• Buro Jansen & Janssen is een onderzoeksburo dat politie, justitie, inlichtingendiensten, de overheid in Nederland en Europa kritisch volgt. Een grond-rechten kollektief dat al 30 jaar publiceert over uitbreiding van repressieve wetgeving, publiek-private samenwerking, bevoegdheden, overheids-optreden en andere staatsaangelegenheden.
    Buro Jansen & Janssen Postbus 10591, 1001EN Amsterdam, 020-6123202, 06-34339533, signal +31684065516, info@burojansen.nl (pgp)
    Steun Buro Jansen & Janssen. Word donateur, NL43 ASNB 0856 9868 52 of NL56 INGB 0000 6039 04 ten name van Stichting Res Publica, Postbus 11556, 1001 GN Amsterdam.

  • Categorieën

  • Point by Point Analysis of Declassified DIA Docs re Western-Backed Syrian Insurgency

    Here, I wrote that these documents “may” say the US/West wanted/want a Salafist Principality in Eastern Syria, because the declassified docs 1) say “Salafist, Muslim Brotherhood, and AQI are the major forces driving the insurgency in Syria”; 2) in the next sentence, the doc defines the “The West, Gulf Countries, and Turkey” as the countries that “support the opposition”; 3) they later say the “opposition forces are trying to control the Eastern areas”, where Syria borders Iraq, and, specifically of this control of Eastern areas, say the “Western Countries, the Gulf States, and Turkey are supporting these efforts”. 4) In a section about “effects on Iraq” the docs say that “there is a possibility of establishing a declared or undeclared Salafist Principality in Eastern Syria…”, then say “this is exactly what the supporting powers to the opposition want, in order to isolate the Syrian regime, which is considered the depth of the Shia expansion (Iraq and Iran).”

    However, while the document begins by stating that “The West, Gulf Countries, and Turkey support the opposition”, the document, as noted, also defines other groups, which could be considered “powers”, as either components of or supporters of the opposition: Salafists, Muslim Brotherhood, and AQI. The report states: “AQI supported the opposition from the beginning…”

    While the FSA is defined as “opposition”, Salafists, Muslim Brotherhood, and AQI are initially described as “the major forces driving the insurgency”, not as “the opposition”. It could be that the document means that the FSA is “the opposition” and the West, its allies, and the Islamic groups are simply all supporting them, but with different individual goals. However, AQI is also directly described as “opposition” to Assad: “AQI declared its opposition of Assad’s government because it considered it a sectarian regime targeting Sunnis.”

    In the section that says “there is a possibility of establishing a declared or undeclared Salafist Principality in Eastern Syria…”, then that “this is exactly what the supporting powers to the opposition want”, this section of the doc defines the opposition forces controlling the Iraq/Syria border as “Syrian Free Army”, the FSA, and says the FSA will try to take “advantage of the sympathy of the Iraqi border population”.

    It then says that “If the situation [likely meaning FSA control of the border] unravels there is the possibility of establishing a declared or undeclared Salafist Principality in Eastern Syria (Hasaka and Der Zor), and this is exactly what the supporting powers to the opposition want, in order to isolate the Syrian regime, which is considered the strategic depth of the Shia expansion (Iraq and Iran).” (The US obviously opposes Iranian expansion and sides with the Sunnis, but the last part of this sentence, as it is framed in terms of Shia expansion, may suggest that here the “supporting powers to the opposition” may be referring not the sentence stating “The West, Gulf Countries, and Turkey support the opposition”, but to earlier sentences stating “AQI supported the opposition from the beginning…” and “AQI declared its opposition of Assad’s government because it considered it a sectarian regime targeting Sunnis.”

    Thus, perhaps this is simply unclear writing, or too much is censored, and what this really means is that while both AQI and “The West, Gulf Countries, and Turkey” support the “opposition” (and AQI also comprises the opposition), only the AQI part of that support for the opposition would want a “Salafist Principality” to be established. This is clearly stated regarding the effect on Iraq. However, the US/West do strongly support existing Salafist Principalities, as noted above, including the most ideologically expansionist one, Saudi Arabia. Thus, supporting a Salafist Principality, and annexation of territory (Israel, Cuba, Diego Garcia, etc.), is something the US already does currently. International relations scholar Dr. Nafeez Ahmed notes that a RAND corp report previously advised the US “to capitalise on the Shia-Sunni conflict by taking the side of the conservative Sunni regimes in a decisive fashion and working with them against all Shiite empowerment movements in the Muslim world.”)

    The doc says the above-noted “deterioration”, likely referring to the ‘unravels’ term above, “has dire consequences on the Iraq situation.” It continues that this “deterioration” would give more momentum to terrorist groups and could allow them to declare an “Islamic state”, “which will create grave danger in regards to unifying Iraq and the protection of its territory.” (A study out of British universities noted that US government/media did not report on ISIS publicly until it began to seize oil fields. Then, the study shows, the US sent drones to try to stop ISIS.)

    The last uncensored sentence of the doc says that the third consequence of the “deterioration of the situation” (’the situation’ likely meaning the FSA control of the border region) would be terrorist elements from all over the Arab world “entering into Iraqi arena.”

    The rest of the document is censored, as are some sections before this.

    Overall, what we can see in the document clearly states that a Salafist Principality is not desired by the West in terms of the Iraqi situation, but may or may not suggest that this principality is desired in terms of isolating Assad, which is a stated goal of the West and its allies (not just isolating, but removing). However, it is also a goal of AQI and its allies, which are defined both as supporting “the opposition” and having “declared its opposition of Assad’s government”. While this group and its affiliates could be viewed as a strategic asset for isolating Assad, they could also be viewed as a third party outside the wider global contest between West and East, which is opposed to either. However, a group in Syria opposed to both sides could be seen as preferable to having a group allied with the East and opposed to the West.

    International security scholar Dr. Nafeez Ahmed analyzes these documents and concludes the US practices a policy of “sponsoring Islamist terrorism for dubious geopolitical purposes.”

    “According to the newly declassified US document, the Pentagon foresaw the likely rise of the ‘Islamic State’ as a direct consequence of this strategy, and warned that it could destabilize Iraq. Despite anticipating that Western, Gulf state and Turkish support for the “Syrian opposition” — which included al-Qaeda in Iraq — could lead to the emergence of an ‘Islamic State’ in Iraq and Syria (ISIS), the document provides no indication of any decision to reverse the policy of support to the Syrian rebels. On the contrary, the emergence of an al-Qaeda affiliated “Salafist Principality” as a result is described as a strategic opportunity to isolate Assad.”

    “The secret Pentagon document thus provides extraordinary confirmation that the US-led coalition currently fighting ISIS, had three years ago welcomed the emergence of an extremist “Salafist Principality” in the region as a way to undermine Assad, and block off the strategic expansion of Iran.”

    “The establishment of such a “Salafist Principality” in eastern Syria, the DIA document asserts, is “exactly” what the “supporting powers to the [Syrian] opposition want.” Earlier on, the document repeatedly describes those “supporting powers” as “the West, Gulf countries, and Turkey.”

    Charles Shoebridge, a former British Army and Metropolitan Police counter-terrorism intelligence officer, said (noted by Ahmed) that the documents “raise vitally important questions of the West’s governments and media in their support of Syria’s rebellion.”

    “Throughout the early years of the Syria crisis, the US and UK governments, and almost universally the West’s mainstream media, promoted Syria’s rebels as moderate, liberal, secular, democratic, and therefore deserving of the West’s support. Given that these documents wholly undermine this assessment, it’s significant that the West’s media has now, despite their immense significance, almost entirely ignored them.”

    Ahmed quotes a former US Marine: ““US intelligence predicted the rise of the Islamic State in Iraq and the Levant (ISIL or ISIS), but instead of clearly delineating the group as an enemy, the report envisions the terror group as a US strategic asset.”

    Ahmed concludes:

    “The rise of a Salafist quasi-state entity that might expand into Iraq, and fracture that country, was therefore clearly foreseen by US intelligence as likely — but nevertheless strategically useful — blowback from the West’s commitment to “isolating Syria.”

    What the docs establish beyond doubt is that, in 2012, when they were written, the US saw the likelihood of a “Salafist Principality” or “Islamic State” being established, and was fully aware the insurgency in Syria was mainly driven by Islamic groups, who were fighting Assad and also supporting the FSA, which itself has been shown to have Islamic tendencies. For example, an FSA commander is on video saying he would want to implement Sharia law. But the West and its allies continued their support, as FSA members openly shared their US supplies with the ISIS-related groups, and even converted to ISIS.

    As Ahmed puts it, “the Pentagon continued to support the Islamist insurgency, even while anticipating the probability that doing so would establish an extremist Salafi stronghold in Syria and Iraq.

    This “entire covert strategy was sanctioned and supervised by the US, Britain, France, Israel and other Western powers.”

    “As Shoebridge told me, “The documents show that not only did the US government at the latest by August 2012 know the true extremist nature and likely outcome of Syria’s rebellion” — namely, the emergence of ISIS — “but that this was considered an advantage for US foreign policy. This also suggests a decision to spend years in an effort to deliberately mislead the West’s public, via a compliant media, into believing that Syria’s rebellion was overwhelmingly ‘moderate.’”

    Ahmed quotes a former MI5 officer explaining that after Libya and other such projects by the West, we see in this behavior towards Syria “part of an established pattern. And they remain indifferent to the sheer scale of human suffering that is unleashed as a result of such game-playing.”

    What we already knew before these docs is that the US and West strongly support extremist Salafist states as part of their strategy of eating away at the parts of the world not under the US thumb, the “East”: Syria, Iran, Russia, and China. The US and West themselves are built on and continue to support and commit theft and annexation of territory, and support, commit, or ignore (if they are not politically helpful) all kinds of mass killings, including by groups worse than ISIS; these have included the Khmer Rouge, the Suharto Regime, and the US itself: the establishment of the USA and the building of it into a superpower was a process that involved crimes worse than anything ISIS will ever accomplish.

    Further, ISIS, as pointed out by Kofi Annan and many others, arose as a consequence of the illegal US invasion of Iraq, motivated largely by Bush Jr.’s religious fanaticism, an invasion the international community tried and failed to prevent, which, the most recent and comprehensive report finds, has killed about 1 to 2 million or more people, another feat ISIS will never accomplish.

    While studies and many official statements make clear, and it is obvious to any minimally non-US-brainwashed individual, that the invasion was largely about oil, even if we disregard that, ignore the rest of US history, and declare the US had/has “good intentions” regarding Iraq, that puts us at the level of of Japanese fascists, who believed in their “good intentions” regarding their invasions of China and elsewhere.

    People with too much power always declare good intentions, and are often sincere, as they get god-complexes and view themselves as humanity’s benevolent saviors. But the reason war (including supporting warring proxies) is outlawed as an instrument of policy is that it has disastrous consequences, as we are seeing, even for the sincerely well-intentioned.

    5/25/15 Update

    It should be stressed that clearly admitting the West would “want” a Salafist principality in Eastern Syria is not generally the kind of statement people in governments would make of themselves, even in private, hence makes it less likely here that the West is being referred to specifically by that statement, as does the inclusion of the phrase “if the situation unravels” (meaning FSA control of the East) an Islamic state could result. However, it is noteworthy that the West and the Islamists are so easily conflated in this document (this conflation may well be intentional as a way of discussing benefits without clearly stating that they might be desired), as they are clearly delineated as both being opposed to the Assad government, and for similar reasons – opposing Iran and the Shia, backed by Russia and China, the latter part being of greater import to the West. The doc also makes very clear that the FSA was/is being supported by AQI and its Islamist affiliates, and that those Islamists were known to be “the major forces driving the insurgency”. It has long been known that FSA shares its US/Western/Gulf/Turkish supplies with and converts to Islamist groups, and AQI, the ISIS precursor, has always been known as particularly aggressive. And as Dr. Ahmed points out, the document nowhere suggests ending aid to the opposition due to its being driven by AQI and affiliates, and only frames the potential creation of the “Islamic state” as a bad thing in relation to Iraq. In relation to Syria/Assad, it is not framed as a bad thing, but as something that would be seen to “isolate” Assad, a goal shared by the West and the Islamist groups. So, these documents may well be an example of discussing a strategy while attempting to maintain some degree of “plausible deniability”.

    It must also be remembered that the US and West not only support extremist Salafi/Wahhabi/Sharia established states, but have on numerous occasions worked with, backed, aided and/or paralleled some of the goals of non-state groups such as the Mujahedin and al Qaeda (in Afghanistan – see Brzezinski, Bob Gates; Bosnia, Kosovo – on these see Fulton in scholarly journal Global Security Studies), including under Obama in relation to Libya. In US support for the Mujahedin in Afghanistan and then the Taliban, the support was not even seen as a means to an end, but a completely acceptable end in itself: the US was fine with the Taliban taking power and staying in power, as long as it cooperated with the US. That is the bottom line. As soon as it proved uncooperative, the US “discovered” the Taliban human rights violations that non-governmental US monitors had been decrying for years, while the US was supporting the Taliban (here). And, as noted, abhorrent behavior is not a deterrent to US support. The US has committed far worse crimes than ISIS and supported groups far worse than ISIS. Only those unfamiliar with history and glued to US TV can think ISIS is some new level of evil in the world, or at least one not seen for a long time. The only qualifier for US support is whether the group in question is willing to cater to US business and strategic interests.

