• Buro Jansen & Janssen is een onderzoeksburo dat politie, justitie, inlichtingendiensten, de overheid in Nederland en Europa kritisch volgt. Een grond-rechten kollektief dat al 30 jaar publiceert over uitbreiding van repressieve wetgeving, publiek-private samenwerking, bevoegdheden, overheids-optreden en andere staatsaangelegenheden.
    Buro Jansen & Janssen Postbus 10591, 1001EN Amsterdam, 020-6123202, 06-34339533, signal +31684065516, info@burojansen.nl (pgp)
    Steun Buro Jansen & Janssen. Word donateur, NL43 ASNB 0856 9868 52 of NL56 INGB 0000 6039 04 ten name van Stichting Res Publica, Postbus 11556, 1001 GN Amsterdam.

  • Categorieën

  • Panama Papers: Spy agencies widely used Mossack Fonseca to hide activities

    Intelligence agencies from several countries, including CIA intermediaries, have abundantly used the services of Panamanian law firm Mossack Fonseca to “conceal” their activities, German newspaper Sueddeutsche Zeitung (SZ) says, citing leaked documents.

    Both “secret agents and their informants have used the company’s services,” wrote the newspaper, which earlier this month published online materials based on 11.5 million documents from the Panamanian law firm. It has been called the largest leak on corruption in journalistic history.

    “Agents have set up shell companies to conceal their activities,” the Munich-based newspaper reported, adding that there are CIA mediators among them.

    According to SZ, Mossack Fonseca’s clients also included some of those involved in the so-called Iran-Contra affair, in which several Reagan administration officials secretly facilitated arms sales to Iran in the 1980s in order to secure the release of US hostages and fund Nicaragua’s Contra rebels.

    Read more
    © RT‘Who’s funding this?’ CIA & MI5 whistleblowers question credibility of Panama Papers coverage
    The Panama Papers also claim to reveal that some “former high-ranking officials of the intelligence services of Saudi Arabia, Colombia and Rwanda” are listed amongst the company’s clients. Among them was Sheikh Kamal Adham, the former Saudi intelligence chief, who according to SZ, was “one of the CIA’s key intermediaries in the 1970s” in the Middle East region.

    The Panama leak claims to expose the offshore holdings of 12 current and former world leaders and provides data on the financial activities of 128 other politicians and public officials from different countries. Newspapers around the globe had plenty of world leaders to choose from, – from President of Ukraine Petro Poroshenko to King Salman of Saudi Arabia and the late father of British Prime Minister David Cameron.

    With high-profile figures on the menu, the majority of the international media rushed to accuse Vladimir Putin of corruption, even though neither he nor any members of his family were mentioned in the Panama Papers leak.

    Last week WikiLeaks tweeted that the US government and American hedge-fund billionaire George Soros allegedly funded the Papers to attack Putin. According to the international whistleblowing organization, the US government’s funding of such an attack appeared to be a serious blow to its integrity.

    Read more
    Demonstrators hold placards during a protest outside Downing Street in Whitehall, central London, Britain April 9, 2016 © Neil HallCrowds march in London to demand Cameron resignation following Panama Papers leak (IMAGES)
    One former CIA officer told RT that the fact that the Western media has been unanimously using the Russian leader as the “face” of the Panama Papers leak can be explained by one simple look at the organizations behind these news outlets.

    “Everyone in corporate press is controlled by corporations that profit on wars and have an interest in creating tensions – all these people in the Western press, like the Guardian, are blackening Putin [for being] a designated villain here. Curiously, his name is not in these documents,” Ray McGovern said, adding that it was “a major mistake made by the leaker” to hand the documents over to the corporate media, instead of leaking them to trusted independent journalists.

    There were many raised eyebrows particularly over little mention of the exposed offshore dealings of UK Prime Minister David Cameron’s late father. Last week the British PM admitted that he benefited from shares in an offshore trust set up by his father. Cameron, who is facing outrage over revelations concerning his private finances, told ITV that he had received £300,000 (about $420,000) in inheritance from his father, who died in 2010. Yet he claimed that he didn’t know whether any of that money came from an offshore source. A massive protest gathered in front of PM David Cameron’s residence at 10 Downing Street on Sunday, calling for his resignation.

    Published time: 12 Apr, 2016 13:22
    © Rodrigo Arangua / AFP
    Find this story at 12 April 2016

    © Autonomous Nonprofit Organization “TV-Novosti”, 2005–2016.

    US-Agenten nutzten offenbar Briefkastenfirmen

    Die CIA bemühte über Mittelsmänner anscheinend die Dienste der Kanzlei Mossack Fonseca: Laut einem Bericht der “SZ” ließen Agenten in den Achtzigern Briefkastenfirmen gründen, um ihre Aktionen zu verschleiern.

    US-Geheimdienstler sollen “in erheblichem Umfang” die Dienste der Kanzlei Mossack Fonseca in Panama genutzt haben. Das geht laut der “Süddeutschen Zeitung” (“SZ”) aus den Panama Papers hervor. Demnach ließen Agenten Briefkastenfirmen gründen, um ihre Aktionen zu verschleiern. Unter ihnen seien auch Mittelsmänner aus dem Umfeld des amerikanischen Auslandsgeheimdienstes CIA.

    Zur Kundschaft von Mossack Fonseca gehörten demnach in den Achtzigerjahren etwa Figuren der Iran-Contra-Affäre. Dabei ging es um geheime Waffenlieferungen der CIA an Teheran. In diesem Zusammenhang wird unter anderem ein US-Geschäftsmann genannt, der Flugzeuge verlieh. Mit einer seiner Maschinen sollen laut dem Bericht in den Achtzigerjahren im Auftrag der CIA Waffen nach Teheran geliefert worden sein. Der Geschäftsmann bestreitet, von der Operation gewusst zu haben.

    Auch weitere Unternehmen, die immer wieder in Verdacht geraten sind, dem US-Geheimdienst geholfen zu haben, tauchen der “SZ” zufolge in dem Material auf.

    Außerdem seien unter den gegenwärtigen oder früheren Kunden hochrangige Geheimdienstverantwortliche aus mindestens drei Ländern zu finden, konkret aus Saudi-Arabien, Kolumbien und Ruanda – auch der saudische Scheich Kamal Adham, der in den Siebzigerjahren als wichtigster Ansprechpartner der CIA in der Region galt.

    Ein weiterer Kunde Mossack Fonsecas ist nach Angaben der “SZ” der Isländer Loftur Johannesson. Er werde im Zusammenhang mit mindestens vier Briefkastenfirmen genannt. Der SPIEGEL bezeichnete ihn Anfang der Neunziger in einem Artikel über die “guten Kunden der CIA” als Kontaktperson des Geheimdienstes. In mehreren Büchern und Artikeln heißt es, Johannesson habe im Auftrag der CIA Waffen in Krisenregionen geliefert, unter anderem nach Afghanistan, so die “SZ”.

    Johannesson habe über einen Sprecher erklären lassen, er sei Geschäftsmann im Luftfahrtgeschäft und nicht für Geheimdienste tätig. Die Kanzlei in Kanada erklärte laut dem Bericht zudem, sie überprüfe ihre Kunden gründlich. Sollte ein Mandant seine Identität oder die Herkunft seiner Gelder nicht angemessenen nachweisen, so werde sie mit ihm nicht zusammenarbeiten.

    12. April 2016, 00:03 Uhr
    Find this story at 12 April 2016

    © SPIEGEL ONLINE 2016

    CIA middlemen and other spies used Panama Papers law firm to hide activities, report says

    Secret agents from several countries, including intermediaries of the CIA, have used the services of Panamanian law firm Mossack Fonseca in order to “conceal” their activities, German newspaper Sueddeutsche Zeitung reported Tuesday.
    “Secret agents and their informants have made wide use of the company’s services,” wrote the newspaper, which obtained a massive stash of 11.5 million documents from the company that is sending shockwaves around the globe.
    “Agents have opened shell companies to conceal their activities… Among them are close intermediaries of the CIA,” the newspaper reported.
    China’s elite hiding billions overseas

    The Munich-based newspaper said Mossack Fonseca’s clients included “several players” in the 1980s Iran-Contra scandal, which saw senior US officials facilitate secret arms sales to Iran in a bid to secure the release of American hostages and fund Nicaragua’s Contra rebels.
    The Panama Papers also reveal that “current or former high-ranking officials of the secret services of at least three countries… Saudi Arabia, Colombia and Rwanda” are listed amongst the company’s clients, the Sueddeutsche said.
    Hong Kong’s rich face exposure in tax-haven leak

    Among them was Sheikh Kamal Adham, the former Saudi intelligence chief who died in 1999. Adham “spent the 1970s as one of the CIA’s key intermediaries” in the Middle East, the daily said.
    The Sueddeutsche Zeitung received the huge stash of Mossack Fonseca documents from an anonymous source and shared them with more than 100 media groups through the International Consortium of Investigative Journalists.
    A week after the first revelations, the documents have shed light on how the world’s rich and powerful have used offshore companies to stash their assets, forcing Iceland’s prime minister to resign and putting pressure on a slew of other leaders around the world.

    PUBLISHED : Tuesday, 12 April, 2016, 1:49pm
    Agence France-Presse

    Find this story at 12 April 2016

    Copyright © 2016 South China Morning Post Publishers Ltd.

    The Covert Roots of the Panama Papers

    Panama has long been a haven for money launderers—including the CIA.

    It should come as no surprise that the CIA’s finances are a secret. One of the rare glimpses into the agency’s funding came when Edward Snowden leaked a copy of the intelligence “black budget” to The Washington Post in 2013. But if history is any indication, the CIA may well have resources that don’t appear on any congressional document, highly classified or otherwise. Covert operations, by their very nature, often require access to off-the-books funding. The CIA’s first operation was paid for with funds seized from the Nazis, and in the years since, the agency has been notoriously creative about how it obtains its money.

    Signal

    The Panama Papers underscore how tax havens are used by covert agencies and other shadowy players to launder dirty money, a practice that has a long history in which Panama, in particular, has played a notable part.

    Adnan Khashoggi would know. A “principal foreign agent” of the United States, as one Senate report referred to him, the billionaire playboy made a fortune (more than $100 million between 1970 and 1975 alone) from commissions negotiating arms deals with his native Saudi Arabia. He used these windfalls, in turn, to cultivate political clout—including, allegedly, with President Richard Nixon. In the aftermath of Watergate, when Congress began reining in the CIA, Khashoggi helped establish the supranational intelligence partnership known as the Safari Club. Soon after, he aided the CIA in circumventing another congressional impediment. With money borrowed from the Saudi and U.S. intelligence-linked Bank of Credit and Commerce International, he financed the illegal arms sales that set off the Iran-Contra scandal.

    One way Khashoggi structured his shadowy holdings during his heyday was through the specialized services of Mossack Fonseca, the law firm that is in the news for having helped global luminaries like Vladimir Putin hide their money. Thanks to a recent report from the International Consortium of Investigative Journalists, we now know Khashoggi to be among a number of former spies and CIA associates implicated by the 2.6 terabytes of offshore financial documents provided to the German newspaper Süddeutsche Zeitung last summer.

    That his name should appear in an international dark money scandal suggests something about the nature of tax havens that much of the media’s coverage has thus far avoided grappling with. The Panama Papers have largely been presented as an unprecedented insight into how global elites hide their fortunes from tax collectors and other regulators. But they also underscore how tax havens are used by covert agencies and other shadowy players to launder dirty money, a practice that has a long history in which Panama, in particular, has played a notable part.

    The Panama Papers date back to 1977. By then, the Carter administration, worried that it could jeopardize negotiations over the Panama Canal, had already willed itself into forgetting what the U.S. government had long known about Panama’s intimate role in the burgeoning South American cocaine trade. Serious allegations against Manuel Noriega, the intelligence chief who would go on to become the country’s ruler, had been brought to the attention of the now-defunct Bureau of Narcotics and Dangerous Drugs as early as 1971. But the United States’s interests in Panama were at least as strong as those of the emerging coke lords who were using Panama as a stopover for drug shipments headed north. In some cases, their interests were one and the same.

    At the time, the Panama Canal Zone played host to the School of the Americas, the U.S. military training academy infamous for the remarkable array of atrocities committed by its highest-achieving graduates. Not far from the SOA facility was the classified U.S. communications network used to coordinate Operation Condor, the cross-border rendition, torture, execution, and assassination program implemented by the South American dictatorships of the era. With its abundance of U.S. surveillance hardware and constant influx of easily disguised foreigners, Panama became a sort of regional outpost for U.S. Cold War intelligence.

    A proud SOA alumnus himself, Noriega was recruited by the U.S. Defense Intelligence Agency in 1959 and received his first check from the CIA in 1967. The military coup that broke out that year catapulted him to the top of Panama’s spy agency, a position for which the ruthless, ideologically flexible Noriega proved to be uniquely well-suited.

    Noriega had a talent for the double life. He would fly to Washington to meet with CIA Director William Casey one day and to Havana to meet with Fidel Castro the next, positioning himself as a key interlocutor between the sworn enemies and playing one side off the other. He was just as comfortable railing against Yankee imperialism as he was serving up rivals and narco-associates in exchange for DEA commendations. Noriega allegedly charged $200,000 a planeload to protect the Medellin Cartel’s shipment routes. The $200,000 a year he collected from the Reagan administration must have seemed a pittance by comparison.

    CIA payments to Noriega were channeled through accounts he maintained at the Bank of Credit and Commerce International, the agency’s preferred conduit for its secret dealings with Saudi and Pakistani intelligence and with the heroin-trafficking mujahedeen insurgency in Afghanistan. During the same period, Adnan Khashoggi, who was listed on a 1991 Defense Intelligence Report as having sold machine guns to the Medellin Cartel, was borrowing from the bank to finance weapons sales to Iran—the proceeds for which, like some of Noriega’s earnings, were then funneled to the Nicaraguan Contras. Subsequent federal prosecutions determined BCCI’s Panamanian branch, in particular, to be actively engaged in money laundering for the Colombian drug trade. A Senate subcommittee report called the bank a “fundamentally corrupt criminal enterprise.”

    But BCCI was hardly the only Panamanian financial house awash in drug profits and covert intrigue. As a 1985 House Foreign Affairs report explained, it was hard to find a Panamanian bank that wasn’t engaged, to one degree or another, in some form of untoward activity. “With more than one hundred banks, the U.S. dollar as the national currency, and strict bank secrecy laws, Panama is an ideal haven for laundering narcotics money. Unlimited amounts of money may be brought into and out of the country with no reporting requirements, and money laundering is not a crime.” Corruption in government and the military, the committee found, was “endemic and institutionalized.”

    Panama, to borrow the words of the Senate’s Iran-Contra report, had become the “hemisphere’s first ‘narco-kleptocracy,’” a major financial clearing house not just for the Colombian cartels, but for illegal groups of all stripes in the region, as well as “legitimate” businesspeople drawn to the exciting new services being offered thanks to the logistical demands and largesse of the drug trade. Americans were sinking millions into this innovative tax haven, and the surplus of available dirty currency actually insulated Panama from the debt crises that were sweeping the region at the time—converting it into a secure, relatively stable place for the Third World rich to hide their money.

    “Particularly popular with Latin Americans,” writes Dr. Rachel Ehrenfeld in Evil Money, “was a double-shell arrangement, in which the Bahamian cover was overlaid with Panamanian corporate shells. Panamanian lawyers were equally adept at creating fictitious companies. The money would be wired from one corporate account to another without revealing the identity of the real owner.”

    Dummy companies of this sort, set up by the White House and registered in Panama, were used to float the Nicaraguan Contras. Noriega’s personal Swiss-based lawyer even helped Marine Colonel Oliver North construct a front for an airfield in Costa Rica. A veritable fleet of aircraft, including planes provided by Noriega and some paid for through a BCCI account, made the circuitous journey from secret runway to secret runway, dropping off weapons in Honduras and Costa Rica, cocaine in the southern United States, and large stacks of small-denomination bills in Panamanian bank vaults.

    As we continue to dig through the many layers of corruption, lawbreaking, and bad faith that have accumulated in the intervening years, it’s important to recognize that the quintessentially private practices that now form the basis for the Panama Papers revelations emerged within a context of large-scale state criminality.

    The 1989 U.S. invasion that led to Noriega’s arrest only exacerbated the underlying problems of Panamanian governance. As Jonathan Marshall, co-author of the indispensable Cocaine Politics, explained, between “economic sanctions, capital flight, war damage, and a more than a billion dollars’ worth of damage from post-conflict looting,” any new president would have faced significant challenges. It happened that the one the United States installed, Guillermo Endara, had dubious ties to a bank the DEA and FBI both suspected of money laundering. Endara’s appointees for attorney general, treasury minister, and chief Supreme Court justice had each served as director of a bank shut down for its alliance with Colombia’s Cali Cartel. By the U.S. government’s own estimation, trafficking and laundering got worse in the invasion’s aftermath, a legacy that has continued on to the present day. Facing corruption charges, the country’s most recent president has sought refuge in Miami.

    After the invasion, a joke started circulating around Panama that seems fairly prescient, in light of the Panama Papers. “They took Ali Baba,” it went, “and left us with the 40 thieves.”

    BY STEVEN COHEN
    April 8, 2016
    Find this story at 8 April 2016

    Copyright 2016 © New Republic.

    Swiss banker whistleblower: CIA behind Panama Papers

    Bradley Birkenfeld is the most significant financial whistleblower of all time, so you might think he’d be cheering on the disclosures in the new Panama Papers leaks. But today, Birkenfeld is raising questions about the source of the information that is shaking political regimes around the world.

    Birkenfeld, an American citizen, was a banker working at UBS in Switzerland when he approached the U.S. government with information on massive amounts of tax evasion by Americans with secret accounts in Switzerland. By the end of his whistleblowing career, Birkenfeld had served more than two years in a U.S. federal prison, been awarded $104 million by the IRS for his information and shattered the foundations of more than a century of Swiss banking secrecy.

    In an exclusive interview Tuesday from Munich, Birkenfeld said he doesn’t think the source of the 11 million documents stolen from a Panamanian law firm should automatically be considered a whistleblower like himself. Instead, he said, the hacking of the Panama City-based firm, called Mossack Fonseca, could have been done by a U.S. intelligence agency.
    “The CIA I’m sure is behind this, in my opinion,” Birkenfeld said.
    Birkenfeld pointed to the fact that the political uproar created by the disclosures have mainly impacted countries with tense relationships with the United States. “The very fact that we see all these names surface that are the direct quote-unquote enemies of the United States, Russia, China, Pakistan, Argentina and we don’t see one U.S. name. Why is that?” Birkenfeld said. “Quite frankly, my feeling is that this is certainly an intelligence agency operation.”

    A poolside view overlooking the newer side of the Panama City skyline.
    Panama Papers show tax avoidance like a ‘cancer’
    Asked why the U.S. would leak information that has also been damaging to U.K. Prime Minister David Cameron, a major American ally, Birkenfeld said the British leader was likely collateral damage in a larger intelligence operation.
    “If you’ve got NSA and CIA spying on foreign governments they can certainly get into a law firm like this,” Birkenfeld said. “But they selectively bring the information to the public domain that doesn’t hurt the U.S. in any shape or form. That’s wrong. And there’s something seriously sinister here behind this.”

    The public relations office for the CIA did not immediately return a message for comment.
    Birkenfeld also said that during his time as a Swiss banker, Mossack Fonseca was known as one piece of the vast offshore maze used by bankers and lawyers to hide money from tax authorities. But he also said that the firm that is at the center of the global scandal was also seen as a relatively small player in the overall offshore tax evasion business.

    The sign in front of the building that houses law firm Mossack Fonseca in Panama City, Panama.
    Did ‘smart’ people avoid the Panama Papers?
    Bradley Birkenfeld, a former banker with UBS AG, walks outside Schuylkill Federal Correctional Institution after speaking to the media in Minersville, Pennsylvania, U.S., on Friday, Jan. 8, 2010.
    Why did the US pay this former Swiss banker $104M?

    “We knew that firm very well in Switzerland. I certainly knew of it,” Birkenfeld said.
    But Mossack Fonseca was just one of a number of firms in Panama offering such services, he said. “The cost of doing business there was quite low, relatively speaking,” he said. “So what you would have is Panama operating as a conduit to the Swiss banks and the trust companies to set up these facilities for clients around the world.”

    Eamon Javers CNBC.com
    12 April 2016

    Find this story at 12 april 2016

    © 2016 CNBC LLC.

    Correction: Serbia-Paris-Guns story

    The head of a Serbian arms factory Milojko Brzakovic speaks during an interview with The Associated Press, in Belgrade, Serbia, Thursday, Dec. 10, 2015. Brzakovic of the Zastava arms factory told the Associated Press Thursday that the M92 semi-automatic pistol was traced after its serial number matched the one delivered to an American arms dealer in May 2013.

    BELGRADE, Serbia (AP) — In a Dec. 10 story, The Associated Press incorrectly reported that a gun exported by a Serbian manufacturer to a Florida-based company was involved in the Nov. 13 Paris attacks. In fact, the gun in question was not involved in the attacks and has been in Mexican government custody since March of this year, according to U.S. authorities.

    The AP report was based on information from the Serbian gun manufacturer Zastava, which cited to AP an advisory from the Serbian Interior Ministry. The advisory quoted Interpol authorities as saying a gun manufactured by Zastava with a particular serial number was used in Paris. The AP story should have made clear that the connection between a Zastava gun with that serial number and the Paris attacks was based only on this advisory.

    Zastava said it exported a gun with that serial number to Delray Beach, Florida-based Century Arms in 2013. According to the U.S. Bureau of Alcohol, Tobacco, Firearms and Explosives, the gun was received by Century and eventually sent to a federal firearms licensee in the United States and purchased by an individual in February 2014. In March of this year it was recovered at a crime scene in Mexico and is still in the custody of Mexican officials, ATF said.

    Serbian authorities declined to provide any additional details this week on the advisory cited by Zastava or what it was based on. Interpol said it could not provide additional material because it only acts as a clearinghouse for information among police agencies. Interpol said it would defer to the information from the Bureau of Alcohol, Tobacco, Firearms and Explosives on the case.

    By JOVANA GEC and DUSAN STOJANOVIC
    Dec. 18, 2015 2:15 PM EST

    find this story at 18 December 2015

    © 2015 Associated Press

    U.S. Mass Surveillance Has No Record of Thwarting Large Terror Attacks, Regardless of Snowden Leaks

    Despite the intelligence community’s attempts to blame NSA whistleblower Edward Snowden for the tragic attacks in Paris on Friday, the NSA’s mass surveillance programs do not have a track record — before or after Snowden — of identifying or thwarting actual large-scale terrorist plots.

    CIA Director John Brennan asserted on Monday that “many of these terrorist operations are uncovered and thwarted before they’re able to be carried out,” and lamented the post-Snowden “handwringing” that has made that job more difficult.

    But the reason there haven’t been any large-scale terror attacks by ISIS in the U.S. is not because they were averted by the intelligence community, but because — with the possible exception of one that was foiled by local police — none were actually planned.

    And even before Snowden, the NSA wasn’t able to provide a single substantiated example of its surveillance dragnet preventing any domestic attack at all.

    The recent history of terror arrests linked to ISIS is documented in an internal unclassified Department of Homeland Security document provided to The Intercept via SecureDrop. It shows that terror arrests between January 2014 and September 2015 linked to ISIS were largely of people trying to travel abroad, provide material support, or plan attacks that were essentially imaginary.

    The document, dated before the Paris attacks, includes a list and map of 64 U.S. persons arrested on terror-related charges over the course of nine months who were “assessed to be inspired by the Islamic State of Iraq and the Levant,” or ISIS.

    ?
    Isil Related Arrests in Homeland From jan2014 sept2015 Final Redacted
    6 pages
    The document assigns six categories to types of arrests made in the given time period: a foiled attack, “aspirational” planning, “advanced attack plotting,” failed travel, travel, or material support.

    The only foiled attack involved the arrests of Elton Simpson and Nadir Soofi, who traveled from Arizona to Garland, Texas, bearing assault weapons and body armor, intending to shoot up an art contest involving the drawing of cartoons of the Prophet Muhammad. Both attackers were shot by local police officers.

    There are just five instances of what the report’s authors call “advanced attack plotting” — two of which involve the FBI providing assistance in planning or acquiring supplies for an attack before making an arrest.

    Harlem Suarez, a 23-year-old from Florida, had been posting on Facebook about his support for ISIS when an undercover FBI agent started communicating with him, eventually about a “timer bomb” he wanted to construct and detonate on a public beach in Key West. Suarez asked the undercover agent if he knew how to assemble a bomb, and the agent agreed to get what he needed, subsequently goading him by asking if he was “true to the Islamic State” or “just playing games.” Suarez paid the FBI agent for the materials to assemble the bomb, and the agent taught him how to detonate it. When he tried to carry out the attack, he was arrested. His attorneys described him as “troubled and confused” in a statement.

    An FBI agent also provided a fake explosive device to John T. Booker, a 20-year-old Kansas man who was indicted for attempting to use a weapon of mass destruction.

    Christopher Cornell, a 20-year-old from Ohio, started posting on Twitter under an alias about his support for ISIS when someone in contact with Cornell agreed to be an FBI informant. Cornell talked about attacking the U.S. Capitol. But his father said it was the FBI that was “taking him somewhere, and they were filling his head with a lot of this garbage.”

    Munther Omar Saleh, a New York college student, was arrested after trying to stab federal officers executing a search warrant at his home. The FBI said he and a co-conspirator discussed setting off a pressure-cooker bomb in New York, but no such charge was filed.

    Usaamah Rahim, a 26-year-old Boston man, was killed by police officers when he was stopped for questioning after allegedly threatening them with a knife. He had been posting ISIS-inspired social media messages, and had threatened to kill Pamela Geller, the host of the Garland, Texas, Muhammad cartoon contest. Law enforcement sources called that plot a “fantasy,” but said his second plan, to kill cops, was more believable.

    There were 12 examples of “aspirational” plots, or even less advanced plans to commit attacks.

    There were 30 arrests involving people who were trying to travel to join up with ISIS, most of whom failed, and 15 of people attempting to provide some sort of “material support.”

    That’s hardly a record of averting major ISIS attacks on the homeland.

    In fact, there’s no evidence that the NSA’s extraordinary surveillance dragnet, as revealed by Snowden, has disrupted any major attack within the U.S. ever.

    The U.S. government initially responded to Snowden’s disclosures in 2013 by suggesting that he had irreparably damaged valuable, life-saving capabilities. Two weeks after the media first reported on Snowden’s leaks, President Barack Obama said that the NSA “averted … at least 50 threats … because of this information,” gathered through communications collection in the United States and abroad.

    Members of Congress and the administration alike subsequently repeated that claim, upping the total to 54 attacks thwarted.

    But only 13 of the 54 cases “had some nexus to the U.S.,” Senator Patrick Leahy, D-Vt., said in a Senate Judiciary Committee hearing in October 2013. And they were not all terror “plots”; a majority involved providing “material support,” like money, to foreign terror organizations.

    Then-NSA Director Keith Alexander was forced to dial back the rhetoric, eventually saying only that the intelligence programs “contributed to our understanding” and “helped enable the disruption of terrorist plots.”

    The only incident the NSA has ever disclosed in which its domestic metadata collection program played a key role involved a San Diego man who was convicted of transferring $8,500 to al Shabaab in Somalia — the terror group responsible for a mass shooting at a mall in Kenya. And the metadata program is the only one that has been reigned in since the Snowden disclosures.

    The three other terrorism cases the NSA cited as warrantless surveillance success stories were debunked. Either the government could have gotten a warrant, or it received a tip from British intelligence, or it was a case of fraud, not terrorism.

    A White House panel concluded in December 2013 that the NSA’s bulk collection of Americans’ telephone information was “not essential in preventing attacks.” A member of the panel took it one step further, when he told NBC News that there were no examples of the NSA stopping “any [terror attacks] that might have been really big” using the program.

    Jenna McLaughlin
    Nov. 17 2015, 8:19 p.m.

    Find this story at 17 November 2015

    Copyright https://theintercept.com/

    AMERICAN TERRORIST

    FRONTLINE investigates American-born terrorist David Coleman Headley, who helped plan the deadly 2008 siege on Mumbai. In collaboration with ProPublica, the film — an updated and expanded version of A Perfect Terrorist — reveals how secret electronic surveillance missed catching the Mumbai plotters, and how Headley planned another Charlie Hebdo-like assault against a Danish newspaper.

    APRIL 21, 2015 // 01:23:48

    Find this story at 21 April 2015

    Copyright http://www.pbs.org/

    Inside Allan Dulles’ Reign as CIA Director, from ’54 Guatemala Coup to Plotting Castro’s Overthrow

    DAVID TALBOT
    author of the new book The Devil’s Chessboard: Allen Dulles, the CIA, and the Rise of America’s Secret Government. He is the founder and former CEO and editor-in-chief of Salon. He is also author of the best-seller, Brothers: The Hidden History of the Kennedy Years.
    This is viewer supported newsDONATE
    Voters go to the polls in Guatemala on Sunday to elect a new president after a popular uprising led to President Otto Pérez Molina’s resignation and jailing. We speak with journalist and historian David Talbot, author of “The Devil’s Chessboard: Allen Dulles, the CIA, and the Rise of America’s Secret Government,” about the role Allen Dulles and his brother, then-Secretary of State John Foster Dulles, played in the CIA’s 1954 coup in the country, the ramifications of which are still being felt. “The CIA and Allen Dulles told Eisenhower after the Guatemala coup, ‘Oh, it was a clean coup. You know, hardly anyone died,'” Talbot said. “But the fact is, tens of thousands of people died in the killing fields of Guatemala as a result of that coup, and that violence continues today.”

    TRANSCRIPT
    This is a rush transcript. Copy may not be in its final form.
    AMY GOODMAN: We turn now to Part 2 of my conversation with the author of The Devil’s Chessboard: Allen Dulles, the CIA, and the Rise of America’s Secret Government. The new book is written by journalist and historian David Talbot, the founder of former CEO and editor-in-chief of Salon. The book examines the life and legacy of Alan Dulles, the longest-serving CIA director. He held the position from 1953 to ’61, but his influence is still felt at the agency. Under his watch, the CIA overthrew the governments of Iran and Guatemala in 1953 and 1954, invaded Cuba, and was tied to the killing of Patrice Lumumba, Congo’s first democratically elected leader.

    During Part 1 of our conversation, I asked David Talbot about the 1953 coup in Iran and the ’61 murder of Patrice Lumumba. Part 2 of our interview begins with Guatemala. The ramifications of the CIA’s 1954 coup are still being felt in Guatemala, where voters will go to the polls next Sunday to elect a new president. Last month, President Otto Pérez Molina resigned and was jailed following a popular uprising. I asked David Talbot to talk about the ’54 coup and the role played by Allen Dulles and his brother, John Foster Dulles, who was secretary of state at the time.

    DAVID TALBOT: Well, of course, their original power goes back to Sullivan & Cromwell, this very powerful Wall Street law firm that John Foster Dulles ran and where Allen Dulles worked. And among their clients was United Fruit. United Fruit, of course, was this colossus, this corporate colossus, that ruled much of Latin America, owned, you know, vast acreage in Guatemala and many other countries. They weren’t just a banana company. They were a multinational real estate company. They owned often the utilities. And they owned the local political elites in those countries.

    In the early ’50s, Jacobo Árbenz, this young military officer, a reform officer, starts to emerge as a potential leader. He runs for president and is elected by his people on a reform campaign. And one of the first things he does, of course, in this country that’s basically a medieval country ruled by land barons, is to begin to nationalize some of the land, that’s not being even used by United [Fruit], and give it to the people themselves, the farmers, to work. And this provokes a major backlash from United Fruit, from the local political elites, the oligarchs, and from the CIA. Allen Dulles, working for Eisenhower as CIA director, portrays Jacobo Árbenz as a dangerous communist—he wasn’t—and prepares to overthrow him in a military coup, which does occur.

    What I tell the story of, mostly I focus on, is the tragic aftermath of that coup, because not only for the Árbenz family, which, in some ways, were the Kennedys of Guatemala—glamorous, young couple, Jacobo and María Árbenz, their children, very good-looking, wealthy, but very committed to uplifting the poor in that country. And after the coup, they’re sent into a terrible exile. No country will touch them, because CIA pressure. The CIA and the State Department pressure every country, from Mexico throughout Latin America, not to take the Árbenz family in. They’re finally forced to go behind the Iron Curtain to Czechoslovakia to seek exile. They’re not happy there. They finally end up back in Mexico, but they’re under tight supervision. The family is haunted. It’s stalked wherever it goes. One of his daughters commits suicide. And Jacobo Árbenz himself ends up dead under mysterious circumstances—scalded to death in a bathtub in a Mexico City hotel. His family today believes that he was assassinated. And given the fact that the CIA had a death list of left-wing figures, journalists, political leaders, after the coup that were to be eliminated, that, you know, is a distinct possibility.

