Oh no, you're thinking, yet another cookie pop-up. Well, sorry, it's the law. We measure how many people read us, and ensure you see relevant ads, by storing cookies on your device. If you're cool with that, hit “Accept all Cookies”. For more info and to customise your settings, hit “Customise Settings”.

Review and manage your consent

Here's an overview of our use of cookies, similar technologies and how to manage them. You can also change your choices at any time, by hitting the “Your Consent Options” link on the site's footer.

Manage Cookie Preferences
  • These cookies are strictly necessary so that you can navigate the site as normal and use all features. Without these cookies we cannot provide you with the service that you expect.

  • These cookies are used to make advertising messages more relevant to you. They perform functions like preventing the same ad from continuously reappearing, ensuring that ads are properly displayed for advertisers, and in some cases selecting advertisements that are based on your interests.

  • These cookies collect information in aggregate form to help us understand how our websites are being used. They allow us to count visits and traffic sources so that we can measure and improve the performance of our sites. If people say no to these cookies, we do not know how many people have visited and we cannot monitor performance.

See also our Cookie policy and Privacy policy.

CIA rendition jet was waiting in Europe to SNATCH SNOWDEN

Unmarked Gulfstream tracked as it passed above UK


As the whistleblowing NSA sysadmin Edward Snowden made his dramatic escape to Russia a year ago, a secret US government jet - previously employed in CIA "rendition" flights on which terror suspects disappeared into invisible "black" imprisonment - flew into Europe in a bid to spirit him back to America, the Register can reveal.

Mr Snowden, your ride is waiting. Click here for full size.

On the evening of 24 June 2013, as Snowden arrived in Moscow from Hong Kong intending to fly on to Cuba, an unmarked Gulfstream V business jet - tail number N977GA - took off from a quiet commercial airport 30 miles from Washington DC. Manassas Regional Airport discreetly offers its clients "the personal accommodations and amenities you can't find at commercial airports".

Early next morning, N977GA was detected heading east over Scotland at the unusually high altitude of 45,000 feet. It had not filed a flight plan, and was flying above the level at which air traffic control reporting is mandatory.

"The plane showed up on our system at 5:20 on 25 June," according to our source, a member of an internet aircraft-tracking network run by enthusiasts in the UK. "We knew the reputation of this aircraft and what it had done in the past."

N977GA was not reporting its progress to air-traffic controllers, and thus it would normally have been necessary to use a massive commercial or military radar installation to follow its path. But, even if pilots have turned off automated location data feeds, ordinary enthusiasts equipped with nothing more than suitable radio receivers connected to the internet can measure differences in the time at which an aircraft's radar transponder signal reaches locations on the ground. Using the technique of multilateration, this information is sufficient to calculate the transponder's position and so track the aircraft. (The ACMS/ACARS data feeds which automatically report an aircraft's position are a separate system from the transponder which responds to air-traffic radar pulses. They too can be picked up by receivers on the ground beneath, if they are activated.)

Several such online tracking networks are active in the UK, using this and other sources of information: they include www.flightradar24.com, www.planefinder.net, Planeplotter (www.coaa.co.uk/planeplotter.htm) and www.radarvirtuel.com. UK-based Planeplotter is one of the more sophisticated of these global "virtual radar" systems. It boasts 2,000 members with receivers hooked up to the internet.

The online tracking information reveals that the Gulfstream did not make it all the way to Moscow, but set down and waited at Copenhagen Airport.

Similar topics

Narrower topics


Other stories you might like

  • Star loses $500,000 NFT after crooks exploit Rarible market
    This isn't the moving-fast-and-breaking-things future we wanted

    Miscreants exploited a now-fixed design flaw in the Rarible NFT marketplace to steal a non-fungible token from Taiwanese singer and actor Jay Chou and sell it for about $500,000.

    That's according to folks at Check Point, who on Thursday said the vulnerability could have been abused by crooks to gain full control of victims' marketplace accounts and the funds in them. Earlier this month, Chou said his NFT was stolen in what looked like a phishing attack.

    When researchers Roman Zaikin, Dikla Barda and Oded Vanunu investigated the security shortcoming they found that fraudsters could lure users to click on a link to malicious NFT, enabling them to take control of their marks' Rarible accounts using a standard called EIP-721.

    Continue reading
  • Intel’s neurochips could one day end up in PCs or a cloud service
    The brain-like chip technology could aid with low-power AI tasks like speech recognition

    You may have heard before about Intel's Loihi neuromorphic chips that mimic the way brains work, but what hasn't been clear yet is how the chipmaker will make money from the experimental silicon.

    In a recent roundtable with journalists, Intel Labs lead Rich Uhlig offered two possibilities: integrating Loihi in a CPU for PCs to perform energy-efficient AI tasks and potentially offering the its neuromorphic chips as a cloud service, although Uhlig was clear he wasn't firming actual product plans, just projecting what could theoretically happen in the future.

    "Right now with Loihi, we're at that point where we think we're onto something, but we don't actually have product plans yet. We're sort of earlier on in that work stream," he said last month.

    Continue reading
  • Cybercriminals do their homework for latest banking scam
    What could be safer than sending money to yourself through your own bank?

    A new social engineering scam is making the rounds, and this one is particularly insidious: It tricks users into sending money to what they think is their own account to reverse a fraudulent charge. 

    The FBI's Internet Crime Complaint Center issued the warning, which it said involves cybercriminals who have definitely done their homework. "In addition to knowing the victim's financial institution, the actors often had further information such as the victim's past addresses, social security number, and the last four digits of their bank accounts," the IC3 said. 

    The con starts off as many that target individuals do nowadays: With a text message. In this case it's not a phishing attempt, it's an attempt to ascertain whether the person receiving the message is susceptible to further manipulation. Posing as the target's bank, the message asks whether a large charge ($5,000 in the example the FBI gives) was legitimate and asks for a reply of YES or NO. Replying no leads to a follow-up text: "Our fraud specialist will be contacting you shortly. 

    Continue reading

Biting the hand that feeds IT © 1998–2022