    6/6/15 Update:

    Dr. Nafeez Ahmed, in another detailed and important report in Middle East Eye, critiqued points from my above analysis and added crucial background information (bold added by me):
    Similarly, Robert Barsocchini speculates that “supporting powers” might refer to al-Qaeda in Iraq. However, the US intelligence community does not classify AQI or any other non-state terrorist network as a “power”.
    The use of the plural, “supporting powers,” clarifies that the reference is to a group of powers supporting the rebels, not just one entity like AQI.
    Barsocchini, like Cole, also suggests that Western governments would not admit to wanting a “Salafist Principality,” even privately. This is incorrect. Declassified files since World War II prove that Western governments frequently and privately admit to cultivating Islamist extremism for geopolitical reasons.
    In summary, the Pentagon report is absolutely clear that the West, the Gulf states and Turkey were supporting the Syrian opposition to attain a common goal: the emergence of a “Salafist” political entity in eastern Syria that would help “isolate” Assad.
    – See more at: http://www.middleeasteye.net/columns/pentagon-confirms-west-gulf-states-and-turkey-created-islamic-state-608321312#sthash.fhgZ94ZJ.jjp4g9bW.dpuf Similarly, Robert Barsocchini speculates that “supporting powers” might refer to al-Qaeda in Iraq. However, the US intelligence community does not classify AQI or any other non-state terrorist network as a “power”. – See more at: http://www.middleeasteye.net/columns/pentagon-confirms-west-gulf-states-and-turkey-created-islamic-state-608321312#sthash.fhgZ94ZJ.jjp4g9bW.dpuf

    Similarly [to Prof. Juan Cole], Robert Barsocchini speculates that “supporting powers” might refer to al-Qaeda in Iraq. However, the US intelligence community does not classify AQI or any other non-state terrorist network as a “power”.

    The use of the plural, “supporting powers,” clarifies that the reference is to a group of powers supporting the rebels, not just one entity like AQI.

    Barsocchini, like Cole, also suggests that Western governments would not admit to wanting a “Salafist Principality,” even privately. This is incorrect. Declassified files since World War II prove that Western governments frequently and privately admit to cultivating Islamist extremism for geopolitical reasons.

    In summary, the Pentagon report is absolutely clear that the West, the Gulf states and Turkey were supporting the Syrian opposition to attain a common goal: the emergence of a “Salafist” political entity in eastern Syria that would help “isolate” Assad.

    Find this story at 24 May 2015

    Copyright http://www.empireslayer.org/

    DIA Docs: West Wants a “Salafist Principality in Eastern Syria”?

    Newly-declassified US Defense Intelligence Agency (DIA) documents from 2012:

    In Syria:

    THE SALAFIST [sic], THE MUSLIM BROTHERHOOD, AND AQI ARE THE MAJOR FORCES DRIVING THE INSURGENCY IN SYRIA.

    AQI [Al Qaeda in Iraq, which became ISIS: “ISIS, once called AQI”] SUPPORTED THE SYRIAN OPPOSITION FROM THE BEGINNING, BOTH IDEOLOGICALLY AND THROUGH THE MEDIA…

    …OPPOSITION FORCES ARE TRYING TO CONTROL THE EASTERN AREAS (HASAKA AND DER ZOR), ADJACENT TO THE WESTERN IRAQI PROVINCES (MOSUL AND ANBAR), IN ADDITION TO NEIGHBORING TURKISH BORDERS. WESTERN COUNTRIES, THE GULF STATES AND TURKEY ARE SUPPORTING THESE EFFORTS.

    IF THE SITUATION UNRAVELS THERE IS THE POSSIBILITY OF ESTABLISHING A DECLARED OR UNDECLARED SALAFIST PRINCIPALITY IN EASTERN SYRIA (HASAKA AND DER ZOR), AND THIS IS EXACTLY WHAT THE SUPPORTING POWERS TO THE OPPOSITION WANT, IN ORDER TO ISOLATE THE SYRIAN REGIME…

    Now for some definitions:

    Salafi Movement:

    The Salafist movement, also known as the Salafi movement, is a movement within Sunni Islam that references the doctrine known as Salafism.

    The Salafi movement is often described as being synonymous with Wahhabism, but Salafists consider the term “Wahhabi” derogatory.[1] At other times, Salafism has been described as a hybrid of Wahhabism and other post-1960s movements.[2] Salafism has become associated with literalist, strict and puritanical approaches to Islam – and, particularly in the West, with the Salafi Jihadis who espouse offensive jihad against those they deem to be enemies of Islam as a legitimate expression of Islam.

    In recent years, Salafi methodology has come to be associated with the jihad of extremist groups that advocate the killing of innocent civilians [though not all Salafists can be stereotyped under this umbrella].

    Principality:

    A principality (or princedom) can either be a monarchical feudatory or a sovereign state, ruled or reigned over by a monarch with the title of prince or by a monarch with another title within the generic use of the term prince.

    Thus, what the documents say the Western powers and their collaborators want, a “Salafist Principality” in Easter Syria, is an Islamic monarchical state. It should be no surprise that the US/West want this, as they are allied with so many Islamic dictatorships (ie the Gulf States and Turkey, as noted above).

    The strictest sect of Salafism:

    Wahhabism (Saudi Arabia)

    Wahhabism is a more strict, Saudi form of Salafism, according to Mark Durie, who states Saudi leaders “are active and diligent” using their considerable financial resources “in funding and promoting Salafism all around the world.” Ahmad Moussalli tends to agree with the view that Wahhabism is a subset of Salafism, saying “As a rule, all Wahhabis are salafists, but not all salafists are Wahhabis”.

    Saudi Government is funding to increase the Salafi Islam throughout the world. Estimates of Saudi spending on religious causes abroad include “upward of $100 billion”, between $2 and 3 billion per year since 1975 (compared to the annual Soviet propaganda budget of $1 billion/year [and US government/corporate propaganda budgets of many billions per year]),[92] and “at least $87 billion” from 1987–2007.

    Its largesse funded an estimated “90% of the expenses of the entire faith“, throughout the Muslim World…

    “Books, scholarships, fellowships, mosques” (for example, “more than 1,500 mosques were built from Saudi public funds over the last 50 years”) were paid for.[96] It rewarded journalists and academics, who followed it and built satellite campuses around Egypt for Al Azhar, the oldest and most influential Islamic university.[97] Yahya Birt counts spending on “1,500 mosques, 210 Islamic centres and dozens of Muslim academies and schools”.

    This financial aid has done much to overwhelm less strict local interpretations of Islam, according to observers like Dawood al-Shirian and Lee Kuan Yew, and has caused the Saudi interpretation (sometimes called “petro-Islam”) to be perceived as the correct interpretation – or the “gold standard” of Islam – in many Muslims’ minds.

    While the Western powers and their collaborators may want a Salafist Principality in Eastern Syria, they, mainly the US, are openly supporting the most extreme Salafist, missionary state in the world: Saudi Arabia.

    The US has been supporting Saudi Arabia since oil was discovered there around the 1930s.

    The US is the world’s biggest arms trafficker. The biggest arms sale of the world’s biggest arms trafficker was to the Saudi dictatorship, approved by Obama in 2010:

    The Guardian:

    Barack Obama to authorise record $60bn Saudi arms sale

    Biggest arms deal in US history…

    The US is the world’s largest arms supplier…

    Amnesty reported that, contrary to US gov and media propaganda, the Saudi regime got worse under the last dictator (who recently died), and is getting even worse now under new US-backed dictator Abdulaziz, with Saudi Arabia committing dozens and dozens of beheading/crucifixions, taking the lead in confirmed state executions worldwide.

    2009 US documents leaked by Wikileaks revealed Hillary Clinton stating that Saudi Arabia is the world’s biggest source of funding for Sunni terrorist groups.

    Abdulaziz himself, the top of the Saudi dictatorship, is said by al Qaeda to be one of their sources of funding and support.

    Unlike Iran, which has parliamentary representatives and voting, Saudi Arabia is a straight despotism which maintains itself through terror, such as by lashing innocent civilians in public.

    Unlike Iran, Saudi Arabia not only does not renounce nuclear weapons (US intelligence does not even say Iran is pursuing them; in fact far from it), but Saudi officials promise never to renounce nuclear weapons, or even negotiate about nuclear weapons, which Iran has agreed to do numerous times, with the US always cancelling the negotiations, as Obama has done before, and did again this week: “US Kills Nuclear Free Mid-East Conference“.

    Indeed, Saudi Arabia just announced its intentions to go nuclear, a prospect that has long been known to all.

    None of this prevents the US from making its biggest ever lethal arms sale to the dictatorship, or selling them almost a billion dollars worth of banned cluster bombs in 2013, which HRW reports are now being used in the US-coordinated/assisted Saudi aggressive war against Yemen, from which the US refuses to rescue its own civilian nationals, unlike eight other countries including Russia, China, and India, which have performed rescue missions.

    To be fair, the US has performed rescue missions in Yemen… for Saudi bombers.

    5/24/15 Update:

    For those interested, here is a four page, point by point analysis of the declassified DIA docs.

    @_DirtyTruths

    Author’s research focuses on global force dynamics. He also writes professionally for the film industry. His articles have been noted by professors, scholars, student-groups, and other independent researchers.

    Posted on May 23, 2015 by Robert Barsocchini

    Find this story at 23 May 2015

    © 2007 – 2015 Washington’s Blog

    2012 Defense Intelligence Agency document: West will facilitate rise of Islamic State “in order to isolate the Syrian regime”

    Monday, May 18, the conservative government watchdog group Judicial Watch published a selection of formerly classified documents obtained from the U.S. Department of Defense and State Department through a federal lawsuit.
    While initial mainstream media reporting is focused on the White House’s handling of the Benghazi consulate attack, a much “bigger picture” admission and confirmation is contained in one of the Defense Intelligence Agency documents circulated in 2012: that an ‘Islamic State’ is desired in Eastern Syria to effect the West’s policies in the region.
    Astoundingly, the newly declassified report states that for “THE WEST, GULF COUNTRIES, AND TURKEY [WHO] SUPPORT THE [SYRIAN] OPPOSITION… THERE IS THE POSSIBILITY OF ESTABLISHING A DECLARED OR UNDECLARED SALAFIST PRINCIPALITY IN EASTERN SYRIA (HASAKA AND DER ZOR), AND THIS IS EXACTLY WHAT THE SUPPORTING POWERS TO THE OPPOSITION WANT, IN ORDER TO ISOLATE THE SYRIAN REGIME…”.
    The DIA report, formerly classified “SECRET//NOFORN” and dated August 12, 2012, was circulated widely among various government agencies, including CENTCOM, the CIA, FBI, DHS, NGA, State Dept., and many others.
    The document shows that as early as 2012, U.S. intelligence predicted the rise of the Islamic State in Iraq and the Levant (ISIL or ISIS), but instead of clearly delineating the group as an enemy, the report envisions the terror group as a U.S. strategic asset.
    While a number of analysts and journalists have documented long ago the role of western intelligence agencies in the formation and training of the armed opposition in Syria, this is the highest level internal U.S. intelligence confirmation of the theory that western governments fundamentally see ISIS as their own tool for regime change in Syria. The document matter-of-factly states just that scenario.
    Forensic evidence, video evidence, as well as recent admissions of high-level officials involved (see former Ambassador to Syria Robert Ford’s admissions here and here), have since proven the State Department and CIA’s material support of ISIS terrorists on the Syrian battlefield going back to at least 2012 and 2013 (for a clear example of “forensic evidence”: see UK-based Conflict Armament Research’s report which traced the origins of Croatian anti-tank rockets recovered from ISIS fighters back to a Saudi/CIA joint program via identifiable serial numbers).
    The newly released DIA report makes the following summary points concerning “ISI” (in 2012 “Islamic State in Iraq,”) and the soon to emerge ISIS:
    Al-Qaeda drives the opposition in Syria
    The West identifies with the opposition
    The establishment of a nascent Islamic State became a reality only with the rise of the Syrian insurgency (there is no mention of U.S. troop withdrawal from Iraq as a catalyst for Islamic State’s rise, which is the contention of innumerable politicians and pundits; see section 4.D. below)
    The establishment of a “Salafist Principality” in Eastern Syria is “exactly” what the external powers supporting the opposition want (identified as “the West, Gulf Countries, and Turkey”) in order to weaken the Assad government
    “Safe havens” are suggested in areas conquered by Islamic insurgents along the lines of the Libyan model (which translates to so-called no-fly zones as a first act of ‘humanitarian war’; see 7.B.)
    Iraq is identified with “Shia expansion” (8.C)
    A Sunni “Islamic State” could be devastating to “unifying Iraq” and could lead to “the renewing facilitation of terrorist elements from all over the Arab world entering into Iraqi Arena.” (see last non-redacted line in full PDF view.)
    _____________________________________________
    The following is excerpted from the seven page DIA declassified report (bold-facing is my own):
    R 050839Z AUG 12

    THE GENERAL SITUATION:
    A. INTERNALLY, EVENTS ARE TAKING A CLEAR SECTARIAN DIRECTION.
    B. THE SALAFIST [sic], THE MUSLIM BROTHERHOOD, AND AQI ARE THE MAJOR FORCES DRIVING THE INSURGENCY IN SYRIA.
    C. THE WEST, GULF COUNTRIES, AND TURKEY SUPPORT THE OPPOSITION; WHILE RUSSIA, CHINA AND IRAN SUPPORT THE REGIME.