    So, these ripples of tragedy, after these coups, go on and on. You know, the CIA and Allen Dulles told Eisenhower after the Guatemala coup, “Oh, it was a clean coup. You know, hardly anyone died.” But the fact is, tens of thousands of people died in the killing fields of Guatemala as a result of that coup, and that violence continues today.

    AMY GOODMAN: And wasn’t it also a precursor to what happened with the Bay of Pigs? Move forward like, what, six years, and explain what happened.

    DAVID TALBOT: Right. Well, emboldened by how easy it was to do a regime change in Guatemala, yes, when Fidel Castro comes to power in Cuba, he again antagonizes the same corporate interests that the Dulles brothers represent—oil companies, like the Rockefeller-owned Standard Oil, and others, agribusiness firms. So they believe that Fidel has to be eliminated, and they begin plotting, under the Eisenhower administration, with Eisenhower’s approval, to kill, to assassinate Fidel Castro. And, in fact, at one point, Fidel Castro, who was beloved in this country after the revolution—he had overthrown a thug, a Mafia-backed thug, Batista, a very corrupt and violent dictatorship. He was seen as the future, and very glamorous, he and Che Guevara and so on. They would come to New York and would be mobbed by people in the streets. When they came to New York for a U.N. meeting in 1960, though, the Eisenhower administration was already pushing back, and no hotel would take them. Finally, a hotel in Midtown did take them, but there was—they asked for so much money as security, they were basically blackmailing Fidel. He was outraged, and he ended up staying in a hotel in Harlem that took him in.

    AMY GOODMAN: Hotel Theresa.

    DAVID TALBOT: Hotel Theresa. And they stood up to this Washington pressure, the manager of that hotel, who was African-American. He had grown up in Jim Crow South. And he said, “You know, I know what it’s like to be denied a roof over your head. This Cuban delegation can stay here.” So it was a very—

    AMY GOODMAN: Did he meet Malcolm X there?

    DAVID TALBOT: He did. It was a very dramatic moment. Malcolm X makes a visit to the Hotel Theresa. He squeezes into his suite, where there’s dozens of people crammed. They have a very interesting encounter, Fidel and Malcolm. And it really changed their lives and had a big impact on both of those men for years afterwards. In fact, Malcolm said he was one of the few white men that he learned to respect and appreciate. And, by the way, there was an FBI guy taking notes the whole time in that hotel room, so we know some of what happened there and the dialogue, because of the FBI report on this.

    AMY GOODMAN: Who was it?

    DAVID TALBOT: Well, his name was not revealed, but there was an agent surveilling him. But meanwhile, while Fidel is there, meeting with Khrushchev from the Soviet Union and Nasser from Egypt and the world leaders and embarrassing the Eisenhower administration, because here he’s gone to Harlem, and, you know, no one else would take him in, in Midtown Manhattan—meanwhile, the Mafia is meeting with CIA agents at the Plaza Hotel, just blocks away, plotting his assassination. So, a lot of intrigue in 1960 going on in New York. And then, to make it even more interesting, a young JFK, who’s campaigning for president, after Fidel has left, shows up at the Hotel Theresa and basically says, “This is revolutionary ground I’m standing on. And we should welcome the winds of change and the revolution, the future. We shouldn’t be afraid of it.” So, very end—and begins to talk about the mortality rate of black infants in Harlem and many of the issues that are still current.

    AMY GOODMAN: And yet, look at what President Kennedy, then President Kennedy, did, when it came to Cuba—

    DAVID TALBOT: Exactly.

    AMY GOODMAN: —what happened under his reign, from the Bay of Pigs to the endless assassination attempts of Fidel Castro.

    DAVID TALBOT: Kennedy did do a flip-flop, to an extent, after that. He came in as president. He was young. He was untested, under a lot of pressure from the national security people in his administration. He inherited the Bay of Pigs operation, the plans for that. He was basically told, “Look, if you pull the plug on this thing, it’s so far along now, there will be a major political backlash against you.” So he was kind of sandbagged by the CIA. He did go through with it, but he had no intention of widening it into an all-out U.S. military assault on the island, on Cuba. But that’s what the CIA had in mind. They knew that this motley crew of Cuban exiles they put together to invade the island wasn’t sufficient to unseat Castro. But what they hoped and what they planned was that a young President Kennedy, as this invasion was bogged down on the beaches of the Bay of Pigs, would be forced then to send in the Marines and the U.S. Air Force to topple Castro.

    AMY GOODMAN: And then, of course, the Cuban missile crisis, the closest we ever came to a nuclear war.

    DAVID TALBOT: Well, but Kennedy stood his ground, and he didn’t do that. And that was the beginning of his break, at the Bay of Pigs, between the CIA and Cuba—and President Kennedy. And then, yes, that became even more severe with the Cuban missile crisis the following year. Again, the military in this country and the CIA thought that we could take, you know, Castro out. During the Cuban missile crisis, they were prepared to go to a nuclear war to do that. President Kennedy thought people like Curtis LeMay, who was head of the Air Force, General Curtis LeMay, was half-mad. He said, “I don’t even see this man in my—you know, in my sight,” because he was pushing for a nuclear confrontation with the Soviet Union. And even years later, Curtis LeMay, after years after Kennedy is dead, in an interview that I quote from in the book, bitterly complains that Kennedy didn’t take this opportunity to go nuclear over Cuba. So, President Kennedy basically, I think, saved my life—I was 12 years old at the time—saved a lot of our lives, because he did stand his ground. He took a hard line against the national security people and said, “No, we’re going to peacefully resolve the Cuban missile crisis.”

    AMY GOODMAN: And then President Kennedy, on November 22nd, 1963, was assassinated.

    DAVID TALBOT: That’s right.

    AMY GOODMAN: David Talbot on his new book, The Devil’s Chessboard: Allen Dulles, the CIA, and the Rise of America’s Secret Government. Back with him in a minute.

    OCTOBER 19, 2015STORY

    Find this story at 19 October 2015

    The Drone Papers” Reveals How Faulty Intel & Secret “Kill Chain” Mark Suspects, Civilians for Death

    The Intercept series “The Drone Papers” exposes the inner workings of how the drone war is waged, from how targets are identified to who decides to kill. They expose a number of flaws, including that strikes have resulted in large part from electronic communications data, or “signals intelligence,” that officials acknowledge is unreliable. We speak to Intercept reporter Cora Currier, whose article “The Kill Chain,” reveals how the U.S. identifies and selects assassination targets, from the collection of data and human intelligence all the way to President Obama’s desk.

    TRANSCRIPT
    This is a rush transcript. Copy may not be in its final form.
    JUAN GONZÁLEZ: Well, today we are looking at “The Drone Papers,” an explosive new exposé by The Intercept based on a cache of secret documents that expose the inner workings of the U.S. military’s assassination program in Afghanistan, Yemen and Somalia. It raises the question: Is there a new Edward Snowden?

    AMY GOODMAN: We’re joined by three reporters who worked on “The Drone Papers.” Cora Currier is staff reporter for The Intercept. Her contributions to the “Drone Papers” series include the pieces “The Kill Chain” and “Firing Blind.” Ryan Devereaux, also a staff reporter at The Intercept, wrote “Manhunting in the Hindu Kush.” Also still with us for the hour, Jeremy Scahill, co-founder of the The Intercept, author of—is also author on this series.

    Cora Currier, I wanted to turn to your piece, “The Kill [Chain].” How do the targets get chosen?

    CORA CURRIER: So this is the first time that we’ve seen documentary evidence of how the Obama White House picks and chooses targets for—to kill them by drone or any other—or other kinds of airstrikes. And this is for operations in Yemen and Somalia. And the slide that we have shows how task force personnel, so people working on the ground in Yemen or Somalia, JSOC task force personnel, working with other intelligence community members, establish—make a package on a target, on a potential target, collecting intelligence, doing reconnaissance. So these people are already under surveillance of various types. And then they put them together, they package them in what they call a “baseball card” on the target, and that passes up the ranks of the military, up the chain of command. It goes through the Joint Chiefs of Staff, secretary of defense, then sends them to the White House.

    And there, they’re examined by counsels of senior administration officials, known as the Principals Committee, which is—of the National Security Council, which is basically sort of all the top Cabinet heads of the Obama administration, all his closest advisers, and their deputies, which is called the Deputies Committee. And that’s reportedly where actually a lot of the work gets done, where they really pour over the targets and they think about sort of the—both the legal cases and also the sort of political ramifications and reasons to kill or not to kill somebody. So this is all happening in—this sort of really interagency process happens at the White House. And then, we know from outside reporting that this is the time when, during the period of this study in 2012, 2013, John Brennan, who then became CIA director, was super influential in these discussions. And it was often him that was bringing the baseball cards to the president to finally sign off on giving JSOC operatives then a 60-day window to go after the target.

    AMY GOODMAN: The baseball cards?

    CORA CURRIER: Mm-hmm, so they would sign off on a “package,” what they called it, a targeting—an operations package, which would have the baseball card, which was all the intelligence on the target, and then a sort of concept of operations about how they might go about getting them. And then they’d have a 60-day window in which they could take a strike against the target. And that is counter to some previous reporting about whether or not the president sort of—you hear this rhetoric that the president personally signs off on each drone strike. It’s not clear that that’s exactly what was meant by that. It seems more likely that he signs off on these packages, and then the actual decision to take a strike goes through the military chain of command.

    JUAN GONZÁLEZ: And a key part of these baseball cards are the SIM cards and the cellphone numbers and—in other words, the signals intelligence attached to each of these individuals?

    CORA CURRIER: Right. It’s going to have, you know, everything that they know about them, so from a variety of sources. And one thing that we learned in the documents is that they are heavily reliant on signals intelligence, heavily reliant on communications intelligence, to build a picture of who they think this person is and why they think he’s important.

    AMY GOODMAN: Now, in your piece, “The Kill Chain: The Lethal Bureaucracy Behind Obama’s Drone War,” you talk about the different officials who sign off. Jeremy mentioned earlier, for example, the treasury secretary. Why would the treasury secretary be involved with naming who should be killed?

    CORA CURRIER: Well, I think, in practice—I mean, by the letter, the Principals Committee of the National Security Council includes all of these—all of these top officials, like the treasury secretary, like the secretary of energy. Is the secretary of energy actually really, you know, a deciding factor in who gets killed in Yemen? No. It’s going to be the—you know, Hillary Clinton at the time of this study was secretary of state, and she would sort of represent the State Department’s opinions about this. Again, would she actually probably have all the background on these individuals? No, it would have been prepared for her by, you know, her second-in-commands or whoever was below her, and they would sort of be representing the views of their agency. So, while all those Cabinet members are, on paper, in the—on the Principals Committee, in practice, it was a smaller circle of advisers.

    AMY GOODMAN: Now, Jeremy, so, the president is making these decisions on the others below him based on—I mean, it’s very much shaped on the information he’s getting on his desk.

    JEREMY SCAHILL: Right. And, I mean, you know, one of the things that we also see in the documents is that a great deal of the intelligence that they’re basing these packages on come from foreign intelligence sources. So it could be from the Saudis, it could be from Yemenis, it could be from another entity, from Qatar—

    AMY GOODMAN: From the Saudis, for example, who want a protester, a pro-democracy protester, dead.

    JEREMY SCAHILL: Right. Right. And, I mean—well, yes, that’s part of it, but more specifically to this, there are cases where it seems as though the U.S. was intentionally fed bad intelligence to—in the effort to try to eliminate a domestic political opponent of the former dictator of Yemen, for instance, where someone that was actually trying to negotiate with al-Qaeda, but was a political opponent of the Yemeni dictator at the time, Ali Abdullah Saleh, was killed in a U.S. drone strike, and it seems quite likely that it was—you know, Yemen had fed that intelligence to try to eliminate one of their opponents. I mean, the WikiLeaks cables were rife with examples of the Yemeni president trying to get the United States to take up his own political cause against the Houthis at the time, who are now controlling parts of Yemen. But the Saudis have a huge influence over who the U.S. targets in that region. And foreign intelligence—they have their own agenda. And if we’re basing a lot of our decision on who should sort of live or die in these cases on foreign intelligence and unreliable signals intelligence, it raises serious questions about who we’re actually killing.

    JUAN GONZÁLEZ: Well, and it seems to me the other aspect of this, as your report shows, is that the government’s own reviews shows—states the unreliability of this information. So they’re not only making decisions without any kind of judicial process to kill people, the evidence that they’re using, they themselves acknowledge, is unreliable.

    JEREMY SCAHILL: Well, remember, this task force, the ISR Task Force, that did these studies that are in the document—

    AMY GOODMAN: And ISR stands for?

    JEREMY SCAHILL: Intelligence, Surveillance, Reconnaissance. And so, this task force is basically an advocacy wing for more drones, more surveillance platforms, and so you have to view it in the context of this is the Pentagon trying to get all the toys and to make themselves, you know, the boss of everything—and they largely are the boss of everything, because they have the biggest budget and they have the most personnel. But what there—you know, what the point there is, is that there’s this not-so-subtle agitation to start being able to do a lot more capturing. I think it’s true what they’re saying about the unreliability of it. But there’s also—you know, there’s a turf war at play here with the CIA, so I think you have to take it with a grain of salt and read it in the context of that.

    AMY GOODMAN: Now, the issue of innocent civilians—I mean, there’s also an issue of the people who they believe are absolutely guilty, whether or not, Cora, the president should be the judge and the jury and the executioner. But this percentage that Juan raised earlier of 90 percent innocents killed in a drone strike, explain further what you learned on who lives and who dies.

    CORA CURRIER: So what was actually striking about the Pentagon study, which was one of the documents that we had—Ryan looked in detail at these campaigns in Afghanistan, where that 90 percent figure comes from. In Yemen and Somalia, in this Pentagon study, they actually—it was pretty striking for how little they talk about civilian casualties, how little it seems to be an issue. The whole gist of the study was, “Give us”—as Jeremy was saying, “Give us more drones, give us better equipment, so that we can get these high-value targets.” And there was sort of little discussion of what the consequences are if you hit the—of hitting the wrong person. It was more about, like, “We’ve got to be more efficient at getting the people that we want,” and there was very little mention of civilian casualties.

    There were a few times that it mentioned that low CDE, or collateral damage estimate, which is military speak for how many civilians might be harmed, was mentioned a few times as kind of a restraining factor on strikes and something that was explaining why they were moving more slowly, because they had these low CDE requirements. And that’s actually really—that word, that standard, low CDE, is interesting, because at the same time as this study was circulated in May 2013 was when the president gave his big speech about how, before the U.S. would take a strike, there had to be near certainty that no civilians would be harmed or injured. And near certainty is not the same as low CDE. And the White House told us that, you know, the standards of the May 2013 speech are still in place, but they wouldn’t explain that discrepancy as to why these internal documents at the same time had this different standard for civilian deaths.

    AMY GOODMAN: And, Jeremy Scahill, what was the White House’s reaction to this explosive series?

    JEREMY SCAHILL: Well, the White House was—you know, basically said, “We’re not going to comment on purported internal documents.” And, you know, I mean, Ryan had sort of a funny interaction with the Special Operations Command that he can explain. But at the end of the day, the Pentagon ended up being the one that kind of spoke for all of them and said, you know, “These are internal classified documents, and we’re not going to speak about it.” I mean, they’ll speak about classified material all the time when it benefits their position, like John Brennan leaking things after bin Laden, but, you know, they’re not going to address these things. Or even—I mean, Cora had very concrete questions: Is this still the case? Is this true? You know, they wouldn’t answer a single question.

    AMY GOODMAN: We’re going to go to break and then come back, and when we come back, we’re going to talk about Afghanistan. And that’s where Ryan Devereaux comes in. With President Obama now reversing course, the longest war in U.S. history is about to get longer. How do “The Drone Papers” weigh in here? What do they tell us about Afghanistan? And much more. We’re speaking with three of the authors of this series, this stunning series at The Intercept: Jeremy Scahill, Ryan Devereaux and Cora Currier. Stay with us.

    OCTOBER 16, 2015STORY

    Find this story at 13 October 2015

    Sources Detail Skewed Reports On How The U.S. Is Doing Against ISIS

    Sens. John McCain, R-Ariz., (left) and Jack Reed, D-R.I., hear testimony on operations against ISIS from Gen. Lloyd Austin.i
    Sens. John McCain, R-Ariz., (left) and Jack Reed, D-R.I., hear testimony on operations against ISIS from Gen. Lloyd Austin.
    Pablo Martinez Monsivais/AP

    NPR has new details on what investigators are discovering about Pentagon analysis of the battle against ISIS in Iraq.

    The Pentagon is looking at whether senior military officials at U.S. Central Command, or CENTCOM, pressured intelligence analysts into painting a rosy picture of the fight against ISIS. The Defense Department’s inspector general is talking to a group of intelligence analysts who are providing evidence and details on how bias crept into their assessments.

    One military source who witnessed the skewing of reports and told NPR he was “a victim of them” said that analysts at CENTCOM got the message as they began writing their assessments of events on the ground. If analysts wanted to include a piece of good news regarding the campaign against ISIS or the progress of Iraqi forces, they needed almost no sourcing. But if they wanted to include bad news — such as Iraqi forces retreating — analysts were required to cite three or four sources.

    Two military sources familiar with the investigation say that, while they haven’t discovered a direct order to cherry-pick intelligence, it was something that evolved because of the way data were handled and produced.

    “The bad news didn’t just need to be footnoted,” one military source, who did not want to be further identified because he is involved with the inquiry, told NPR. “The intelligence data itself had to be attached to the report. It became pretty clear if they wrote something bad, it was likely to be changed. Knowing that bad news on ISIS wasn’t welcome meant that, over time, the picture of the fight began being rosier.”

    A military source described the evolution of one report that came out of CENTCOM’s intelligence shop. It was a dispatch on an ISIS attack in Iraq near the Syrian border. The initial CENTCOM report read, “Iraqi forces retreated.” It was sent back for reworking, the source said. Eventually that report came to read that the Iraqi forces had not retreated, but instead had reinforced another Iraqi position. The final draft suggested a strategic decision had been made. But that was not what happened, the source said — the Iraqi forces ran. A second source confirmed the account of the change in wording to put the Iraqi forces in a more positive light.

    The head of U.S. Central Command, Gen. Lloyd Austin, was on Capitol Hill on Wednesday to testify before the Senate Armed Services Committee. He had been called to provide a progress report on the fight against ISIS. But he was obliged to address, although obliquely, the Pentagon investigation into CENTCOM first. “There is an ongoing DOD IG investigation looking into allegations concerning the processing of intelligence information by CENTCOM’s intelligence directorate,” Austin said in his opening remarks. “Because the allegations are currently under investigation … it would be premature and inappropriate for me to discuss this matter.”

    All he would say was that the CENTCOM reports, contrary to what had been said in the media, did not go directly to the president, and CENTCOM drew its intelligence analysis from a variety of sources — 1,200 analysts, combat commanders on the ground, and other agencies. Even so, in his testimony, the general seemed to be painting an upbeat picture. “In recent months, Iraq’s security forces have experienced some setbacks, and this is to be expected in a fight as complex as this one,” said Austin. “But overall the Iraqis continue to make progress.”

    Sen. John McCain, chairman of the Armed Services Committee, made clear he wasn’t swallowing Austin’s assessment. “I must say I have been on this committee for 30 years and I have never heard testimony like this,” McCain said. “Never.”

    Just the week before his appearance, McCain told the general, the chairman of the Joint Chiefs, Gen. Martin Dempsey, had testified that the fight against ISIS was tactically stalemated. “So obviously you and the outgoing chairman of the Joint Chiefs of Staff have a very different view of what the situation is,” McCain said.

    SEPTEMBER 16, 2015 8:09 PM ET
    Dina Temple- Raston

    Find this story at 16 September 2015

    © 2015 npr

    Tomgram: Engelhardt, Creating an Un-Intelligence Machine The Fog of Intelligence Or How to Be Eternally “Caught Off Guard” in the Greater Middle East

    1,500.

    That figure stunned me. I found it in the 12th paragraph of a front-page New York Times story about “senior commanders” at U.S. Central Command (CENTCOM) playing fast and loose with intelligence reports to give their air war against ISIS an unjustified sheen of success: “CENTCOM’s mammoth intelligence operation, with some 1,500 civilian, military, and contract analysts, is housed at MacDill Air Force Base in Tampa, in a bay front building that has the look of a sterile government facility posing as a Spanish hacienda.”

    Think about that. CENTCOM, one of six U.S. military commands that divide the planet up like a pie, has at least 1,500 intelligence analysts (military, civilian, and private contractors) all to itself. Let me repeat that: 1,500 of them. CENTCOM is essentially the country’s war command, responsible for most of the Greater Middle East, that expanse of now-chaotic territory filled with strife-torn and failing states that runs from Pakistan’s border to Egypt. That’s no small task and about it there is much to be known. Still, that figure should act like a flash of lightning, illuminating for a second an otherwise dark and stormy landscape.

    And mind you, that’s just the analysts, not the full CENTCOM intelligence roster for which we have no figure at all. In other words, even if that 1,500 represents a full count of the command’s intelligence analysts, not just the ones at its Tampa headquarters but in the field at places like its enormous operation at al-Udeid Air Base in Qatar, CENTCOM still has almost half as many of them as military personnel on the ground in Iraq (3,500 at latest count). Now, try to imagine what those 1,500 analysts are doing, even for a command deep in a “quagmire” in Syria and Iraq, as President Obama recently dubbed it (though he was admittedly speaking about the Russians), as well as what looks like a failing war, 14 years later, in Afghanistan, and another in Yemen led by the Saudis but backed by Washington. Even given all of that, what in the world could they possibly be “analyzing”? Who at CENTCOM, in the Defense Intelligence Agency, or elsewhere has the time to attend to the reports and data flows that must be generated by 1,500 analysts?

    Of course, in the gargantuan beast that is the American military and intelligence universe, streams of raw intelligence beyond compare are undoubtedly flooding into CENTCOM’s headquarters, possibly overwhelming even 1,500 analysts. There’s “human intelligence,” or HUMINT, from sources and agents on the ground; there’s imagery and satellite intelligence, or GEOINT, by the bushelful. Given the size and scope of American global surveillance activities, there must be untold tons of signals intelligence, or SIGINT; and with all those drones flying over battlefields and prospective battlefields across the Greater Middle East, there’s undoubtedly a river of full motion video, or FMV, flowing into CENTCOM headquarters and various command posts; and don’t forget the information being shared with the command by allied intelligence services, including those of the “five eyes“ nations, and various Middle Eastern countries; and of course, some of the command’s analysts must be handling humdrum, everyday open-source material, or OSINT, as well — local radio and TV broadcasts, the press, the Internet, scholarly journals, and god knows what else.

    And while you’re thinking about all this, keep in mind that those 1,500 analysts feed into, and assumedly draw on, an intelligence system of a size surely unmatched even by the totalitarian regimes of the twentieth century. Think of it: the U.S. Intelligence Community has — count ‘em — 17 agencies and outfits, eating close to $70 billion annually, more than $500 billion between 2001 and 2013. And if that doesn’t stagger you, think about the 500,000 private contractors hooked into the system in one way or another, the 1.4 million people (34% of them private contractors) with access to “top secret” information, and the 5.1 million — larger than Norway’s population — with access to “confidential and secret” information.

    Remember as well that, in these years, a global surveillance state of Orwellian proportions has been ramped up. It gathers billions of emails and cell phone calls from the backlands of the planet; has kept tabs on at least 35 leaders of other countries and the secretary general of the U.N. by hacking email accounts, tapping cell phones, and so on; keeps a careful eye and ear on its own citizens, including video gamers; and even, it seems, spies on Congress. (After all, whom can you trust?)

    In other words, if that 1,500 figure bowls you over, keep in mind that it just stands in for a far larger system that puts to shame, in size and yottabytes of information collected, the wildest dreams of past science fiction writers. In these years, a mammoth, even labyrinthine, bureaucratic “intelligence” structure has been constructed that is drowning in “information” — and on its own, it seems, the military has been ramping up a smaller but similarly scaled set of intelligence structures.

    Surprised, Caught Off Guard, and Left Scrambling

    The question remains: If data almost beyond imagining flows into CENTCOM, what are those 1,500 analysts actually doing? How are they passing their time? What exactly do they produce and does it really qualify as “intelligence,” no less prove useful? Of course, we out here have limited access to the intelligence produced by CENTCOM, unless stories like the one about top commanders fudging assessments on the air war against the Islamic State break into the media. So you might assume that there’s no way of measuring the effectiveness of the command’s intelligence operations. But you would be wrong. It is, in fact, possible to produce a rough gauge of its effectiveness. Let’s call it the TomDispatch Surprise Measurement System, or TSMS. Think of it as a practical, news-based guide to the questions: What did they know and when did they know it?

    Let me offer a few examples chosen almost at random from recent events in CENTCOM’s domain. Take the seizure at the end of September by a few hundred Taliban fighters of the northern provincial Afghan capital of Kunduz, the first city the Taliban has controlled, however briefly, since it was ejected from that same town in 2002. In the process, the Taliban fighters reportedly scattered up to 7,000 members of the Afghan security forces that the U.S. has been training, funding, and arming for years.

    For anyone following news reports closely, the Taliban had for months been tightening its control over rural areas around Kunduz and testing the city’s defenses. Nonetheless, this May, based assumedly on the best intelligence analyses available from CENTCOM, the top U.S. commander in the country, Army General John Campbell, offered this predictive comment: “If you take a look very closely at some of the things in Kunduz and up in [neighboring] Badakhshan [Province], [the Taliban] will attack some very small checkpoints… They will go out and hit a little bit and then they kind of go to ground… so they’re not gaining territory for the most part.’”

    As late as August 13th, at a press briefing, an ABC News reporter asked Brigadier General Wilson Shoffner, the U.S. deputy chief of staff for communications in Afghanistan: “There has been a significant increase in Taliban activity in northern Afghanistan, particularly around Kunduz. What is behind that? Are the Afghan troops in that part of Afghanistan at risk of falling to the Taliban?”

    Shoffner responded, in part, this way: “So, again, I think there’s been a lot of generalization when it comes to reports on the north. Kunduz is — is not now, and has not been in danger of being overrun by the Taliban, and so — with that, it’s kind of a general perspective in the north, that’s sort of how we see it.”

    That General Cambell at least remained of a similar mindset even as Kunduz fell is obvious enough since, as New York Times reporter Matthew Rosenberg reported, he was out of the country at the time. As Goldstein put it:

    “Mostly, though, American and Afghan officials appeared to be genuinely surprised at the speedy fall of Kunduz, which took place when Gen. John F. Campbell, the commander of coalition forces, was in Germany for a defense conference… Though the Taliban have been making gains in the hinterlands around Kunduz for months, American military planners have for years insisted that Afghan forces were capable of holding onto the country’s major cities.

    “‘This wasn’t supposed to happen,’ said a senior American military officer who served in Afghanistan, speaking on the condition of anonymity. ‘The Afghans are fighting, so it’s not like we’re looking at them giving up or collapsing right now. They’re just not fighting very well.’”

    It’s generally agreed that the American high command was “caught off guard” by the capture of Kunduz and particularly shocked by the Afghan military’s inability to fight effectively. And who would have predicted such a thing of an American-trained army in the region, given that the American-backed, -trained, and -equipped Iraqi Army on the other side of the Greater Middle East had a similar experience in June 2014 in Mosul and other cities of northern Iraq when relatively small numbers of Islamic State militants routed its troops?

    At that time, U.S. military leaders and top administration officials right up to President Obama were, as the Wall Street Journal reported, “caught off guard by the swift collapse of Iraqi security forces” and the successes of the Islamic State in northern Iraq. Peter Baker and Eric Schmitt of the Times wrote in retrospect, “Intelligence agencies were caught off guard by the speed of the extremists’… advance across northern Iraq.” And don’t forget that, despite that CENTCOM intelligence machine, something similar happened in May 2015 when, as Washington Post columnist David Ignatius put it, U.S. officials and American intelligence were “blindsided again” by a very similar collapse of Iraqi forces in the city of Ramadi in al-Anbar Province.

    Or let’s take another example where those 1,500 analysts must have been hard at work: the failed $500 million Pentagon program to train “moderate” Syrians into a force that could fight the Islamic State. In the Pentagon version of the elephant that gave birth to a mouse, that vast effort of vetting, training, and arming finally produced Division 30, a single 54-man unit of armed moderates, who were inserted into Syria near the forces of the al-Qaeda-aligned al-Nusra Front. That group promptly kidnapped two of its leaders and then attacked the unit. The result was a disaster as the U.S.-trained fighters fled or were killed. Soon thereafter, the American general overseeing the war against the Islamic State testified before Congress that only “four or five” armed combatants from the U.S. force remained in the field.

    Here again is how the New York Times reported the response to this incident:

    “In Washington, several current and former senior administration officials acknowledged that the attack and the abductions by the Nusra Front took American officials by surprise and amounted to a significant intelligence failure. While American military trainers had gone to great lengths to protect the initial group of trainees from attacks by Islamic State or Syrian Army forces, they did not anticipate an assault from the Nusra Front. In fact, officials said on Friday, they expected the Nusra Front to welcome Division 30 as an ally in its fight against the Islamic State.

    “‘This wasn’t supposed to happen like this,’ said one former senior American official, who was working closely on Syria issues until recently, and who spoke on the condition of anonymity to discuss confidential intelligence assessments.”

    Now, if accurate, this is wild stuff. After all, how anyone, commander or intelligence analyst, could imagine that the al-Nusra Front, classified as an enemy force in Washington and some of whose militants had been targeted by U.S. air power, would have welcomed U.S.-backed troops with open arms is the mystery of all mysteries. One small footnote to this: McClatchy News later reported that the al-Nusra Front had been poised to attack the unit because it had been tipped off in advance by Turkish intelligence, something CENTCOM’s intelligence operatives evidently knew nothing about.

    In the wake of that little disaster and again, assumedly, with CENTCOM’s full stock of intelligence and analysis on hand, the military inserted the next unit of 74 trained moderates into Syria and was shocked (shocked!) when its members, chastened perhaps by the fate of Division 30, promptly handed over at least a quarter of their U.S.-supplied equipment, including trucks, ammunition, and rifles, to the al-Nusra Front in return for “safe passage.” Al-Nusra militants soon were posting photos of the weapons online and tweeting proudly about them. CENTCOM officials initially denied that any of this had happened (and were clearly in the dark about it) before reversing course and reluctantly admitting that it was so. (“‘If accurate, the report of NSF [New Syrian Forces] members providing equipment to al-Nusra Front is very concerning and a violation of Syria train-and-equip program guidelines,’ U.S. Central Command spokesman Colonel Patrick Ryder said.”)

    To turn to even more recent events in CENTCOM’s bailiwick, American officials were reportedly similarly stunned as September ended when Russia reached a surprise agreement with U.S. ally Iraq on an anti-ISIS intelligence-sharing arrangement that would also include Syria and Iran. Washington was once again “caught off guard” and, in the words of Michael Gordon of the Times, “left… scrambling,” even though its officials had known “that a group of Russian military officers were in Baghdad.”

    Similarly, the Russian build-up of weaponry, planes, and personnel in Syria initially “surprised” and — yes — caught the Obama administration “off guard.” Again, despite those 1,500 CENTCOM analysts and the rest of the vast U.S. intelligence community, American officials, according to every news report available, were “caught flat-footed” and, of course, “by surprise” (again, right up to the president) when the Russians began their full-scale bombing campaign in Syria against various al-Qaeda-allied outfits and CIA-backed opponents of Syrian President Bashar al-Assad. They were even caught off guard and taken aback by the way the Russians delivered the news that their bombing campaign was about to start: a three-star Russian general arrived at the U.S. Embassy in Baghdad to offer an hour’s notice. (Congressional lawmakers are now considering “the extent to which the spy community overlooked or misjudged critical warning signs” about the Russian intervention in Syria.)

    The Fog Machine of American Intelligence

    You get the point. Whatever the efforts of that expansive corps of intelligence analysts (and the vast intelligence edifice behind it), when anything happens in the Greater Middle East, you can essentially assume that the official American reaction, military and political, will be “surprise” and that policymakers will be left “scrambling” in a quagmire of ignorance to rescue American policy from the unexpected. In other words, somehow, with what passes for the best, or at least most extensive and expensive intelligence operation on the planet, with all those satellites and drones and surveillance sweeps and sources, with crowds of analysts, hordes of private contractors, and tens of billions of dollars, with, in short, “intelligence” galore, American officials in the area of their wars are evidently going to continue to find themselves eternally caught “off guard.”

