, 62, was seriously injured. Both are from added that a 79-year-old man and a 68-year-old woman from Budleigh Salterton were treated for minor injuries. Police said the road was shut for about seven hours after the Citroen C4 and Peugeot 306 force has asked any witnesses to get in contact.

Chinese hackers have seized control. How did we let this happen?
Chinese hackers have seized control. How did we let this happen?

Telegraph

time6 minutes ago

  • Telegraph

Chinese hackers have seized control. How did we let this happen?

A civilisation that cannot defend itself really should not expect to survive, and after the latest cybersecurity news, I wonder how it can. An official advisory was recently sent out to the US military, warning that all forces must now assume their networks have been breached. The enemy is inside the house. What it means is that no system connected to the internet can be defended. Our own national cybersecurity agency asked UK businesses to make this presumption in 2020. The reason this hasn't been bigger news is that we've become fatalistic and weary, as one cybersecurity attack follows another. So when we discovered in early July that Chinese hackers had gained control of Microsoft servers at hundreds of US government agencies – including the US nuclear weapons agency – it was just another hacking story. What made this one noteworthy was that there wasn't immediately a fix or a patch, Microsoft admitted last Tuesday. Incredibly, confirmation of the US military's 'assume breach' alert had to be dragged out of the Department of Defense via Freedom of Information Act requests by a campaigning non-profit called Property of the People. These developments are the latest stage in an ongoing state-sponsored Chinese campaign, in which hacking has evolved from widespread commercial espionage a decade ago into something far more threatening. The latest phases, Salt Typhoon and now Volt Typhoon, are meticulous and sophisticated. They target not just government agencies like the National Guard, and China-critical MPs like Sir Iain Duncan Smith, but also private sector companies in the energy, telecoms, transport and water sectors. Ciaran Martin, former head of NCSC, the cybersecurity centre based at GCHQ, says that China's capabilities have been transformed. 'Now think of dozens or even hundreds of [individual] hacks at the same time – 'everything, everywhere, all at once' in the words of Jen Easterly, recently departed head of the US Cybersecurity and Infrastructure Security Agency.' Software attacks on our computer systems can create unique damage in ways that conventional warfare cannot. Let's consider two. While aerial bombing can produce spectacular instant results, targets can be disassembled prior to attack, and can be quickly rebuilt after the attack. Both happened with the recent attack on Iraq's nuclear facilities. But recovering from cyber attacks is much harder. Ask the British Library, which has still not restored all of its services. 'Printed catalogues and handlists are available in our Reading Rooms', it still advises visitors to its website. The attack took place in October 2023. A second way in which cyber attacks now present a unique challenge is the ability of Chinese hackers to 'live off the land' after they break through. Rather like special forces embedded behind enemy lines, hackers conceal themselves undetected for months or years. To the guardians of the network, they are just another innocent user. 'Both Salt and Volt Typhoon were in play for years before being detected,' writes Martin. 'And they are strategic compromises of the West on a scale hitherto unseen by any other cyber power.' Not only do we not know when the attack is over, we don't even know when it has begun. How did this happen? If I haven't depressed you enough, this is where it gets particularly troubling. Cybersecurity is a gnarly failure of accountability and regulation that spans decades of indifference, and implicates business complacency and government apathy. The internet protocols (IP) we use today are completely rotten. The great and the good of the IT and telecommunications industries spent the entire 1980s in international committees devising complex secure networking protocols, only to be met with mistrust and specifications no one really wanted. Fed up with waiting, we adopted today's protocols, which were cheap and simple to implement, but not secure. Now, the international standards bodies that might devise a successor to IP are dominated by China. When they fail, suppliers can hide behind licensing agreements and expensive lawyers. No one goes to prison for bad security design. Their customers – us – are guilty of negligence too. Salt Typhoon took advantage of a bug in Cisco routers that users had not bothered to fix for seven years. As a society, we rush to implement technologies without thinking too hard about externalities. Generative artificial intelligence (AI) opens up lots of new holes, and also lowers the bar so that even the technically unskilled can plant hacks. All in all, then, this may not seem a good time to force Britons to use a new government identity service. Especially when you know that 'red team' penetration testing proved in March that this could be penetrated by hostile foreign agents without them being detected. This is what Baroness Neville Jones calls 'a piece of critical infrastructure'. Chinese agents may already be 'living off the land' inside the One Login system, on which your government wallet has been built, and soon perhaps, your digital ID. But don't expect Peter Kyle, the Science and Technology Minister, to put the brakes on the One Login project when he's its biggest fan. To survive and prosper, we need serious and technically aware people in his position, who listen to the security professionals. Kyle appeared on Newsnight last week wearing jeans and a T-shirt and trainers, all of which were intended to signal to viewers his youthful love of digital technology. He is 54.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store