    3. (C) Al QAEDA – IRAQ (AQI):… B. AQI SUPPORTED THE SYRIAN OPPOSITION FROM THE BEGINNING, BOTH IDEOLOGICALLY AND THROUGH THE MEDIA…

    4.D. THERE WAS A REGRESSION OF AQI IN THE WESTERN PROVINCES OF IRAQ DURING THE YEARS OF 2009 AND 2010; HOWEVER, AFTER THE RISE OF THE INSURGENCY IN SYRIA, THE RELIGIOUS AND TRIBAL POWERS IN THE REGIONS BEGAN TO SYMPATHIZE WITH THE SECTARIAN UPRISING. THIS (SYMPATHY) APPEARED IN FRIDAY PRAYER SERMONS, WHICH CALLED FOR VOLUNTEERS TO SUPPORT THE SUNNI’S [sic] IN SYRIA.

    7. (C) THE FUTURE ASSUMPTIONS OF THE CRISIS:
    A. THE REGIME WILL SURVIVE AND HAVE CONTROL OVER SYRIAN TERRITORY.
    B. DEVELOPMENT OF THE CURRENT EVENTS INTO PROXY WAR: …OPPOSITION FORCES ARE TRYING TO CONTROL THE EASTERN AREAS (HASAKA AND DER ZOR), ADJACENT TO THE WESTERN IRAQI PROVINCES (MOSUL AND ANBAR), IN ADDITION TO NEIGHBORING TURKISH BORDERS. WESTERN COUNTRIES, THE GULF STATES AND TURKEY ARE SUPPORTING THESE EFFORTS. THIS HYPOTHESIS IS MOST LIKELY IN ACCORDANCE WITH THE DATA FROM RECENT EVENTS, WHICH WILL HELP PREPARE SAFE HAVENS UNDER INTERNATIONAL SHELTERING, SIMILAR TO WHAT TRANSPIRED IN LIBYA WHEN BENGHAZI WAS CHOSEN AS THE COMMAND CENTER OF THE TEMPORARY GOVERNMENT.

    8.C. IF THE SITUATION UNRAVELS THERE IS THE POSSIBILITY OF ESTABLISHING A DECLARED OR UNDECLARED SALAFIST PRINCIPALITY IN EASTERN SYRIA (HASAKA AND DER ZOR), AND THIS IS EXACTLY WHAT THE SUPPORTING POWERS TO THE OPPOSITION WANT, IN ORDER TO ISOLATE THE SYRIAN REGIME, WHICH IS CONSIDERED THE STRATEGIC DEPTH OF THE SHIA EXPANSION (IRAQ AND IRAN)
    8.D.1. …ISI COULD ALSO DECLARE AN ISLAMIC STATE THROUGH ITS UNION WITH OTHER TERRORIST ORGANIZATIONS IN IRAQ AND SYRIA, WHICH WILL CREATE GRAVE DANGER IN REGARDS TO UNIFYING IRAQ AND THE PROTECTION OF ITS TERRITORY.

    May 19, 2015 by Brad Hoff 43 Comments

    Find this story at 19 May 2015

    Copyright http://levantreport.com/

    ISRAELI SPECIAL FORCES ASSASSINATED SENIOR SYRIAN OFFICIAL

    On Aug. 1, 2008, a small team of Israeli commandos entered the waters near Tartus, Syria, and shot and killed a Syrian general as he was holding a dinner party at his seaside weekend home. Muhammad Suleiman, a top aide to the Syrian president, was shot in the head and neck, and the Israeli military team escaped by sea.

    While Israel has never spoken about its involvement, secret U.S. intelligence files confirm that Israeli special operations forces assassinated the general while he vacationed at his luxury villa on the Syrian coast.

    The internal National Security Agency document, provided by former NSA contractor Edward Snowden, is the first official confirmation that the assassination of Suleiman was an Israeli military operation, and ends speculation that an internal dispute within the Syrian government led to his death.

    A top-secret entry in the NSA’s internal version of Wikipedia, called Intellipedia, described the assassination by “Israeli naval commandos” near the port town of Tartus as the “first known instance of Israel targeting a legitimate government official.” The details of the assassination were included in a “Manhunting Timeline” within the NSA’s intelligence repository.

    According to three former U.S. intelligence officers with extensive experience in the Middle East, the document’s classification markings indicate that the NSA learned of the assassination through surveillance. The officials asked that they not be identified, because they were discussing classified information.

    The information in the document is labeled “SI,” which means that the intelligence was collected by monitoring communications signals. “We’ve had access to Israeli military communications for some time,” said one of the former U.S. intelligence officers.

    The former officer said knowledge within the NSA about surveillance of Israeli military units is especially sensitive because the NSA has Israeli intelligence officers working jointly with its officers at NSA headquarters in Fort Meade, Maryland.

    Brig. Gen. Suleiman was a top military and intelligence adviser to Syrian leader Bashar al-Assad, and was suspected of being behind the Syrian government’s efforts to facilitate Iran’s provision of arms and military training to Hezbollah in neighboring Lebanon. Suleiman was also reported to have been in charge of the security and construction of Syria’s Al Kibar nuclear facility, which Israel destroyed in a 2007 air attack. The NSA document described part of Suleiman’s responsibilities as “sensitive military issues.”

    Israel’s involvement in Suleiman’s assassination raises questions about both the purpose of the killing, as well as whether Israel violated international law in conducting the operation.

    “The Israelis may have had many good reasons to kill [Suleiman],” said Mary Ellen O’Connell, a professor of international law at Notre Dame. “But under international law it’s absolutely clear that in Syria in 2008, they had no rights under the laws of war because at the time there was no armed conflict. They had no right to kill General Suleiman.”

    The Assad government withheld news of the assassination for four days before announcing Suleiman’s death. Israel has neither confirmed nor denied its involvement.

    According to a classified State Department cable published online by WikiLeaks, the Syrian government’s investigation into the killing turned up $80 million in cash in Suleiman’s home. “[Assad] was said to be devastated by the discovery, and, fearing [Suleiman] had betrayed him, redirected the investigation from solving his murder to finding out how the general had acquired so much money,” the cable noted.

    Last year, Hezbollah leader Hassan Nasrallah told journalists that the Israeli government killed Suleiman, and that the assassination was “linked” to Suleiman’s role in the July 2006 war between Israel and Hezbollah.

    “For them it’s not only payback, but mitigates future operations,” said one of the retired intelligence officers, who has worked with the Israelis but does not have direct knowledge of the Suleiman assassination. “They will take a target of opportunity if it presents itself.”

    The Israeli assassination of Suleiman came less than six months after a joint Mossad-CIA team assassinated a top Hezbollah operative in the heart of Damascus, according to several current and former U.S. military and intelligence officials. U.S. and Israeli involvement in that attack, which targeted Hezbollah operative Imad Mughniyeh, was first reported in detail by the Washington Post. The CIA had long sought Mughniyeh for his role in several terrorist attacks against Americans, including the 1983 Marine barracks bombing in Beirut, Lebanon, which left 241 American service members dead.

    The NSA declined to comment. A spokesperson for the Israeli Prime Minister did not respond to several requests for comment.

    Matthew Cole
    July 15 2015, 1:23 p.m.

    Find this story at 15 July 2015

    Copyright https://firstlook.org/theintercept/

    US said preparing to release Israeli spy Jonathan Pollard

    Officials say chances of life-termer going free ‘better than ever’ as US seeks to sooth Israel over Iran; Justice Department denies report

    The Obama administration is preparing to release Jonathan Pollard, who was convicted in 1987 of spying for Israel, in hopes of alleviating tensions over the Iranian nuclear deal, the Wall Street Journal reported Friday.

    According to US officials cited in the report, some are pushing for Pollard’s release in a matter of weeks, while others say it could take months. Still other US officials mentioned in the report denied any link between the Iranian nuclear deal and Pollard’s potential release.

    ABC News’ managing editor tweeted Friday night that US officials had confirmed to ABC that the former Navy analyst was set to be released in November, when he is eligible for parole.

    But the Justice Department said it expected Pollard to serve out his entire sentence.

    “The Department of Justice has always and continues to maintain that Jonathan Pollard should serve his full sentence for the serious crimes he committed, which in this case is a 30-year sentence as mandated by statute,” said spokesman Marc Raimondi.

    “Mr. Pollard’s status will be determined by the United States Parole Commission according to standard procedures,” added National Security Council spokesman Alistair Baskey. “There is absolutely zero linkage between Mr. Pollard’s status and foreign policy considerations.”

    Israeli government officials — including Prime Minister Benjamin Netanyahu himself — activists, and even members of Congress have for decades lobbied successive US administrations for Pollard’s release.

    There have been several reports in US media in recent months alleging that Pollard may be released later this year.

    Last week, one of Pollar’s attorneys, Eliot Lauer, told the Times of Israel that he has received no indication of this.

    “We have not received any word, and I would expect that either I or my client would be the ones who would be notified,” he said. Lauer is a member of Pollard’s pro bono legal team, and has represented him for over two decades.

    The 61-year-old Pollard is serving a life sentence in a US federal prison for passing classified information to Israel; he was granted citizenship by Israel 20 years ago. The flurry of reports reflect a US government website that lists Pollard’s release date (under ID number 09185-016) as November 21, 2015 – a date that would coincide with the 30th anniversary of his arrest.

    Lauer noted that November 21, 2015, has been listed as a release date for Pollard for decades.

    US government site showing Jonathan Pollard’s scheduled release date
    US government site showing Jonathan Pollard’s scheduled release date

    In order for Pollard to be released, a Notice of Action must first be issued – and presumably, it is Pollard’s legal team which would receive it first. According to Lauer, no such Notice of Action has been received.

    Lauer said the authorities could issue such a notice shortly before Pollard’s release date.

    Although Pollard is serving a life sentence under a Federal law that allows the possibility of parole, he is the only American citizen who has been sentenced to life in prison for passing classified information to a US ally.

    The US has at times considered releasing Pollard, but has been met with fierce opposition by some in the CIA, the FBI and the Justice Department. This could again be the case if indeed the Obama administration is considering it, but “[Pollard’s] chances at winning freedom are better now than they have ever been,” according to the WSJ report that attributes the belief to unnamed US officials.

    There have been multiple false starts and reports over the years indicating that Pollard’s release was imminent. During his farewell visit as president of Israel to Washington DC last year, Shimon Peres pressed President Barack Obama for Pollard’s release.

    In August 2014, a request by Pollard for parole was denied, with the officials arguing that releasing Pollard would “constitute contempt for the severity of the offense and promote a lack of respect for the law.”

    AP contributed to this report.

    BY REBECCA SHIMONI STOIL AND TIMES OF ISRAEL STAFF July 24, 2015, 11:29 pm 43

    Find this story at 24 July 2015

    © 2015 THE TIMES OF ISRAEL

    Capturing Jonathan Pollard

    De Amerikaanse voormalig spion Jonathan Pollard zit een levenslange gevangenisstraf uit. Als werknemer bij de VS Marine Inlichtingendienst stal hij honderdduizenden geheime documenten en verkocht die aan Israël. De man die hem ontmaskerde, schreef er een boek over.

    Bradley Manning wordt verdacht van het lekken van geheime documenten van de Amerikaanse overheid. Deze documenten werden openbaar gemaakt voor Wikileaks. Nog voordat Manning een eerlijk proces heeft gekregen, zit hij al een ruim een jaar in eenzame opsluiting.

    De omvang en gevoeligheid van de Wikileaks-documenten vallen echter in het niet in vergelijking met het aantal geheime stukken dat Jonathan Pollard begin jaren ’80 aan de Israëliërs heeft overhandigd. Pollard werkte voor de Naval Intelligence Service. Van juni 1984 tot zijn aanhouding in november 1985 wandelde hij bijna dagelijks het gebouw van de Naval Intelligence Command uit met een tas vol top secret documenten.