    The phrase “the fog of war” stands in for the inability of commanders to truly grasp what’s happening in the chaos that is any battlefield. Perhaps it’s time to introduce a companion phrase: the fog of intelligence. It hardly matters whether those 1,500 CENTCOM analysts (and all those at other commands or at the 17 major intelligence outfits) produce superlative “intelligence” that then descends into the fog of leadership, or whether any bureaucratic conglomeration of “analysts,” drowning in secret information and the protocols that go with it, is going to add up to a giant fog machine.

    It’s difficult enough, of course, to peer into the future, to imagine what’s coming, especially in distant, alien lands. Cobble that basic problem together with an overwhelming data stream and groupthink, then fit it all inside the constrained mindsets of Washington and the Pentagon, and you have a formula for producing the fog of intelligence and so for seldom being “on guard” when it comes to much of anything.

    My own suspicion: you could get rid of most of the 17 agencies and outfits in the U.S. Intelligence Community and dump just about all the secret and classified information that is the heart and soul of the national security state. Then you could let a small group of independently minded analysts and critics loose on open-source material, and you would be far more likely to get intelligent, actionable, inventive analyses of our global situation, our wars, and our beleaguered path into the future.

    The evidence, after all, is largely in. In these years, for what now must be approaching three-quarters of a trillion dollars, the national security state and the military seem to have created an un-intelligence system. Welcome to the fog of everything.

    Tom Engelhardt is a co-founder of the American Empire Project and the author of The United States of Fear as well as a history of the Cold War, The End of Victory Culture. He is a fellow of the Nation Institute and runs TomDispatch.com. His latest book is Shadow Government: Surveillance, Secret Wars, and a Global Security State in a Single-Superpower World.

    [Note: Nick Turse was my co-conspirator on this piece and I thank him for all his help.]

    Follow TomDispatch on Twitter and join us on Facebook. Check out the newest Dispatch Book, Nick Turse’s Tomorrow’s Battlefield: U.S. Proxy Wars and Secret Ops in Africa, and Tom Engelhardt’s latest book, Shadow Government: Surveillance, Secret Wars, and a Global Security State in a Single-Superpower World.

    Posted by Tom Engelhardt at 7:29am, October 15, 2015.
    Follow TomDispatch on Twitter @TomDispatch.
    Email Print
    [Note to TomDispatch Readers: Here’s a small reminder. TomDispatch keeps itself going to a significant extent thanks to the donations of faithful readers. In return for contributions of $100 or more, we like to offer — as a small but (we hope) meaningful thank you — signed, personalized copies of superlative books that help, like this website, make some sense of our embattled world. Among those on offer at present are Nick Turse’s Tomorrow’s Battlefield and his bestselling Kill Anything That Moves, my own Shadow Government and The End of Victory Culture, David Vine’s Base Nation, and Greg Grandin’s Kissinger’s Shadow. Check out our donation page for the full list. Tom]

    By Tom Engelhardt

    Find this story at 15 October 2015

    Copyright 2015 Tom Engelhardt

    A Former CIA Official Apologizes to ‘Every American’ For Iraq Intelligence Failures

    An intelligence assessment drafted by the CIA months prior to the March 2003 US invasion of Iraq asserting that Saddam Hussein harbored an active weapons of mass destruction (WMDs) cache has been thoroughly debunked time and again.

    But even after the deaths of more than 4,000 US soldiers and hundreds of thousands of Iraqi civilians, CIA officials have never publicly taken responsibility for getting the pre-war intelligence so wrong.

    Former CIA deputy director Michael Morell, however, now owns up to the disastrous “mistakes” the agency made on the Iraqi WMD failures.

    The veteran intelligence official has written The Great War of Our Time: The CIA’s Fight against Terrorism from al Qa’ida to ISIS, which offers a behind-the-scenes look at numerous national security crises since 9/11. Morell writes in the book about the CIA’s Iraq intelligence failures, and he apologizes to former Secretary of State Colin Powell, who told the United Nations Security Council on February 5, 2003 that Iraq had “biological weapons and the capability to rapidly produce more, many more.” When WMDs weren’t located in Iraq after the US invasion, Powell’s credibility was destroyed.

    Related: CIA Report Says No Evidence Saudi Arabia ‘Willingly Supported’ al Qaeda Leading up to 9/11

    “Let me tell you why I [apologized to] Colin Powell,” Morell told VICE News before a recent appearance at the Richard Nixon Library to promote his book. “Here’s a guy who had a stellar reputation… and quite frankly that reputation was tarnished when he went before the UN and laid out the case. That case turns out to be wrong. Almost every part of it turns out to be wrong. I knew he had said to folks over the years, ‘You know, nobody from the agency has ever apologized to me.’ And so that’s why I wanted to apologize to him…. The apology applies to every single American.”

    Morell was somewhat defensive when asked to discuss why CIA analysts were unable to determine that Iraq had abandoned its weapons program in the 1990s. He compared the analysts to “weather forecasters.”

    “This is a very difficult business,” he said. “I don’t know a harder job in the world than trying to get an understanding of what’s the status of the Iran nuclear program. Or, what’s the status of North Korea’s long-range missile system. Or, where does Chinese military modernization stand. Or, what are the plans, intentions, and capabilities of al Qaeda in Yemen.”

    Watch the VICE News interview with Michael Morell

    Ultimately, Morell said the main reason “we were not able to come up with the right answer is that we didn’t do our fundamental job of penetrating [Saddam Hussein’s] inner circle with a human asset. So there was no information to give to the analyst to say, ‘Here’s what this guy is up to.’ This was our failure, and quite frankly a national security failure, to get inside of Saddam’s inner circle to tell us exactly what he was up to with regards to weapons of mass destruction.”

    While Morell leaves no doubt that the CIA failed on Iraq, he mounts a full-throated defense when discussing the agency’s so-called enhanced interrogation program, which he “doesn’t like calling torture, because to call it torture says my guys were torturers, and they were told that they weren’t.”

    “I have no doubt after spending months looking at this that [the program] was effective,” Morell said. “I’ve seen the intelligence that these guys provided before enhanced interrogation techniques. It was not full answers to questions, it was not specific information, it was not actionable. After enhanced interrogation techniques, full answers to questions, specific information, actionable information. There’s no doubt in my mind it was effective.”

    His analysis is at odds with the damning findings of the Senate Intelligence Committee, which last December released a declassified executive summary of its mammoth report on the CIA’s torture program, an investigation that took five years to complete, cost $40 million, and led to chilled relations between the CIA and the committee.

    In fact, the harshest critique in Morell’s book is aimed directly at Democrats on the Senate Intelligence Committee, including the panel’s former chairwoman, Dianne Feinstein, who led the oversight effort into the detention and interrogation program and said what committee staffers discovered in millions of pages of CIA documents clearly rose to the level of torture. He declined to respond to some of the more brutal findings in the Senate report, such as subjecting a handful of detainees to “rectal feeding” and whether that amounted to torture.

    So how did the Senate get it wrong if it perused the CIA’s own highly classified documents to reach its conclusions?

    “One of the things I learned as an intelligence analyst very early on is it’s very dangerous to speculate,” Morell said. “When you speculate, you get things wrong a lot more then you get right. But I’ll speculate for you with that caveat. Senator Feinstein made it very clear to everyone who would talk to her about this, that she wanted the report to be the nail in the coffin of the country ever doing anything like this again. Well, when you’re on her staff and you hear that day after day after day, and your job is to put this report together, it takes you in a certain direction.”

    “Republican leaders in the House and the Senate [approved] this program back in 2002, 2003, 2004. And not only approved the program but encouraged us to go further — they thought we were risk-averse when we stopped the program for a period of time…. So what’s the only way that the [Senate] can get themselves out of this discussion? To say that the CIA lied to them at the time about what we were doing and about the effectiveness of the program. That’s the only way to get themselves off the hook. I can’t prove any of that. I’m speculating.”

    VICE News tried numerous times to obtain a comment from Feinstein, but her office failed to respond to our queries.

    However, a day before Morell’s book went on sale, Feinstein took the unprecedented step of issuing a press release attacking Morell’s contradictory claims about the torture program and said he did not even bother to read the full 6,700-page report. Feinstein’s office then issued a 54-page point-by-point rebuttal to all of the assertions Morell made in his book about the efficacy of the program.

    Morell, who now works for a private security firm founded by former aides to Hillary Clinton, told VICE News that the US is engaged in an “intelligence war.”

    “In this new era of terrorism, the enemy is very hard to find, but very easy to kill,” he said. “The finding, which is the hard part, is all about intelligence. So this is an intelligence war…. You cannot capture and kill your way out of this. The other problem that you have to deal with is how do you stop the creation of new terrorists? How do you deal with the radicalization problem of young men and young women around the globe? That’s something that we have not done well as a country or as a coalition of countries… and it’s not going to go away until we get our arms around that.”

    An earlier version of this report incorrectly said the CIA’s pre-war Iraq intelligence concluded that Saddam Hussein colluded with Al Qaeda. The story has been updated.

    By Jason Leopold
    June 25, 2015 | 7:35 pm

    Find this story at 25 June 2015

    Copyright https://news.vice.com/

    Military Analyst Again Raises Red Flags on Progress in Iraq

    WASHINGTON — As the war in Iraq deteriorated, a senior American intelligence analyst went public in 2005 and criticized President George W. Bush’s administration for pushing “amateurish and unrealistic” plans for the invasion two years before.

    Now that same man, Gregory Hooker, is at the center of an insurrection of United States Central Command intelligence analysts over America’s latest war in Iraq, and whether Congress, policy makers and the public are being given too rosy a picture of the situation.

    As the senior Iraq analyst at Central Command, the military headquarters in Tampa that oversees American military operations across the Middle East and Central Asia, Mr. Hooker is the leader of a group of analysts that is accusing senior commanders of changing intelligence reports to paint an overly optimistic portrait of the American bombing campaign against the Islamic State. The Pentagon’s inspector general is investigating.

    Although the investigation became public weeks ago, the source of the allegations and Mr. Hooker’s role have not been previously known. Interviews with more than a dozen current and former intelligence officials place the dispute directly at the heart of Central Command, with Mr. Hooker and his team in a fight over what Americans should believe about the war.

    Photo

    Gregory Hooker is critical of reports on the ISIS fight.
    Mr. Hooker, who declined to comment, has been an Iraq analyst for more than two decades. Some on his team were at Central Command, or Centcom, when American troops poured into Iraq in 2003. The analysts remained focused on the country long after President Obama officially ended the war in 2011.

    “This core group of Iraq analysts have been doing this for a long time,” said Stephen Robb, a retired Marine colonel and a former head of the Centcom Joint Intelligence Center. “If they say there’s smoke, start looking for a firehouse.”

    The investigation has repercussions beyond the question of whether the American-led bombing campaign in Iraq and Syria is succeeding. The allegations call into question how much the president — this one or the next — can rely on Centcom for honest assessments of military operations in Iraq, Afghanistan, Yemen and other crisis spots.

    In some ways, the Iraq team’s criticism mirrors the disputes of a decade ago, when Mr. Hooker wrote a research paper saying the Bush administration, over many analysts’ objections, advocated a small force in Iraq and spent little time thinking about what would follow the invasion.

    That dispute was separate from the battle over flawed intelligence assessments by the C.I.A. and other spy agencies that Saddam Hussein had weapons of mass destruction. Central Command did not contribute significantly to those assessments.

    Several current and former officials said that it was the two most senior intelligence officers at Centcom — Maj. Gen. Steven Grove and his civilian deputy, Gregory Ryckman — who drew analysts’ ire with changes in draft intelligence assessments. But why the assessments were changed remains an open question. Some analysts suggested that leaders in Tampa feared that reporting bad news might anger the White House. Others described an institutional bias that makes it hard for the military to criticize its own operations.

    Continue reading the main story

    Graphic: Where ISIS Has Directed and Inspired Attacks Around the World
    Centcom’s leader, Gen. Lloyd J. Austin III, was chosen for the job in part because the White House regarded him as a steady, cautious loyalist who would execute military operations in the Middle East with little drama — an especially important consideration after the contentious relationship between the White House and Gen. James Mattis, the previous Centcom commander. General Austin gave testimony last week to the Senate Armed Services Committee that was roundly criticized by some lawmakers as being an overly positive assessment of the war’s progress.

    Centcom’s mammoth intelligence operation, with some 1,500 civilian, military and contract analysts, is housed at MacDill Air Force Base in Tampa, in a bay front building that has the look of a sterile government facility posing as a Spanish hacienda. In banks of plain cubicles, the analysts try each day to measure the progress of war.

    That effort has long been difficult, particularly in campaigns without traditional armies and clear battle lines. During the war in Vietnam, generals were criticized for measuring success in body counts. In the fight against the Islamic State, also known as ISIS or ISIL, the military issues daily reports that suggest tactical victories but offer little hint about how the war is going.

    “One airstrike struck an ISIL tactical unit and destroyed an ISIL cache, three ISIL fighting positions and one ISIL motorcycle,” a report this month said. “Near Ramadi, one airstrike destroyed an ISIL vehicle.”

    Brian Hale, a spokesman for the director of national intelligence, played down the significance of Centcom’s conclusions in shaping the thinking of senior policy makers, including Mr. Obama, about the war. In a statement on Wednesday he said that Centcom and other military commanders do not provide “broad or strategic assessments.”

    The success of daily airstrikes, experts say, can give the illusion of progress, particularly for Centcom commanders who are judged in Washington on their ability to carry out a successful mission. Iraq analysts, officials said, are less optimistic.

    Continue reading the main story
    Obama’s Evolution on ISIS
    Some of President Obama’s statements about the American strategy to confront ISIS and its effectiveness.

    “You can get pulled into watching the laser dot on a target and watching it blow up,” said Kevin Benson, a retired Army colonel who teaches intelligence analysis to officers at Fort Leavenworth, Kan. “After that, it can be hard to hear that you’re not making progress, because you saw it.”

    Analysts like Mr. Hooker and his team are supposed to be immune from such pressure because they are employed by the Defense Intelligence Agency. In practice, though, the analysts are reviewed by officials at Centcom.

    Although critics have suggested that the bombing campaign’s stalemate proves the need for more troops in Iraq, colleagues say Mr. Hooker’s team is not advocating that approach. “I don’t know anyone outside of a political commercial who thinks we need to send large numbers of troops into Iraq,” said one intelligence official who has worked closely with the Centcom analysts.

    Instead, analysts say the dispute centers on whether the military is being honest about the political and religious situation in Iraq and whether a bombing campaign can change it.

    “What are the strategic objectives here? There are none. This is just perpetual war,” said David Faulkner, the former targeting director at Centcom who worked alongside the Iraq analysts. “People say: ‘Oh, you’re military. You like that.’ No, we don’t.”

    Current and ex-officials said tension about how to portray the war’s progress began almost at the start of the campaign last summer, when Mr. Obama authorized strikes against Islamic State fighters in Iraq and later expanded the bombings to Syria.

    Continue reading the main story

    Graphic: How ISIS Expands
    Early this year, one former official said, Mr. Hooker’s team concluded that, despite public statements to the contrary, airstrikes against Islamic State-held refineries had not significantly weakened its finances because it had built makeshift refineries to sell oil on the black market. But the finding was not distributed outside Centcom, the ex-official said.

    Over this past year, analysts felt pressure to keep their assessments positive. In order to report bad news, current and former officials said, the analysts were required to cite multiple sources. Reporting positive news required fewer hurdles. Senior officials sent emails cautioning against using pessimistic phrases that they said were more likely to get attention, according to one former official. In some instances, officials said, conclusions were completely changed.

    Anger among analysts grew so intense that in the spring, Mr. Hooker’s civilian boss, William Rizzio, confronted his superiors about the problems. Mr. Rizzio, a retired Marine colonel who had gradually come to take the side of the analysts in the dispute, had meetings with General Grove and Mr. Ryckman. It is unclear what transpired in the meetings, but three people with knowledge of the situation, who, like some others interviewed, spoke on the condition of anonymity because the matter is part of the inspector general’s investigation, said the result was that Mr. Rizzio was punished for siding with the analysts. He was temporarily reassigned, and analysts were left wondering what happened to him after his name was scraped off the front of his office at Centcom’s Joint Intelligence Center.

    Mr. Rizzio, who has since returned to his position, declined to be interviewed.

    His concerns gained a more sympathetic hearing several months later, when officials began speaking to the Pentagon’s inspector general, who opened his investigation in July. Officials would not say if Mr. Hooker was the first analyst to do so.

    The inspector general’s investigation turned a quiet matter into one of the most high-profile intelligence disputes since officials issued new rules that encourage dissenting views. Those rules were intended to prevent a repeat of the debacle over weapons of mass destruction in Iraq.

    The investigation has put this team of analysts, who for years worked in relative obscurity, at the center of a dispute that has the attention of intelligence officials across the government.

    “Signing onto a whistle-blowing complaint can easily be a career-ender,” David Shedd, a former acting head of the Defense Intelligence Agency, wrote in a column this week on Defense One, a national security news website. “The nation’s analytic professionals are watching closely to see how it is handled.”

    Correction: September 24, 2015
    An earlier version of this article misstated the year that President Obama officially ended the Iraq war. It was 2011, not 2009.
    Kitty Bennett contributed research.

    By MARK MAZZETTI and MATT APUZZOSEPT. 23, 2015

    A version of this article appears in print on September 24, 2015, on page A1 of the New York edition with the headline: Military Analyst Again Raises Red Flags on Progress in Iraq. Order Reprints| Today’s Paper|Subscribe

    Find this story at 23 September 2015

    © 2015 The New York Times Company

    Inquiry Weighs Whether ISIS Analysis Was Distorted

    WASHINGTON — The Pentagon’s inspector general is investigating allegations that military officials have skewed intelligence assessments about the United States-led campaign in Iraq against the Islamic State to provide a more optimistic account of progress, according to several officials familiar with the inquiry.

    The investigation began after at least one civilian Defense Intelligence Agency analyst told the authorities that he had evidence that officials at United States Central Command — the military headquarters overseeing the American bombing campaign and other efforts against the Islamic State — were improperly reworking the conclusions of intelligence assessments prepared for policy makers, including President Obama, the government officials said.

    Fuller details of the claims were not available, including when the assessments were said to have been altered and who at Central Command, or Centcom, the analyst said was responsible. The officials, speaking only on the condition of anonymity about classified matters, said that the recently opened investigation focused on whether military officials had changed the conclusions of draft intelligence assessments during a review process and then passed them on.

    Photo

    Iraqi Army recruits in Taji in April with U.S. Army trainers. About 3,400 American troops are advising Iraqi forces. Credit John Moore/Getty Images
    The prospect of skewed intelligence raises new questions about the direction of the government’s war with the Islamic State, and could help explain why pronouncements about the progress of the campaign have varied widely.

    Legitimate differences of opinion are common and encouraged among national security officials, so the inspector general’s investigation is an unusual move and suggests that the allegations go beyond typical intelligence disputes. Government rules state that intelligence assessments “must not be distorted” by agency agendas or policy views. Analysts are required to cite the sources that back up their conclusions and to acknowledge differing viewpoints.

    Under federal law, intelligence officials can bring claims of wrongdoing to the intelligence community’s inspector general, a position created in 2011. If officials find the claims credible, they are required to advise the House and Senate Intelligence Committees. That occurred in the past several weeks, the officials said, and the Pentagon’s inspector general decided to open an investigation into the matter.

    Spokeswomen for both inspectors general declined to comment for this article. The Defense Intelligence Agency and the White House also declined to comment.

    Col. Patrick Ryder, a Centcom spokesman, said he could not comment on a continuing inspector general investigation but said “the I.G. has a responsibility to investigate all allegations made, and we welcome and support their independent oversight.”

    Numerous agencies produce intelligence assessments related to the Iraq war, including the Defense Intelligence Agency, the Central Intelligence Agency and others. Colonel Ryder said it was customary for them to make suggestions on one another’s drafts. But he said each agency had the final say on whether to incorporate those suggestions. “Further, the multisource nature of our assessment process purposely guards against any single report or opinion unduly influencing leaders and decision makers,” he said.

    It is not clear how that review process changes when Defense Intelligence Agency analysts are assigned to work at Centcom — which has headquarters both in Tampa, Fla., and Qatar — as was the case of at least one of the analysts who have spoken to the inspector general. In the years since the Sept. 11, 2001, attacks, the Pentagon has relocated more Defense Intelligence Agency analysts from the agency’s Washington headquarters to military commands around the globe, so they can work more closely with the generals and admirals in charge of the military campaigns.

    Mr. Obama last summer authorized a bombing campaign against the Islamic State, and approximately 3,400 American troops are currently in Iraq advising and training Iraqi forces. The White House has been reluctant, though, to recommit large numbers of ground troops to Iraq after announcing an “end” to the Iraq war in 2009.

    The bombing campaign over the past year has had some success in allowing Iraqi forces to reclaim parts of the country formerly under the group’s control, but important cities like Mosul and Ramadi remain under Islamic State’s control. There has been very little progress in wresting the group’s hold over large parts of Syria, where the United States has done limited bombing.

    Some senior American officials in recent weeks have provided largely positive public assessments about the progress of the military campaign against the Islamic State, a Sunni terrorist organization that began as an offshoot of Al Qaeda but has since severed ties and claimed governance of a huge stretch of land across Iraq and Syria. The group is also called ISIS or ISIL.

    Continue reading the main story
    Obama’s Evolution on ISIS
    Some of President Obama’s statements about the American strategy to confront ISIS and its effectiveness.

    In late July, retired Gen. John Allen — who is Mr. Obama’s top envoy working with other nations to fight the Islamic State — told the Aspen Security Forum that the terror group’s momentum had been “checked strategically, operationally, and by and large, tactically.”

    “ISIS is losing,” he said, even as he acknowledged that the campaign faced numerous challenges — from blunting the Islamic State’s message to improving the quality of Iraqi forces.

    During a news briefing last week, Defense Secretary Ashton B. Carter was more measured. He called the war “difficult” and said “it’s going to take some time.” But, he added, “I’m confident that we will succeed in defeating ISIL and that we have the right strategy.”

    But recent intelligence assessments, including some by Defense Intelligence Agency, paint a sober picture about how little the Islamic State has been weakened over the past year, according to officials with access to the classified assessments. They said the documents conclude that the yearlong campaign has done little to diminish the ranks of the Islamic State’s committed fighters, and that the group over the last year has expanded its reach into North Africa and Central Asia.

    Critics of the Obama administration’s strategy have argued that a bombing campaign alone — without a significant infusion of American ground troops — is unlikely to ever significantly weaken the terror group. But it is not clear whether Defense Intelligence Agency analysts concluded that more American troops would make an appreciable difference.

    In testimony on Capitol Hill this year, Lt. Gen. Vincent R. Stewart, the agency’s director, said sending ground troops back into Iraq risked transforming the conflict into one between the West and ISIS, which would be “the best propaganda victory that we could give.”

    “It’s both expected and helpful if there are dissenting viewpoints about conflicts in foreign countries,” said Micah Zenko, a fellow at the Council on Foreign Relations and author of a forthcoming book, “Red Team,” that includes an examination of alternative analysis within American intelligence agencies. What is problematic, he said, “is when a dissenting opinion is not given to policy makers.”

    The Defense Intelligence Agency was created in 1961, in part to avoid what Robert McNamara, the Secretary of Defense at the time, called “service bias.” During the 1950s, the United States grossly overestimated the size of the Soviet missile arsenal, a miscalculation that was fueled in part by the Air Force, which wanted more money for its own missile systems.

    During the Vietnam War, the Defense Intelligence Agency repeatedly warned that even a sustained military campaign was unlikely to defeat the North Vietnamese forces. But according to an internal history of the agency, its conclusions were repeatedly overruled by commanders who were certain that the United States was winning, and that victory was just a matter of applying more force.

    “There’s a built-in tension for the people who work at D.I.A., between dispassionate analysis and what command wants,” said Paul R. Pillar, a retired senior Central Intelligence Agency analyst who years ago accused the Bush administration of distorting intelligence assessments about Iraq’s weapons programs before the beginning of the Iraq war in 2003.

    “You’re part of a large structure that does have a vested interest in portraying the overall mission as going well,” he said.

    By MARK MAZZETTI and MATT APUZZOAUG. 25, 2015
    A version of this article appears in print on August 26, 2015, on page A1 of the New York edition with the headline: Inquiry Weighs If ISIS Analysis Was Distorted . Order Reprints| Today’s Paper|Subscribe

    Find this story at 25 August 2015

    © 2015 The New York Times Company

    Syria crisis: US-trained rebels give equipment to al-Qaeda affiliate

    A group of US-trained Syrian rebels has handed over their vehicles and ammunition to fighters linked to al-Qaeda, the US military has admitted.
    It said one rebel unit had surrendered six pick-up trucks and ammunition to the al-Nusra Front this week – apparently to gain safe passage.
    Congress has approved $500m (£323m) to train and equip about 5,000 rebels to fight against Islamic State militants.
    But the first 54 graduates were routed by al-Nusra Front, the military said.
    Gen Lloyd Austin told US lawmakers last week that only “four or five” US-trained rebels were still fighting.
    ‘Programme violation’
    “Unfortunately, we learned late today that the NSF (New Syrian Forces) unit now says it did in fact provide six pick-up trucks and a portion of their ammunition to a suspected al-Nusra Front (group),” Pentagon spokesman Cpt Jeff Davis said on Friday.
    Meanwhile, Col Patrick Ryder, a spokesman for US Central Command (Centcom), said this happened on 21-22 September.
    He added that the surrendered vehicles and ammunition amounted to roughly 25% of the equipment issued to the unit.
    “If accurate, the report of NSF members providing equipment to al-Nusra Front is very concerning and a violation of Syria train-and-equip programme guidelines,” Col Ryder said.
    The unit was part of some 70 rebel fighters who participated in the second US training course.
    The train-and-equip programme is at an early stage, but this is just the latest in a series of setbacks, the BBC’s Laura Bicker in Washington says.

    26 September 2015

    Find this story at 26 September 2015

    Copyright © 2015 BBC

    Pentagon: U.S.-trained fighters have not joined forces with al-Qaeda

    The Pentagon on Wednesday denied reports that the latest batch of U.S.­trained rebels in Syria had defected
    and joined al­Qaeda, as officials sought to dispel suggestions of further setbacks for the troubled effort to build
    an effective local force against the Islamic State.
    Earlier this week, shortly after a group of 71 U.S.­trained rebels returned to Syria after completing an American
    training course in Turkey, one of the commanders said to be with the group issued a statement dissociating the
    fighters from the Pentagon program and saying that it would operate as an “independent faction.”
    The statement triggered rumors that the group had defected to the al­Qaeda­linked Jabhat al­Nusra, fueled by
    photographs posted on social media by Jabhat al­Nusra purportedly showing U.S. weapons that had been
    handed over by the Pentagon graduates.
    The new reports came as U.S. officials search for ways to retool the Pentagon’s $500 million training program,
    which was supposed to prepare a reliable, moderate force to combat the Islamic State, but which has come to
    symbolize the shortcomings of the Obama administration’s handling of Syria’s protected civil conflict.
    At the Pentagon, Capt. Jeff Davis, a military spokesman, said that U.S. officials were in touch with members of
    the U.S.­trained group, referred to as the New Syrian Force (NSF), and said reports that the fighters had joined
    Jabhat al­Nusra were false.
    “We have no information at all to suggest that that’s true,” Davis told reporters. He said photos posted by Jabhat
    al­Nusra­affiliated Twitter accounts, which purported to show American weaponry provided by those fighters,
    had been “repurposed.”
    U.S. Central Command, which oversees the training program, took the unusual step of issuing a statement to
    rebut the reports. “All coalition­issued weapons and equipment are under the positive control of NSF fighters,”
    the statement said.
    The whereabouts and affiliation of the fighters was thrown into doubt following the statement by Anas Obaid,
    who was one of the leaders of the new group of Pentagon graduates. He said the group would continue to fight
    the Islamic State, but not in coordination with the United States. He also said the group had disowned its parent
    organization, Division 30, the larger rebel unit from which the Pentagon trainees have been drawn, and would
    call themselves Atareb Rebels, after the town where they are based.
    Division 30 issued a statement saying that the unit had been unable to contact Obaid and warned he would be
    put on trial for “high treason” if the reports of his defection were true.
    Charles Lister of the Doha­based Brookings Institution said it was possible the U.S.­trained fighters had been
    intimidated by Jabhat al­Nusra or other groups into denying their U.S. affiliation. “In that area of northern
    Aleppo, it’s Islamists who have dominance, so to come in as a U.S.­backed force, you are at a disadvantage to
    start with,” he said.
    Later, Division 30, on its Twitter feed, denied that any of its weapons had been handed over: “The handover of
    weapons has not occurred — not a single piece of weaponry.”
    Still, U.S. officials acknowledge that they have limited ability to track the movements of the U.S.­trained
    fighters, who are not under American command and control, and their arms.
    The program, which has produced fewer than 200 fighters so far, has been plagued by setbacks. After the first
    round of training, some fighters were kidnapped by Jabhat al­Nusra; others were attacked, and the unit
    dissolved.
    Last week, Gen. Lloyd Austin III, the Centcom commander, said fewer than five U.S.­backed fighters were then
    in Syria.
    “If this second group has failed as dismally as the first, this could well be the nail in the coffin of the program,”
    Lister said.

    By Missy Ryan and Liz Sly September 23
    Sly reported from Beirut. Thomas Gibbons­Neff contributed to this report.
    Missy Ryan writes about the Pentagon, military issues, and national security for The Washington Post.

    Find this story at 23 September 2015

    Copyright https://www.washingtonpost.com/

    Ankara suicide bombings cast long shadow over Turkey’s Syria policy

    The twin attacks – Turkey’s most devastating in recent history – killed at least 97 civilians and wounded 246 more on Saturday during a predominantly Kurdish peace rally in the capital.

    ISIL is the prime suspect in the suicide bombings, and investigators are close to identifying one of the perpetrators, prime minister Ahmet Davutoglu told Turkish broadcaster NTV on Monday.

    Turkish president Recep Tayyip Erdogan has dangerously supported hardline militant groups – such as the Army of Conquest, a coalition that includes Al Qaeda’s Syria branch Jabhat Al Nusra and the Salafist group Ahrar Al Sham – to topple Syrian president Bashar Al Assad.

    His contentious policy in Syria was already under strain before this, with Russia directly intervening in the war and the US forging close ties with Turkey’s other nemesis on the ground – the Kurdish Democratic Union Party (PYD).

    The growing tussle of superpowers in the Syrian war is edging Turkey out of the equation, according to analysts.

    “Turkey, in my judgement, is no longer a first rank player in the Syrian crisis. It will always have a role to play, but only because of its geography,” said Soli Ozel, professor of international relations at Kadir Has University in Istanbul.

    Russia’s intervention has altered the course of war, not least for Turkey. One immediate effect will be the likely inclusion of Mr Al Assad in any transitional deal, a bitter pill Turkish leaders will have to swallow.

    “Turkey will probably be part of any negotiating table, but I doubt that it will have much of a say as to who sits at the table,” Mr Ozel said.

    Mr Erdogan will officially maintain his stance on ousting Mr Al Assad so as not to appear to have backed down from his position, but this may change should, as expected, Mr Erdogan’s AKP fail to win a majority in the upcoming elections, according to veteran Turkish journalist Semih Idiz.

    “Turkey’s current policy [on Assad] is unsustainable and could change after the elections on November 1,” he said.

    The shift appears even more likely, Mr Idiz added, given the West’s gradual gravitation towards accepting Mr Al Assad in any interim peace deal.

    Turkey first emerged as a major player in the Syrian conflict when anti-regime protests began in 2011, pursuing a vigorous policy of backing mostly religiously conservative rebels to overthrow the Assad regime and empower the Muslim Brotherhood. But Ankara’s objectives are slowly blunting as the war draws in direct interventions from the US and Russia.

    The priorities of the major powers have taken precedence, with Washington’s main focus on eradicating ISIL and Moscow determined to protect its key ally Mr Al Assad and prevent the Syrian state from crumbling further.

    Another indicator of the zero-sum effect Russia’s intervention has had on Turkey’s influence in Syria is the question of Mr Erdogan’s proposed safe-zone within northern Syria.

    “The Russian intervention has put the last nail into the coffin for Ankara in terms of its demand for a safe zone,” Mr Idiz said.

    Russia’s violations of Turkish airspace last week demonstrate Moscow’s hostility towards a no-fly zone, and send a message to Turkey to respect Syria’s sovereignty, according to Mr Idiz.

    Russian incursions into Turkey’s airspace and their close aerial encounters are also a power play that exposes Ankara’s inability to stop the Russians.

    “[Russia is] showing its power and exposing Erdogan’s helplessness,” Mr Ozel said.

    Pushed back by Russia and facing ISIL’s terror, Turkey is also being squeezed by its main ally, the US.

    Washington’s war on ISIL has brought the Americans closer to the PYD, the only acceptable ground force that has proven capable of defeating ISIL extremists.

    “Turkey is clearly displeased with the rising international profile of the PYD, which it is insisting is a terrorist organisation like the PKK, but appears to have little it can do to prevent this,” Mr Idiz said.

    A key Turkish interest is to prevent the emergence of an independent Kurdish state in northeastern Syria, fearing it would inspire further unrest among its large Kurdish minority.

    While a Kurdish state is unlikely, the importance of the PYD to Washington in its fight against ISIL has curtailed Ankara’s ability to weaken the group.

    “The fact that the PYD, which is getting support from the US led-coalition against ISIL, is establishing warm ties with Moscow, is set to weaken Turkey’s hand even more against this group,” Mr Idiz said.

    Mr Erdogan’s Syria policy was designed to expand Turkish influence in its southern neighbour.

    Instead, he may be relegated to spectator status as he watches three worst case scenarios unfold: Mr Al Assad retaining interim power; the Kurds obtaining unprecedented power along the Turkey-Syria border; and radical ISIL with no qualms spreading its terror into the heart of Turkey.

    Antoun Issa
    October 12, 2015 Updated: October 12, 2015 06:20 PM

    Find this story at 12 October 2015

    Copyright http://www.thenational.ae/

    Turkey Pays Former CIA Director and Lobbyists to Misrepresent Attacks on Kurds and ISIS

    Thousands of articles have been published worldwide in recent weeks exposing Turkey’s strategic trickery — using the pretext of fighting ISIS to carry out a genocidal bombing campaign against the Kurds who have courageously countered ISIS in Syria and Iraq.

    The Wall Street Journal reported on August 12 that a senior US military official accused Turkey of deceiving the American government by allowing its use of Incirlik airbase to attack ISIS, as a cover for President Erdogan’s war on Kurdish fighters (PKK) in northern Iraq. So far, Turkey has carried out 300 air strikes against the PKK, and only three against ISIS! Erdogan’s intent in punishing the Kurds is to gain the sympathy of Turkish voters in the next parliamentary elections, enabling his party to win an outright majority and establish an autocratic presidential theocracy.

    To conceal its deception and mislead the American public, within days of starting its war on the Kurds, Ankara hired Squire Patton Boggs for $32,000 a month, as a subcontractor to the powerful lobbying firm, the Gephardt Group. Squire Patton Boggs includes former Senators Trent Lott and John Breaux, and retired White House official Robert Kapla. The Gephardt lobbying team for Turkey consists of subcontractors Greenberg Traurig, Brian Forni, Lydia Borland, and Dickstein Shapiro LLP; the latter recently added to its lobbying staff former CIA Director Porter Goss. Other firms hired by Turkey are: Goldin Solutions, Alpaytac, Finn Partners, Ferah Ozbek, and Golin/Harris International. According to U.S. Justice Department records, Turkey pays these lobbying/public relations firms around $5 million a year. Furthermore, several U.S. non-profit organizations serve as fronts for the Turkish government to promote its interests in the United States and take Members of Congress and journalists on all-expense paid junkets to Turkey.

    Among the U.S. lobbyists for Turkey, perhaps the most questionable is Porter Goss, CIA Director from 2004 to 2006, who has agreed to sell his soul and possibly U.S. national secrets for a fistful of Turkish Liras.

    It is noteworthy that in a report Mr. Goss filed with the Justice Department under the Foreign Agents Registration Act, he avoided answering the question regarding his compensation from the Turkish government. He simply wrote: “Salary not based solely on services rendered to the foreign principal [Turkey]”!

    In the same form, filed on April 23, 2015, Mr. Goss described his services for Turkey as follows:

    1) Provide counsel in connection with the extension and strengthening of the Turkish-American relationship in a number of key areas that are the subject of debate in Congress, including trade, energy security, counter-terrorism efforts, and efforts to build regional stability in the broader Middle East and Europe;
    2) Educating Members of Congress and the Administration on issues of importance to Turkey;
    3) Notifying Turkey of any action in Congress or the Executive Branch on issues of importance to Turkey;
    4) Preparing analyses of developments in Congress and the Executive Branch on issues of importance to Turkey.
    It is significant that Dickstein Shapiro LLP, Mr. Goss’s employer, misled the Justice Department, by reporting two days prior to the start of his employment and three days before the Armenian Genocide Centennial, that the former CIA Director had already met on behalf of his lobbying firm with nine members of Congress to discuss “US-Turkish relations.”

    Most probably, hiring Porter Goss as a lobbyist for Turkey was a reward for his staunch support of Turkish issues, while serving as a Republican congressman from Florida from 1989 to 2004. During the October 2000 debate on the Armenian Genocide resolution in the House International Relations Committee, Cong. Goss, the then Chair of the House Intelligence Committee, testified against the adoption of the resolution, using the excuse that it would harm U.S.-Turkey relations. Nevertheless, the genocide resolution was adopted by a vote of 24 to 11.

    It is bad enough that former Members of Congress are selling themselves to anyone who is willing to pay them. But, the former director of the CIA…? This is more than unethical; it is a grave risk to U.S. national security. The American government must not allow the sale of its top spymaster to the highest bidder! What if North Korea offered him a higher price? Would Mr. Goss jump ship and lobby for an enemy state just to make a few more dollars?

    Harut Sassounian
    Posted: 08/19/2015 11:49 am EDT Updated: 08/28/2015 8:59 am EDT

    Find this story at 19 August 2015

    Copyright ©2015 TheHuffingtonPost.com, Inc.

    Senior ex-general hints at CIA involvement in Balyoz coup plot case

    Retired Gen. Bilgin Balanlı, who was among the 236 suspects acquitted in the “Balyoz” (Sledgehammer) coup-plot case, has said the United States or the Central Intelligence Agency (CIA) could have had a finger in the coup case.

    The CIA or the U.S.’ “deep state” could have been involved in the case, recalling the testimony of a suspect, who said in 2010 he and a former deputy had picked up a sack full of documents in 2007 to be used in the Balyoz coup plot case from an American senator and a retired Turkish major in Istanbul and taken it to Ankara, according to Balanlı.

    Balanlı said the alleged military documents, which became evidence and began the investigation, contained terms the Turkish army did not use and which were known to be used in the U.S. Army.

    “For example, we do not use the word ‘ocean’ when we talk about our seas. The term ‘ocean’ was used in some places of the Balyoz coup plot plan. I think that they could have translated this from an American plan,” said Balanlı.

    Balanlı, who was the only four-star general on active duty who was a suspect in the coup-plot case, was in line to be appointed to Chief of the Air Staff in August 2011 if he had not been arrested and sent to jail just two months before. He spent two years in jail and was forced to retire.

    Balanlı said even though government officials now say they have been deceived about the case they believed they could gain political benefit from the plot case at the time.

    “We can say the government perceived they could politically benefit from the case. Maybe both an opinion was formed and they believed the information given to them within the plot. They believed the plotters very much. Now they say they were deceived,” said Balanlı, adding this was a weakness for the Turkish Republic with all its institutions.

    President Recep Tayyip Erdoğan said March 19, during his first speech as commander-in-chief at the War Colleges Command, that the “parallel structure” of state officials sympathetic to U.S.-based Islamic scholar Fethullah Gülen “misled and deceived” Turkey through the Ergenekon and Balyoz coup-plot cases, claiming he had personally objected to the arrest of top commanders and officers.

    Stating he had identified a formation dubbed the “parallel structure” by the government as a “gang” when he lodged a petition to the court during his first trial, Balanlı said it would be “naïve” not to think the “parallel structure” had also stationed its own people inside the army, as some of the documents about the suspects in the case contained information people outside of the military could not have known.

    Balanlı said they had struggled on their own to tell the truth to the nation, disclaiming the General Staff and Chief of General Staff Necdet Özel’s contributions to winning the case.

    “We made the struggle to enlighten the public and made the nation see the truth. If there is any honor in this matter then it is the honor of the people who have showed the courage to stand by us and the truth. I do not believe the General Staff has [made] any contributions to this,” said Balanlı.

    Cansu Çamlıbel ISTANBUL
    April/06/2015

    Find this story at 6 April 2015

    Copyright http://www.hurriyetdailynews.com/

    US neither confirms nor denies tapping Turkey’s intelligence head Hakan Fidan

    US Department of State Spokesperson John Kirby refused to comment during Thursday’s daily press briefing on a German magazine’s claim that the US’s National Security Agency (NSA) had spied on Hakan Fidan, the chief of the Turkish National Intelligence Organization (MİT), in order to collect information on a high level security meeting about the possible Turkish intervention in Syria to protect a Turkish enclave there last year.
    When asked about a report by the Germany-based Focus magazine asserting the NSA tapped Fidan’s phone and therefore collected the audio from the meeting, Kirby said: “We’re not going to comment publicly on every specific alleged intelligence or disclosure activity. I just — I would refer you to the National Security Agency for anything more.”
    Kirby was also asked to comment on this week’s meeting in Ankara between Turkish officials and a US delegation led by US Special Presidential Envoy for the Global Coalition to Counter the Islamic State in Iraq and the Levant (ISIL) Gen. John Allen. In response to the question, Kirby said the US delegation and the Turks held a series of constructive meetings, in which the parties discussed their mutual efforts in the coalition against ISIL. He added, “I’m not going to detail all the various things that were discussed, but I think you can understand that — I mean, again, it was a pretty wide-ranging sets of discussions about all the different challenges we’re facing against ISIL.”
    Kirby did not confirm or deny allegations that the Turkish government had agreed during the talks to allow its military air base in İncirlik, Adana, to be used by US drones to strike ISIL targets in Syria. “I’m in no position to confirm any kind of decision in that regard,” said the spokesman on the claim.
    With regards to the differences between Turkey and the US on Kurdish fighters in northern Syria, Kirby stated that the US understands Turkish concerns, adding “It’s not something that we ignore. What our focus [is] on inside Syria is against ISIL. That’s the focus of the coalition effort. And I’d like to remind everybody that Turkey is a part of that coalition, not just a NATO ally but a part of that coalition, and they’re contributing to the effort.”
    Kirby also pointed out Turkey’s “significant refugee problem” from Syria. Gen. Allen and US Department of Defense Under Secretary of Defense for Policy Christine Wormuth, along with a large delegation from the Pentagon, have been in Ankara this past week meeting with their Turkish counterparts, including Turkish Foreign Ministry Undersecretary Feridun Sinirlioğlu. The Turkish and US delegations had an eight-hour-long meeting on Tuesday and continued their discussions on Wednesday and Thursday.
    The Turkish daily Cumhuriyet reported on Thursday that Ankara agreed to let US armed drones that are deployed at İncirlik Air Base be used against ISIL. Speaking to the A Haber TV channel in late June, Turkey’s Foreign Minister Mevlüt Çavuşoğlu talked about the presence of armed US drones at İncirlik, adding that the drones were being used for gathering intelligence and that it was natural that they were armed, given the threats in the region.
    According to Cumhuriyet, Turkey and the US are close to a deal on using the base, but Ankara wants the US to support the Syrian opposition, especially around Aleppo, as a precondition to its assistance.

    July 10, 2015, Friday/ 12:17:03/ TODAYSZAMAN.COM / ISTANBUL

    Find this story at 10 July 2015

    © Feza Gazetecilik A.Ş. 2007

    Erdogans SchattenkriegerSo ungeniert spioniert Erdogan seine Gegner aus – mitten in Deutschland

    Türkische Spione in Deutschland sollen Erdogan-Gegner ans Messer geliefert haben. Ein Prozess gegen einen Top-Spion zeigt jetzt, wie Ankaras Geheimdienst massiv Spitzel nach Deutschland einschleust.
    Richterin Yvonne O. geriet ins Stocken. Die Verlesung des Haftbefehls gegen den mutmaßlichen türkischen Spion Taha Gergerlioglu, 59, hatte um 11.30 Uhr just begonnen, da stolzierte ein elegant gekleideter Herr in den Verhandlungssaal. Der Mann übersah mit diplomatischer Arroganz die einfachen Justizbeamten und erwartete Respekt. Immerhin, sagte er zu der Haftrichterin am Karlsruher Bundesgerichtshof, sei er der türkische Generalkonsul Serhat Aksen, 44. In schwerer Stunde wolle er seinem Landsmann Gergerlioglu beistehen, eingesperrt wegen angeblicher feindlicher Agententätigkeit in Deutschland.
    Die sichtlich überraschte Richterin wollte gerade weiter den Haftbefehl vortragen, als das Telefon neben ihr klingelte. Ein Anwalt teilte im Auftrag eines Professors aus Ankara mit, dass der mutmaßliche Agentenführer zum einflussreichen Beraterstab des türkischen Präsidenten Recep Tayyip Erdogan gehöre.
    „Damit“, so ein Ermittler zu FOCUS, „war die Katze aus dem Sack. Die Türken haben versucht, massiv auf die deutsche Justiz einzuwirken.“ Die mutmaßliche Botschaft, überbracht von Generalkonsul und Professor: Wenn dem Angeklagten auch nur ein Haar gekrümmt wird, bekommt ihr Erdogans Jähzorn zu spüren.
    Den Boss nennen sie “Großbruder”
    Die Bundesanwaltschaft stuft die Intervention im Gerichtssaal durchaus als „besonderen Umstand“ ein, lässt sich ansonsten aber nicht irritieren. Auch wenn Erdogans Top-Spion eine hohe Stellung im Staatsgefüge der Türkei bekleide, so sei er nach Staatsschutz-Ermittlungen gleichwohl der Anführer eines Agentenrings in der Bundesrepublik. Zwei seiner besonders aktiven Spitzel, der Arbeitslose Göksel G., 34, aus Bad Dürkheim und Reisekaufmann Duran Y., 59, aus Wuppertal, werden sich mit ihrem Chef Gergerlioglu vor Gericht verantworten müssen.
    Die Spionage-Clique hatte ein klares Ziel: Verfolgung und Ausspähung von türkischen und kurdischen Dissidenten, die bei der Rückkehr in ihre Heimat vermutlich verhaftet und gefoltert wurden. Ende April 2014 teilte zum Beispiel Duran Y. seinem Führungsoffizier Gergerlioglu mit, dass einer der „Hetzer“ gegen Erdogan bald in die Türkei fahre. Der Boss, von seinen Spitzeln stets demütig als „Großbruder“ oder „Gouverneur“ angesprochen, versprach, dass man das Lästermaul nach der Einreise in die Türkei „sofort fertigmachen“ werde.
    In Deutschland lebende Aktivisten der verbotenen Arbeiterpartei Kurdistans (PKK) sowie rebellische Jesiden waren in den Augen des Erdogan-Vertrauten die größten Staatsfeinde. Überdies galten auch Kommunisten der Partei DHKP-C als Top-Zielpersonen.
    Das Stammkapital kommt aus der Operativ-Kasse
    Der vierfache Familienvater Gergerlioglu, seit Studentenzeiten ein fleißiger Unterstützer Erdogans islamischkonservativer Partei AKP, begann offenbar 2011 seine erste Geheimmission in Deutschland. In Bad Dürkheim gründete der Textilingenieur mit seinem Komplizen Göksel G. eine Agentur zur Beratung von Firmen im deutsch-türkischen Handel. Eine Tarnadresse?
    Das Stammkapital von 25 000 Euro kommt offenbar aus der Operativ-Kasse von Hakan Fidan, 46, Boss des mächtigen und allseits gefürchteten Geheimdienstes MIT. Fidan, Intimus von Erdogan, führt Agentennetze im In- und Ausland. Seine Kundschafter in Deutschland sind ihm besonders wichtig. Umso mehr dürfte es ihn geschmerzt haben, dass seine Spitzenkraft Gergerlioglu im Untersuchungsgefängnis landete.
    Fidan, ein intelligenter und bulliger Typ, kennt die deutschen Sicherheitsbehörden sehr gut. Als türkischer Verbindungsoffizier zur Nato war er eine Zeitlang am „Allied Command Europe Rapid Reaction Corps“ in Mönchengladbach-Rheindahlen stationiert. Seit dieser Zeit gilt er als großer Fußballfan von Borussia Mönchengladbach.
    Wer ist der größte Prahler? Die absurden Protzbauten von Staatsoberhäuptern
    So smart Fidan wirken mag, so knallhart setzt er Erdogans Ideen um. Vor knapp zwei Jahren protokollierte der US-Geheimdienst NSA ein Telefonat von Fidan, in dem er mit einem hohen Offizier den heimtückischen Plan erörterte, in einer verdeckten Operation von syrischer Seite aus das Grabmal eines berühmten türkischen Religionslehrers beschießen und zerstören zu lassen.
    Nach Fidans Konzept hätte dies der Anlass sein können, mit türkischen Truppen in Syrien einzumarschieren. Der Plan liegt bis heute in der Schublade. Stattdessen muss Erdogans Adlatus seit Monaten sein Image aufpolieren. Nahezu alle Geheimdienste in Europa werfen ihm vor, gefährliche Islamisten auf dem Weg nach Syrien ungehindert durch die Türkei ziehen zu lassen. Fahndungsersuchen aus Deutschland oder Frankreich wurden nachweislich missachtet.
    Seinem Top-Spion Gergerlioglu und dessen Komplizen war offenbar kein Trick zu schmutzig. Ende 2013 nahmen sie sich den Anführer einer oppositionellen Glaubensgruppe vor. Staatsschützer des Hessischen Landeskriminalamts (LKA) konnten in abgehörten Telefonaten verfolgen, wie das Trio ihr Opfer Fetullah Güllen erledigen wollte. Mit Hilfe eines Fälschers sollte ein Dokument erstellt werden, aus dem hervorging, dass sich Güllen im Korankurs sexuell an Jungen vergangen habe. Diese belastende Nachricht, so die Ermittlungen, war eigens für den „Oberchef“ bestimmt – gemeint ist Recep Erdogan.
    Er würde seinem Vorbild angeblich bis in den Tod folgen
    Der türkische Staatspräsident war zu dieser Zeit ohnehin rachsüchtig. Kurz vor seinem Besuch in Köln erfuhr er im Mai 2014, dass Plakate in der Domstadt ihn als „unerwünschte Person“ dargestellt hatten. Zwei Wochen später nannten Erdogans Spezialagenten einen der angeblichen Aufwiegler: Diesen Mann, so hörten die LKA-Lauscher, müsse man „ficken“.
    Der Prozess gegen das Spionage-Trio könnte die deutschtürkischen Beziehungen weiter belasten. Angebliche V-Mann-Operationen des Bundesnachrichtendienstes im Umfeld von Mördern eines Staatsanwalts brachten die Türken kürzlich in Rage.
    Umgekehrt agiert man dezenter. Die deutschen Sicherheitsbehörden wissen seit Jahren, wie rücksichtslos die Spione von Hakan Fidan in der Bundesrepublik agieren – dennoch nimmt man auf den Nato-Partner Rücksicht. „Wenn’s nach den Türken ginge, könnten wir jede Woche ein Dutzend PKK-Leute festnehmen“, sagte ein früherer BKA-Staatsschutzchef zu FOCUS.
    Hakan Fidan, der seinem Vorbild Erdogan angeblich treu bis in den Tod folgen würde, gilt als cleverer Geheimdienst-Boss. Seine Deutschland-Spione sitzen nicht nur in sogenannten legalen Residenturen wie Botschaft und Konsulate, sondern auch als Undercover-Agenten in türkischen Reisebüros, Redaktionen, Banken und Gebetshäusern.
    Seine Trümpfe sind junge Türken
    Die staatliche DITIB-Moschee in Köln-Ehrenfeld gilt als wichtiger Stützpunkt von Hakan Fidans Geheimdienst MIT. Die Vorbeter werden angeblich angewiesen, Informationen über Erdogans Kritiker sowie Personenfotos über vermeintliche Landesverräter zu liefern. Falls ein Rollkommando für harte Bestrafungsaktionen benötigt wird, stehen die Schläger der nationalistischen Grauen Wölfe gern bereit.
    Fidans Trümpfe sind junge Türken, die in Deutschland geboren und aufgewachsen sind. Für viele von ihnen ist der Wehrdienst verpflichtend. Wenn sie einwilligen, dem Geheimdienst MIT aus patriotischen Gründen zu helfen, verkürzt sich ihre Militärzeit erheblich.
    Zurück in Deutschland, arbeiten die zweisprachigen jungen Türken in Stadtverwaltungen, Hotels und Banken. Somit haben sie Zugang zu Daten, die den Agentenboss Fidan interessieren könnten. „Hakans Arm“, so ein LKA-Man, „ist verdammt lang.“

    Samstag, 04.07.2015, 21:19 · von FOCUS-Reporter Josef Hufelschulte und FOCUS-Redakteur Axel Spilcker

    Find this story at 4 July 2015
    Drucken© FOCUS Online 1996-2015

    Exclusive: Congress probing U.S. spy agencies’ possible lapses on Russia

    Senior U.S. lawmakers have begun probing possible intelligence lapses over Moscow’s intervention in Syria, concerned that American spy agencies were slow to grasp the scope and intention of Russia’s dramatic military offensive there, U.S. congressional sources and other officials told Reuters.

    A week after Russia plunged directly into Syria’s civil war by launching a campaign of air strikes, the intelligence committees of the U.S. Senate and House of Representatives want to examine the extent to which the spy community overlooked or misjudged critical warning signs, the sources said.

    Findings of major blind spots would mark the latest of several U.S. intelligence misses in recent years, including Moscow’s surprise takeover of Ukraine’s Crimea region last year and China’s rapid expansion of island-building activities in the South China Sea.

    Though spy agencies have sought to ramp up intelligence gathering on Russia since the crisis over Ukraine, they continue to struggle with inadequate resources because of the emphasis on counter-terrorism in the Middle East and the Afghanistan-Pakistan region, according to current and former U.S. officials.

    A senior administration official, who also asked not to be identified, insisted that there were “no surprises” and that policymakers were “comfortable” with the intelligence they received in the lead-up to the Russian offensive.

    Spy agencies had carefully tracked Russian President Vladimir Putin’s build-up of military assets and personnel in Syria in recent weeks, prompting White House criticism and demands for Moscow to explain itself.

    But intelligence officers – and the U.S. administration they serve – were caught mostly off-guard by the speed and aggressiveness of Putin’s use of air power as well as a Russian target list that included U.S.-backed rebels, according to the officials, who spoke on condition of anonymity.

    “They saw some of this going on but didn’t appreciate the magnitude,” one of the sources told Reuters.

    Russia’s sudden move to ramp up its military involvement in the Syria crisis has thrown Obama’s Middle East strategy into doubt and laid bare an erosion of U.S. influence in the region.

    A shortage of reliable information and analysis could further hamper President Barack Obama’s efforts to craft a response on Syria to regain the initiative from Washington’s former Cold War foe.

    BEHIND THE CURVE?

    It is unclear how his administration could have reacted differently with better intelligence, though advance word of Putin’s attack plans might have allowed U.S. officials to warn the moderate Syrian opposition that they could end up in Russia’s line of fire.

    Obama, who is reluctant to see America drawn deeper into another Middle East conflict, has shown no desire to directly confront Russia over its Syria offensive – something Moscow may have taken as a green light to escalate its operations.

    Syrian troops and militia backed by Russian warplanes mounted what appeared to be their first major coordinated assault on Syrian insurgents on Wednesday and Moscow said its warships fired a barrage of missiles at them from the Caspian Sea, a sign of its new military reach.

    Russia’s military build-up now includes a growing naval presence, long-range rockets and a battalion of troops backed by Moscow’s most modern tanks, the U.S. ambassador to NATO said.

    The U.S. administration believes it now has a better understanding at least of Putin’s main motive – to do whatever it takes to prop up Syrian President Bashar al-Assad. But Washington remains uncertain exactly how much further Putin is willing to go in terms of deployment of advanced military assets, the U.S. officials said.

    The lack of clarity stems in part from the limited ability of U.S. intelligence agencies to discern what Putin and a tightly knit circle of advisers are thinking and planning.

    In a tense meeting with Putin at the United Nations early last week, Obama was not given any advance notice of Russia’s attack plans, aides said. Russian air strikes began two days later, including the targeting of CIA-trained “moderate” anti-Assad rebels, though Moscow insisted it only hit Islamic State insurgents.

    “They did not expect the speed with which Putin ramped things up,” said Michael McFaul, Obama’s former ambassador to Moscow. “He likes the element of surprise.”

    U.S. intelligence agencies did closely follow and report to policymakers Russian moves to sharply expand infrastructure at its key air base in Latakia as well as the deployment of heavy equipment, including combat aircraft, to Syria, officials said.

    “We’re not mind readers,” the senior administration official said. “We didn’t know when Russia would fly the first sortie, but our analysis of the capabilities that were there was that they were there for a reason.”

    However, several other officials said U.S. agencies were behind the curve in assessing how far the Russians intended to go and how quickly they intended to launch operations.

    In fact, right up until a White House briefing given shortly after the bombing began, Obama press secretary Josh Earnest declined to draw “firm conclusions” on Russia’s strategy.

    CONFUSION OVER RUSSIAN INTENT

    One source suggested that U.S. experts initially thought the Russian build-up might have been more for a military “snap exercise” or a temporary show of force than preparations for sustained, large-scale attacks on Assad’s enemies.

    Another official said that after initial review, congressional oversight investigators believe that “information on this was not moving quickly enough through channels” to policymakers.

    And another source said there had been a “lag of a week” before agencies began voicing full-throated alarm about imminent Russian military operations.

    The senior administration official said, however, that “I don’t think anybody here perceived a gap” in intelligence.

    In their reviews of how U.S. intelligence handled the Syria build-up, officials said congressional intelligence committees would examine reports issued by the agencies and question officers involved in the process, according to congressional and national security sources. At the moment, no public hearings are planned, the officials said.

    Though the senior administration official denied the intelligence community was paying any less attention to Syria, John Herbst, a former U.S. ambassador to Ukraine, said that not enough intelligence assets had been devoted to analyzing Putin’s “aggressive policies”.

    McFaul, who took the view that the Obama administration had been largely on top of the situation as Putin prepared his offensive, said that a faster or more precise intelligence assessment would probably have done little to change the outcome.

    “What difference would it make if we had known 48 hours ahead of time?” asked McFaul, who now teaches at Stanford University in California. “There still wouldn’t have been any better options for deterring Putin in Syria.”

    (Additional reporting by Lesley Wroughton and Roberta Rampton, Writing by Matt Spetalnick; editing by Stuart Grudgings)

    Politics | Thu Oct 8, 2015 8:03am EDT Related:
    BY MARK HOSENBALL, PHIL STEWART AND MATT SPETALNICK

    Find this story at 8 October 2015

    Copyright Thomson Reuters

    Despite bombing, Islamic State is no weaker than a year ago

    This image made from gun-camera video taken on July 4, 2015 and released by United States Central… Read more

    WASHINGTON (AP) — After billions of dollars spent and more than 10,000 extremist fighters killed, the Islamic State group is fundamentally no weaker than it was when the U.S.-led bombing campaign began a year ago, American intelligence agencies have concluded.

    U.S. military commanders on the ground aren’t disputing the assessment, but they point to an upcoming effort to clear the important Sunni city of Ramadi, which fell to the militants in May, as a crucial milestone.

    The battle for Ramadi, expected over the next few months, “promises to test the mettle” of Iraq’s security forces, Marine Corps Brig. Gen. Kevin J. Killea, who is helping run the U.S.-led coalition effort in Iraq, told reporters at the Pentagon in a video briefing from the region.

    The U.S.-led military campaign has put the Islamic State group on defense, Killea said, adding, “There is progress.” Witnesses on the ground say the airstrikes and Kurdish ground actions are squeezing the militants in northern Syria, particularly in their self-proclaimed capital in Raqqa.

    But U.S. intelligence agencies see the overall situation as a strategic stalemate: The Islamic State remains a well-funded extremist army able to replenish its ranks with foreign jihadis as quickly as the U.S. can eliminate them. Meanwhile, the group has expanded to other countries, including Libya, Egypt’s Sinai Peninsula and Afghanistan.

    The assessments by the CIA, the Defense Intelligence Agency and others appear to contradict the optimistic line taken by the Obama administration’s special envoy, retired Gen. John Allen, who told a forum in Aspen, Colorado, last week that “ISIS is losing” in Iraq and Syria. The intelligence was described by officials who would not be named because they were not authorized to discuss it publicly.

    “We’ve seen no meaningful degradation in their numbers,” a defense official said, citing intelligence estimates that put the group’s total strength at between 20,000 and 30,000, the same estimate as last August, when the airstrikes began.

    The Islamic State’s staying power raises questions about the administration’s approach to the threat that the group poses to the U.S. and its allies. Although officials do not believe it is planning complex attacks on the West from its territory, the group’s call to Western Muslims to kill at home has become a serious problem, FBI Director James Comey and other officials say.

    Yet under the Obama administration’s campaign of bombing and training, which prohibits American troops from accompanying fighters into combat or directing airstrikes from the ground, it could take a decade or more to drive the Islamic State from its safe havens, analysts say. The administration is adamant that it will commit no U.S. ground troops to the fight despite calls from some in Congress to do so.

    The U.S.-led coalition and its Syrian and Kurdish allies have made some inroads. The Islamic State has lost 9.4 percent of its territory in the first six months of 2015, according to an analysis by the conflict monitoring group IHS.

    A Delta Force raid in Syria that killed Islamic State financier Abu Sayyaf in May also has resulted in a well of intelligence about the group’s structure and finances, U.S. officials say. His wife, held in Iraq, has been cooperating with interrogators.

    Syrian Kurdish fighters and their allies have wrested most of the northern Syria border from the Islamic State group, and the plan announced this week for a U.S.-Turkish “safe zone” is expected to cement those gains.

    In Raqqa, U.S. coalition bombs pound the group’s positions and target its leaders with increasing regularity. The militants’ movements have been hampered by strikes against bridges, and some fighters are sending their families away to safer ground.

    But American intelligence officials and other experts say the Islamic State is in no danger of being defeated any time soon.

    “The pressure on Raqqa is significant … but looking at the overall picture, ISIS is mostly in the same place,” said Harleen Gambhir, a counterterrorism analyst at Institute for the Study of War, a Washington think tank.

    Although U.S. officials have said it is crucial that the government in Baghdad win back disaffected Sunnis, there is little sign of that happening. American-led efforts to train Syrian rebels to fight the Islamic State have produced a grand total of 60 vetted fighters.

    The militants have adjusted their tactics to thwart a U.S. bombing campaign that tries assiduously to avoid civilian casualties, officials say. Fighters no longer move around in easily targeted armored columns; they embed themselves among women and children, and they communicate through couriers to thwart eavesdropping and geolocation, the defense official said.

    Oil continues to be a major revenue source. By one estimate, the Islamic State is clearing $500 million per year from oil sales, said Daniel Glaser, assistant secretary for terrorist financing at the Treasury Department. That’s on top of as much as $1 billion in cash the group seized from banks in its territory.

    Although the U.S. has been bombing oil infrastructure, the militants have been adept at rebuilding oil refining, drilling and trading capacity, the defense official said.

    The stalemate makes the battle for Ramadi all the more important.

    Iraqi security forces, including 500 Sunni fighters, have begun preparing to retake the Sunni city, Killea said, and there have been 100 coalition airstrikes designed to support the effort. But he cautioned it will take time.

    “Momentum,” he said, “is a better indicator of success than speed.”

    Karam and Mroue reported from Beirut.
    By KEN DILANIAN, ZEINA KARAM and BASSEM MROUE
    Jul. 31, 2015 1:36 PM EDT

    Find this story at 31 July 2015

    AP News | © 2015 Associated Press

    Iraq Ambassador to US: ‘We Cannot Coexist with ISIS’

    A recent session at the 2015 Aspen Security Forum session exploring the expansion of ISIS, and the international response, began by moderator and New York Times Senior Correspondent Eric Schmitt mentioning that in a Senate hearing earlier that day, Sen. John McCain said, “ISIS is winning” (a sentiment he would later echo during his own Security Forum session two days later) and that a spokesperson for the US Secretary of Defense said it would be one to 8 weeks before Iraqi forces could begin an offensive against ISIS. Despite this, the panel was optimistic about the future of the region and its ability to take on ISIS.

    Ret. Gen. John Allen: “ISIS is losing.”