    De Amerikaanse overheid schat dat hij ruim een miljoen stukken aan de Israëliërs heeft overhandigd. Een van de stukken was het tiendelige boekwerk Radio-Signal Notations (RASIN), een gedetailleerde beschrijving van het netwerk van de wereldwijde elektronische observatie door de Amerikanen.

    Pollard onderzocht

    Capturing Jonathan Pollard werd in 2006 door de Naval Institue Press gepubliceerd. Het boek is van de hand van Ronald Olive, destijds werkzaam voor de Naval Criminal Investigative Service (NCIS). Als medewerker van de NCIS kreeg Olive in 1985 de taak om te onderzoeken of Pollard geheime stukken lekte.

    Het onderzoek volgde op een tip van een medewerker van de Anti-Terrorism Alert Center (ATAC) van de NIS, de afdeling waar Pollard werkte. Deze man zag Pollard het gebouw uitlopen met een stapel papier. De stapel was verpakt in bruin inpakpapier en tape met de code TS/SCI, Top Secret/Sentive Compartmented Information. TS/SCI is een nog zwaardere kwalificatie als top secret.

    Pollard stapte met de stukken bij zijn vrouw Ann in de auto. Nog even dacht zijn collega dat Pollard naar een andere inlichtingendienst, zoals de DIA (Defense Intelligence Service) zou rijden om daar de documenten af te geven. Dit leek onwaarschijnlijk omdat Pollard eerder tegen hem had gezegd dat hij verkeerde documenten had besteld bij het ‘archief’ en dat hij deze nu moest terugbrengen en vernietigen. Pollard en Ann reden echter een geheel andere kant op.

    Olive beschrijft vervolgens de ontmaskering van Jonathan en Ann. In Pollards werkruimte wordt een camera opgehangen die registreert hoe de spion een aktetas vol TS/SCI documenten propt en het gebouw verlaat. Pollard en zijn vrouw ruiken onraad en proberen de sporen van spionage te wissen. Ann moet een koffer vol super geheime documenten, die in hun huis liggen, vernietigen. Zij raakt in paniek en de koffer belandt bij de buren.

    Gevoelige snaar

    Het boek van Ronald Olive is nog even actueel als het eerste boek dat over deze spionagezaak is verschenen in 1989, Territory of Lies: The American Who Spied on His Country for Israel and How He Was Betrayed.

    Begin dit jaar wordt een petitie, ondertekend door meer dan 10.000 Israëliërs, aan de Israëlische president Shimon Peres gezonden. Hierin roepen politici, kunstenaars en andere bekende en onbekende Israëliërs de president op om Pollard vrij te krijgen. Op 1 september 2010 berichtte de LA Times zelfs dat de vrijlating van Pollard de bevriezing van de bouw van Israëlische nederzettingen in de bezette gebieden zou verlengen.

    Pollard raakt kennelijk een gevoelige snaar, zowel in Israël als in de Verenigde Staten. Schrijver Olive op zijn beurt bevindt zich in een gezelschap van allerlei mensen die er voor ijveren om de spion zijn gehele leven achter slot en grendel te houden, hoewel levenslang in de Verenigde Staten niet echt levenslang hoeft te zijn. Bij goed gedrag kunnen gevangenen na dertig jaar vrijkomen.

    In 1987 werd Pollard veroordeeld tot levenslang na een schuldbekentenis en toezegging dat hij de Amerikaanse overheid zou helpen bij het in kaart brengen van de schade die hij door zijn spionage-activiteiten had veroorzaakt. Die schade werd door de toenmalige minister van Defensie Casper Weinberger vastgelegd in een memorandum van 46 pagina’s, welke nog steeds niet openbaar is gemaakt. Pollard’s vrouw kreeg vijf jaar gevangenisstraf voor het in bezit hebben van staatsgeheime documenten.

    Capturing Jonathan Pollard is geen spannend fictie / non-fictie boek met een twist, zoals Spywars van Bagley. Olive beschrijft droog het leven van de spion vanaf het moment dat hij bij de CIA solliciteert, tot aan de dag van zijn veroordeling. Natuurlijk is de schrijver begaan met de geheimhouding van Amerikaanse strategische informatie en verbaast het niet dat hij bij het verschijnen van het boek in 2006 een pleidooi hield om Pollard niet vrij te laten.

    Niet kieskeurig

    Hoewel de volle omvang van het lekken van Pollard niet duidelijk wordt beschreven, blijkt dat Pollard niet bepaald kieskeurig was. De Israëliërs hadden hem lijsten meegegeven van wat zij graag wilden hebben, vooral informatie over het Midden-Oosten, maar ook over de Russen en operaties van de Amerikanen in het Middellandse Zee gebied.

    Zodra Pollard echter stukken langs ziet komen die ook voor andere landen interessant zouden kunnen zijn, probeert hij ook daar te winkelen. Zo poogt hij geheime documenten aan de Chinezen, Australiërs, Pakistani en de Zuid-Afrikanen, maar ook aan buitenlandse correspondenten te slijten.

    Het gegeven dat landen elkaars strategische informatie en geheimen proberen te stelen, is niet nieuw. Het bestaan van contra-spionage afdelingen toont aan dat geheime diensten daar zelf ook rekening mee houden. De Australiërs dachten dan ook dat Pollard onderdeel uitmaakte van een CIA-operatie. Hoewel ze dat eigenlijk niet konden geloven, vermeed hun medewerker Pollard en werd de zaak niet gemeld bij Amerikaanse instanties.

    Als onderdeel van thrillers en spannende lectuur zijn de spionage praktijken van Pollard, zoals Olive die beschrijft, niet bijster interessant, want het leidt af van waar het werkelijk om draait. Daarentegen is het boek van grote waarde waar het gaat om de beschrijving van de persoon Pollard, de wijze waarop hij kon spioneren, zijn werkomgeving, de blunders die worden gemaakt – niet alleen het aannemen en overplaatsen van Pollard, maar ook de wijze waarop geheimen zo eenvoudig kunnen worden gelekt – eigenlijk de totale bureaucratie die de wereld van inlichtingendiensten in zijn greep heeft.

    Hoewel deze persoonlijke en bureaucratische gegevens niet breed worden uitgemeten – Olive is zelf een voormalig inlichtingenman – verschaft het boek een veelheid aan informatie daarover. De schrijver lijkt die persoonlijke details specifiek aan Pollard te koppelen, alsof het niet voor andere medewerkers zou gelden.

    Opschepper

    Dit gaat ook op ook voor de gemaakte fouten van de bureaucratie rond de carrière van de spion. Zo lijkt Pollard van jongs af aan een voorliefde te hebben gehad om spion te worden, of in ieder geval iets geheims te willen doen in zijn leven. Tijdens zijn studie schept hij erover op dat hij voor de Mossad zou werken en had gediend in het Israëlische leger. Zijn vader zou ook voor de CIA werkzaam zijn.

    Aan deze opschepperij verbindt Olive een psychologisch element. Het zou een soort compensatie zijn voor de slechte jeugd van Pollard die vaak zou zijn gepest. Ook zijn vrouw zou niet bij hem passen omdat die te aantrekkelijk is. Pollard moet dat compenseren door stoer te doen. Later, toen hij voor een inlichtingendienst werkte, voelde hij zich opnieuw het buitenbeentje. Zijn carrière verliep alles behalve vlekkeloos, regelmatig werd hij op een zijspoor gezet.

    Olive schetst een beeld van een verwend kind, dat niet op juiste waarde werd ingeschat en stoer wilde doen. Was Pollard echter zoveel anders dan zijn voormalige collega analisten of medewerkers van de inlichtingendienst? Werken voor een inlichtingendienst vereist een zekere mate van voyeurisme, een gespleten persoonlijkheid. Buiten je werk om kun je niet vrijelijk praten over datgene waar je mee bezig bent.

    Dat doet wat met je psyche, maar trekt ook een bepaald soort mensen aan. Het werk betreft namelijk niet het oplossen van misdrijven, maar het kijken in het hoofd van mogelijke verdachten. Het BVD-dossier van oud-provo Roel van Duin laat zien dat een dienst totaal kan ontsporen door zijn eigen manier van denken. Dat komt echter niet voort uit de dienst als abstracte bureaucratie, maar door toedoen van de mensen die er werken.

    Roekeloos

    Pollard gedroeg zich arrogant en opschepperig, misschien wel om zijn eigen onzekerheid te maskeren. Dergelijk gedrag wordt door de schrijver verbonden aan zijn spionage-activiteiten voor de Israëliërs. Pollard was echter niet getraind in het lekken van documenten en ging verre van zorgvuldig te werk. Hij deed het zo openlijk dat het verbazingwekkend is dat het zo lang duurde voordat hij tegen de lamp liep. Hij zei bijvoorbeeld tegen de Israëliërs dat zij alleen de TS/SCI documenten moesten kopiëren en dat ze de rest mochten houden.

    In de loop van de anderhalf jaar dat hij documenten naar buiten smokkelde, werd hij steeds roekelozer. Dat hij gespot werd met een pak papier onder zijn arm terwijl hij bij zijn vrouw in de auto stapte, was eerder toeval dan dat het het resultaat was van grondig speurwerk van de NCIS.

    Eenmaal binnenin het inlichtingenbedrijf zijn de mogelijkheden om te lekken onuitputtelijk. Als Pollard wel getraind was geweest en zorgvuldiger te werk was gegaan, dan had hij zijn praktijk eindeloos kunnen voorzetten. Welke andere ‘agenten’ doen dat wellicht nog steeds? Of welke andere medewerkers waren minder roekeloos en tevreden geweest met het lekken van enkele documenten?

    Die medewerkers vormen gezamenlijk het systeem van de dienst. Pollard schepte graag op, maar de schrijver van Spy Wars, Bagley, klopte zich ook graag op de borst en, hoewel in mindere mate, Ronald Olive ook. Iets dat eigenlijk vreemd is, als het aantal blunders in ogenschouw wordt genomen nadat Pollard ontdekt was. Alleen omdat de Israëliërs Pollard de toegang tot de diplomatieke vestiging ontzegden, zorgde ervoor dat hij alsnog gearresteerd en levenslang kreeg in de VS. Hij was echter bijna ontsnapt.

    Blunders

    Het is daarom niet gek dat inlichtingendiensten een gebrek aan bescheidenheid vertonen. Vele aanslagen zijn voorkomen, wordt vaak beweerd, maar helaas kunnen de diensten geen details geven. Het klinkt als Pollard, op bezoek bij Olive, die breed uitmeet dat hij die en die kent op de Zuid-Afrikaanse ambassade en of hij die moet werven als spion. Olive was werkzaam voor de NCIS. Pollard bezocht hem voordat hij werd ontmaskerd. Zijn eigen gebrek aan actie in relatie tot de twijfels over Pollard toont aan dat geen enkel bureaucratisch systeem perfect is, ook niet dat van inlichtingendiensten.

    Het is niet verbazingwekkend dat de carrière van Pollard bezaaid is met blunders. Hij werd dan wel afgewezen door de CIA, maar waagde vervolgens een gokje bij een andere dienst en had geluk. Hij werd bij de NIS aangenomen en kroop zo langzaamaan in de organisatie. De fouten die bij het aannamebeleid en bij de evaluaties van Pollard zijn gemaakt, worden door Olive gepresenteerd als op zichzelf staand, maar de hoeveelheid blunders en gebrekkige administratie lijken zo talrijk dat het geen toevalstreffers zijn.

    Bij elke promotie of overplaatsing lijkt slechts een deel van zijn persoonsdossier hem te volgen. De NIS wist vanaf het begin niet dat Pollard eerder door de CIA werd afgewezen. Als zijn toegang tot geheime documenten wordt ingetrokken, wacht Pollard net zo lang tot bepaalde medewerkers zijn overgeplaatst of vertrokken. Hij wordt dan wel afgeschilderd als een verwend kind dat met geheimen speelt, regelmatig moet Olive echter toegeven dat Pollard een briljant analist is. Pas in de laatste maanden van zijn spionage-activiteiten, lijdt zijn werk onder de operatie om zoveel mogelijk documenten naar buiten te smokkelen.

    Waarom Pollard de Amerikaanse overheid schade toebracht, wijdt Olive vooral aan zijn joodse afkomst. Niet dat de schrijver alle joodse Amerikanen verdenkt, maar een belangrijke reden voor het fanatiek lekken wordt verklaard aan de hand van Pollard’s wens om naar Israël te emigreren. Olive gaat echter voorbij aan het geld dat de spion aan zijn activiteiten verdiende. Aanvankelijk 1.500 dollar per maand, na een paar maanden 2.500 en twee volledig verzorgde reizen met zijn vrouw naar Europa en Israël en tot slot een Zwitserse bankrekening met jaarlijks een bonus van 30.000 dollar.