    Special Presidential Envoy for the Global Coalition to Counter ISIS and Former Commander of the US Forces in Afghanistan, retired US Marine Corps Gen. John Allen had just returned from Turkey, which announced that it would not only allow the US to use two of its airbases for operations in Syria, but also send Turkish forces into direct combat along the Syrian border — a “very important turn” for Turkey, as Allen put it.

    “A year ago today, we were facing the real possibility that Iraq was going to come apart,” Allen said. But with the appointment of the new Iraqi Prime Minister, Haider al-Abadi, last September, and the formation of a 62-member coalition, “we’ve seen some significant progress,” he continued. And inside Iraq, Allen explained that many tribes are committed to the defeat of Al Qaeda and Daesh (a term he prefers over ISIS), and they are better supported by al-Abadi. Accordingly, Iraqi Security Forces will continue to grow in number and training, whereas Allen believes international efforts will decrease ISIS’s access to foreign fighters.

    Allen noted that in the past year, Daesh’s territory and the population under their control has shrunk significantly (and will continue to do so as the Turkish border closes).

    “I do believe that Daesh’s momentum has been checked strategically, operationally, and, by in large, tactically. But it isn’t just a military campaign. There’s a counter-finance campaign, there’s a counter-messaging campaign, there’s a counter-foreign-fighters campaign, and then there’s a humanitarian piece… It’s very important that you have that larger strategic perspective when you consider whether we’ve had an effect.”

    Tackling ISIS’s finances

    “I don’t think we’ve ever seen a terrorist organization that had the ability to draw from its own internal territory these kinds of resources,” US Assistant Secretary of the Treasury for Terrorist Financing Daniel Glaser. For example, ISIS has taken control of “money in the bank vaults that was there when ISIS took control of the territory” — between $500 million and a billion dollars — but this is “non-renewable.” Once it’s been spent, it’s gone. Renewable sources of wealth include “hundreds of millions of dollars per year” from extortion or taxation and almost $500 million per year from the sale of oil. ISIS also receives smaller amounts of money from ransoming and foreign donations.

    “It would be great to bankrupt ISIS, but I think the challenge we have is to disrupt their financing and bring their revenue down, to make it harder for them to meet their costs,” Glaser said. He outlined a four-part strategy to tackle ISIS’s finances:

    Isolate ISIS-controlled territory from international financial systems (the most important piece of the strategy).
    Go after foreign donors and smugglers, applying sanctions in some cases.
    Understand their internal financial architecture and target their key financiers.
    Identify their external international financial networks.
    Iraq Ambassador to the US: “We have no Plan B. We cannot coexist with ISIS.”

    Ambassador of Iraq to the US Lukman Faily said that while Iraq faces political challenges both within the country and region, great progress has been made recently. “The new Prime Minister [Haider al-Abadi] has been extremely inclusive,” he said. “He has done outreach to all, whether it’s tribes, political entities within Iraq, and so on.” Additionally, the struggle against ISIS has trumped any sectarian differences. “ISIS can be a good, common project for us, to enhance our social cohesion and to focus on the commonalities of that threat. It’s a threat to our ethnicity, a threat to Iraq’s heritage, and so on.”

    Faily said that Iraq will need international support, but as far as Iraqis are concerned, “I don’t think this is an issue of will… We have not asked the US for boots on the ground for a number a reasons. One of them is that we want to go through that painful process [of fighting ISIS] for our own sake, for our own long-term policies, and not have dependencies on others.”

    But Faily did praise the work of Iran, noting that they view ISIS as a common threat, so they offered an “open check” to Iraq. Additionally, they provided 200 advisors. Although this is less than one-tenth the number of American advisors, the Iranian advisors are on the front lines, unlike the Americans. Although the US government might not like this, Faily said, “That is a Washington problem, not an Iraqi problem.”

    “ISIS is a cancer in our body,” Faily said. “We need to get rid of it through all methods… and we need to be fast. That is the key message.” In order to do so, a myriad of treatments — military, economic, and diplomatic — will be required. But for now, despite the fears of some in DC, the outlook is in fact positive.

    Jul 27 2015
    By Eric Christensen

    Find this story at 27 July 2015

    © 2015 Aspen Institute

    US-trained Division 30 rebels ‘betray US and hand weapons over to al-Qaeda’s affiliate in Syria’

    Pentagon-trained rebels are reported to have betrayed US and handed weapons over to Jabhat al-Nusra immediately after entering Syria

    Pentagon-trained rebels in Syria are reported to have betrayed their American backers and handed their weapons over to al-Qaeda in Syria immediately after re-entering the country.
    Fighters with Division 30, the “moderate” rebel division favoured by the United States, surrendered to the al-Qaeda-affiliated Jabhat al-Nusra, a raft of sources claimed on Monday night.
    Division 30 was the first faction whose fighters graduated from a US-led training programme in Turkey which aims to forge a force on the ground in Syria to fight against Islamic State in Iraq and the Levant (Isil).
    A statement on Twitter by a man calling himself Abu Fahd al-Tunisi, a member of al-Qaeda’s local affiliate Jabhat al-Nusra, read: “A strong slap for America… the new group from Division 30 that entered yesterday hands over all of its weapons to Jabhat al-Nusra after being granted safe passage.
    “They handed over a very large amount of ammunition and medium weaponry and a number of pick-ups.”

    Abu Khattab al-Maqdisi, who also purports to be a Jabhat al-Nusra member, added that Division 30’s commander, Anas Ibrahim Obaid,had explained to Jabhat al-Nusra’s leaders that he had tricked the coalition because he needed weapons.
    “He promised to issue a statement… repudiating Division 30, the coalition, and those who trained him,” he tweeted. “And he also gave a large amount of weapons to Jabhat al-Nusra.”
    The Syrian Observatory for Human Rights (SOHR), a monitoring group, reported that seventy-five Division 30 fighters had crossed into Syria from Turkey early the day before with “12 four-wheel vehicles equipped with machine guns and ammunition”.
    US Central Command confirmed about 70 graduates of the Syria “train and equip” programme had re-entered Syria with their weapons and equipment and were operating as New Syrian Forces alongside Syrian Kurds, Sunni Arab and other anti-Isil forces.
    The latest disaster, if true, will be the second to befall the programme. Last month, after the first group of fighters re-entered, the militia was attacked and routed by Jabhat al-Nusra, which stormed its headquarters and kidnapped a number of its members.
    At the weekend, the group’s chief of staff also resigned, saying the training programme was “not serious”.
    In the statement, Lieutenant Colonel Mohammad al-Dhaher complained of insufficient numbers of trainees and fighters, inadequate supplies, and even “a lack of accuracy and method in the selection of Division 30’s cadres”.
    The latest developments have only added to the scorn heaped on the much-criticized $500 million (£320m) program, which aimed to forge a 5,400-strong force of “moderate” rebels to combat Isil.
    It has been hampered by problems almost from the outset, with rebels complaining of a laborious vetting process. The biggest point of contention is that they are only allowed to fight Isil, not the Assad regime, which is the principal enemy for most opposition groups.
    Sept. 16, 2015, photo, U.S. Central Command Commander Gen. Lloyd Austin III, testifies on Capitol Hill in Washington.

    General Lloyd Austin told the Senate Armed Services Committee that only “four or five” US-trained rebels were still fighting the Islamic State

    Last Wednesday, General Lloyd Austin, head of US Central Command, shocked leaders in the US Senate’s armed services committee when he said there were only handful of programme graduates still fighting inside Syria. “We’re talking four or five,” he said.

    By Nabih Bulos, Amman5:22PM BST 22 Sep 2015

    Find this story at 22 September 2015

    © Copyright of Telegraph Media Group Limited 2015

    Why Britain hasn’t Followed the US into Syria

    It seems like a generation ago now, but it was only in late August 2013 that Britain’s House of Commons narrowly rejected launching airstrikes on Bashar al-Assad’s Syria in response to his military’s use of chemical weapons. While the U.S. and France noted their resolve to continue to push for military action in the wake of the vote, it is undeniable that this event had a significant impact in halting the rush to war. With accusations of a war-weary Parliament and fear for what the UK’s refusal to intervene would do to the Anglo-American “Special Relationship,” the vote has been the most high-profile and public foreign policy blow of David Cameron’s premiership.

    There is no straightforward reason behind why MPs rejected the measure. Certainly, a degree of war-weariness was palpable in the context of Iraq and the imminent (and rather ignominious) withdrawal from Afghanistan. Parallels to Iraq were all too clear when the Government was attempting to press for action before a group of UN weapons inspectors reported their findings on the chemical attack; the idea that the British Military would become involved in another Middle East quagmire with no clear exit strategy was a bit too much for many MPs to stomach. In addition, the Syrian rebel groups Western powers supported were a large question mark; it was uncertain as to what they were about and, if supplied with weapons, would they go on to lose them to extremist groups, such as the al-Nusra Front? There was simply too much uncertainty surrounding an intervention – its legality, its exit strategy and its “allies” in Syria.

    The Commons defeat two years ago has haunted Cameron’s foreign policy, with there being a distinct unwillingness for his Government’s to stick its neck out unless Parliamentary support is guaranteed. But the situation in Syria has changed dramatically over the past two years, as the self-styled Islamic State has overrun much of Syria and neighbouring Iraq, and inspired and aided in terrorist attacks around the Middle East and wider world.

    While in 2013 the justification to intervene was primarily the responsibility to protect Syrian citizens from a dictator – and topple the regime in the process – in 2015 the justification also involves restoring stability to the Middle East and ensuring the wider world’s security from terrorist attacks. Despite this, Cameron’s Government has been constrained by the Commons defeat to only strike ISIS in Iraq (unless RAF pilots are embedded in allied air forces striking Syria). But, in a veritable Gulf of Tonkin moment – the killing of dozens British holidaymakers in Tunisia by a man with connections to ISIS – Cameron has been handed an opportunity to expand the RAF’s mandate to strike ISIS in Syria. It only took a few days before feelers to that effect were put out by the Defence Secretary, Michael Fallon. With the opposition Labour Party in the middle of a leadership election, a repeat Commons vote is likely to be on hold until at least mid-September when a new leader is officially elected. Despite this uncertainty, it is expected that Labour will support the Government (unless the Party lurches to the left and elects Jeremy Corbyn – a prominent member of the Stop the War Coalition – as leader).

    Despite the lack of a comprehensive solution to Syria’s problems, bombing when in doubt and having nothing else to do is not a viable solution. It may be enough to win the war, but it definitely will not be enough to win the lasting peace.

    From what has been said, it would appear fairly reasonable to pass such a motion and bomb Syria – ISIS pose a more substantial threat to the region and national security than Assad did and Britain’s allies are already doing so. The only reason the RAF is not over Syria already is the legacy of the 2013 vote, before ISIS was even on the scene. But this is working under the assumption that bombing an entity into submission will bring about peace. To take a step back, bombing ISIS in Syria would appear to make no strategic sense; it will not resolve the conflict satisfactorily or the overt justification for the proposed intervention.

    The Strategic Deficit

    The doubts surrounding bombing Syria in 2013 are actually more acute today (on the whole). The issues surrounding the legality of bombing Syria have now largely been resolved. Coalition aircraft only strike ISIS forces and while Assad may preach Syria’s sovereignty, he is in desperate need of any sort of aid when fighting ISIS, the al-Nusra Front, moderate rebel groups and the Kurds. Despite this, the moderate Syrian opposition is in a much weaker position today than it was in 2013, primarily due to the advance of ISIS. The increasingly assertive Saudis are even said to be more willing to back the al-Nusra Front and other extremists instead of the moderate rebels to ensure the pro-Iranian and Shiite Assad does not regain control of Syria. While Turkey’s commitment to aid the rebels may yield some results, this is yet to be seen. If they were to succeed in taking control of Syria, there are a plethora of groups over as many fault lines to contend for power. The only question is whether the international coalition leaves these various factions to fight for power immediately, as in Libya, or wait nearly a decade, as in Iraq.

    In reality, a clear international consensus needs to be reached at the UN and be fully implemented for stability to return to Syria, Iraq and the wider Middle East. While it may sound defeatist, this will not be reached due to various competing geopolitical interests and the desire to avoid intervention becoming a norm. Despite the lack of a comprehensive solution to Syria’s problems, bombing when in doubt and having nothing else to do is not a viable solution. It may be enough to win the war, but it definitely will not be enough to win the lasting peace. At least there is an Iraqi government in place to establish control when ISIS is defeated in Iraq (so long as it resolves its sectarian issues). In contrast, the people of Syria would be starting from scratch with a highly uncertain amount of international assistance. If the self-interest of nations in the conflict so far is anything to go by, international support would be minimal.

    The reason why ISIS is a legitimate threat to British national security is twofold. First, the territory it controls can be used as a safe haven for planning terrorist attacks; second, its existence and prominence inspires and cultivates home-grown terrorists. In addition to the doubts surrounding the bombing of ISIS in Syria, neither of these issues would be resolved in the process.

    One of the reasons behind the British Government calling for airstrikes on Syria is because it is suspected that the Tunisia beach attack was planned and coordinated from ISIS-controlled areas of Syria. Even if this is the case, one look at the simplicity of the attack highlights how it could be planned and executed anywhere – there were no specialist explosives or weaponry, there was no intricate set of demands and there was little originality. A man went onto a tourist beach, opened fire with a Kalashnikov rifle and left. It was a striking example of hit-and-run urban terrorism which has become all too familiar in recent years with the 2008 Mumbai attacks and the Charlie Hebdo shootings earlier this year. Whereas security forces are used to facing a long (stationary) standoff with terrorists, the game has changed. Simply killing as many indiscriminate targets as possible is the end goal of these shootings, not securing demands through a complex hostage-taking.

    More than just unleashing terrorists on the world, with ISIS having such a high profile in the media and many foreign Muslims coming to Iraq and Syria to fight for them (including hundreds of Brits), the group has the potential to inspire Muslims in distant lands to commit terrorist attacks. But, again, simply bombing ISIS in Syria does not resolve the issue. The root of the matter is that there are disaffected young Muslims in Western states who have not been effectively integrated into society. It is known that ISIS do not look to recruit foreign Muslims with strong religious backgrounds as they cannot be moulded easily; instead, recruiters go after young, disenfranchised and vaguely religious Muslims who see ISIS as an escape from a world they do not understand. Attacking ISIS for this reason would be attacking a symptom of successive British governments’ failure to integrate young Muslims into British society.

    Why Intervene?

    In Syria, the UK has no horse in the race. The opposition is too weak and, like the international community, divided. Intervention will not lead to a lasting peace in Syria and the region, protect Syrian civilians or resolve the threat ISIS pose to national security. The only reason for the UK to intervene in Syria is to sure up the “Special Relationship” and prove that Britain will not shy away from a fight, reversing the damage done from the 2013 vote.

    For many, while they may not say so in public, this will be enough, and why not? Fewer than 5% of coalition airstrikes in Iraq are made by the RAF’s ageing Tornado fleet, so expanding the mission to Syria would only be a token gesture of solidarity with little impact. It could also open up British bases in Cyprus to be used by other coalition partners (but Turkey recently allowing the U.S. to use some of its bases has largely resolved the issue of U.S. planes having to fly from outrageous distances to strike ISIS in Syria). It would mean Britain could do its part in this aspect of the war against ISIS, even if it does not win the peace and Syria’s chaos simply morphs into a new shape.

    Bearing all of this in mind, here is something to consider. About fifty years ago, Prime Minister Harold Wilson refused to let British troops get entangled in the jungles of Vietnam, much to President Johnson’s anger and dismay. While the “Special Relationship” took a hit, British interests ultimately were not in a far off war with no clear exit strategy. In hindsight, Wilson wisely ensured that Britain avoided the South-East Asian quagmire and Britain’s relationship with the U.S. certainly rebounded. Later this year, British law-makers are likely to decide whether or not to intervene in Syria. Although it is tempting to blindly follow an ally into war, let us hope that they think carefully of where Britain’s interests truly lie in this conflict.

    August 17, 2015 at 6:00 am
    BY PETER STOREY

    Find this story at 17 August 2015

    Copyright

    A New Image for an Old al-Qaeda

    Over three decades, al-Qaeda has undergone a number of changes. Faced by an alliance of powerful governments and ISIS, another is now required. What it will be, we do not know with any certainty, but a couple of possible strategies have emerged in recent months.

    In a 55 minute video released at the beginning of September 2014, the leader of al-Qaeda announced that the movement was expanding into India. Emir Ayman al-Zawahiri assured Muslims in Myanmar, Bangladesh, the Indian states of Assam and Gujarat, and Kashmir, that “your brothers” in the militant organization “did not forget you and…they are doing what they can to rescue you.” The declaration came two months after ISIS leader Abu Bakr al-Baghdadi, in his black cloak of Caliph Ibrahim, declared his hegemony over Afghanistan, Pakistan, and the one hundred and seventy-five million Muslims of India. Al-Zawahiri did not mention ISIS, but repeated his allegiance to Mullah Omar, the Emir al-Mu’minin and erstwhile leader of the Afghan Taliban. He appears not to have known that Mullah Omar had died nearly a year and a half earlier.

    After al-Zawahiri released the September 2014 video, he disappeared for the next eleven months. The rumor mill produced stories that he had died, been removed in a coup, or was planning some spectacular event. The failure of the Emir to praise the Yemeni branch of al-Qaeda, AQAP, for the successful attack in January upon the satirical magazine Charlie Hebdo was unusual. In addition, failing to eulogize the death of Nasir al-Wuhayshi in June, the leader of AQAP and his chosen successor, left many members worried, especially as the movement was increasingly under attack by ISIS in Afghanistan, Libya, Yemen, and Syria. The return in August of the Emir in a ten minute audio message did not explain his absence. He simply pledged his allegiance to the new leader of the Taliban, Mullah Akhtar Mansoor, and eulogized the late Mullah Omar. The surprise which might explain the disappearance was that al-Qaeda has followed the Taliban back to Afghanistan’s Helmand Province from where it had fled fourteen years ago.

    However, in the same month, one other surprise was the introduction of Hamza bin Osama bin Laden in a ten minute video that was recorded in May. The twenty-four year old son of Osama bin Laden praised martyrs to the cause, urged more attacks upon the West, and pledged his allegiance to Mullah Omar. As his grooming for great things continues, his introduction comes at a time when al-Qaeda is undergoing a transformation.

    Al-Zawahiri and “Political Guerrilla War”

    A recording by al-Zawahiri released this September and believed to have been made towards the start of 2015 reflects the shift in al-Qaeda’s strategy. “Despite the big mistakes [of ISIS], if I were in Iraq or Syria I would co-operate with them in killing the crusaders and secularists and Shi’ites even though I don’t recognise the legitimacy of their state, because the matter is bigger than that.” Abdullah bin Mohammed, an al-Qaeda ideologue, has similarly proposed that the strategy of recent years has been a failure and that change is necessary. In what he terms “Political Guerrilla War,” he advocates the merging of the al-Qaeda movement within a coalition of jihadi organizations. For these men, the path forward for al-Qaeda relies upon limited cooperation with those once shunned.

    One branch of al-Qaeda where bin Mohammed’s methods appear to have been put into operation is in Syria. Abu Mariah al-Qahtani, the second-in-command of al-Qaeda’s Syrian branch, the al-Nusra Front, has voiced his support for a strategy of Political Guerrilla War. Al-Qahtani has noted his opposition to confronting powerful states that can overwhelm the movement or creating caliphates which are easy targets for superior military forces. In recent months, the al-Nusra Front has joined with a number of other jihadist groups to form the Army of Conquest. Through this application of bin Mohammed’s strategy, the united force concluded a lengthy siege and captured Abu al-Duhur Airbase – the last remaining government military base in Idlib Province. This group has even received approval and economic and material support from the Turkish, Saudi, and Qatari sponsors.

    However, there have been reservations regarding the inclusion of the al-Nusra Front in any alliance, with this strategic shift causing a schism within the organization between those wishing to focus on Syria and those wanting to pursue the traditional objective of targeting the far off enemy (the West). Responding to doubters, al-Zawahiri outlined the al-Nusra Front’s strategy earlier this year. The al-Qaeda leader instructed the leadership to adapt to the local cultural and political environment by coordinating more closely with other radical groups, while promoting a Sharia legal system and strengthening its position.

    AQAP’s Consolidation of Power

    AQAP has been the most active al-Qaeda branch in international operations. Among the long list of foreign attacks this branch has been implicit in, there has been the Charlie Hebdo attack, as well as attempts to send bombs to the United States. There is no evidence that the shift in policy to localize operations has been extended to AQAP in Yemen. If anything, the opposite is the case, with the first public statement of AQAP’s new leader, Qassim al-Raymi, being used to call for more attacks upon the United States.

    The real change for AQAP’s seizure of territory has come as a result of the Saudi Arabian-led intervention in Yemen’s Civil War which began in March. So far, the Saudis have ignored AQAP and the al-Qaeda branch has avoided contact with the Saudis, with AQAP using this time wisely to consolidate its own position in the region. To this effect, the branch has taken control of the south-eastern province of Hadramawt – the ancestral homeland of Osama bin Laden – and is strictly enforcing Sharia law throughout the province.

    A further interesting development is that Iran released five of AQAP’s leaders in a prisoner exchange with the organization at about the same time as the Saudi-led intervention began. The loss of so many of AQAP’s key personnel to drone strikes in recent years makes the return of these five a much-needed infusion of vital management, ensuring that AQAP is a more dangerous force. Of these five, Saif al-Adel is viewed to be the most dangerous. The former colonel in the Egyptian Army has a five million dollar bounty on his head and is believed to have been involved in the 1998 bombings of U.S. Embassies in East Africa. In addition, Abu Mohamed al-Misri was substantially involved in al-Qaeda’s operational planning pre-9/11, while Abul Qassam was a contemporary of Abu Musab al-Zarqawi, one of the key figures in al-Qaeda in Iraq before his death in 2006.

    So long as the Saudi-led coalition is occupied through fighting Houthi rebels, AQAP has a substantial opportunity to consolidate its position in Yemen. Thus, when the time is right and the coalition inevitably abandons the battlefield, AQAP will be in a fantastic position to use its consolidated base to both strike out at the far enemy and challenge for supremacy in Yemen.

    Reconciling the Two Strategies

    The two potential paths of al-Qaeda are not necessarily mutually exclusive. AQAP’s unpragmatic approach may be difficult to pair with the realpolitik of al-Zawahiri and bin Mohammed’s Political Guerrilla Warfare, but the opposite need not be the case. Indeed, al-Zawahiri has also advocated lone wolf-style attacks on Western targets in addition to militants outside of the West concentrating on local conflicts and working with other extremist groups.

    However, why Hamza bin Laden has been placed center-stage at this time remains an open question. A simple answer is that the young man provides al-Qaeda with a very strong psychological link to the figure who founded the organization and whom many revered as the Lion of Jihad. But is the son the Lion’s cub or will he also follow the path of Political Guerrilla Warfare? Time will tell.

    OPINIONOctober 13, 2015 at 11:59 pm
    BY FELIX IMONTI

    Find this story at 13 October 2015

    © Copyright 2015. All rights reserved.

    FIRING BLIND FLAWED INTELLIGENCE AND THE LIMITS OF DRONE TECHNOLOGY (the drone papers)

    The Obama administration has portrayed drones as an effective and efficient weapon in the ongoing war with al Qaeda and other radical groups. Yet classified Pentagon documents obtained by The Intercept reveal that the U.S. military has faced “critical shortfalls” in the technology and intelligence it uses to find and kill suspected terrorists in Yemen and Somalia.
    THOSE SHORTFALLS STEM from the remote geography of Yemen and Somalia and the limited American presence there. As a result, the U.S. military has been overly reliant on signals intelligence from computers and cellphones, and the quality of those intercepts has been limited by constraints on surveillance flights in the region.

    The documents are part of a study by a Pentagon Task Force on Intelligence, Surveillance, and Reconnaissance. They provide details about how targets were tracked for lethal missions carried out by the Joint Special Operations Command, or JSOC, in Yemen and Somalia between January 2011 and summer 2012. When the study was circulated in 2013, the Obama administration was publicly floating the idea of moving the bulk of its drone program to the Pentagon from the CIA, and the military was eager to make the case for more bases, more drones, higher video quality, and better eavesdropping equipment.

    Yet by identifying the challenges and limitations facing the military’s “find, fix, finish” operations in Somalia and Yemen — the cycle of gathering intelligence, locating, and attacking a target — the conclusions of the ISR study would seem to undermine the Obama administration’s claims of a precise and effective campaign, and lend support to critics who have questioned the quality of intelligence used in drone strikes.

    The study made specific recommendations for improving operations in the Horn of Africa, but a Pentagon spokesperson, Cmdr. Linda Rojas, declined to explain what, if any, measures had been taken in response to the study’s findings, saying only that “as a matter of policy we don’t comment on the details of classified reports.”

    THE TYRANNY OF DISTANCE

    One of the most glaring problems identified in the ISR study was the U.S. military’s inability to carry out full-time surveillance of its targets in the Horn of Africa and Yemen. Behind this problem lies the “tyranny of distance” — a reference to the great lengths that aircraft must fly to their targets from the main U.S. air base in Djibouti, the small East African nation that borders Somalia and sits just across the Gulf of Aden from Yemen.
    Surveillance flights are limited by fuel — and, in the case of manned aircraft, the endurance of pilots. In contrast with Iraq, where more than 80 percent of “finishing operations” were conducted within 150 kilometers of an air base, the study notes that “most objectives in Yemen are ~ 500 km away” from Djibouti and “Somalia can be over 1,000 km.” The result is that drones and planes can spend half their air time in transit, and not enough time conducting actual surveillance.

    A Pentagon chart showing that as of June 2012 manned spy planes accounted for the majority of flights over Yemen, even though drones were more efficient, since they could spend more time over a target. Over Somalia, the military used a mix of manned and unmanned aircraft. AP = Arabian Peninsula; EA = East Africa.
    Compounding the tyranny of distance, the ISR study complained, was the fact that JSOC had too few drones in the region to meet the requirements mandated for carrying out a finishing operation. The military measures surveillance flights in orbits — meaning continuous, unbroken coverage of a target — and JSOC chronically failed to meet “minimum requirements” for orbits over Yemen, and in the case of Somalia had never met the minimum standards. On average, 15 flights a day, by multiple aircraft relieving or complementing one another, were needed to complete three orbits over Yemen.

    The “sparse” available resources meant that aircraft had to “cover more potential leads — stretching coverage and leading to [surveillance] ‘blinks.’” Because multiple aircraft needed to be “massed” over one target before a strike, surveillance of other targets temporarily ceased, thus breaking the military’s ideal of a “persistent stare” or the “unblinking eye” of around-the-clock tracking.

    When the military was focused on a “finish” — meaning kill — operation, drones were taken off the surveillance of other targets.
    JSOC relied on manned spy planes to fill the orbit gap over Yemen. In June 2012 there were six U-28 spy planes in operation in East Africa and the Arabian Peninsula, as well as several other types of manned aircraft. The U-28s in Djibouti were “referred to as the ‘Chiclet line,’” according to the ISR study, and “compounded Djiboutian air control issues” because of their frequent flights.

    Only in the summer of 2012, with the addition of contractor-operated drones based in Ethiopia and Fire Scout unmanned helicopters, did Somalia have the minimum number of drones commanders wanted. The number of Predator drones stationed in Djibouti doubled over the course of the study, and in 2013, the fleet was moved from the main U.S. air base, Camp Lemonnier, to another Djibouti airstrip because of overcrowding and a string of crashes.

    “Blinking” remained a concern, however, and the study recommended adding even more aircraft to the area of operations. Noting that political and developmental issues hampered the military’s ability to build new bases, it suggested expanding the use of aircraft launched from ships. JSOC already made use of Fire Scout helicopter drones and small Scan Eagle drones off the coast of Somalia, as well as “Armada Sweep,” which a 2011 document from the National Security Agency, provided by former contractor Edward Snowden, describes as a “ship-based collection system” for electronic communications data. (The NSA declined to comment on Armada Sweep.)

    Lt. Gen. Michael Flynn, who was head of the Defense Intelligence Agency from July 2012 to August 2014, told The Intercept that the surveillance requirements he outlined for tracking al Qaeda while in office had never been met. “We end up spending money on other stupid things instead of actually the capabilities that we need,” he said. “This is not just about buying more drones, it’s a whole system that’s required.”

    According to Micah Zenko, a senior fellow at the Council on Foreign Relations who has closely studied the drone war, resource constraints in Africa “mean less time for the persistent stare that counterterrorism analysts and commanders want, and got used to in the Afghanistan-Pakistan theater.”

    FIND, FIX, FINISH

    The find, fix, finish cycle is known in the military as FFF, or F3. But just as critical are two other letters: E and A, for “exploit and analyze,” referring to the use of materials collected on the ground and in detainee interrogations.
    F3EA became doctrine in counterinsurgency campaigns in Iraq and Afghanistan in the mid-2000s. Gen. Stanley McChrystal wrote in his memoir that the simplicity of those “five words in a line … belied how profoundly it would drive our mission.” In 2008, Flynn, who worked closely with McChrystal before becoming head of the Defense Intelligence Agency, wrote that “Exploit-Analyze starts the cycle over again by providing leads, or start points, into the network that could be observed and tracked using airborne ISR.”

    Deadly strikes thus truncate the find, fix, finish cycle without exploitation and analysis — precisely the components that were lacking in the drone campaign waged in East Africa and Yemen. That shortfall points to one of the contradictions at the heart of the drone program in general: Assassinations are intelligence dead ends.

    The ISR study shows that after a “kill operation” there is typically nobody on the ground to collect written material or laptops in the target’s house, or the phone on his body, or capture suspects and ask questions. Yet collection of on-the-ground intelligence of that sort — referred to as DOMEX, for “document and media exploitation,” and TIR, for “tactical interrogation report” — is invaluable for identifying future targets.

    A slide from a Pentagon study notes that deadly strikes in Yemen and Somalia reduce the amount of intelligence for future operations. AUMF = 2001 Authorization for Use of Military Force; FMV = Full Motion Video; F3EA = Find, Fix, Finish, Exploit, Analyze; HOA = Horn of Africa
    Stating that 75 percent of operations in the region were strikes, and noting that “kill operations significantly reduce the intelligence available from detainees and captured material,” the study recommended an expansion of “capture finishes via host-nation partners for more ‘finish-derived’ intelligence.” One of the problems with that scenario, however, is that security forces in host nations like Yemen and Somalia are profoundly unreliable and have been linked to a wide variety of abuses, including the torture of prisoners.

    A report last year by retired Gen. John Abizaid and former Defense Department official Rosa Brooks noted that the “enormous uncertainties” of drone warfare are “multiplied further when the United States relies on intelligence and other targeting information provided by a host nation government: How can we be sure we are not being drawn into a civil war or being used to target the domestic political enemies of the host state leadership?”

    In 2011, for example, U.S. officials told the Wall Street Journal that they had killed a local governor because Yemeni officials didn’t tell them he was present at a gathering of al Qaeda figures. “We think we got played,” one official said. (The Yemeni government disputed the report.)

    Despite such warnings, the drone program has relied heavily on intelligence from other countries. One slide describes signals intelligence, or SIGINT, as coming “often from foreign partners,” and another, titled “Alternatives to Exploit/Analyze,” states that “in the reduced access environment, national intelligence partners often have the best information and access.”

    The military relies heavily on intelligence from electronic communications, much of it provided by foreign governments, but acknowledges that the information is “neither as timely nor as focused as tactical intelligence.”
    One way to increase the reliability of host-nation intelligence is to be directly involved in its collection — but this can be risky for soldiers on the ground. The study called for “advance force operations,” including “small teams of special force advisors,” to work with foreign forces to capture combatants, interrogate them, and seize any written material or electronic devices they possess. According to public Special Operations guidelines, advance force operations “prepare for near-term” actions by planting tracking devices, conducting reconnaissance missions, and staging for attacks. The documents obtained by The Intercept did not specify an optimum number of advisors or where they should be based or how exactly they should be involved in capture or interrogation operations.

    Although the study dates from 2013, current Special Operations Commander Joseph Votel echoed its findings in July 2015. Votel noted that his troops were working closely with African Union forces and the Somali government to battle al Shabaab. He added, “We get a lot more … when we actually capture somebody or we capture material than we do when we kill someone.”

    A man walks past destroyed buildings in Zinjibar, capital of Abyan province in southern Yemen on Dec. 5, 2012. Photo: Sami-al-Ansi/AFP/Getty Images
    THE POVERTY OF SIGNALS INTELLIGENCE

    With limited ability to conduct raids or seize materials from targeted individuals in Yemen and Somalia, JSOC relied overwhelmingly on monitoring electronic communications to discover and ultimately locate targets.
    The documents state bluntly that SIGINT is an inferior form of intelligence. Yet signals accounted for more than half the intelligence collected on targets, with much of it coming from foreign partners. The rest originated with human intelligence, primarily obtained by the CIA. “These sources,” the study notes, “are neither as timely nor as focused as tactical intelligence” from interrogations or seized materials.

    Making matters worse, the documents refer to “poor” and “limited” capabilities for collecting SIGINT, implying a double bind in which kill operations were reliant on sparse amounts of inferior intelligence.

    The disparity with other areas of operation was stark, as a chart contrasting cell data makes clear: In Afghanistan there were 8,900 cell data reports each month, versus 50 for Yemen and 160 for Somalia. Despite that, another chart shows SIGINT comprised more than half the data sources that went into developing targets in Somalia and Yemen in 2012.

    Cellphone data was critical for finding and identifying targets, yet a chart from a Pentagon study shows that the military had far less information in Yemen and Somalia than it was accustomed to having in Afghanistan. DOMEX = Document and Media Exploitation; GSM = Global System for Mobile communication; HOA = Horn of Africa; IIRs = Intelligence Information Reports; SIGINT = Signals Intelligence; TIRs = Tactical Interrogation Reports.
    Flynn told The Intercept there was “way too much reliance on technical aspects [of intelligence], like signals intelligence, or even just looking at somebody with unmanned aerial vehicles.”

    “I could get on the telephone from somewhere in Somalia, and I know I’m a high-value target, and say in some coded language, ‘The wedding is about to occur in the next 24 hours,’” Flynn said. “That could put all of Europe and the United States on a high-level alert, and it may be just total bullshit. SIGINT is an easy system to fool and that’s why it has to be validated by other INTs — like HUMINT. You have to ensure that the person is actually there at that location because what you really intercepted was the phone.”

    In addition to using SIGINT to identify and find new targets, the documents detail how military analysts also relied on such intelligence to make sure that they had the correct person in their sights and to estimate the harm to civilians before a strike. After locating a target, usually by his cellphone or other electronics, analysts would study video feeds from surveillance aircraft “to build near-certainty via identification of distinguishing physical characteristics.”

    A British intelligence document on targeted killing in Afghanistan, which was among the Snowden files, describes a similar process of “monitoring a fixed location, and tracking any persons moving away from that location, and identifying if a similar pattern is experienced through SIGINT collect.” The document explains that “other visual indicators may be used to aid the establishment of [positive identification]” including “description of clothing” or “gait.” After a shot, according to the British document and case studies in the Pentagon’s ISR report, drones would hover to determine if their target had been hit, collecting video and evidence of whether the cellphone had been eliminated. (The British intelligence agency, GCHQ, declined to comment on the document.)

    A chart comparing the surveillance capabilities of the various drones and aircraft flying over Yemen and Somalia in 2012. APG = Aerial Precision Geolocation; DNR COMINT = Dial Network Recognition Communications Intelligence; ISR = Intelligence, Surveillance, and Reconnaissance; FMV = Full Motion Video; PTT COMINT = Push-to-Talk Communications Intelligence.
    Yet according to the ISR study, the military faced “critical shortfalls of capabilities” in the technologies enabling that kind of precise surveillance and post-strike assessment. At the time of the study, only some of the Reaper drones had high-definition video, and most of the aircraft over the region lacked the ability to collect “dial number recognition” data.

    The study cites these shortcomings as an explanation for the low rate of successful strikes against the targets on the military’s kill list in Yemen and Somalia, especially in comparison with Iraq and Afghanistan. It presents the failings primarily as an issue of efficiency, with little mention of the possible consequence of bad intelligence leading to killing the wrong people.

    THE DRONE PAPERS
    Cora Currier, Peter Maass
    Oct. 15 2015, 1:58 p.m.
    Additional reporting: Jeremy Scahill

    Find this story at 15 October 2015

    Copyright https://theintercept.com/

    A DEATH IN ATHENS Did a Rogue NSA Operation Cause the Death of a Greek Telecom Employee?

    JUST OUTSIDE THE MAIN DOWNTOWN part of Athens lies Kolonos, an old Athenian neighborhood near the archaeological park of Akadimia Platonos, where Plato used to teach. Along the maze of narrow streets, flower-filled balconies hang above open-air markets, and locals gather for hours at lazy sidewalk cafes, sipping demitasse cups of espresso and downing shots of Ouzo in quick gulps.

    It was a neighborhood Costas Tsalikidis knew well. He lived at No. 18 Euclid Street, a loft apartment just down the hall from his parents. Slim and dark-haired, with a strong chin and a sly smile, he was born in Athens 38 years earlier to a middle-class family in the construction business. Talented in math and physics from an early age, he earned a degree in electrical engineering from the National Technical University of Athens, considered the most prestigious college in Greece, where he specialized in telecommunications, and later obtained his master’s in computer science in England. Putting his skills to good use, for the last 11 years he had worked for Vodafone-Panafon, also known as Vodafone Greece, the country’s largest cell phone company, and was promoted in 2001 to network-planning manager at the company’s headquarters in the trendy Halandri section of Athens.

    On March 9, 2005, Costas’ brother, Panagiotis, dropped by the apartment. He thought he’d have a coffee before a business meeting scheduled for that morning. But as he entered the building, he found his mother, Georgia, running up and down the corridor yelling for help.

    “Cut him down!” she was saying. “Cut him down!”

    Panagiotis had no idea what she was talking about until he went inside his brother’s apartment and saw Costas hanging from a rope tied to pipes above the lintel of his bathroom door, an old wooden chair nearby. He and his mother cut the rope and laid Costas down on the bed.

    Costas Tsalikidis Photo: Courtesy of the Tsalikidis familyThe day before his death, Costas’ boss at Vodafone had ordered that a newly discovered code — a powerful and sophisticated bug — be deactivated and removed from its systems. The wiretap, placed by persons unknown, targeted more than 100 top officials, including then Prime Minister Kostas Karamanlis and his wife, Natassa; the mayor of Athens; members of the Ministerial Cabinet; as well as journalists, capturing not only the country’s highest secrets, but also its most intimate conversations. The question was, who did it?
    For a year, the eavesdropping case remained secret, but when the affair finally became public, it was regarded as Greece’s Watergate. One newspaper called it “a scandal of monumental proportions.” And at its center was the dark underside of the 2004 Summer Olympic Games in Athens. While the athletes were competing for medals as millions watched, far in the shadows spies had hacked into the country’s major telecom systems to listen and record.

    A decade later, Costas’ death is caught up in an investigation into what now appears to have been a U.S. covert operation in Greece. Last February, Greek authorities took the extraordinary step of issuing an international arrest warrant for a CIA official the Greeks believe was a key figure in the operation while based in Athens. Unnoticed by the U.S. press, the warrant was a nearly unprecedented action by an allied country. The intelligence official, identified as William George Basil, was accused of espionage and eavesdropping. But by then he had already left the country, and the U.S. government, as it has done for the past 10 years, continues to stonewall Greek authorities on the agency’s involvement.

    The Greek charges only touch the surface, however, and Basil may be less a key figure than simply a spy guilty of poor tradecraft. An investigation by The Intercept has uncovered not only the role of the CIA, but also that of the NSA, as well as how and why the operation was carried out. The investigation began while I was producing a documentary for PBS NOVA on cyberwarfare, scheduled to air on October 14, for which some of the interviews were conducted. In addition, I have had exclusive access to highly classified and previously unreported NSA documents released by Edward Snowden.

    The Intercept, along with the Greek newspaper Kathimerini, interviewed over two dozen people familiar with the wiretapping case, ranging from U.S. intelligence officials and Greek government officials to those involved in the investigation and its aftermath. Many of those interviewed agreed to talk on condition that their names not be used, fearing criminal prosecution for speaking on intelligence matters or professional retribution. While some questions remain, the evidence points to a massive illegal eavesdropping program that may have led to Costas’ tragic death.

    “COSTAS WAS ENGAGED,” his brother, Panagiotis, told me last year. “He was planning to get married.” Like Costas, who was three years younger, Panagiotis spoke fluent English, the product of frequent trips to the U.S., both on business and vacation.

    After a dinner of lamb and hummus at a restaurant not far from the apartment where Costas died, Panagiotis spoke emotionally about his brother. “He had met the woman of his life and they were planning to get married really soon. And for that reason, they were looking to get a house and they had already started buying things that they could use in their new household. Costas was happy and optimistic and things had been working out really good for him.”

    At the time, Panagiotis couldn’t understand what had happened; Costas was in good health and, at least until recently, seemed to love his job at Vodafone. “I thought there was no reason for him to commit suicide,” he said, although he acknowledged Costas had been under more pressure than usual. “In the last year of his life, he was working very hard because Greece had undertaken the Olympic Games of 2004,” he said. “And that meant a lot of hours at work and a lot of planning to beef up the networks.”

    Given the enormous numbers of journalists and tourists who were planning to attend the events, all wanting to communicate, Costas’ workload increased enormously in the months before the games were to begin. Eventually, the technical infrastructure created by the Athens Olympics Organizing Committee for staff and media involved more than 11,000 computers, 23,000 fixed-line telephone devices, and 9,000 mobile phones. But the Olympics ended more than six months before Costas’ death, so there had to be another reason.

    At work, things suddenly began to change. Costas told his brother that he wanted to quit. “He tendered his resignation to the company, but it wasn’t accepted,” Panagiotis told me. “He wanted to get out.” And he sent a text to his fiancée, a piano teacher named Sara Galanopoulou, saying he had to leave his job, adding cryptically that it was a “matter of life and death.”

    As Costas Tsalikidis and his colleagues at Vodafone worked overtime in the months leading up to the games, thousands of miles away another group was also getting ready for the Summer Olympics in Greece: members of the U.S. National Security Agency. But rather than communicating, they were far more interested in listening. According to previously undisclosed documents from the Snowden archive, NSA has a long history of tapping into Olympic Games, both overseas and within the U.S. “NSA has had an active role in the Olympics since 1984 Los Angeles games,” according to a classified document from 2003, “and has seen its involvement increase with the recent games in Atlanta, Sydney, and Salt Lake City. During the 2002 Winter Olympics in Salt Lake City, the focus was on counterterrorism, and NSA acted largely in support of the FBI in a fusion cell known as the Olympics Intelligence Center (OIC). … NSA’s support to the 2004 Olympics in Athens will be much more complicated.”

    In 2004, for the first time since the 9/11 attacks of 2001, the Summer Olympic Games would be held outside the U.S., and thus the difficulties would be far greater. “Several factors will make the Athens Olympics vastly different,” the document continued, “not the least of which is the fact these Olympics will not be held at a domestic location. Also different is that the security organization that NSA will support is the EYP, or Greek National Intelligence Service. NSA will gather information and tip off the EYP of possible terrorist or criminal actions. Without a doubt, the communication between NSA and EYP will take some coordination, and for that reason preparations are already underway.”

    According to a former senior U.S. intelligence official involved with the operation, there was close cooperation between NSA and the Greek government. “The Greeks identified terrorist nets, so NSA put these devices in there and they told the Greeks, OK, when it’s done we’ll turn it off,” said the source. “They put them in the Athens communications system, with the knowledge and approval of the Greek government. This was to help with security during the Olympics.”

    The Olympic Games ran smoothly — there were no serious terrorist threats and Greece had its best medal tally in more than a century. On August 29, 16 days after the games began, closing ceremonies were held at the Athens Olympic Stadium. As 70,000 people watched, Greek performers displayed traditional dances, a symbolic lantern was lit with the Olympic Flame, and Dr. Jacques Rogge, president of the International Olympics Committee, gave a short speech and then officially closed the games.

    Two weeks later, the Paralympics ended, and at that point, keeping their promise to the Greek government, the NSA employees should have quietly disconnected their hardware and deleted their software from the local telecommunications systems, packed up their bugging equipment, and boarded a plane for Fort Meade. The problem was, they didn’t. Instead, they secretly kept the spying operation active, but instead of terrorists, they targeted top Greek officials. According to the former U.S. intelligence official involved with the operation, the NSA began conducting the operation secretly, without the approval or authorization of the CIA chief of station in Athens, the U.S. ambassador, or the Greek government.

    “We had a huge problem right after the Greek Olympics,” the source said. “They [NSA] said when the Olympics is over, we’ll turn it off and take it away. And after the Olympics they turned it off but they didn’t take it away and they turned it back on and the Greeks discovered it. They triangulated some signals, anonymous signals, and it all pointed back to the embassy.”

    At that point, the source said, someone from the Greek government called Richard Eric Pound, the CIA chief of station at the embassy in Athens and the person officially responsible for all intelligence operations in the country. Pound had arrived in May 2004, replacing Michael F. Walker, the agency’s former deputy director of the paramilitary Special Activities Division, as chief of station in Athens. Describing himself as “a small town boy from Indiana who set off to see the world,” Pound had joined the agency in 1976. Hefty and mustachioed, he was a veteran of the agency’s backwater posts in Africa.

    Pound, according to the source, knew nothing about the operation having been turned back on, so he called his boss at CIA headquarters to ask about it. “He says, ‘What in God’s name is this all about?’” said the source (Pound declined to speak to The Intercept). Pound’s boss then immediately called his NSA counterpart. “Oh, yeah, we were going to tell you about that,” the NSA official told Pound’s CIA boss, according to the source. “They didn’t take it out and they turned it back on.”

    National Security Agency Deputy Director John Chris Inglis testifies before the House Select Intelligence Committee on the NSA’s PRISM program, which tracks web traffic and US citizens’ phone records, during a hearing on Capitol Hill in Washington, DC, June 18, 2013. AFP PHOTO / Saul LOEB (Photo credit should read SAUL LOEB/AFP/Getty Images) National Security Agency Deputy Director John Chris Inglis in Washington, D.C., June 18, 2013. Photo: Saul Loeb/AFP/Getty ImagesNot informing the chief of station and the ambassador was an enormous breach of protocol. The chain of events surprised another source, a long-time veteran of the CIA’s National Clandestine Service, who was once a colleague of Basil in Athens. “I can’t think of another time in my experience when that ever happened, that’s how unusual it is,” the source said. “I’m astounded by that.”
    In 2006, Chris Inglis became the NSA’s deputy director, the agency’s No. 2 official, who was thus in a position to discover what had happened. In an interview, I questioned him about the scandal and the illegal bugging operation. “Was the NSA involved?” I asked. Inglis offered no denial. “I couldn’t say whether NSA was involved in that or any other activity that might have been alleged to be conducted by an intelligence service, let alone NSA.”

    Inglis did confirm, however, that NSA operations in foreign countries would normally have the approval of the CIA chief of station. “The chief of station,” he said, “would speak on intelligence matters for the nation, or essentially be expected to adjudicate matters on behalf of the nation.” He added, “So if NSA was expected to conduct an intelligence operation physically in some particular place of the world, I would expect that the chief of mission — the ambassador — and that the chief of station — the intelligence rep — would have some influence on that, some kind of ability to understand what it was and to ensure that it was done in the proper way.”

    I also put the question to Gen. Michael Hayden, the NSA director at the time. “Do you remember the incident that came up involving Greece?” I asked. “Not anything we’re going to talk about here,” he said. “Did that come to your attention?” I pressed. “Not something I can talk about,” he replied.

    At the time of the Greek bugging operation, Hayden was also secretly running the NSA’s illegal warrantless eavesdropping and metadata dragnet surveillance programs, the largest domestic spying operations in U.S. history.

    FILE – In this Dec. 6, 2002 an aerial file photo of the US embassy in Athens, Greece. Theodoros Pangalos a former foreign minister of Greece said on Tuesday, Oct. 29, 2013 the U.S. is not the only country eavesdropping on foreign diplomats: his country’s secret services did that to U.S. ambassadors in Athens and Ankara in the 1990s. (AP Photo/Thanassis Stavrakis, File) An aerial file photo of the U.S. Embassy in Athens, Greece, Dec. 6, 2002. Photo: Thanassis Stavrakis/AP
    Stonewalled by the U.S., over the past decade Greek investigators were nevertheless able to follow a digital trail right to the front door of the U.S. Embassy in Athens, and then to William George Basil, a mysterious embassy official with a Greek background.

    Although very little is publicly known about Basil, interviews with his relatives and childhood friends in Greece, as well as fellow embassy employees and intelligence officials in Athens and the U.S., shed light on his background.

    Basil was born on December 10, 1950, in Baltimore, where many of his relatives had settled after emigrating from Greece. Much of his extended family came from the small Greek island of Karpathos in the Aegean Sea, a port of call for the Argonauts traveling between Libya and Crete, and mentioned in Homer’s Iliad. There, his ancestors worked as stonemasons and as farmhands in mountainside wheat fields.

    His father, George, had emigrated to the U.S. where Basil and his sister, Maria, spent their early years. But when Basil was 9, his now-divorced father became engaged to a woman from Karpathos and they all traveled to the island for the wedding. An old snapshot shows a young Basil in a suit jacket sitting uneasily on the back of a donkey. After a few months, the family returned to the U.S., then in the 1960s, when Basil was in his early teens, moved back to Karpathos for good.

    Today, childhood friends there still remember Basil as “Billy,” an Americanized youth who liked to spend time on the beach. His cousin Nikos Kritikos often played sports with him. “He played rugby when he was young,” Nikos said. “He was amazingly smart. … We grew up in the same house; his stepmother, Marigoula, raised us.” And Basil’s uncle Manolis Kritikos, a local schoolteacher, remembered him as “a happy kid who smiled.” “He was always restless as a young man, he searched things,” he said. “Most of all he liked the history of this place, the folklore. … And he loved Greece and [the Karpathos village of] Olympos more than anything.”

    Basil 9 years old attending his father’s wedding on Karpathos Basil, 9 years old, attending his father’s wedding on Karpathos. After graduating from high school at the American Community Schools in Athens in 1968, Basil joined the Army for five years and was posted to Alaska. Then, according to Basil’s former CIA colleague, he took a job as a Baltimore County deputy sheriff and later joined the CIA’s Office of Security as a polygraph expert. But, after nearly two decades, said the colleague, he grew bored with strapping recruits and potential agents to lie detector machines and sought a position in the agency’s Directorate of Operations. Largely based on his Greek heritage and fluency in the language, he was accepted and quickly disappeared behind the agency’s heavy black curtain, emerging undercover as a Foreign Service Officer with the State Department.
    With a black diplomatic passport in his pocket, he was soon on his way to Athens, a city he knew well; he had owned an apartment in the city for many years, which he rented out. Soon after arriving, he moved into an apartment near the beach in Glyfada, one of the most exclusive areas of the city, home to ship owners and wealthy business executives. A long-time biker, he would often cruise around the city on his motorcycle.

    At the U.S. Embassy in Athens, he was officially a second secretary in the regional affairs section, later promoted to first secretary. In reality, he joined the CIA station as a terrorism expert. The station, located on the embassy’s top floor (with the forgery section in the basement), was one of the largest in Europe, because it often served smaller Middle East stations with logistical help and temporary personnel. Protected by a bulletproof vest under his shirt, a 9 mm pistol strapped to his belt, and a small M38 handgun on his ankle, Basil, who had a reputation as an Olympic-level shooter, drove around the city in an armored car looking for informants to recruit and liaising with the Greek police organization. According to a confidential report by Greek prosecutor Yiannis Diotis, obtained by The Intercept, Basil played a role in a March 2003 operation — just prior to the U.S. invasion of Iraq — that involved an informant recruited by the embassy’s CIA station. The operation, code-named “Net,” led to the discovery, by a joint U.S.-Greek team, of a small cache of guns and explosives in the basement of the Iraq Embassy in Athens.

    While most CIA assignments to Athens were two years, Basil kept extending his tour, giving him an opportunity to spend time on Karpathos, visiting friends and relatives and playing backgammon. “He never withheld where he was working or what he was doing,” recalled his cousin Nikos. “A lot of times we would call each other and he would tell me, ‘I am in the Middle East.’ His job was to report on the sentiment of those countries’ society. … From what he said he had a lot of friends in high places. I understood that he was acquainted with Ministers of Interior and Ministers of Public Order in Greece.”

    One person who knew Basil in passing was John Brady Kiesling, a now-retired career Foreign Service Officer who had worked as the embassy’s political officer from July 2000 to March 2003. I spoke to him in his apartment in the historic Plaka section of Athens, a labyrinth of winding streets and colorful shops in the shadow of the Acropolis. After leaving his post at the embassy, he decided to remain in Greece, where he has followed the bugging case closely. When I brought up the possibility of the NSA conducting a covert operation out of the embassy, without the knowledge of either the ambassador or the CIA chief of station, he looked surprised. “I would say that a rogue agency was performing it if it was performed without the prior clearance with the ambassador, as the president’s representative in Greece,” he said. “It definitely is something that is hanging as a sort of swinging sword blade over the U.S.-Greek relationship.”

    But according to Basil’s former CIA colleague in Athens, there are occasions when an ambassador is not informed by the agency because of the sensitivity of the operation. However, there was never a time when a chief of station was kept in the dark. “There were times we didn’t inform the ambassador — it was just too sensitive — and we would have to get a waiver signed,” the source said.

    william-george-basil Visa from U.S. passport of William George Basil. A half-dozen miles southwest of Athens is the city of Piraeus. The largest passenger port in Europe and the third largest in the world, it services about 20 million passengers a year. Piraeus is to ships what Chicago’s O’Hare Airport is to planes. There are long rows of ferries, endless quays, hydrofoils and mega-yachts, tankers and cruise ships. It was here, not far from the pier for ferries to Karpathos that the planning ended and the operation began. According to the Greek prosecutor’s report, on June 8, 2004, someone entered the Mobile Telecommunication Center at 31 Akti Miaouli Street, and in the name of a “Markos Petrou,” purchased the first four of what would eventually be 14 prepaid cell phones.
    They would become the “shadow” phones. As normal calls from Vodafone went to and from legitimate parties, a parallel stream of digitized voice and data — an exact copy — was directed to the NSA’s shadow phones. The data would then be automatically transferred miles away to NSA receivers and computers for monitoring, analysis, and storage.

    Not long after, according to the Snowden documents I reviewed, the NSA contingent began arriving at US-966G, the surveillance agency’s code for the Athens embassy. The planning had already been underway. “Although the first race, dive, and somersault are still a year away,” noted a Signals Intelligence Directorate document, “SID Today,” dated August 15, 2003, “in truth, NSA has been gearing up for the 2004 Olympics for quite some time, in anticipation of playing a larger role than ever before at the international games.” The document then noted that NSA would be sending “the largest contingent of personnel in support of the games in our history. A team of 10 NSA analysts will arrive in Greece anywhere from 30-45 days before the Olympics and stay until the flame is extinguished. … The scope of the Olympics is tremendous, and so will be the support of SID [Signals Intelligence Directorate] and NSA.”

    Then, in a note of unintended irony, the writer added, “The world will be watching and so will NSA!”

    A key part of the operation would be obtaining secret access to the Greek telecom network. And it is here that Costas Tsalikidis may have entered the picture. As a senior engineer in charge of network planning, working for the country’s largest cellular service provider, he would have been one of those in a position to become the team’s inside person. But he was also far from the only one. “Of course, it could have even been me,” said another Vodafone technician interviewed.

    The operation could have been accomplished a number of ways. At the beginning, the installation of the bugging software, while illegal according to Greek law, had been secretly authorized by the Greek government. Thus, an inside person would have been operating outside the law in providing assistance to U.S. intelligence, but with the patriotic objective of helping protect Greece from terrorists. Also, the person may never have been told that the software was supposed to be removed following the conclusion of the games. In any case, it is unlikely that the person would have known who the targets were since they were just lists of phone numbers.

    In fact, recruiting a foreign telecom employee as an “inside person” for a major bugging operation was standard operating procedure for both the NSA and the CIA, according to the senior intelligence official involved with the Athens operation. “What the NSA really doesn’t like to admit, about 70 percent of NSA’s exploitation is human enabled,” the former official said. “For example, at a foreign Ministry of Post and Telecommunications, if NSA determines it needs to get access to that system, NSA and/or the CIA in coordination would come up with a mechanism that would allow them to replicate the existing switch to be swapped out. The CIA would then go and seek out the person who had access to that switch — like a Nortel switch or a router — go in there, and then it would be the CIA that would effect the operation. And then the take from it would be exploited by the NSA.”

    And according to a highly classified NSA document provided by Snowden and previously published by The Intercept, covertly recruiting employees in foreign telecom companies has long been one of the NSA’s deepest secrets. A program code-named “Sentry Owl,” for example, deals with “foreign commercial platform[s]” and “human asset[s] cooperating with the NSA/CSS [Central Security Service].” The document warns that information related to Sentry Owl must be classified at an unusually high level, known as ECI, or Exceptionally Controlled Information, well above top secret.

    “Human intelligence guys can provide sometimes the needed physical access without which you just can’t do the signals intelligence activity,” Gen. Hayden, the NSA head at the time of the Athens bugging, who later ran the CIA, told me.

    Basil’s ties to Greece made him very good at developing local agents. “He was the best recruiter the station had, the best,” said the former CIA associate in Athens. “[Basil] may have been in charge of recruiting the guy on the inside. He may have made the initial recruitment.”

    With an agent in place inside the network, the next step would be to implant spyware capable of secretly transmitting the conversations of the NSA’s targets to the shadow phones where they could be resent to NSA computers. Developing such complex malware is the job of the NSA’s Tailored Access Operations (TAO) organization. And, according to the previously undisclosed Snowden documents, members of the group “performed CNE [Computer Network Exploitation] operations against Greek communications providers” as part of the preparations for the Olympics. In lay terms, this means they developed malware to secretly extract communications data. Also involved were members of the Special Source Operations (SSO) group, the specialists who work covertly with telecom companies, such as AT&T — or in this case Vodafone — to get secret access to their networks.

    The key to the operation was hijacking a particular piece of software, the “lawful intercept” program. Installed in most modern telecom systems, it gave a telecom company the technical capability to respond to a legal warrant from the local government to monitor a suspect’s communications. Vodafone’s central switching equipment was made by Ericsson, the large Swedish company, and on January 31, 2002, Ericsson delivered to Vodafone an upgrade containing the lawful intercept program, a piece of software known as the Remote Control Equipment Subsystem (RES). According to a report by Greece’s Authority for Communication Security and Privacy (ADAE), Costas was the Vodafone employee who accepted delivery of the upgrade.

    Normally, when a lawful warrant is submitted to a company such as Vodafone Greece, the information, including the target phone numbers, would first be logged into a program called the Interception Management System (IMS). This creates a permanent record of the request that can later be audited. The information is then sent to the RES, which initiates the actual monitoring by secretly creating a duplicate communications stream for the targeted number. That duplicate stream is then transmitted, along with the metadata — date, time, and number calling or being called — to the law enforcement agency.

    But despite having the capability to initiate wiretaps with the RES program, at the time of the Olympics Greece did not have laws in place to permit them. As a result, Vodafone never paid the additional fee to Ericsson for the IMS program and the digital key to activate the system. Far behind the NSA, the Greek government had only simple wiretap technology. “All they had was some primitive suitcase methods that would allow very limited surveillance of very specific targets,” said Kiesling, the former U.S. Embassy official. “From an American point of view, that was terrifyingly primitive.”

    Thus, according to Greek sources, prior to the Olympics U.S. officials began asking the Greek government for permission to secretly activate the lawful intercept program, which led to the government agreeing to the U.S. bugging operation. Ironically, the presidential decree permitting widespread eavesdropping was finally enacted on March 10, 2005, the day after Costas’ death.

    For NSA, the missing IMS program was the technical opening its operatives needed. In essence, they created malware that would secretly turn on the RES program and begin tapping. But without the IMS program there would be no audit trail, no indication or evidence that eavesdropping was going on as the target numbers were being tapped and transmitted to the shadow phones by the RES. “It was a very complex system, because it was invisible to detection,” Vodafone Greece CEO George Koronias told investigators. “It functioned independently of whether the lawful interception system was activated, and bypassed the security alarm.”

    Exploiting the weaknesses associated with lawful intercept programs was a common trick for NSA. According to a previously unreleased top-secret PowerPoint presentation from 2012, titled “Exploiting Foreign Lawful Intercept Roundtable,” the agency’s “countries of interest” for this work included, at that time, Mexico, Indonesia, Egypt, and others. The presentation also notes that NSA had about 60 “Fingerprints” — ways to identify data — from telecom companies and industry groups that develop lawful intercept systems, including Ericsson, as well as Motorola, Nokia, and Siemens.

    There are also a variety of “Access Methods” used to penetrate other countries’ lawful intercept programs. These include using the highly secret Special Collection Service. Known internally as “F-6,” it is described in another Snowden document as “a joint NSA-CIA organization whose mission is to covertly collect SIGINT [Signals Intelligence] from official U.S. establishments abroad, such as embassies and consulates.” The organization’s job, according to the PowerPoint, is to intercept microwaves, the thousands of communications-packed signals that crisscross a city. The PowerPoint also suggested using the Special Source Operations unit, the people who work out secret arrangements with the local telecom companies. And with the Tailored Access Operations unit, techniques could be developed to hack into the country’s telecom systems. For the Athens Olympics operation, it would be a full house.

    With the malware installed, the NSA was set to go, with more than a dozen shadow phones purchased and a contingent of employees from at least 11 different NSA organizations poised to begin eavesdropping during “24-hour watches.” According to the ADAE report, the tappers first activated the malware at Vodafone’s communications centers on August 4, 2004, and five days later they began inserting the target phone numbers. Then on September 28, following the conclusion of the Paralympic Games, some of the malware was removed. But less than a week later, long after the Olympic Torch had been extinguished, new malware was implanted.

    “And then,” said Kiesling, looking both troubled and perplexed, “the mystery becomes why it continued after the Olympics, and that’s a mystery that still has not been solved.” It was a question I asked a former senior NSA official with long involvement in worldwide eavesdropping operations. “They never [remove it],” the official said with a laugh. “Once you have access, you have access. You have the opportunity to put implants in, that’s an opportunity.”

    “FEVER,” COSTAS WROTE. Several of the antennas used for the bugging operation were heating up, and to Costas, it was as if they had a fever. After the Olympic Games concluded, Costas started having problems at work. In the weeks following Costas’ death, his brother discovered one of his notebooks, dating from October and November 2004, after the Olympics, and it described a number of incidents. “In his notes he said that at certain points in time certain antennas seemed to get overworked and they were trying to figure out why that was happening,” said Panagiotis. “Now it turned out that those antennas were the same antennas that were connected with the system of the wiretapping.” In another entry, which Panagiotis submitted to the prosecutor, Costas wrote about a month before he died: “Something is not right at the company.”

    Then, at 7:56 p.m. on January 24, 2005, someone installed a routine update in the NSA’s bugging software at Vodafone’s facility in the Paiania section of the city. It would turn out to be anything but routine. Within seconds, errors appeared, which caused hundreds of text messages from customers to go undelivered, and people began complaining. At the same time, an automatic failure report was sent to Vodafone management. It was as if a burglar alarm had gone off during a robbery. As normally happens, Vodafone sent the voluminous logs and data dumps to Ericsson for analysis, while those involved quietly waited — and worried. The once cheerful and upbeat Costas turned glum and angry. “We have heard that Costas was in meetings inside the company, in meetings that were very loud and a lot of people were arguing,” said Panagiotis. “He tendered his resignation to the company, but it wasn’t accepted. … He wanted to get out.”

    On March 4, after weeks of investigation, Ericsson notified Vodafone that it had discovered a sophisticated piece of malware, containing a hefty 6,500 lines of code — evidence of a large bugging operation. The company also turned up the target phone numbers of the prime minister and his wife, the mayor of Athens, members of the Ministerial Cabinet, and scores of high officials, as well as the numbers for the shadow phones and the metadata describing when the calls were made.

    Three days later, Vodafone technicians isolated the malware. Then on March 8, before law enforcement had an opportunity to get involved, Koronias, the Vodafone Greece CEO, ordered the software deactivated and removed, thus hampering any future investigation. Apparently alerted, those involved in the bugging operation immediately turned off their shadow phones. “Vodafone’s decision to deactivate the software meant our hands were tied,” Yiannis Korandis, the chief of the EYP, the Greek National Intelligence Service, told investigators.

    The next morning Panagiotis discovered his brother’s body hanging from a white rope tied to a pipe above the bathroom doorway. To this day, he is convinced that Costas was murdered to keep him quiet and prevent him from quitting and going public with the details. “He probably wanted answers there and then and I think that led to his demise,” he said. The bugging, Panagiotis suspects, may have been the reason Costas sent the text to his fiancée about leaving his job being a “matter of life and death.”