    Los van de Zwitserse rekening schat de Amerikaanse overheid dat Pollard rond de 50.000 dollar aan zijn spionagewerk heeft overgehouden. Eigenlijk niet eens veel in vergelijking met de één miljoen documenten die hij leverde. De onderhandelingen over het geld maken echter duidelijk dat Pollard wel degelijk geïnteresseerd was om zoveel mogelijk te verdienen. De prijs werd gedrukt omdat de Israëliërs niet erg toeschietelijk waren en Pollard ze sowieso wilde helpen.

    Afkomst

    Zijn joodse afkomst zat hem in de weg, want waarschijnlijk had hij alleen al voor het tiendelige boekwerk Radio-Signal Notations (RASIN) 50.000 dollar kunnen krijgen. Uiteindelijk blijkt Pollard een gewoon mens die de verlokking van het geld niet kon weerstaan. Andere agenten zijn hem voorgegaan en hebben zijn voorbeeld gevolgd.

    Het nadeel van zijn afkomst blijkt ook uit het feit dat hij zijn Israëlische runner een ‘cadeautje’ gaf. Aviem Sella had mee gevochten in de zesdaagse Yom Kippur oorlog en was een van de piloten die de Iraakse kernreactor in Osirak bombardeerde. Pollard gaf hem destijds satellietbeelden van die aanval. Sella wordt nog steeds gezocht voor Verenigde Staten voor spionage.

    De operatie werd door een andere veteraan, Rafi of Rafael Eitan, geleid. Onder diens leiding spoorde de Mossad Adolf Eichmann op. Eitan en Sella werden rijkelijk beloond voor hun werk met Pollard, maar moesten hun promoties inleveren omdat de Amerikanen eind jaren ’80 furieus reageerden. Na de arrestatie van Pollard beweerden de Israëliërs dat ze helemaal niet zoveel documenten hadden gekregen van de spion en de onderhandelingen over teruggave uiterst stroef waren verlopen.

    Uiteindelijk werd maar een fractie van de documenten teruggegeven aan de Amerikanen. De Israëliërs waren vooral bezig om na zijn veroordeling Pollard vrij te krijgen. Premier Nethanyahu sprak vorig jaar de Knesset toe over het lot van Pollard, terwijl de Israëlische ambassadeur in de VS hem juli 2011 bezocht in de gevangenis.

    Tot nu toe lijken de Amerikanen niet van zins om hem vrij te laten. Na de veroordeling van Pollard kwam de campagne Free Pollard op gang. Zijn vrouw verdween uit beeld. Niet alleen Israëliërs nemen deel aan de campagne, maar ook Alan Dershowitz, professor aan de Harvard Law School en andere academici. In het laatste hoofdstuk More sinned against than sinning beschrijft Olive enkele andere spionnen die documenten verkochten aan buitenlandse mogendheden.

    Capturing Jonathan Pollard was nog niet gepubliceerd toen de stroom Wikileaks-documenten op gang kwam. Die documenten laten echter zien dat een waterdicht systeem niet bestaat en dat mensen voor geld of om andere redenen geheime stukken lekken. De Wikileaks-documenten onderstrepen dat er sinds de jaren ’80 weinig is veranderd. Met als enige verschil de hardvochtige wijze waarop verdachte Manning in deze zaak wordt behandeld en de gebrekkige aandacht die hij krijgt van professoren en andere betrokkenen bij de Wikileaks-documenten.

    Capturing Jonathan Pollard: How One of the Most Notorious Spies in American History Was Brought to Justice. Auteur Ronald J. Olive. Uitgeverij US Naval Institute Press (2006).

    Find this story at 19 June 2012

    The Mystery of Duqu 2.0: a sophisticated cyberespionage actor returns New zero-day used for effective kernel memory injection and stealth

    Earlier this year, during a security sweep, Kaspersky Lab detected a cyber-intrusion affecting several of our internal systems.

    Following this finding, we launched a large scale investigation, which led to the discovery of a new malware platform from one of the most skilled, mysterious and powerful groups in the APT world – Duqu. The Duqu threat actor went dark in 2012 and was believed to have stopped working on this project – until now. Our technical analysis indicates the new round of attacks include an updated version of the infamous 2011 Duqu malware, sometimes referred to as the stepbrother of Stuxnet. We named this new malware and its associated platform “Duqu 2.0”.

    Some of the new 2014-2015 Duqu infections are linked to the P5+1 events and venues related to the negotiations with Iran about a nuclear deal. The threat actor behind Duqu appears to have launched attacks at the venues for some of these high level talks. In addition to the P5+1 events, the Duqu 2.0 group has launched a similar attack in relation to the 70th anniversary event of the liberation of Auschwitz-Birkenau.

    In the case of Kaspersky Lab, the attack took advantage of a zero-day in the Windows Kernel, and possibly up to two other, currently patched vulnerabilities, which were zero-day at that time. The analysis of the attack revealed that the main goal of the attackers was to spy on Kaspersky Lab technologies, ongoing research and internal processes. No interference with processes or systems was detected. More details can be found in our technical paper.

    From a threat actor point of view, the decision to target a world-class security company must be quite difficult. On one hand, it almost surely means the attack will be exposed – it’s very unlikely that the attack will go unnoticed. So the targeting of security companies indicates that either they are very confident they won’t get caught, or perhaps they don’t care much if they are discovered and exposed. By targeting Kaspersky Lab, the Duqu attackers probably took a huge bet hoping they’d remain undiscovered; and lost.

    At Kaspersky Lab, we strongly believe in transparency, which is why we are going public with this information. Kaspersky Lab is confident that its clients and partners are safe and that there is no impact on the company’s products, technologies and services.

    By GReAT on June 10, 2015. 12:00 pm

    Find this story at 10 June 2015

    © 2015 AO Kaspersky Lab.

    Spy vs. Spy: Espionage and the U.S.-Israel Rift

    If more evidence was needed to show that the relationship between Benjamin Netanyahu and Barack Obama has morphed from tragedy to farce, it came late Monday with the revelation that Israel had spied on the nuclear talks between the United States and Iran.

    “The White House discovered the operation,” according to the blockbuster account by Adam Entous in The Wall Street Journal, “when U.S. intelligence agencies spying on Israel intercepted communications among Israeli officials that carried details the U.S. believed could have come only from access to the confidential talks, officials briefed on the matter said.”

    Talk about spy vs. spy, the old Mad magazine trope featuring two pointy-nosed, masked cartoon creatures. The National Security Agency, eavesdropping on Israeli officials (as usual, according to the revelations of Edward Snowden), overheard them discussing intelligence their own spies had gathered by spying on U.S. officials talking about the Iran negotiations.

    Try Newsweek: subscription offers

    This was a whole new level of gamesmanship between the two bickering allies.

    “It’s one thing for the U.S. and Israel to spy on each other. It is another thing for Israel to steal secrets and play them back to U.S. legislators to undermine U.S. diplomacy,” an unnamed “senior U.S. official” told the Journal.

    Officials in Jerusalem issued emphatic denials, as they did last year when Newsweek reported on Israeli espionage against the U.S., saying that “Israel does not spy on the United States, period, exclamation mark,’’ as Yuval Steinitz, minister for intelligence and strategic affairs, told Israel Radio on Tuesday.

    Of course, Israel does spy on the U.S., and vice versa. In the age of cyberwar, electronic spying runs on autopilot, with state-of-the-art Pac-Mans zooming around the Internet gobbling up anything with the right keyword. Anybody with an antenna (or a keyboard) spies on whoever is seen as the remotest threat, including friends. Or as the Journal put it, “While U.S. officials may not be direct targets…Israeli intelligence agencies sweep up communications between U.S. officials and parties targeted by the Israelis, including Iran.”

    And how did the Israelis intercept conversations between officials in Tehran and Washington? In another comedic dimension to this latest spy flap, it turns out that “U.S. intelligence agencies helped the Israelis build a system to listen in on high-level Iranian communications,” the Journal reported.

    In part, it’s an old story. Israel’s clandestine operations to steal U.S. scientific, technical, industrial and financial secrets are so commonplace here that officials in the Pentagon and FBI periodically verge into open revolt.

    Last year, U.S. intelligence officials trooped up to Capitol Hill to tell U.S. lawmakers considering visa waivers for Israelis that Jerusalem’s spying here had “crossed red lines.” One congressional staffer who attended the behind-closed-doors briefings called the information “very sobering…alarming…even terrifying.” Another staffer called it “damaging.”

    “We used to call the Israelis on the carpet once a year to tell them to cut it out, when a particular stunt was just too outrageous ” says a former top FBI counterintelligence official. “They’d make all the right noises and then go right back at it through another door.” But since Israel is such an important strategic ally of the U.S., it was a sin that could not be named. The standing order has always been to just suck it up.

    Until this week. The accusations by the unnamed Obama administration officials marked a new frontier in calling out the Israelis—or at least Netanyahu’s right-wing administration.

    Netanyahu had crossed some sort of red line again when, according to the Journal, his man in Washington began quietly sharing Israeli intelligence about the U.S. negotiating position with members of Congress, hoping to shore up support for its rejection of any deal with the Iranians short of a total nuclear capitulation on their part. But what seems to have pushed Obama officials over the edge was that Ambassador Ron Dermer, a former Republican operative who holds dual U.S.-Israeli citizenship, was wildly exaggerating what the U.S. position was, according to the Journal, making it sound like the White House had given away the store to the Iranians in a desperate effort to ink a deal.

    Republican Representative Devin Nunes of California, chairman of the House Intelligence Committee, indicated he had indeed gotten a different view on Iran from sources outside the administration.

    “As good as our intelligence community is, a lot of times we don’t even know what the Iranians are up to,” he told CNN. “So we were shocked at the disclosures that have come forward of the size and scope of the Iranian program even in the most recent years.”

    One former U.S. intelligence operative with long, firsthand familiarity with Israeli operations called the revelation “appalling but not surprising,” especially under Netanyahu, whose governing coalition depends on the support of far-right Orthodox and ultra-Orthodox parties with a stake in the West Bank settlements.

    “The fact that there is such manipulation of our institutions by a so-called ally must be exposed, and the ‘useful idiots’ in [the U.S.] government who toe the Likud line will someday be looked back upon as men and women who sacrificed the U.S. national interest for a foreign ideology—Likud right-wing Zionism,” the operative said, on condition of anonymity due to the sensitivity of the matter.

    “We know publicly that the administration is seething,” he added, “but I can assure you that behind closed doors the gloves are coming off. Bibi is in the administration’s crosshairs. If this is what is being allowed to leak publicly, you can bet that, behind the scenes, folks both in the White House and the foreign policy-intel community [are prepared to] act on that anger.”

    This is not the end of it, he predicted. The American Israel Public Affairs Committee (AIPAC), which critics say has morphed from a powerful “pro-Israel” lobby to a powerful pro-Likud lobby over the years, will be Obama officials’ next target.

    “I’m betting there are going to be some willing leakers now about stories such as AIPAC’s operations against Congress,” the former operative said.

    Bob Corker of Tennessee, the Republican chairman of the Senate Foreign Relations Committee, has no doubt that Obama administration officials made a calculated decision to call out Netanyahu, who has long been at odds with the White House on the Middle East peace process, Israeli settlements in the occupied West Bank and the Iranian nuclear talks.

    “I think y’all all understand what’s happening here,” he told reporters. “I mean, you understand who’s pushing this out.”

    But if Senator Tim Kaine, a Virginia Democrat, is any barometer, the Israelis have little to worry about.

    “I just don’t look at that as spying,” Kaine said of the Journal’s allegations. “Their deep existential interest in such a deal, that they would try to figure out anything that they could, that they would have an opinion on it…I don’t find any of that that controversial.”

    Jeff Stein writes SpyTalk from Washington, D.C. He can be reached more or less confidentially via spytalker@hushmail.com.

    BY JEFF STEIN 3/25/15 AT 12:23 PM

    Find this story at 25 March 2015

    © 2015 NEWSWEEK LLC

    NETANYAHU’S SPYING DENIALS CONTRADICTED BY SECRET NSA DOCUMENTS

    Israeli Prime Minister Benjamin Netanyahu yesterday vehemently denied a Wall Street Journal report, leaked by the Obama White House, that Israel spied on U.S. negotiations with Iran and then fed the intelligence to Congressional Republicans. His office’s denial was categorical and absolute, extending beyond this specific story to U.S.-targeted spying generally, claiming: “The state of Israel does not conduct espionage against the United States or Israel’s other allies.”

    Israel’s claim is not only incredible on its face. It is also squarely contradicted by top-secret NSA documents, which state that Israel targets the U.S. government for invasive electronic surveillance, and does so more aggressively and threateningly than almost any other country in the world. Indeed, so concerted and aggressive are Israeli efforts against the U.S. that some key U.S. government documents — including the top secret 2013 intelligence budget — list Israel among the U.S.’s most threatening cyber-adversaries and as a “hostile” foreign intelligence service.