    Athens, GREECE: Vodafone Greece Chief Executive Officer George Koronias holds documents 06 April 2006 before the start of a parliamentary committee hearing investigating the case of a phone-tapping scandal, which targeted Prime Minister Costas Karamanlis and top officials during and after the 2004 Athens Olympics games. AFP PHOTO / Louisa Gouliamaki (Photo credit should read LOUISA GOULIAMAKI/AFP/Getty Images) Vodafone Greece CEO George Koronias holds documents in April 2006 before the start of a parliamentary committee hearing investigating the phone-tapping scandal. Photo: Louisa Gouliamaki /AFP/Getty ImagesWithin hours of Costas’ death, Ericsson prepared a formal “Incident Case Description,” outlining technical details about the malware and how it worked. It contained the warning: “This document is to be treated as highly confidential and … all necessary steps to protect this information must be taken, including the mandatory use of Entrust encryption within Ericsson.” After seven pages of technical detail, the report concluded that someone had loaded unauthorized “corrections,” i.e. malware implants, “designed to introduce RES functionality in such a way that it is not visible to any observer. Neither Ericsson nor Vodafone have any knowledge of the corrections. Nor is it known who supplied the correction, who loaded them or how long they have been loaded in the network.” In other words, someone had introduced malware to secretly activate the lawful intercept’s tapping function while at the same time hiding the fact that it had been turned on. On March 10, the report was turned over to Vodafone Greece CEO Koronias.
    The Tsalikidis family’s former lawyer, Themistoklis Sofos, believes that Costas discovered the spy software by chance and then reported it. “Some people were afraid that he would talk so they killed him in a professional manner,” he told a Greek newspaper. Although the official coroner’s report said he took his own life, no suicide note was ever found, and the initial forensic report was inconclusive.

    Nevertheless, Supreme Court prosecutor Dimitris Linos said that Costas’ death was clearly tied to the eavesdropping operation. “If there had not been the phone tapping, there would not have been a suicide,” he said in June 2006. In his report, prosecutor Yiannis Diotis also said that Costas had knowledge of the illegal phone-tapping software. And Giorgos Constantinopoulos, a former colleague in charge of communications security for Vodafone, reportedly told prosecutors that he was sure Costas was in a position to know about the spy software, and that his death was likely connected to that discovery.

    THROUGHOUT THIS PAST SUMMER in Athens as the debt crisis mounted, crowds of pro-government demonstrators filled Syntagma Square shouting angry chants against European creditors. A few blocks away on Panepistimiou Street, an anarchy symbol was spray-painted on the walls of the headquarters of the Bank of Greece. And behind the Doric columns and yellow neo-classical façade of the Parliament Building, nervous politicians huddled and debated what to do next.

    But a mile and a half away, in a heavily guarded compound near Pedion tou Areos, one of the largest parks in Athens, prosecutors were finally bringing to a close a decade of investigations. And on June 26 the finger of guilt was pointed directly at America’s Central Intelligence Agency. Now it is up to the Justices’ Council to decide how to proceed, and it may prove very embarrassing for the United States.

    From the very start, according to a former senior Greek official involved in the investigation, there was no doubt within the highest levels of government that the U.S. was behind the bugging. On Friday, March 25, 2005, two weeks after Panagiotis cut the rope from his brother’s neck, Greeks celebrated Independence Day, followed by a weekend of festivities. But in Maximos Mansion, the Greek White House, the talk was far from jubilant. As Greek Navy helicopters flew low over the Acropolis during a military parade, members of the Greek inner circle were meeting with Prime Minister Costas Karamanlis about the bugging scandal that had targeted him and his wife.

    A few days before, Foreign Minister Petros Molyviatis was in Washington engaged in high-level meetings with top officials. Secretary of State Condoleezza Rice spoke of the “excellent state of relations between Greece and the United States,” and President George W. Bush issued a proclamation declaring “our special ties of friendship, history, and shared values with Greece.” He noted, “Our two Nations are founded on shared ideals of liberty.” But based on the investigation up to that point, close aides, including Foreign Minister Molyviatis, were convinced that U.S. intelligence was behind the operation. Although at least one member of the group wanted to bury the whole matter rather than cause a rupture in relations with the U.S., Karamanlis disagreed, according to the source. “No way,” Karamanlis said. “If they find this on us 10 years from now, things will prove really difficult.”

    The decision was made to have the police and the EYP intelligence service launch an investigation. Although far from exhaustive, with many questions left unanswered, Minister of Public Order George Voulgarakis and several other officials finally held a televised press conference in February 2006. Scribbling with a blue marker on a white board, they noted that the 14 shadow cell phones were using four mobile phone antennas with a radius of about 2 kilometers in central Athens.

    Within that area was the U.S. Embassy on Vassilissis Sofias Avenue, which turned out to be a matter of great embarrassment for both the U.S. and Greek governments. “The U.S. has been fingered in the media as the culprit,” U.S. Ambassador Charles P. Ries noted in a classified memo to Washington, released by WikiLeaks. Ries suspected Voulgarakis of the leak. Calling him “a less reliable ally,” Ries said Voulgarakis “has allowed rumors to circulate that the U.S. is behind [the] major eavesdropping case in Greece.” Nevertheless, both sides wanted to pretend all was normal. Thus, Foreign Minister Molyviatis suggested to Ries that they move a previously scheduled meeting between them from the ambassador’s residence to the very public Grande Bretagne Hotel in central Athens. There, Ries noted in his memo, “All could see that the U.S.-Greece relationship was unimpaired.”

    It was an odd lunch. Molyviatis was sitting across from the man whose embassy, he believed, had been listening in on his cell phone for months. And Ries, out of the loop because it was a rogue NSA/CIA operation, still may not have known of his embassy’s involvement. “Addressing the eavesdropping case,” Ries said in his memo, “Molyviatis gave his opinion that the whole hullabaloo [the press conference] had been unnecessary. It would have been sufficient to hand the matter to the judicial authorities for investigation and, if appropriate, prosecution, he said. But now, both he and the Prime Minister were keen to show that the current hysteria did not detract from excellent U.S.-Greece relations.”

    For some, however, the cozy relations only seemed to increase the anger. In May, a Greek terrorist organization, “Revolutionary Struggle,” attempted to assassinate Voulgarakis with a remote-controlled bomb. Pointing to the wiretapping scandal and weakening Greek sovereignty as a key reason for the attack, the group said it opposed state-sponsored “terrorism of mass surveillance.” At the U.S. Embassy, the deputy chief of mission sent a classified cable to Washington, released by WikiLeaks, with a warning. “This group is to be taken seriously,” he said. “While there is no mention thus far of targeting foreign ‘capitalist-imperialists,’ it would not be a leap of faith for RS to focus its attention on the U.S. presence in Greece.” Ten months later, the group fired a rocket at the embassy.

    Around the time the eavesdropping was discovered, Basil left the country, apparently with a quick reassignment by CIA to Sudan. Then, according to Greek documents obtained by The Intercept, on August 4, as things quieted down, he obtained a visa at the Greek Embassy in Khartoum and returned 10 days later to Athens and his cover job as first secretary for regional affairs. The diplomatic position gave him immunity from arrest.

    The investigation was the first of what would be five major probes stretching over a decade in which more than 500 witnesses would be questioned, including agents of the EYP. Evidence built up slowly as investigators picked apart the telltale computer logs, traced the cell phone signals, and dissected layers and layers of software. Over the years, piece after piece, the puzzle began to come together.

    In his testimony, Ericsson’s managing director for Greece, Bill Zikou, laid out the “how,” describing the method by which the bugging was accomplished. “What happened in this incident,” he said, “is that a complex, sophisticated, non-Ericsson intruder piece of software was planted into the Vodafone Greece network,” which by activating the RES function “thus made illegal interceptions possible.”

    william-basil200 William George Basil. Date unknown. Photo: FacebookThen investigators turned to the “who.” At the conclusion of its operation, the NSA was hoping that it could disappear into the night without leaving a trace. “Unlike the athletes, when the Olympics are over, the NSA team is hoping you won’t even know they were there,” said one of the classified documents. It bore the ironic title, “Another Successful Olympics Story.” But as a result of sloppy intelligence tradecraft by the American spies, each step pointed the investigators closer and closer to the U.S.
    One person who spent a great deal of time buying shadow phones was William Basil. “We used to call him the telephone man,” said the former CIA colleague in Athens. “All we do is we buy burner phones. Just drive in any direction you want and go to a random phone store and just buy a phone, make a call, and throw the phone away.”

    But Basil wasn’t the only one buying shadow phones. According to the prosecutor’s confidential report, issued June 26, 2015 and obtained by The Intercept, investigators traced four of the shadow cell phones to the shop in Piraeus. There, the prosecutor showed pictures of Basil and his wife, Irene, to the store’s manager. “She is known” to the store, the manager said. The prosecutor then noted in his report that Irene was “acting as designated by him [Basil] and on his behalf.” And according to registered deeds, the family of Irene Basil has long owned a home in Piraeus just a few miles from the shop.

    Things got even sloppier. After purchasing the four shadow phones, meant to be untraceable, the SIM card from one of them was removed and placed in a cell phone registered to the U.S. Embassy. It was a direct link between the covert operation and the U.S. government. Investigators then traced more than 40 calls to and from the U.S. Embassy involving the phone. The numbers listed in the ADAE report include the embassy’s main number, the emergency after-hours number, the Marine guard, and the FBI office. There was even a call to a women’s clothing store in Athens, Rouge Paris.

    Then, on the same shadow phone using another SIM card, investigators found calls to Maryland. Based on the phone numbers, The Intercept was able to determine that those calls were made to Ellicott City, where Basil and his wife used to own property, and to neighboring Cantonsville, both bedroom communities for NSA. The implications greatly worried the investigators. “We were scared,” one told a parliamentary committee. “This is something that the Foreign and Justice Ministries should investigate.”

    Finally, after years of slow, ineffective, and politically hindered investigations that produced more fog than clarity, the determined work of the ADAE and a few others began paying off. The evidence pointed at the U.S. Embassy, and with a bit of luck and thanks to the American spies’ mistakes, prosecutors came up with a name, William Basil, and the international arrest warrant was issued last February.

    But by then, he was long gone. After Athens, Basil was promoted to deputy chief of station in Islamabad, Pakistan, then sent back to a desk job at headquarters, that of director of human resources at the agency’s Counterterrorism Center. Now retired and no longer protected by diplomatic immunity, he may never see Greece again, the country where his wife currently lives in her family’s home in Piraeus. In 2012, according to a petition he signed protesting a planned marine park on Karpathos, he wrote, “I own property in Karpathos and plan to retire there next year.”

    Today the two-story house near the beach in Diafani sits empty; construction materials are stacked on the porch, its exterior unpainted. Nearby, friends and relatives can’t believe that Billy from Karpathos could have secretly wiretapped their top officials, or spied on their government. “There’s no way he did what they say he did,” said Basil’s cousin Nikos. “Because of his love [for] Greece, they would know that if that thing [the wiretapping] needed to be done, they would most certainly ask somebody else to do it. No way he did it. It is well known that he was first and foremost a Greek patriot.”

    Months before the arrest warrant was issued, Basil had been in touch by phone with a prominent criminal lawyer in Athens, Ilias G. Anagnostopoulos, according to a Greek source, who asked not to be named because of the confidential nature of the information. When asked by the attorney if he would be willing to testify if it came to that, Basil, according to the source, replied: “If there are questions, of course I can answer them.” The attorney met with the prosecutor, but after leaks to the press, Basil told Anagnostopoulos to drop the matter for the time being. Complicating matters, the prosecutor has filed the eavesdropping case alongside a much larger, but unconnected, conspiratorial case involving an assassination attempt on former Prime Minister Karamanlis, a key target of the wiretapping operation.

    CIA Chief of Station Eric Pound left Athens in 2007, returning to headquarters to become chief of the External Operations and Cover Division, the organization responsible for creating front companies overseas for clandestine officers masquerading as business executives or other occupations. After he retired in September 2009, Pound mentioned to a college audience that the CIA has an obsession to learn the truth. He added, “But obsession does not always lead to success.”

    Costas Tsalikides March 9, 2005 Costas Tsalikidis, March 9, 2005.
    Panagiotis and other family members also want the truth. In 2011, Costas’ family asked two coroners to reexamine the medical records. One was Dr. Steven Karch, a forensic pathologist and former medical examiner in San Francisco, and the other was Dr. Theodoros Vougiouklakis, an associate professor of forensic medicine in Greece. Karch called the original autopsy “farcical.” Based on pictures of the body, the coroners concluded that the marks to Costas’ neck couldn’t have come from simply jumping off the chair. “Something was done to him prior,” Karch told The Intercept.
    The family agrees with this conclusion. “I believe there are people who know what happened, what exactly and who exactly did it and they will give us those facts,” said Panagiotis. “I believe that as time goes by the reasons for protecting the perpetrators will fade and mouths will open.” Last March, on the 10th anniversary of Costas’ death, his mother spoke to a local Greek reporter for the first time. “I want to know what happened to my child and nobody that investigated until now, 10 years [later], gave me the slightest response,” she said. “As long as I live I will live with this suffering. I want to punish those who are guilty for what happened, and those who know [but] do not speak.”

    There appears little chance that her questions will be answered, however. It is extremely unlikely the Obama administration will ever allow Basil, or any other intelligence official, to be extradited. Nor is it likely that Basil will return to Greece voluntarily with an arrest warrant waiting for him. Around 2009 he appeared in a Facebook picture, seemingly in disguise, sporting a long white beard and moustache. “Dude, Santa’s job isn’t available for what … another seven months,” a friend joked on Facebook. Though he has not responded to requests for an interview, pictures online show him in Greece in 2013 attending his daughter’s wedding, without the beard, in the Glyfada section of Athens. Multiple attempts to reach Basil by phone, and through family members, were unsuccessful. Both the CIA and NSA declined to comment on any issue surrounding the Athens wiretapping, including Basil’s indictment.

    As for the NSA, a classified review of the Greek Olympics asked the now ironic question, “After this year’s gold medal performance, what comes next?” Next will certainly be the Olympics scheduled for Rio de Janeiro, Brazil, next summer. According to a previously published top-secret NSA slide, the agency has already planted malware throughout the country’s telecommunications system. And, if history is any guide, in the weeks leading up to the start of the games, teams from the SCS, SSO, TAO, and other organizations will arrive once again to begin 24/7 eavesdropping. And as in Greece, they may just happen to leave some of their monitoring equipment behind.

    Sitting in his apartment overlooking Athens’ Plaka, John Brady Kiesling could make little sense of it all. “I don’t see a shred of evidence that this wiretapping did the U.S. government any good,” he said. “I think it’s just important to underscore that intelligence gathering is never free. It always comes at a human and political cost to someone. In this case it was paid by an innocent Vodafone technician.”

    Aggelos Petropoulos of the Athens-based newspaper Kathimerini contributed reporting from Greece, and Ryan Gallagher, senior reporter at The Intercept, contributed research and reporting from the Snowden Archive.

    Documents published with this story:

    Another Successful Olympics Story
    Exploiting Foreign Lawful Intercept Roundtable
    Gold Medal Support for Olympic Games
    NSA Team Selected for Olympics Support
    SID Trains for Athens Olympics

    James Bamford
    Sep. 29 2015, 4:01 a.m.

    Find this story at 29 September 2015
    Copyright https://theintercept.com/

    CIA Cover-Up Thwarted FBI’s Nuclear Diversion Investigations Evidence that missing uranium went to Israel withheld since 1968

    According to formerly top-secret and secret Central Intelligence Agency files (PDF) released August 31 in response to a Freedom of Information Act lawsuit (PDF), the agency’s long retention of key information ultimately stymied two FBI investigations into the 1960s diversion of weapons-grade uranium from a Pennsylvania-based government contractor into the Israeli nuclear weapons program.

    The Nuclear Materials and Equipment Corporation (NUMEC) was a nuclear fuel processing company founded by legendary chemist Zalman Mordecai Shapiro and financed by entrepreneur David Luzer Lowenthal. According to the Department of Energy, during Shapiro’s reign at NUMEC, the company lost more weapons-grade uranium – 337 kilograms after accounting for losses – much of a particularly unique and high enrichment level than any other U.S. facility. Losses only returned to industry norms after Shapiro, who later unsuccessfully tried to get a job working on advanced hydrogen bomb designs, was forced out of NUMEC.

    In the 1950’s Shapiro developed vital breakthroughs for US Navy nuclear propulsion systems. In the 1940s Lowenthal fought in Israel’s War of Independence, serving as a smuggler who developed close contacts with high Israeli intelligence officials. An ardent supporter of Israel, Shapiro was Pittsburgh Chapter President of the Zionist Organization of America. According to the Jerusalem Post, Shapiro later joined the board of governors of the Israeli Intelligence Heritage Center, an organization that honors spies who secretly took action to advance Israel. NUMEC holding company Apollo Industries President Morton Chatkin also held a ZOA leadership role while Apollo Executive Vice President Ivan J. Novick went on to become ZOA’s national president. David Lowenthal, who raised capital for acquiring NUMEC’s facilities (an old steel mill in the center of the village) served as Apollo’s treasurer.

    In 1968 CIA Director Richard Helms sent an urgent request for an investigation to Attorney General Ramsey Clark (PDF) stating “You are well aware of the great concern which exists at the highest levels of this Government with regard to the proliferation of nuclear weapons…It is critical for us to establish whether or not the Israelis now have the capability of fabricating nuclear weapons which might be employed in the Near East…I urge that the Federal Bureau of Investigation be called upon to initiate a discreet intelligence investigation of all source nature of Dr. Shapiro in order to establish the nature and extent of his relationship with the Government of Israel.” (PDF)

    The FBI investigation documented Shapiro’s many meetings with top Israeli nuclear weapons development officials such as Avraham Hermoni and wiretapped a conversation representative of the overall lack of concern over worker safety and the environment by Shapiro and Lowenthal. The FBI discovered that NUMEC had formed a joint venture with the Israel Atomic Energy Commission called Isorad to supply food irradiators to Israel. The now-defunct Atomic Energy Agency questioned Zalman Shapiro in 1969 – never asking if he had diverted material – over his many meetings with Israelis known to the FBI to be intelligence operatives. After the AEC defended Shapiro and his continued holding of security clearances, the FBI terminated its intelligence investigation.

    In 1976 the Ford administration reopened the NUMEC investigation in order to determine if a diversion had occurred and whether a government cover-up had ensued. The 130-page release is replete with formal CIA denials to Congressional Committee investigators, the GAO and the Nuclear Regulatory Commission inquiries about whether the CIA had participated in any illegal diversions, or whether it was aware of any presidential finding authorizing such an operation. Arizona Democrat Morris Udall asked bluntly on August 23, 1977 “Is it possible that President Johnson, who was known to be a friend of Israel, could have encouraged the flow of nuclear materials to the Israelis?” Citing CIA’s role in alerting the attorney general to the problem as evidence that it was not involved, the agency also repeatedly emphasized “we in CIA are not and have not been concerned with the law enforcement aspects of this problem. Indeed, Dick Helms turned the matter over to the FBI in order to avoid such involvement.” Rather, exploring the NUMEC-Israel link was part of CIA’s intelligence function to substantiate why its National Intelligence Estimate concluded Israel had a nuclear arsenal.

    FBI special agents soon lost morale over being sent unprepared into a second investigation. The CIA, for its part, continued withholding critical information that could have provided both motivation and a tool for confronting hostile interviewees. This was according to the newly released CIA files “information…of obvious importance in reaching an intelligence decision on the probability of diversion, it is not of any legal pertinence to the FBI’s criminal investigation of NUMEC. In our discussions with the FBI we have alluded to this information but we have not made the details available to special agents from the Washington Field Office of the FBI who are working on the case. While Mr. Bush’s [then-CIA Director George H.W. Bush] conversations are not known to us, we have had no substantive discussions with officials at FBI Headquarters on this matter.” It was this sensitive CIA information, made available only to the president, cabinet, and a limited number of top agency officials that led one National Security Council staffer to conclude, “I do not think that the President has plausible deniability.”

    On June 6, 1977 Associate Deputy Director for Operations Theodore Shackley briefed the FBI agents in charge of the NUMEC investigation. They grumbled that since they had not established that the diversion took place, they could not begin to address the second question about a cover-up. They then pleaded for “new information” from the CIA, blithely ignorant that their reasoning was completely backward – it was old information they required, and it was the CIA’s withholding of it that was the true cover-up. The FBI also thought it needed a NUMEC insider willing to blow the whistle in order to finally break the case open.

    Unknown to the FBI, every CIA director was complicit in withholding a key clandestine operational finding from investigators. According to a May 11, 1977 report by Shackley, the “CIA has not furnished to the FBI sensitive agent reporting…since the decision was made by Directors Helms, Colby and Bush that this information would not further the investigation of NUMEC but would compromise sources and methods.”

    Though carefully redacted from the CIA release, the omitted fact was likely that highly enriched uranium of a signature unique to NUMEC had been detected in Israel, a country that did not have facilities to enrich uranium. This sensitive information (PDF) was delivered to former Atomic Energy Commissioner Glen Seaborg by two Department of Energy investigators sifting for more facts about NUMEC in June of 1978. It was powerful enough evidence that the retired Seaborg subsequently refused to be interviewed by less informed FBI investigators.

    The CIA noted FBI investigators “indicated that even if they came up with a case, it was extremely unlikely that Justice and State would allow it to come to trial…they feel that they have been given a job to do with none of the tools necessary to do it.” Although in 1981 special agents finally identified a former NUMEC employee who had personally witnessed the means of the diversion – Zalman Shapiro and other NUMEC officials stuffing HEU canisters into irradiators (PDF) sealed and rushed to Israel – lacking the missing CIA puzzle piece the FBI investigation went dormant as the statute of limitations for Atomic Energy Act violations – punishable by death – finally expired.

    Grant F. Smith is the author of DIVERT! NUMEC, Zalman Shapiro, and the diversion of U.S. weapons-grade uranium into the Israeli nuclear weapons program. He currently serves as director of research at the Institute for Research: Middle Eastern Policy in Washington (IRmep), D.C. Read other articles by Smith, or visit the IRmep website.

    by Grant Smith, September 07, 2015

    Find this story at 7 September 2015

    Copyright © Antiwar.com 2015

    U.S. Suspected Israeli Involvement in 1960s Missing Uranium (2014)

    Officials Believed Ally Used Materials Lifted From Pennsylvania Toward a Weapons Program

    Declassified documents from the 1970s provide new evidence that federal officials believed bomb-grade uranium that disappeared from a Pennsylvania nuclear facility in the 1960s was likely taken for use in a clandestine Israeli atomic-weapons program.

    The documents, obtained earlier this year through public-records requests by a Washington-based nonprofit group, also indicate that senior officials wanted to keep the matter under wraps for fear it could undermine U.S. Middle East peace efforts.

    Though the Central Intelligence Agency’s case for the suspected theft wasn’t conclusive, it was sufficiently persuasive that “I do not think that the President has plausible deniability” regarding the question, said a memo dated July 28, 1977, by a National Security Council staffer in President Jimmy Carter’s administration.

    A security council memo to Mr. Carter a few days later expressed more uncertainty about whether a theft had occurred, but noted that then-Secretary of State Cyrus Vance had a coming Middle East trip and discussed the need to keep attention “away from the CIA’s information.”

    The question of whether one of America’s closest allies was involved in the theft of some of its most valuable and dangerous material in pursuit of nuclear weapons has been one of the enduring mysteries of the atomic age. The suspected theft has drawn the attention of at least three presidents and other senior government officials.

    The evidence suggested that “something did transpire,” said Zbigniew Brzezinski, Mr. Carter’s national-security adviser, in a recent interview. “But until you have conclusive evidence you don’t want to make an international incident. This is a potentially very explosive, controversial issue.” Besides, he added, even if a theft was proved, “What are we going to say to the Israelis, ‘Give it back?’ ”

    Israel hasn’t ever said whether it has nuclear weapons. A spokeswoman for the Israeli Embassy in Washington, D.C., declined to comment for this article.

    So did a spokeswoman for the Obama administration, which like past U.S. administrations has declined to say whether it believes Israel has an atomic arsenal. A CIA spokesman also declined to comment.

    Mr. Carter, who said at a 2008 gathering in Britain that he believes Israel has nuclear weapons, declined through a spokeswoman to be interviewed.

    His diplomatic efforts as president, which helped produce a peace treaty between Israel and Egypt in 1979, likely wouldn’t have been possible “if there was some huge scandal at the time about this,” said John Marcum, the staffer who wrote the July 28, 1977, memo, in a recent interview.

    The theft suspicions surround events at a now-dismantled facility in Apollo, Pa., owned by a company called Nuclear Materials & Equipment Corp., or Numec. In the mid-1960s, some 200 pounds of bomb-grade uranium—enough possibly for several Hiroshima-sized bombs—couldn’t be accounted for there.

    ENLARGE
    An FBI investigation begun in the late 1960s, which drew interest from top Nixon administration officials, including the president, couldn’t determine what happened to the uranium, according to Federal Bureau of Investigation and other agency documents. But FBI officials did raise questions about suspected dealings between Numec’s founder and president, Zalman Shapiro, and Israeli intelligence officials, according to government documents. Babcock & Wilcox Co., a nuclear-technology and energy company that acquired Numec in 1971, declined to comment.

    In an interview late last year, the 93-year-old Mr. Shapiro, who has long argued the material had been lost in the production process, said that no theft took place. He said his dealings with Israel, where Numec had commercial activities, were legitimate and to his knowledge never involved intelligence officials.

    Potentially crucial sections of the recently released documents—obtained by the Institute for Research: Middle Eastern Policy, an organization that has been critical of Israel—remain classified.

    The latest document release underscores the need for the government to declassify the remaining information about the suspected theft, some former federal officials say.

    “We know the CIA thought the material was stolen. We want to know why they thought that,” said Victor Gilinsky, a former commissioner of the Nuclear Regulatory Commission.

    Government records show that a federal nuclear-enrichment facility in Ohio sent shipments to Numec containing the highest percentage of U235, the explosive form of uranium, ever known to have been produced, said Roger Mattson, another former NRC official.

    Did the CIA later find that such uranium had turned up in Israel, as some documentary evidence suggests? “That’s not something that’s declassified,” said Jessica Tuchman Mathews, a national-security official in the Carter administration who wrote or received some of the recently declassified documents.

    By JOHN R. EMSHWILLER
    Updated Aug. 6, 2014 7:41 p.m. ET

    Find this story at 6 August 2014

    Copyright ©2015 Dow Jones & Company, Inc.

    MI6 spy Gareth Williams found dead in bag had ‘hacked Clinton secrets’

    A MI6 spy who was discovered dead in a holdall at his apartment in 2010 had hacked into sensitive information about former US President Bill Clinton, it has been claimed. The spy had obtained Clinton’s diary for an event and passed it to a friend.
    Gareth Williams, 31, hacked into the event’s guest list as it was to be attended by President Clinton, passing it to his friend who was also to be a guest at the party, according to sources speaking on condition of anonymity to the Sun on Sunday.
    “The Clinton diary hack came at a time when Williams’s work with America was of the most sensitive nature,” one source said. “It was a diplomatic nightmare for Sir John Sawers, the new director of MI6 at the time.”
    The death of Williams remains an unsolved case after five years. A three-year investigation by the Metropolitan Police ended in 2013, deciding that no one else was involved in Williams’ death and his being locked inside the bag, which was found in his bath. A coroner’s report following his death judged that he was killed unlawfully, however.
    Another inside source told the newspaper that before his death, living with a new identity has been taking its toll on Williams. “Williams’s state of mind in the months before his death was worrying those closest to him,” the source told the paper. “He found the training so stressful and his mood blackened even talking about it.”
    “Typically he’d be asked to learn a new identity then report to a country hotel to meet an interrogation team. There he would be grilled about his new ID for 48 hours without sleep, the source added. “His wrist was broken once after he was handcuffed to a metal bar inside a van that was driven around the country for several hours while he faced a barrage of questions.”
    Last week, it was reported that spies may have broken into Williams’ flat in Pimlico, central London, through a skylight, re-entering the residence in order to destroy evidence while the property was under armed guard after the spy’s death. An anonymous source told the Mirror that forensic officers realised that equipment in the flat had been moved in their absence. Williams was a keen cyclist from Anglesey in North Wales and before his death had attended a hacking conference in the US and also a drag show by himself two days before his death.

    International Business TimesBy Jack Moore | International Business Times – Sun, Aug 30, 2015

    Find this story at 30 August 2015

    copyright https://uk.news.yahoo.com/

    THE DRONE PAPERS: THE ASSASSINATION COMPLEXSECRET MILITARY DOCUMENTS EXPOSE THE INNER WORKINGS OF OBAMA’S DRONE WARS

    From his first days as commander in chief, the drone has been President Barack Obama’s weapon of choice, used by the military and the CIA to hunt down and kill the people his administration has deemed — through secretive processes, without indictment or trial — worthy of execution. There has been intense focus on the technology of remote killing, but that often serves as a surrogate for what should be a broader examination of the state’s power over life and death.
    DRONES ARE A TOOL, not a policy. The policy is assassination. While every president since Gerald Ford has upheld an executive order banning assassinations by U.S. personnel, Congress has avoided legislating the issue or even defining the word “assassination.” This has allowed proponents of the drone wars to rebrand assassinations with more palatable characterizations, such as the term du jour, “targeted killings.”

    When the Obama administration has discussed drone strikes publicly, it has offered assurances that such operations are a more precise alternative to boots on the ground and are authorized only when an “imminent” threat is present and there is “near certainty” that the intended target will be eliminated. Those terms, however, appear to have been bluntly redefined to bear almost no resemblance to their commonly understood meanings.

    The first drone strike outside of a declared war zone was conducted more than 12 years ago, yet it was not until May 2013 that the White House released a set of standards and procedures for conducting such strikes. Those guidelines offered little specificity, asserting that the U.S. would only conduct a lethal strike outside of an “area of active hostilities” if a target represents a “continuing, imminent threat to U.S. persons,” without providing any sense of the internal process used to determine whether a suspect should be killed without being indicted or tried. The implicit message on drone strikes from the Obama administration has been one of trust, but don’t verify.

    Photo: The Intercept
    Document
    SMALL FOOTPRINT OPERATIONS 2/13Document
    SMALL FOOTPRINT OPERATIONS 5/13Document
    OPERATION HAYMAKERDocument
    GEOLOCATION-WATCHLISTThe Intercept has obtained a cache of secret slides that provides a window into the inner workings of the U.S. military’s kill/capture operations at a key time in the evolution of the drone wars — between 2011 and 2013. The documents, which also outline the internal views of special operations forces on the shortcomings and flaws of the drone program, were provided by a source within the intelligence community who worked on the types of operations and programs described in the slides. The Intercept granted the source’s request for anonymity because the materials are classified and because the U.S. government has engaged in aggressive prosecution of whistleblowers. The stories in this series will refer to the source as “the source.”

    The source said he decided to provide these documents to The Intercept because he believes the public has a right to understand the process by which people are placed on kill lists and ultimately assassinated on orders from the highest echelons of the U.S. government. “This outrageous explosion of watchlisting — of monitoring people and racking and stacking them on lists, assigning them numbers, assigning them ‘baseball cards,’ assigning them death sentences without notice, on a worldwide battlefield — it was, from the very first instance, wrong,” the source said.

    “We’re allowing this to happen. And by ‘we,’ I mean every American citizen who has access to this information now, but continues to do nothing about it.”
    The Pentagon, White House, and Special Operations Command all declined to comment. A Defense Department spokesperson said, “We don’t comment on the details of classified reports.”

    The CIA and the U.S. military’s Joint Special Operations Command (JSOC) operate parallel drone-based assassination programs, and the secret documents should be viewed in the context of an intense internal turf war over which entity should have supremacy in those operations. Two sets of slides focus on the military’s high-value targeting campaign in Somalia and Yemen as it existed between 2011 and 2013, specifically the operations of a secretive unit, Task Force 48-4.

    Additional documents on high-value kill/capture operations in Afghanistan buttress previous accounts of how the Obama administration masks the true number of civilians killed in drone strikes by categorizing unidentified people killed in a strike as enemies, even if they were not the intended targets. The slides also paint a picture of a campaign in Afghanistan aimed not only at eliminating al Qaeda and Taliban operatives, but also at taking out members of other local armed groups.

    One top-secret document shows how the terror “watchlist” appears in the terminals of personnel conducting drone operations, linking unique codes associated with cellphone SIM cards and handsets to specific individuals in order to geolocate them.