    One top-secret 2008 document features an interview with the NSA’s Global Capabilities Manager for Countering Foreign Intelligence, entitled “Which Foreign Intelligence Service Is the Biggest Threat to the US?” He repeatedly names Israel as one of the key threats.

    While noting that Russia and China do the most effective spying on U.S., he says that “Israel also targets us.” He explains that “A NIE [National Intelligence Estimate] ranked [Israel] as the third most aggressive intelligence service against the US.” While praising the surveillance relationship with Israel as highly valuable, he added: “One of NSA’s biggest threats is actually from friendly intelligence services, like Israel.” Specifically, the Israelis “target us to learn our positions on Middle East problems.”

    Other NSA documents voice the grievance that Israel gets far more out of the intelligence-sharing relationship than the U.S. does. One top-secret 2007 document, entitled “History of the US – Israel SIGINT Relationship, post 1992,” describes the cooperation that takes place as highly productive and valuable, and, indeed, top-secret documents previously reported by The Intercept and the Guardian leave no doubt about the very active intelligence-sharing relationship that takes place between the two countries. Yet that same document complains that the relationship even after 9/11 was almost entirely one-sided in favor of serving Israeli rather than U.S. interests:

    The U.S. perception of Israel as a threat as much as an ally is also evidenced by the so-called “black budget” of 2013, previously referenced by The Washington Post, which lists Israel in multiple places as a key intelligence “target” and even a “hostile foreign intelligence service” among several other countries typically thought of as the U.S.’s most entrenched adversaries:

    The same budget document reveals that the CIA regards Israel — along with Russia, China, Iran, Pakistan and Cuba — as a “priority threat country,” one against which it “conduct[s] offensive [counter-intelligence] operations in collaboration with DoD”:

    One particular source of concern for U.S. intelligence are the means used by Israel to “influence anti-regime elements in Iran,” including its use of “propaganda and other active measures”:

    What is most striking about all of this is the massive gap between (a) how American national security officials talk privately about the Israelis and (b) how they have talked for decades about the Israelis for public consumption — at least until the recent change in public rhetoric from Obama officials about Israel, which merely brings publicly expressed American views more in line with how U.S. government officials have long privately regarded their “ally.” The NSA refused to comment for this article.

    Previously reported stories on Israeli spying, by themselves, leave no doubt how false Netanyahu’s statement is. A Der Spiegel article from last fall revealed that “Israeli intelligence eavesdropped on US Secretary of State John Kerry during Middle East peace negotiations.” A Le Monde article described how NSA documents strongly suggest that a massive computer hack of the French presidential palace in 2012 was likely carried about by the Israelis. A 2014 article from Newsweek’s Jeff Stein revealed that when it comes to surveillance, “the Jewish state’s primary target” is “America’s industrial and technical secrets” and that “Israel’s espionage activities in America are unrivaled and unseemly.”

    All of these stories, along with these new documents, leave no doubt that, at least as the NSA and other parts of the U.S. National Security State see it, Netanyahu’s denials are entirely false: The Israelis engage in active and aggressive espionage against the U.S., even as the U.S. feeds the Israelis billions of dollars every year in U.S. taxpayer funds and protects every Israeli action at the U.N. Because of the U.S. perception of Israel as a “threat” and even a “hostile” foreign intelligence service — facts they discuss only privately, never publicly — the U.S. targets Israel for all sorts of espionage as well.

    Glenn Greenwald, Andrew Fishman
    Mar. 25 2015, 8:06 p.m.

    Find this story at 25 March 2015

    Copyright https://firstlook.org/theintercept/

    Israeli TV Says US Has Stopped Sharing Intelligence About Iranian Nuclear Program With Israel

    Report: Obama Administration Has Stopped Sharing Intelligence With Israel on Iran’s Nuclear Program

    The Obama administration has “unilaterally” and “completely” stopped sharing intelligence with Israel over Iran’s nuclear development program due to its anger over Israeli Prime Minister Benjamin Netanyahu’s Tuesday address to Congress, Israel’s Channel 10 reported, a charge the White House flatly denied.

    “The U.S. unilaterally stopped all of its joint activity with Israel regarding the nuclearization of Iran,” the news show reported Monday night. This freeze in intelligence sharing was attributed to the “American anger” at Netanyahu.

    White House national security spokeswoman Bernadette Meehan told TheBlaze in an email, “the report is completely false.”

    In this Oct. 26, 2010 file photo, a worker rides a bicycle in front of the reactor building of the Bushehr nuclear power plant, just outside the southern city of Bushehr, Iran. (AP Photo/Mehr News Agency, Majid Asgaripour, File)

    On Sunday, one day before the Channel 10 report, Secretary of State John Kerry touted the close security relationship with Israel in an interview with ABC’s “This Week.”

    “We have a closer relationship with Israel right now, in terms of security, than at anytime in history,” Kerry said.

    To make up for the gap, Israel is cooperating with other countries, not the U.S., to collect intelligence on Iran’s nuclear program. Past joint efforts by American and Israeli intelligence have helped the International Atomic Energy Agency monitor Iran’s nuclear progress, which is suspected of ultimately being aimed at the development of weapons.

    Those IAEA reports raising suspicions about the objectives of Iran’s nuclear program have been the cornerstone of the case to convince the international community to impose sanctions on the Islamic Republic.

    Netanyahu was in Washington to warn lawmakers of the dangers of the emerging deal currently being negotiated between Iran and six world powers, including the U.S. Media reports have said the framework being worked out would monitor Iranian nuclear progress for only 10 years.

    An unnamed senior aide to Netanyahu told reporters traveling on Netanyahu’s plane Sunday that the Obama administration was not fully sharing details with Congress about the negotiations.

    The State Department on Monday warned Netanyahu against disclosing those details to Congress.

    “We’ve continuously provided detailed classified briefings to Israeli officials to keep them updated and to provide context for how we are approaching getting to a good deal, because we’ve been very clear we will not accept a bad deal,” State Department spokeswoman Marie Harf said. “So any release of any kind of information like that would, of course, betray that trust.”

    Channel 10 also reported that in addition to refusing to meet the Israeli leader, Obama had no plans to phone him while he’s in town either.

    The Jerusalem Post reported that the prime minister’s office would not comment on the Channel 10 report.

    Sharona Schwartz
    The Blaze
    March 3, 2015

    Find this story at 3 March 2015

    Copyright http://www.matthewaid.com/

    Leak investigation stalls amid fears of confirming U.S.-Israel operation

    A sensitive leak investigation of a former vice chairman of the Joint Chiefs of Staff has stalled amid concerns that a prosecution in federal court could force the government to confirm a joint U.S.-Israeli covert operation targeting Iran, according to current and former U.S. officials.

    Federal investigators suspect that retired Marine Gen. James E. “Hoss” Cartwright leaked to a New York Times reporter details about a highly classified operation to hobble Iran’s nuclear enrichment capability through cyber-sabotage — an effort not acknowledged by Israel or the United States.

    Prosecutors will have to overcome significant national security and diplomatic concerns if they want to move forward, including pitting the Obama administration against Israel if that ally were opposed to any information about the cyber-operation being revealed in court.

    The United States could move forward with the case against Israel’s ­wishes, but such a move might further harm relations between two countries, which are already frayed because of a disagreement over how best to prevent Iran from obtaining nuclear weapons.

    Administration officials also fear that any revelations could complicate the current negotiations with Iran over its nuclear program.

    “There are always legitimate national security reasons for not proceeding in one of these ­cases,” said John L. Martin, who handled many sensitive espionage investigations as a former Justice Department prosecutor.

    The case captures the tension between national security concerns and the desire of prosecutors to hold high-ranking officials to account for leaking classified secrets. The Obama administration has been the most aggressive in U.S. history in pursuing those suspected of leaking classified information.

    The Justice Department has offered no clues to whether it intends to proceed with a case against Cartwright, who helped design the cyber-campaign against Iran under President George W. Bush and was involved in its escalation under President Obama.

    Spokesmen for the Justice Department, the White House and the FBI declined to comment for this article.

    Gregory B. Craig, Cartwright’s attorney and a former White House counsel in the Obama administration, said he has had no contact with prosecutors for more than a year.

    “General Cartwright has done nothing wrong,” Craig said. “He has devoted his entire life to defending the United States. He would never do anything to weaken our national defense or undermine our national security. Hoss Cartwright is a national treasure, a genuine hero and a great patriot.”

    In discussions with the office of the White House counsel, then led by Kathryn Ruemmler, prosecutors sought to determine whether the White House would be willing to declassify material important to the case. Ruemmler was unwilling to provide the documentation, citing security concerns, including those relating to sources­ and methods, said a person familiar with the matter.

    Ruemmler, who left the post in June, declined to comment.

    “There’s a fundamental tension in cases­­ like this between the needs of a criminal prosecution and the needs of national security,” said Jason Weinstein, a former deputy assistant attorney general in charge of the Justice Department’s Criminal Division, who was not briefed on the investigation. “Where that comes to a head is when prosecutors want to use evidence in a courtroom that is highly classified and very sensitive.”

    It is often the case that the needs of a particular criminal prosecution yield to national security interests. “At the end of the day,” Weinstein said, “if you can’t use the evidence you need in court, you can’t bring the case.”

    Details of the joint program, including its code name, Olympic Games, were revealed by Times reporter David E. Sanger in a book and article in June 2012. The sabotage of Iranian nuclear centrifuges by the computer worm dubbed Stuxnet had emerged two years earlier, and security experts speculated that it was the work of the United States and Israel.

    Confirmation of the joint authorship set off a political controversy, with congressional Republicans charging that the White House had deliberately leaked information to enhance Obama’s national security credentials as he sought reelection.

    Attorney General Eric H. Holder Jr. assigned Rod J. Rosenstein, the U.S. attorney for Maryland, to investigate the leak. His office declined to comment.

    FBI investigators focused on Cartwright in the fall of 2012, officials said. They interviewed him at least twice, according to people who are familiar with the case and who spoke on the condition of anonymity because of the sensitivity of the investigation. During the first interview, Cartwright had to go to the hospital.

    Part of the challenge of preparing a case like this is determining to what extent authorities who control the declassification of information, in this case the White House and the intelligence community, are willing to divulge information.

    In the case of a CIA officer who was recently convicted of espionage, the government disclosed sensitive details during the leak trial about a separate operation to sabotage Iran’s nuclear program that occurred more than a decade ago. The CIA even allowed a Russian scientist who had defected and taken part in the highly classified operation to testify.

    “The government’s got to make a choice: Is it more important to prosecute a national security leak or more important to preserve relationships with allies and shield sources­ and methods that protect the country?” said one individual familiar with the matter.

    The case also poses opportunities for “graymail” — a situation in which defense attorneys exercise leverage that lawyers in ordinary criminal cases­ lack by forcing prosecutors to make tough judgment calls about divulging sensitive or classified information.

    Craig might, for instance, push for broad discovery of information aimed at demonstrating that other officials could have been sources­ of the leak. Experts say he also could press to establish the factual basis for the information leaked, which could expose sensitive material.

    Cartwright, who retired in 2011, had White House authorization to speak with reporters, according to people familiar with the matter. Craig might try to put the White House’s relationship with reporters and the use of authorized leaks on display, creating a potentially embarrassing distraction for the administration.

    The case could remain open beyond the point at which national security and foreign policy concerns are an issue. Under the Espionage Act, one of the statutes that the government probably would use, prosecutors have 10 years from the date of the alleged crime to file charges.

    Sari Horwitz contributed to this report.
    By Ellen Nakashima and Adam Goldman March 10

    Find this story at 10 March 2015

    Copyright https://www.washingtonpost.com/

    Israel’s N.S.A. Scandal

    WASHINGTON — IN Moscow this summer, while reporting a story for Wired magazine, I had the rare opportunity to hang out for three days with Edward J. Snowden. It gave me a chance to get a deeper understanding of who he is and why, as a National Security Agency contractor, he took the momentous step of leaking hundreds of thousands of classified documents.

    Among his most shocking discoveries, he told me, was the fact that the N.S.A. was routinely passing along the private communications of Americans to a large and very secretive Israeli military organization known as Unit 8200. This transfer of intercepts, he said, included the contents of the communications as well as metadata such as who was calling whom.

    Typically, when such sensitive information is transferred to another country, it would first be “minimized,” meaning that names and other personally identifiable information would be removed. But when sharing with Israel, the N.S.A. evidently did not ensure that the data was modified in this way.

    Mr. Snowden stressed that the transfer of intercepts to Israel contained the communications — email as well as phone calls — of countless Arab- and Palestinian-Americans whose relatives in Israel and the Palestinian territories could become targets based on the communications. “I think that’s amazing,” he told me. “It’s one of the biggest abuses we’ve seen.”