    A top-secret document shows how the watchlist looks on internal systems used by drone operators.
    The costs to intelligence gathering when suspected terrorists are killed rather than captured are outlined in the slides pertaining to Yemen and Somalia, which are part of a 2013 study conducted by a Pentagon entity, the Intelligence, Surveillance, and Reconnaissance Task Force. The ISR study lamented the limitations of the drone program, arguing for more advanced drones and other surveillance aircraft and the expanded use of naval vessels to extend the reach of surveillance operations necessary for targeted strikes. It also contemplated the establishment of new “politically challenging” airfields and recommended capturing and interrogating more suspected terrorists rather than killing them in drone strikes.

    The ISR Task Force at the time was under the control of Michael Vickers, the undersecretary of defense for intelligence. Vickers, a fierce proponent of drone strikes and a legendary paramilitary figure, had long pushed for a significant increase in the military’s use of special operations forces. The ISR Task Force is viewed by key lawmakers as an advocate for more surveillance platforms like drones.

    The ISR study also reveals new details about the case of a British citizen, Bilal el-Berjawi, who was stripped of his citizenship before being killed in a U.S. drone strike in 2012. British and American intelligence had Berjawi under surveillance for several years as he traveled back and forth between the U.K. and East Africa, yet did not capture him. Instead, the U.S. hunted him down and killed him in Somalia.

    Taken together, the secret documents lead to the conclusion that Washington’s 14-year high-value targeting campaign suffers from an overreliance on signals intelligence, an apparently incalculable civilian toll, and — due to a preference for assassination rather than capture — an inability to extract potentially valuable intelligence from terror suspects. They also highlight the futility of the war in Afghanistan by showing how the U.S. has poured vast resources into killing local insurgents, in the process exacerbating the very threat the U.S. is seeking to confront.

    Read more
    FIND, FIX, FINISH These secret slides help provide historical context to Washington’s ongoing wars, and are especially relevant today as the U.S. military intensifies its drone strikes and covert actions against ISIS in Syria and Iraq. Those campaigns, like the ones detailed in these documents, are unconventional wars that employ special operations forces at the tip of the spear.

    The “find, fix, finish” doctrine that has fueled America’s post-9/11 borderless war is being refined and institutionalized. Whether through the use of drones, night raids, or new platforms yet to be unleashed, these documents lay bare the normalization of assassination as a central component of U.S. counterterrorism policy.

    “The military is easily capable of adapting to change, but they don’t like to stop anything they feel is making their lives easier, or is to their benefit. And this certainly is, in their eyes, a very quick, clean way of doing things. It’s a very slick, efficient way to conduct the war, without having to have the massive ground invasion mistakes of Iraq and Afghanistan,” the source said. “But at this point, they have become so addicted to this machine, to this way of doing business, that it seems like it’s going to become harder and harder to pull them away from it the longer they’re allowed to continue operating in this way.”

    The articles in The Drone Papers were produced by a team of reporters and researchers from The Intercept that has spent months analyzing the documents. The series is intended to serve as a long-overdue public examination of the methods and outcomes of America’s assassination program. This campaign, carried out by two presidents through four presidential terms, has been shrouded in excessive secrecy. The public has a right to see these documents not only to engage in an informed debate about the future of U.S. wars, both overt and covert, but also to understand the circumstances under which the U.S. government arrogates to itself the right to sentence individuals to death without the established checks and balances of arrest, trial, and appeal.

    Among the key revelations in this series:

    HOW THE PRESIDENT AUTHORIZES TARGETS FOR ASSASSINATION

    Read more
    KILL CHAINIt has been widely reported that President Obama directly approves high-value targets for inclusion on the kill list, but the secret ISR study provides new insight into the kill chain, including a detailed chart stretching from electronic and human intelligence gathering all the way to the president’s desk. The same month the ISR study was circulated — May 2013 — Obama signed the policy guidance on the use of force in counterterrorism operations overseas. A senior administration official, who declined to comment on the classified documents, told The Intercept that “those guidelines remain in effect today.”

    U.S. intelligence personnel collect information on potential targets, as The Intercept has previously reported, drawn from government watchlists and the work of intelligence, military, and law enforcement agencies. At the time of the study, when someone was destined for the kill list, intelligence analysts created a portrait of a suspect and the threat that person posed, pulling it together “in a condensed format known as a ‘baseball card.’” That information was then bundled with operational information and packaged in a “target information folder” to be “staffed up to higher echelons” for action. On average, it took 58 days for the president to sign off on a target, one slide indicates. At that point, U.S. forces had 60 days to carry out the strike. The documents include two case studies that are partially based on information detailed on baseball cards.

    The system for creating baseball cards and targeting packages, according to the source, depends largely on intelligence intercepts and a multi-layered system of fallible, human interpretation. “It isn’t a surefire method,” he said. “You’re relying on the fact that you do have all these very powerful machines, capable of collecting extraordinary amounts of data and information,” which can lead personnel involved in targeted killings to believe they have “godlike powers.”

    ASSASSINATIONS DEPEND ON UNRELIABLE INTELLIGENCE AND HURT INTELLIGENCE GATHERING

    Read more
    FIRING BLINDIn undeclared war zones, the U.S. military has become overly reliant on signals intelligence, or SIGINT, to identify and ultimately hunt down and kill people. The documents acknowledge that using metadata from phones and computers, as well as communications intercepts, is an inferior method of finding and finishing targeted people. They described SIGINT capabilities in these unconventional battlefields as “poor” and “limited.” Yet such collection, much of it provided by foreign partners, accounted for more than half the intelligence used to track potential kills in Yemen and Somalia. The ISR study characterized these failings as a technical hindrance to efficient operations, omitting the fact that faulty intelligence has led to the killing of innocent people, including U.S. citizens, in drone strikes.

    The source underscored the unreliability of metadata, most often from phone and computer communications intercepts. These sources of information, identified by so-called selectors such as a phone number or email address, are the primary tools used by the military to find, fix, and finish its targets. “It requires an enormous amount of faith in the technology that you’re using,” the source said. “There’s countless instances where I’ve come across intelligence that was faulty.” This, he said, is a primary factor in the killing of civilians. “It’s stunning the number of instances when selectors are misattributed to certain people. And it isn’t until several months or years later that you all of a sudden realize that the entire time you thought you were going after this really hot target, you wind up realizing it was his mother’s phone the whole time.”

    Within the special operations community, the source said, the internal view of the people being hunted by the U.S. for possible death by drone strike is: “They have no rights. They have no dignity. They have no humanity to themselves. They’re just a ‘selector’ to an analyst. You eventually get to a point in the target’s life cycle that you are following them, you don’t even refer to them by their actual name.” This practice, he said, contributes to “dehumanizing the people before you’ve even encountered the moral question of ‘is this a legitimate kill or not?’”

    By the ISR study’s own admission, killing suspected terrorists, even if they are “legitimate” targets, further hampers intelligence gathering. The secret study states bluntly: “Kill operations significantly reduce the intelligence available.” A chart shows that special operations actions in the Horn of Africa resulted in captures just 25 percent of the time, indicating a heavy tilt toward lethal strikes.

    STRIKES OFTEN KILL MANY MORE THAN THE INTENDED TARGET

    Read more
    MANHUNTING IN THE HINDU KUSH The White House and Pentagon boast that the targeted killing program is precise and that civilian deaths are minimal. However, documents detailing a special operations campaign in northeastern Afghanistan, Operation Haymaker, show that between January 2012 and February 2013, U.S. special operations airstrikes killed more than 200 people. Of those, only 35 were the intended targets. During one five-month period of the operation, according to the documents, nearly 90 percent of the people killed in airstrikes were not the intended targets. In Yemen and Somalia, where the U.S. has far more limited intelligence capabilities to confirm the people killed are the intended targets, the equivalent ratios may well be much worse.

    “Anyone caught in the vicinity is guilty by association,” the source said. When “a drone strike kills more than one person, there is no guarantee that those persons deserved their fate. … So it’s a phenomenal gamble.”

    THE MILITARY LABELS UNKNOWN PEOPLE IT KILLS AS “ENEMIES KILLED IN ACTION”

    Read more
    MANHUNTING IN THE HINDU KUSH The documents show that the military designated people it killed in targeted strikes as EKIA — “enemy killed in action” — even if they were not the intended targets of the strike. Unless evidence posthumously emerged to prove the males killed were not terrorists or “unlawful enemy combatants,” EKIA remained their designation, according to the source. That process, he said, “is insane. But we’ve made ourselves comfortable with that. The intelligence community, JSOC, the CIA, and everybody that helps support and prop up these programs, they’re comfortable with that idea.”

    The source described official U.S. government statements minimizing the number of civilian casualties inflicted by drone strikes as “exaggerating at best, if not outright lies.”

    THE NUMBER OF PEOPLE TARGETED FOR DRONE STRIKES AND OTHER FINISHING OPERATIONS

    Read more
    KILL CHAINAccording to one secret slide, as of June 2012, there were 16 people in Yemen whom President Obama had authorized U.S. special operations forces to assassinate. In Somalia, there were four. The statistics contained in the documents appear to refer only to targets approved under the 2001 Authorization for Use of Military Force, not CIA operations. In 2012 alone, according to data compiled by the Bureau of Investigative Journalism, there were more than 200 people killed in operations in Yemen and between four and eight in Somalia.

    HOW GEOGRAPHY SHAPES THE ASSASSINATION CAMPAIGN

    Read more
    FIRING BLINDIn Afghanistan and Iraq, the pace of U.S. strikes was much quicker than in Yemen and Somalia. This appears due, in large part, to the fact that Afghanistan and Iraq were declared war zones, and in Iraq the U.S. was able to launch attacks from bases closer to the targeted people. By contrast, in Somalia and Yemen, undeclared war zones where strikes were justified under tighter restrictions, U.S. attack planners described a serpentine bureaucracy for obtaining approval for assassination. The secret study states that the number of high-value targeting operations in these countries was “significantly lower than previously seen in Iraq and Afghanistan” because of these “constraining factors.”

    Even after the president approved a target in Yemen or Somalia, the great distance between drone bases and targets created significant challenges for U.S. forces — a problem referred to in the documents as the “tyranny of distance.” In Iraq, more than 80 percent of “finishing operations” were conducted within 150 kilometers of an air base. In Yemen, the average distance was about 450 kilometers and in Somalia it was more than 1,000 kilometers. On average, one document states, it took the U.S. six years to develop a target in Somalia, but just 8.3 months to kill the target once the president had approved his addition to the kill list.

    INCONSISTENCIES WITH WHITE HOUSE STATEMENTS ABOUT TARGETED KILLING

    Read more
    KILL CHAINThe White House’s publicly available policy standards state that lethal force will be launched only against targets who pose a “continuing, imminent threat to U.S. persons.” In the documents, however, there is only one explicit mention of a specific criterion: that a person “presents a threat to U.S. interest or personnel.” While such a rationale may make sense in the context of a declared war in which U.S. personnel are on the ground in large numbers, such as in Afghanistan, that standard is so vague as to be virtually meaningless in countries like Yemen and Somalia, where very few U.S. personnel operate.

    While many of the documents provided to The Intercept contain explicit internal recommendations for improving unconventional U.S. warfare, the source said that what’s implicit is even more significant. The mentality reflected in the documents on the assassination programs is: “This process can work. We can work out the kinks. We can excuse the mistakes. And eventually we will get it down to the point where we don’t have to continuously come back … and explain why a bunch of innocent people got killed.”

    The architects of what amounts to a global assassination campaign do not appear concerned with either its enduring impact or its moral implications. “All you have to do is take a look at the world and what it’s become, and the ineptitude of our Congress, the power grab of the executive branch over the past decade,” the source said. “It’s never considered: Is what we’re doing going to ensure the safety of our moral integrity? Of not just our moral integrity, but the lives and humanity of the people that are going to have to live with this the most?”

    Jeremy Scahill
    Oct. 15 2015, 1:57 p.m.

    Find this story at 15 October 2015

    Copyright https://theintercept.com/

    German spy scandal deepens

    The German intelligence service has spied on European and American embassies in ways that may have been beyond its mandate, German media ARD and Spiegel Online reported on Wednesday (14 October).
    The Bundesnachtrichtendienst (BND) reportedly targeted French and US institutions and eavesdropped on them to acquire information about countries like Afghanistan.

    The news follows reports in April that the BND spied on France and the European Commission on behalf of the US’ National Security Agency (NSA). But according to the new reports, BND also spied on allies on its own initiative.
    For its spying programme, the BND used thousands of search queries, so-called selectors, including phone numbers and IP addresses, possibly queries the service chose itself.

    “The question is … whether the used queries were covered by the BND’s mandate”, MP Clemens Binninger of chancellor Angela Merkel’s centre-right CDU party told ARD.

    Binninger is head of the Bundestag’s supervisory body that oversees the intelligence service.

    The German media sourced their news at a secret meeting of the overseeing body on Wednesday evening.

    The revelations are remarkable considering the criticism that followed revelations by Edward Snowden in 2013 that the NSA had spied on EU leaders, including Merkel.

    “Spying among friends – that is just not done”, Merkel said following the scandal.

    The BND programme stopped around the same time as the Snowden revelations revealed the NSA practices, in the autumn of 2013.

    German MPs are planning to interview staff next week at the BND headquarters in Pullach and review the list of search queries to determine if there has been any illegal practice.

    By PETER TEFFER
    BRUSSELS, 15. OCT, 09:11

    Find this story at 15 October 2015

    Copyright https://euobserver.com/

    German spy charged with treason for aiding CIA and Russia

    Prosecutors have charged a German spy with treason, breach of official secrecy and taking bribes for allegedly providing secret documents to both the CIA and Russia’s intelligence agency. Prosecutors say Thursday Aug. 20, 2015, the 32-year-old man,handled mail and classified documents for Germany’s foreign intelligence agency BND. ( Stephan Jansen/dpa via AP)
    BERLIN (AP) — A German spy who allegedly acted as a double agent for the United States and Russia has been charged with treason, breach of official secrecy and taking bribes, Germany’s federal prosecutors’ office said Thursday.

    The 32-year-old, identified only as Markus R. due to privacy rules, is accused of offering his services to the CIA in early 2008 while working for Germany’s foreign intelligence agency BND. Documents he gave the U.S. spy agency would have revealed details of the BND’s work and personnel abroad, officials said.

    “In doing so the accused caused serious danger to Germany’s external security,” prosecutors said in a statement. “In return the accused received sums amounting to at least 95,000 euros ($104,900) from the CIA.”

    Shortly before his arrest in July 2014, Markus R. also offered to work for Russian intelligence and provided them with three documents, again harming Germany’s national security, prosecutors said.

    The discovery that the CIA had allegedly been spying on its German counterpart caused anger in Berlin, adding to diplomatic tension between Germany and the United States over reports about U.S. surveillance of Chancellor Angela Merkel’s cellphone.

    Following the arrest, the German government demanded the removal of the CIA station chief in Berlin.

    Prosecutors said Markus R. would have had access to sensitive documents because his job involved handling mail and classified documents for the BND’s foreign operations department.

    German weekly Der Spiegel reported that the 218 documents Markus R. allegedly passed to the CIA included a list of all BND agents abroad, a summary of an eavesdropped phone call between former U.S. Secretary of State Hillary Rodham Clinton and former U.N. Secretary-General Kofi Annan, as well as a draft counter-espionage strategy. A spokeswoman for the federal prosecutors’ office declined to comment on the report.

    If convicted, Markus R. could face between one and 15 years in prison.

    Associated Press By FRANK JORDANS
    August 20, 2015 11:07 AM

    Find this story at 20 August 2015
    Copyright http://news.yahoo.com/

    Deliberate Deception Washington Gave Answer Long Ago in NSA Case

    For months, the German government sought to create the impression it was still waiting for an answer from the US on whether it could share NSA target lists for spying with a parliamentary investigation. The response came months ago.

    The order from Washington was unambiguous. The United States Embassy in Berlin didn’t want to waste any time and moved to deliver the diplomatic cable without delay. It was May 10, 2015, a Sunday — and even diplomats aren’t crazy about working weekends. On this day, though, they had no other choice. James Melville, the embassy’s second-in-command, hand delivered the mail from the White House to Angela Merkel’s Chancellery at 9 p.m.

    The letter that Melville handed over to Merkel’s staff contained the long-awaited answer to how the German federal government could proceed with highly classified lists of NSA spying targets. The so-called “selector” lists had become notorious in Germany and the subject of considerable grief for Merkel because her foreign intelligence agency, the BND, may have helped the NSA to spy on German firms as a result of them. The selector lists, which were fed into the BND’s monitoring systems on behalf of the NSA, are reported to have included both German and European targets that were spied on by the Americans.

    The letter put the German government in a very delicate position. The expectation had been that the US government would flat out refuse to allow officials in Berlin to present the lists to members of the federal parliament, which is currently investigating NSA spying in Germany, including the eavesdropping of Merkel’s own mobile phone. But that wasn’t the case. Instead, the Americans delivered a more differentiated letter, making it all the more interesting.

    Canned Answers

    Nevertheless, the German government remained silent about the letter’s existence. It disposed of all queries by saying that talks with the US on how to deal with the lists were still ongoing. The government kept giving the same reply whenever journalists from SPIEGEL or other media asked if it had received an answer from the Americans.

    On May 11, for example, one day after Chancellery officials received the letter, Merkel’s spokesman Steffen Seibert responded to a query by saying: “The heads of the Parliamentary Control Panel (responsible for parliamentary oversight of Germany’s intelligence agencies) and the NSA investigative committee are all being informed about all relevant things in the context of this consultation process.” Is it not relevant when the US government provides its first official response to the Germans’ request to present the lists to parliament?

    Two days later, on May 13, Seibert was asked explicitly by a reporter whether there had been any new developments on the NSA issue. “I have nothing new to report,” the government spokesman answered. At the very least, his reply was a deliberate deception of the public by the government. The letter, after all, didn’t come from just anyone — it came from US President Barack Obama’s White House chief of staff, Denis McDonough. A letter from such a high-ranking official is most certainly a new development. When questioned by SPIEGEL on the matter, the German government responded that “it would not publicly comment on confidential communications with foreign parties.”

    Several sources familiar with the contents of the letter claim that in it, Obama’s people express their great respect for the parliamentary oversight of intelligence services and also accept that the committee will learn more about the NSA target list. At the same time, the letter also includes the decisive requirement: that the German government had to make sure no information contained in the target lists went public.

    Keeping the Public in the Dark

    The demand created a dilemma for the government. It meant, on the one Hand, that Merkel’s Chancellery could no longer hide behind the Americans as an excuse to withhold the information from parliament. On the other hand, the Chancellery didn’t want to take the risk of sharing the lists with members of the Bundestag because doing so, they worried, would create the risk that someone might then leak them to the media.

    Merkel and her people instead deliberately kept German citizens and members of parliament in the dark about the Americans’ position. Almost two weeks after receipt of the letter from Washington, Merkel’s chief of staff, Chancellery Minister Peter Altmaier, informed the heads of the NSA investigative committee in a highly confidential meeting of an answer by the Americans, but he implied it had been vague, and there was no mention of any willingness on the part of the US government to allow the German parliament to clarify the issue. Instead, Altmaier argued that Washington had listed a number of legal concerns. He said it was unlikely further discussions would lead to any green light.

    When the German weekly Die Zeit reported 10 days ago that the Americans had given their okay for the release of the lists, Altmaier responded: “We could have spared ourselves a difficult debate if permission to pass (the lists) on had actually been given by the US.” Altmaier clearly attempted to skirt the question of whether the US had made any statements on the issue.

    Officials in the Chancellery are now doing their best to portray the McDonough letter as a kind of kick-off in German-American consultations on how to deal with the selector lists. After receiving the letter, Chancellery Minister Altmaier had a number of exchanges with his US counterpart by phone and email. In addition, Klaus-Dieter Fritsche, the Chancellery’s intelligence coordinator, also spoke several times with the Americans.

    Berlin’s approach to the negotiations says quite a bit about the outcome one should expect. Officially, the German government is asking for permission to release the selector lists without the application of any restrictions by the US government. It had to have been clear to everyone involved that a demand like that would be unrealistic, but in this instance, the government didn’t want to risk making any mistakes. Within the Chancellery, officials then agreed that any time they were approached with questions, they would always answer that the consultations were still in progress — even if a decision had already been made.

    Pushback from the Opposition

    “The Federal Chancellery is doing exactly the opposite of what Merkel promised,” criticizes Konstantin von Notz, the Green Party’s representative on the NSA investigative committee. “Instead of clearing things up, things are being concealed behind the scenes, also using improper means.”

    As the course of the NSA scandal showed, Merkel and her people already have practice when it comes to cover-up attempts. During her election campaign in 2013, Merkel created the impression for months that there was a chance Germany might be able to reach a no-spy agreement with the US. Throughout, the White House signaled behind the scenes that it would never agree to one, but the German government told the public nothing about these discussions.

    Now, a special ombudsman is supposed to steer the government out of the difficult situation in which it finds itself. It’s an idea that originated with Altmaier. Rather than providing the selector lists to the NSA investigative committee in parliament, they will instead be viewed by Kurt Graulich, a former justice with the Federal Administrative Court. Altmaier’s hope is that this path will prevent details from being leaked to the press.

    The opposition parties in parliament are against the idea. And why shouldn’t they be? In recent years, the Chancellery has done everything in its power to downplay spying by US intelligence services on Germany. Altmaier’s predecessor, Ronald Pofalla, even went so far in August 2013 as to say that the NSA scandal had been “cleared up.” The revelation, arguably the biggest, that Merkel’s own mobile phone had been tapped by the NSA followed two months later. Now the Green and Left parties want to prevent the government from choosing its own inspector. They are considering a legal challenge at the Federal Constitutional Court to stop Merkel’s government.

    08/21/2015 07:44 PM
    By Matthias Gebauer, René Pfister and Holger Stark

    Find this story at 21 August 2015

    © SPIEGEL ONLINE 2015

    An American Tip to German Spies Points to a More Complex Relationship

    BERLIN — In the summer of 2011, American intelligence agencies spied on a senior German official who they concluded had been the likely source of classified information being leaked to the news media.

    The Obama administration authorized the top American spy in Germany to reveal to the German government the identity of the official, according to German officials and news media reports. The decision was made despite the risk of exposing that the United States was monitoring senior national security aides to Chancellor Angela Merkel.

    The tip-off appears to have led to a senior German intelligence official being barred from access to sensitive material. But it also raises suspicions that Ms. Merkel’s government had strong indications of the extent of American surveillance at least two years before the disclosures by Edward J. Snowden, which included the number of a cellphone used by the chancellor.

    The decision by the United States to risk disclosing a surveillance operation against a close ally indicates the high level of concern over the perceived security breach. It is unclear, however, what that information might have been or if it involved intelligence provided to Germany by the United States.

    The German newsmagazine Der Spiegel reported Friday that it believed the American effort to expose the German intelligence official arose from conversations by its own journalists. It filed a complaint with the federal prosecutor in Germany over espionage activity and a violation of Germany’s data protection laws. The prosecutor’s office declined to comment, other than to confirm that the filing had been received.

    In Washington, a spokesman for the National Security Council, Ned Price, declined on Friday to comment on the reported surveillance other than to indicate that the government does not spy on foreign journalists. “The United States is not spying on ordinary people who don’t threaten our national security,” Mr. Price said.

    The disclosure is the latest intelligence revelation to shake the alliance, even though it is unclear that the National Security Agency actively listened to Ms. Merkel’s calls. Among other actions that widened the rift, the Germans last summer expelled the then-C.I.A. chief. And this week material uncovered by the antisecrecy group WikiLeaks suggested that the Americans had been spying on their German allies back to the 1990s.

    The first hints emerged in the German media this year. The Bild am Sonntag newspaper reported that Hans Josef Vorbeck, a deputy director of the chancellery’s intelligence division, had been “put out in the cold” in 2011 after the then-C.I.A. station chief in Berlin gave information to Mr. Vorbeck’s boss, Günter Heiss. Der Spiegel said Mr. Heiss was specifically told of contacts with its journalists.

    Mr. Heiss, a quiet but powerful figure in German intelligence activities, was questioned for nearly six hours at an open hearing of a German parliamentary committee on Thursday. Mr. Heiss was particularly reticent when asked about Mr. Vorbeck. He repeatedly declined to answer questions about him, challenging the mandate of the committee to pose such queries, and arguing that he was not allowed to discuss a third party in public.

    Konstantin von Notz, a lawmaker for the opposition Green Party, which has been vocal in its criticism of Ms. Merkel and the German handling of alleged American espionage, accused Mr. Heiss of hiding behind a “cascade” of excuses.

    Eventually, Hans-Christian Ströbele, a longtime lawmaker for the Greens, asked Mr. Heiss whether he ever had a “concrete suspicion” that Mr. Vorbeck was leaking classified information. Mr. Heiss said there was no “concrete suspicion” that would have led to “concrete action.” He indicated the matter had been discussed in the chancellery, but declined to give specifics.

    But when asked whether Mr. Vorbeck had been the target of spying, Mr. Heiss declared: “No. That much I can say.”

    In a report in the edition it published on Saturday, Der Spiegel said Mr. Heiss had learned of the suspicions against Mr. Vorbeck in the summer of 2011, when invited by the C.I.A. station chief to take a walk.

    Appearing before the committee last month, Guido Müller, a senior intelligence official, at first said he could not recall Mr. Vorbeck’s transfer to a lower-level job. Mr. Müller then said he could remember it only if testifying behind closed doors.

    When he appeared before the committee, two days shy of his 64th birthday, Mr. Vorbeck himself was cagey. When Mr. von Notz raised the Bild am Sonntag reports and asked for more detail, the demoted intelligence officer replied that he “did not know much more than what has been in the papers,” according to a transcript on a live-blog at netzpolitik.org, a website that tracks intelligence matters.

    André Hahn, a lawmaker for the opposition Left party, asked Mr. Vorbeck whether he had a good relationship with Mr. Heiss — “at first,” Mr. Vorbeck answered — and whether he had ever been charged with betraying secrets. “Not then and not now,” Mr. Vorbeck replied, according to the netzpolitik blog.

    Mr. Vorbeck is suing the government for material damages he said he suffered as a result of being transferred to a senior archival post concerning the history of German intelligence. His lawyer declined to return a call seeking comment or access to his client.

    The dimensions of German anger over American espionage have been evidenced in public opinion polls and in protests against a possible trans-Atlantic trade pact. German officials have talked about creating an internal Internet so that communications among Germans do not have to pass outside the country.

    What makes these disclosures different is that they suggest that German publications have been either direct or indirect targets of American surveillance. “Spiegel suspects spying by U.S. secret services,” the online edition of the respected weekly Die Zeit reported Friday.

    The latest disclosures by WikiLeaks — a summary of an October 2011 conversation Ms. Merkel had with an adviser about the debt crisis in Greece, a document from her senior adviser on European affairs, plus a list of 69 telephone numbers of important ministries and senior officials that appeared to date back to the 1990s — had already prompted Ms. Merkel’s chief of staff on Thursday to invite the United States ambassador, John B. Emerson, to explain.

    A government statement following that meeting did not confirm the material, but made plain that violations of German laws would be prosecuted. The government defended its heightened counterintelligence operations, hinting at the depth of anger with the United States.

    Steffen Seibert, the German government spokesman, referred inquiries on Friday to another government spokesman who said he could not be identified by name. He reiterated that the government did not comment on personnel moves, and that it reported on intelligence services only to the relevant supervisory committee in Parliament.

    The spokesman added in an email that Mr. Heiss had testified on Thursday that there was no reason to take disciplinary or other action regarding Mr. Vorbeck.

    Alison Smale and Melissa Eddy reported from Berlin, David E. Sanger from Vienna and Eric Schmitt from Washington.

    By ALISON SMALE, MELISSA EDDY, DAVID E. SANGER and ERIC SCHMITTJULY 3, 2015

    Find this story at 3 July 2015

    © 2015 The New York Times Company

    Germany trades citizens’ metadata for NSA’s top spy software

    Spies keen to use XKeyscore, less keen to tell German government or citizens.

    In order to obtain a copy of the NSA’s main XKeyscore software, whose existence was first revealed by Edward Snowden in 2013, Germany’s domestic intelligence agency agreed to hand over metadata of German citizens it spies on. According to documents seen by the German newspaper Die Zeit, after 18 months of negotiations, the US and Germany signed an agreement in April 2013 that would allow the Federal Office for the Protection of the Constitution (Bundesamtes für Verfassungsschutz—BfV) to obtain a copy of the NSA’s most important program and to adopt it for the analysis of data gathered in Germany.

    This was a lower level of access compared to the non-US “Five Eyes” nations—the UK, Australia, Canada, and New Zealand—which had direct access to the main XKeyscore system. In return for the software, the BfV would “to the maximum extent possible share all data relevant to NSA’s mission.” Interestingly, there is no indication in the Die Zeit story that the latest leak comes from Snowden, which suggests that someone else has made the BfV’s “internal documents” available.

    Unlike Germany’s foreign intelligence service, the Bundesnachrichtendienst (BND), the domestic-oriented BfV does not employ bulk surveillance of the kind also deployed on a vast scale by the NSA and GCHQ. Instead, it is only allowed to monitor individual suspects in Germany and, even to do that, must obtain the approval of a special parliamentary commission. Because of this targeted approach, BfV surveillance is mainly intended to gather the content of specific conversations, whether in the form of e-mails, telephone exchanges, or even faxes, if anyone still uses them. Inevitably, though, metadata is also gathered, but as Die Zeit explains, “whether the collection of this [meta]data is consistent with the restrictions outlined in Germany’s surveillance laws is a question that divides legal experts.”

    The BfV had no problems convincing itself that it was consistent with Germany’s laws to collect metadata, but rarely bothered since—remarkably—all analysis was done by hand before 2013, even though metadata by its very nature lends itself to large-scale automated processing. This explains the eagerness of the BfV to obtain the NSA’s XKeyscore software after German agents had seen its powerful metadata analysis capabilities in demonstrations.

    It may also explain the massive expansion of the BfV that the leaked document published by Netzpolitik had revealed earlier this year. As Die Zeit notes, the classified budget plans “included the information that the BfV intended to create 75 new positions for the ‘mass data analysis of Internet content.’ Seventy-five new positions is a significant amount for any government agency.”

    FURTHER READING

    GERMANY’S TOP PROSECUTOR FIRED OVER NETZPOLITIK “TREASON” PROBE
    Heads begin to roll, but the investigation has not yet been dropped.
    The BfV may have been keen to deploy XKeyscore widely, but it wasn’t so keen to inform the German authorities about the deal with the NSA. Peter Schaar, who was data protection commissioner at the time, told Die Zeit: “I knew nothing about such an exchange deal [of German metadata for US software].” He says that he only discovered that the BfV was using XKeyscore when he asked the surveillance service explicitly after reading about the program in Snowden’s 2013 revelations. The same is true for another key oversight body: “The Parliamentary Control Panel learned that the BfV had received XKeyscore software and had begun using it. But even this very general briefing was only made after the panel had explicitly asked following the Snowden revelations,” according to Die Zeit.

    This post originated on Ars Technica UK
    by Glyn Moody (UK) – Aug 27, 2015 5:32pm CEST

    Find this story at 27 August 2015

    © 2015 Condé Nast

    New WikiLeaks Revelations: NSA Targeted Phones of All of German Chancellor Angela Merkel’s Top Aides

    BERLIN — WikiLeaks on Wednesday published a new list of German phone numbers it claims showed the U.S. National Security Agency targeted phones belonging to Chancellor Angela Merkel’s close aides and chancellery offices for surveillance.

    Wednesday’s publication came a week after WikiLeaks released a list of numbers it said showed the NSA targeted officials at various other German ministries and elsewhere. That rekindled concerns over U.S. surveillance in Germany after reports two years ago that Merkel’s own cellphone was targeted.

    Merkel’s chief of staff last week asked the U.S. ambassador to a meeting and told him that German law must be followed.

    There was no immediate comment from the German government on the latest publication.

    The list includes a cellphone number attributed to Ronald Pofalla, Merkel’s chief of staff from 2009-13; a landline number that appears to belong to the leader of Merkel’s parliamentary caucus; various other connections at Merkel’s office; and a cellphone number for the chancellor that WikiLeaks says was used until 2013.

    It was unclear when exactly the partially redacted list of 56 German phone numbers dates from and it wasn’t immediately possible to confirm the accuracy of that and other documents released by WikiLeaks.

    Those documents, WikiLeaks said, are NSA reports based on interceptions — including one from 2009 that details Merkel’s views on the international financial crisis and another from 2011 summarizing advisers’ views on plans for the eurozone’s rescue fund.

    According to the secret-spilling site, the list of phone numbers was updated for more than a decade after 2002 and a “close study” of it shows it evolved from an earlier target list dating back into the 1990s.

    July 8, 2015
    Associated Press

    Find this story at 8 July 2015

    Copyright http://www.matthewaid.com/

    << oudere artikelen  nieuwere artikelen >>