    It appears that Mr. Snowden’s fears were warranted. Last week, 43 veterans of Unit 8200 — many still serving in the reserves — accused the organization of startling abuses. In a letter to their commanders, to Prime Minister Benjamin Netanyahu and to the head of the Israeli army, they charged that Israel used information collected against innocent Palestinians for “political persecution.” In testimonies and interviews given to the media, they specified that data were gathered on Palestinians’ sexual orientations, infidelities, money problems, family medical conditions and other private matters that could be used to coerce Palestinians into becoming collaborators or create divisions in their society.

    The veterans of Unit 8200 declared that they had a “moral duty” to no longer “take part in the state’s actions against Palestinians.” An Israeli military spokesman disputed the letter’s overall drift but said the charges would be examined.

    It should trouble the American public that some or much of the information in question — intended not for national security purposes but simply to pursue political agendas — may have come directly from the N.S.A.’s domestic dragnet. According to documents leaked by Mr. Snowden and reported by the British newspaper The Guardian, the N.S.A. has been sending intelligence to Israel since at least March 2009.

    The memorandum of agreement between the N.S.A. and its Israeli counterpart covers virtually all forms of communication, including but not limited to “unevaluated and unminimized transcripts, gists, facsimiles, telex, voice and Digital Network Intelligence metadata and content.” The memo also indicates that the N.S.A. does not filter out American communications before delivery to Israel; indeed, the agency “routinely sends” unminimized data.

    Although the memo emphasizes that Israel should make use of the intercepts in accordance with United States law, it also notes that the agreement is legally unenforceable. “This agreement,” it reads, “is not intended to create any legally enforceable rights and shall not be construed to be either an international agreement or a legally binding instrument according to international law.”

    Continue reading the main story
    RECENT COMMENTS

    pak September 17, 2014
    What type of information could be used against a palestinian to force him/her to collaborate? Homosexuality? Adultery? Premarital sex?…
    kagni September 17, 2014
    Very romantic to ignore that ugly breeds ugly, especially from a journalist of Mr Bamford’s age and experience. If anything, only…
    Guy September 17, 2014
    Clearly, there are thousands of ways to abuse private information collected on people. This is one of many, and this is why folks like…
    SEE ALL COMMENTS
    It should also trouble Americans that the N.S.A. could head down a similar path in this country. Indeed, there is some indication, from a top-secret 2012 document from Mr. Snowden’s leaked files that I saw last year, that it already is. The document, from Gen. Keith B. Alexander, then the director of the N.S.A., notes that the agency had been compiling records of visits to pornographic websites and proposes using that information to damage the reputations of people whom the agency considers “radicalizers” — not necessarily terrorists, but those attempting, through the use of incendiary speech, to radicalize others. (The Huffington Post has published a redacted version of the document.)

    In Moscow, Mr. Snowden told me that the document reminded him of the F.B.I.’s overreach during the days of J. Edgar Hoover, when the bureau abused its powers to monitor and harass political activists. “It’s much like how the F.B.I. tried to use Martin Luther King’s infidelity to talk him into killing himself,” he said. “We said those kinds of things were inappropriate back in the ’60s. Why are we doing that now? Why are we getting involved in this again?”

    It’s a question that American and Israeli citizens should be asking themselves.

    James Bamford is the author of three books on the National Security Agency, including “The Shadow Factory: The Ultra-Secret N.S.A. from 9/11 to the Eavesdropping on America.”

    By JAMES BAMFORDSEPT. 16, 2014

    Find this story at 16 September 2014

    © 2015 The New York Times Company

    Israel Eavesdropped on John Kerry in Mideast Talks

    New information indicates that Israeli intelligence eavesdropped on telephone conversations by US Secretary of State John Kerry. Sources told SPIEGEL the government then used the information obtained from the calls during negotiations in the Mideast conflict.

    SPIEGEL has learned from reliable sources that Israeli intelligence eavesdropped on US Secretary of State John Kerry during Middle East peace negotiations. In addition to the Israelis, at least one other intelligence service also listened in as Kerry mediated last year between Israel, the Palestinians and the Arab states, several intelligence service sources told SPIEGEL. Revelations of the eavesdropping could further damage already tense relations between the US government and Israel.

    During the peak stage of peace talks last year, Kerry spoke regularly with high-ranking negotiating partners in the Middle East. At the time, some of these calls were not made on encrypted equipment, but instead on normal telephones, with the conversations transmitted by satellite. Intelligence agencies intercepted some of those calls. The government in Jerusalem then used the information obtained in international negotiations aiming to reach a diplomatic solution in the Middle East.

    In the current Gaza conflict, the Israelis have massively criticized Kerry, with a few ministers indirectly calling on him to withdraw from peace talks. Both the US State Department and the Israeli authorities declined to comment.

    Only one week ago, Kerry flew to Israel to mediate between the conflict parties, but the Israelis brusquely rejected a draft proposal for a cease-fire. The plan reportedly didn’t include any language demanding that Hamas abandon its rocket arsenal and destroy its tunnel system. Last year, Kerry undertook intensive diplomatic efforts to seek a solution in the conflict between the Israelis and the Palestinians, but they ultimately failed. Since those talks, relations between Kerry and Israeli Prime Minister Benjamin Netanyahu have been tense.

    Still, there are no doubts about fundamental support for Israel on the part of the United States. On Friday, the US Congress voted to help fund Israel’s “Iron Dome” missile defense system to the tune of $225 million (around €168 million).

    Find this story at 3 August 2014

    © SPIEGEL ONLINE 2014

    The officer who saw behind the top-secret curtain

    From supporting Yemeni Royalists to a proposal for the assassination Iran’s Khomenei, former military intelligence officer Yossi Alpher had a behind-the-scenes look at some of the IDF’s most classified operations; now he explains the covert strategies that guided Israeli intelligence for decades.

    In the mid-1960s, Lieutenant Yossi Alpher served as a junior officer in one of the Israel Defense Forces’ most classified units – the Military Intelligence unit responsible for liaising with Israel’s other intelligence bodies, the Shin Bet security service and the Mossad.

    He was entrusted with a secret task: “I had to go under the cover of darkness to the Israel Air Forces’ Tel-Nof base,” he recalls during an interview, “and meticulously check through huge piles of military equipment, and weapons and ammunition in particular, to ensure they bore no distinguishing Israeli marks – no IDF symbol, no Hebrew letters, nothing that would be able to link the equipment to us even if someone were to go through it with a fine-tooth comb.”

    On completing his inspection, Alpher signed off on a document to confirm that everything was in order, and the equipment and weapons were then loaded onto an IAF cargo aircraft and flown to a destination that only very few in Israel knew of. Even the name of the operation, Rotev (Hebrew for gravy) was top secret.

    In those days, as is the case now too, Yemen was embroiled in a fierce civil war – between the Royalists (the Shia Zaidis, the Houthis of today) and the so-called Republican rebels, who were being supported by Egypt and the Soviets. Back then in the mid-1960s, however, the Royalists had the backing in fact of Saudi Arabia.

    “The Saudis didn’t care that they were Shia, whose descendants are the ones supporting Iran today,” Alpher says. “It was important for them to preserve their influence in Yemen and oppose the Soviet-Egyptian intervention.”

    The Saudis turned for help to Britain, where former members of the Special Air Service (SAS) – the elite British army unit- were recruited for the mission. Operating out of their headquarters in London and bases in Aden, Yemen, the SAS veterans sought help in turn from Israel, the strongest power in the region and Egypt’s main enemy.

    At the same time, a representative of Imam al-Badr, leader of the Royalists in Yemen, made direct contact with Mossad operatives in Europe and was even brought to Israel for a visit. The operation was conducted over a period of slightly more than two years, during which an IAF Stratocruiser cargo aircraft made 14 dangerous nighttime sorties from Tel-Nof to Yemen – a 14-hour round trip. From an altitude of some 3,600 meters, Egyptian weapons seized during the 1956 Sinai Campaign were accurately parachuted into wadis surrounded by high mountains controlled by the Royalists.

    Alpher says that in order to carry out the initial parachute drops in the proper fashion, and to ensure that the equipment ended up in the right place and right hands, two members of Caesarea, the Mossad’s special-operations division, were sent to Yemen in coordination with the British intelligence services. One of the Caesarea operatives fell ill on the way and was forced to pull out. The second made it to the drop site and guided the aircraft in for the initial deliveries.

    Once everything was running smoothly, the Mossad stepped back and the logistics of the remaining drops were handled by the British. Even now, years later, it’s easy to grasp the intensity of the drama, the risk, the secrecy and the significance of the Israeli-British-Saudi-Yemeni operation of that time.

    The operation was coordinated in Israel by Nahum Admoni, who went on to become Mossad chief from 1982 to 1989; the British, for their part, sent two senior SAS members to Israel, one by the name of the Gene and the other Tony – and hence the unofficial codename for the operation, “Gin and Tonic”.

    Alpher: “Presumably, only a very few in Saudi Arabia knew of Israel’s involvement. The Yemenis didn’t know who was parachuting equipment to them, but it had a big impact on the war there and the damage caused to the rebels and the Egyptian forces.”

    What was the objective of the operation from Israel’s perspective?

    “The main objective was to pin down and wear out Egyptian forces. We’re talking about the period between the Sinai Campaign and the Six-Day War. We knew there was another war coming. We also knew that the Egyptians were using mustard gas in Yemen. That frightened us a great deal. We were concerned that we would struggle to cope with such an army and such a weapon in the next military campaign.

    “And lo and behold, we were presented with the opportunity to strike at them and wear them down in a place where they least expected us to appear. In addition, we ended up with some intelligence from the Mossad’s activities in Yemen and better relations with the British and the Saudis. Not bad, right? Moreover, we didn’t invest all that much; the weapons were Egyptian spoils-of-war that fell into our hands in the 1956 war.”

    The operation was going ahead so successfully that at one stage the IAF considered carrying out an attack on Egyptian aircraft stationed at their bases in Yemen, as an act of deterrence that would damage the reputation of then-Egyptian president Gamal Abdel Nasser. The plan was eventually scrapped.

    “And good that it was,” Alpher says, “because it allowed us to notch up a complete surprise later on, when the IAF carried out strikes on the Egyptian aircraft at their bases in Egypt on the morning of June 5, 1967.”

    That said, Alpher believes that the operation can be crowned a big success, as it pinned down Egyptian forces in Yemen and severely undermined the fighting spirit of the Egyptian Army ahead of the Six-Day War. “We learned from prisoners we captured in the Sinai,” he says, “just how much the events in Yemen negatively impacted the mood and readiness of the Egyptian Army.”

    The full extent of Operation Rotev, from the mouths of Israeli sources, has been released for publication and appears for the first time in Alpher’s book, Periphery: Israel’s Search for Middle East Allies (Rowman & Littlefield, 2015; the Hebrew edition has a slightly different title).

    A long-serving Mossad official who went on to head the Jaffee Center for Strategic Studies at Tel Aviv University, Alpher has written a comprehensive study, in part as an active player with firsthand knowledge, and in part based on interviews he conducted and documents he collected about the “Periphery doctrine” – Israel’s covert strategy in the region, with the Mossad operations at its center.

    The general strategy of the “Periphery doctrine” was devised by Israel’s first prime minister, David Ben-Gurion. Its implementation was entrusted initially to the Mossad’s founder and first director, Reuven Shiloah, and then the Mossad chiefs to follow.

    What is the so-called Periphery doctrine?

    “It was the Israeli attempt to breach the hostile Arab ring surrounding us and to forge ties further afield, with the purpose of creating deterrence, acquiring intelligence assets, and counterbalancing the Arab hostility.

    “Nasser spoke regularly of his desire to throw the Jews into the sea. The Mossad looked for allies to offset this desire and be able to say: We’re not alone. At the same time, we took advantage of these ties to gather intelligence about Arab states, in places where they least expected us to show up, to pin down and wear down Arab forces there, and to use our ties with countries in the region as an asset to present to the Americans.”

    With this strategy in mind, the Mossad sought to forge intimate intelligence ties with countries bordering on Israel’s close-quarter enemies, even if the said countries publicly toed the line with the Arab states and condemned Israel in the international arena. Israelis gathered and obtained intelligence on Arab countries in the outlying countries with which secret ties were established; and in return, Israel provided training services, information, arms and sophisticated electronic equipment.

    Alpher divides the periphery, from the Mossad’s perspective, into three categories. Included in the first were the non-Arab and/or non-Muslim states that bordered on the Arab conflict states – Iran, Ethiopia, Turkey, Eritrea, and Kenya and Uganda at the rear.

    The second comprised non-Arab and non-Muslim ethnic groups and peoples living in the Arab conflict states – the Christians in southern Sudan and in Lebanon, and the Kurds in Iraq. And the third category was made up of Arab countries on the margins of the Middle East that felt that militant Arab nationalism was a threat to them or wanted ties with Israel in light of local or regional circumstances – Morocco, some of the Gulf States, and, for a short time, Yemen.

    Alpher also talks of the ideological element that drove the system. “There were certainly instances, particularly when it came to providing help to minorities suffering at the hands of the Arabs, in which there was also an ideological component,” he says. “I remember my colleagues and I at the Mossad seeing ourselves, the Jews, as the only ethnic minority in the Middle East that has achieved self-determination and that needs to help other ethnic minorities that are up against imperialistic and extremely cruel Arab hostility. We felt a moral obligation to help them.

    “When (Mossad official) David Kimche, for example, went to meet Kurdish leader Mullah Mustafa Barzani in Iraq in 1965, what did he see? What did he encounter? Dave saw an extremely downtrodden people who were suffering terribly under shocking Arab oppression. You cannot help but identify with them.”

    Israel’s covert military and intelligence activities throughout the entire Middle East region were carried out for the most part by small forces and on a shoestring budget, in keeping with the country’s limited resources, and the jury is still out when it comes to the quality of the intelligence gathered; but as Alpher views things, these issues are dwarfed by the manner in which the Mossad’s activities were perceived by the other side. In the eyes of the enemy, the Arab states, the Mossad’s influence and capabilities increased beyond measure.

    “In talks years later with Arab officials,” Alpher says, “I got an understanding of how the other side had viewed the whole issue. They saw our presence in those countries as an extremely powerful and direct threat to themselves. Thus, for example, they viewed our presence in southern Sudan and Ethiopia as a direct threat to the source of the Nile River.

    “Israel never considered tampering with the Nile, and it’s impossible to do so from an engineering perspective too; but the Egyptians didn’t see it like that, and they interpreted the fact that the IDF and Mossad were so close to their lifeline very differently – as an Israeli attempt to say to them that we are breathing down their necks. And thus it contributed to peace: They understood that they wouldn’t be able to defeat us by means of an armed conflict.”

    The Trident alliance
    The highpoint of the “Periphery doctrine” was the tripartite intelligence pact involving Israel, Turkey and Iran – known in the Mossad as C’lil but termed Trident among the partners. The Turkish-Israeli part of the pact was sealed during a secret agreement in Ankara on August 20, 1958, between Ben-Gurion and the Turkish prime minister at the time, Adnan Menderes.

    The catalyst for the Turks occurred a month earlier: In July, a coup d’etat led by Abd al-Karim Qasim toppled the Hashemite monarchy in Iraq and brought about Iraq’s withdrawal from the Central Treaty Organization (CENTO) – a secret pro-Western alliance formed in 1955 between the United Kingdom, Turkey, Pakistan, Iran and Iraq – and its inclusion in the pro-Soviet radical camp.

    “At the first trilateral meeting between the sides that took place in Turkey in late September and early October of 1958,” Alpher reveals, “the participants – all heads of their respective countries’ spy agencies – decided on a series of joint intelligence operations that included subversive activities directed against Nasser’s influence and the influence of the Soviets. They divided the region into realms of responsibility for each of the parties. The Iranian intelligence service, for example, was entrusted with the Persian Gulf, Iraq and Morocco.”

    The American dimension was critical too. “As soon as we completed the establishment of Trident, we ran to tell the Americans about it,” Alpher says. “We bragged; look, we’ve put together a NATO pact of our own. To begin with, Ben-Gurion marketed Trident to the Eisenhower administration in Washington as an asset for the West.

    “He portrayed the alliance as an effective means to thwart Soviet infiltration into the Middle East, and also as a counterbalance against the radical Arab states, especially after Iraq’s withdrawal from the Baghdad Pact.”

    The Central Intelligence Agency didn’t remain indifferent. On a deserted hill north of Tel Aviv, the US agency financed the construction of a two-story building intended to serve as Trident headquarters. “The ground floor included a ‘Blue Wing’ for the use of the Iranians and a ‘Yellow Wing’ for the Turks, with the conference rooms on the second floor,” Alpher recalls.

    Later came accommodation facilities, a fully equipped kitchen, a swimming pool, a plush movie theater and a gym – all for the purpose of secretly hosting high-ranking foreign officials in style, in keeping at least with what Israel could offer and afford at the time. “Bobby, an excellent chef, served non-kosher Hungarian food and the guests were very satisfied,” Alpher notes.

    From the late 1950s and through to the Khomeini revolution in 1979, the meetings between the heads of the three intelligence services were held in a different country every time. Alpher attended some of the sessions. “Every meeting would begin with a festive reception that was followed by a ceremonial meeting in the presence of the heads of the services themselves,” Alpher recounts.

    “I remember the excitement that gripped me when I arrived for my first meeting and was introduced to General Nassiri, the awe-inspiring commander of the SAVAK, the shah’s intelligence agency. He showed up in uniform, surrounded by an aura of fear and mystery.

    “At the initial meetings, the heads (of the intelligence agencies) would first present their notes and papers that included matters of principle, and then the participants would break away into discussion groups in which intelligence and ideas were exchanged. It was a huge achievement for Israel, less so because of the quality of the intelligence presented – our capabilities were usually a lot higher – and more so due to the very existence of such an alliance under Israeli auspices.”

    At the same time, in 1959, Israeli and Turkish military leaders – with Israel represented by then-chief of staff Haim Laskov – met in Istanbul to plan a joint military campaign against Syria. The joint operation didn’t materialize, but cooperation between the parties grew ever stronger.

    Over and above the trilateral meetings that took place twice a year, the alliance also involved the exchange of intelligence on an almost-daily basis. “As a Military Intelligence officer, I remember we used to receive daily reports on the passage of Soviet vessels through the Dardanelles Strait,” Alpher says. “This was of dual importance – firstly, it was information about Soviet supplies to the Arab states; and secondly, it was information we could share with the CIA.”

    The Iran-Israel cooperation was even more active: Jews who had fled Iraq for Iran via the Kurdish region in northern Iraq went on from there to Israel; IDF officers trained Iranian forces and Israel sold arms to Iran; in 1958, Iranian weapons were supplied via Israel to conservative Shia groups in southern Lebanon; and on behalf of the Iranians, Israeli intelligence officials set up a body that was responsible for recruiting and handling agents, with its efforts focused on Iraq and also countering Nasser’s subversive activities among the Arabs of the Khuzestan Province in southwest Iran.

    Since the Trident building on the hilltop north of Tel Aviv remained vacant most days of the year, then-Mossad director Meir Amit decided to turn it into a training college named after Mossad agent Eli Cohen, who was executed in Damascus.

    On several occasions over the years, the Mossad requested approval to refurbish the building or even demolish it completely, but the Tel Aviv Municipality declared it a heritage site due to its unique architecture – and thus it remained standing. Those Yellow and Blue rooms, painted many times since in different colors, would go on to serve as the location for some of the most dramatic meetings in Israel’s history, both with foreign officials and among Israeli leaders.

    In 2010, the building hosted the series of lengthy and controversial discussions convened by Prime Minister Benjamin Netanyahu and then-defense minister Ehud Barak on the option of carrying out a strike on Iran’s nuclear facilities. And that’s just one example.

    CIA funding
    The intelligence cooperation with Iran fitted in well with Israel’s support of the Kurds in Iraq, one of the goals of which was to cause as much significant damage as possible to the hostile Iraqi Army.

    The CIA financed a large portion of the Mossad’s activities with the Kurds; and later, as a Mossad official, Alpher, who was born in the United States and is fluent in English, was instructed to prepare the Israeli agency’s request for additional funding from its American counterpart. “We ceremoniously presented them with all the intelligence reports the Kurds had provided, along with information on the extent of the assistance they had received, the extent of the damage they had caused to the Iraqi forces, and so on,” Alpher recalls.

    One of the tasks assigned to Alpher with respect to the Kurds left him feeling uncomfortable; he was asked to review a Kurdish request to plan the demolition of two dams in northern Iraq. “Implementation of such a plan would have led to catastrophic strategic and legal implications,” Alpher says, noting that Israeli experts he met with at the time had told that blowing up the dams would flood Baghdad entirely and cause the death of numerous people. “In the end,” he says, “we informed Barzani, via the Mossad team in Kurdistan, that we were opposed to the operation for humanitarian reasons.”

    A second task was more straightforward, from a moral standpoint at least. “I approached Colonel David Laskov (commander at the time of the Engineering Corps’ research and development unit) and asked him to build Katyusha rocket launchers that could be carried by mules,” Alpher recounts.

    “A week later, Laskov invited me to a firing range in the Negev. On arrival, I found a mule with a sled-like metal frame of sorts on its back, the size of a full briefcase; and in it were Katyushas of the kind that we were about to send to the Kurds. Laskov demonstrated how to tie the ‘saddle’ to the mule, to dismantle it, to position it on the ground, to aim and to launch the rocket.”

    A month later, the Kurds deployed the launchers and rockets in Kirkuk, causing extensive damage to the Iraqi oil facilities there.

    Another major operation carried out by the Mossad during the same period, in the late 1960s, involved assistance in the form of the weapons, food, equipment and training for the Anyanya, the Christian underground in southern Sudan. Under the leadership of Mossad operative David Ben Uziel, a series of three-man Israeli delegations were sent to southern Sudan to train the separatist army, coordinate the delivery of weapons and equipment (with the support of IAF cargo aircraft), and oversee a humanitarian mission that involved the establishment of a field hospital at which an Israeli medical team treated the sick and wounded and vaccinated thousands of children in the area against smallpox and yellow fever.

    Alpher: “The operation was a resounding success. Sudanese President Nimeiri, frustrated by his army’s defeats, offered the South autonomy in 1972. A guerilla war, orchestrated by a junior commander from a minority tribe who operated with the help of Israel, laid the foundations for a new African country (from 2011) free of the Arab threat. At one point in 1970, we did the math and found that the total cost of the Israeli operation in southern Sudan was less than the price of a single Mirage III fighter plane – the French aircraft used at that time by the Israel Air Force against Egypt and Sudan on the Suez Canal front.”

    Rabin in a blonde wig
    Israel’s relations with Morocco are another layer in the Periphery alliance. Israel helped the Moroccan intelligence agency to set up its bodyguards unit and others, including a sophisticated technologically division. And in return, the Moroccans provided Israel with first-grade intelligence, including intimate access to the deliberations of the Arab Summit Conference in Casablanca in September 1965.

    Another important element in the ties with Morocco came some 12 years later, when the North African state served as the stage for arranging then-Egyptian President Anwar Sadat’s historic visit to Jerusalem, with Morocco’s King Hassan as the mediator.

    Alpher: “A meeting between the king and Mossad chief Yitzhak Hofi led to another royal meeting, this time with Prime Minister Yitzhak Rabin, who arrived in Morocco incognito and wearing a blonde wig. Rabin left Hassan with a series of questions for Egyptian President Anwar Sadat with regard to the possibility of a breakthrough towards peace.

    At the next meeting, Hofi held talks with Hassan Tuhami, Sadat’s deputy, and this paved the way for a meeting between Tuhami and Moshe Dayan, foreign minister in (Menachem) Begin’s government. For his secret trip to Morocco, Dayan removed his eye patch and wore a fedora hat. Mossad officials who saw his passport photo couldn’t believe it was Dayan.”

    Following the signing of the peace treaty with Egypt, one of Alpher’s assignments in the Mossad’s research division involved efforts to identify “signs of peace” among other Arab entities – a lesson learned after portions of the intelligence community were caught by surprise by Sadat’s daring initiative.

    Alpher didn’t really find any signs of peace to speak of; but he did discover Israeli blindness in another region under his purview – Iran. “We were so obsessed about trying to preserve our ties with the Iranian shah, who blew hot and cold in his attitude towards us,” Alpher says, “and we so wanted to woo and appease him that we didn’t think about or try to understand what was really happening in Iran – whether the opposition movement stands a chance, or whether we could link up with them not at the expense of our relations with the shah. It was a terrible mistake. We should have known much more about our allies in the periphery, especially when it came to dictatorships.”

    “Terrible ignorance”
    With the fires of the revolution growing ever-more intense in Tehran and elsewhere in the country, Alpher was put in charge of the Iranian file in the Mossad’s research unit. “And that’s when I discover the terrible ignorance,” he says. “Despite the fact that we were invested up to our necks in that country, with 1,500 Israelis working and living there, we knew almost nothing about the opposition – a long line of high-ranking Israeli officials who had served in Iran and were sure they knew it like the back of their hand and that Iran would always remain friendly towards us.”

    In mid-January, Alpher was summoned urgently to the office of Mossad chief Hofi. “They told me to come immediately – right now, drop everything and go up to Hofi,” he recalls.

    With several of the intelligence agency’s top brass in attendance, Hofi briefly laid out the reason for the meeting. A little while earlier, the director said, the secular prime minister appointed by the shah to govern Iran in his stead, Shapour Bakhtiar, had approached the head of the Mossad’s Tehran branch, Eliezer Tsafrir, with a plain and simple request – for the Mossad to assassinate Khomeini.

    At the time, the radical Islamic leader was somewhere near Paris, following his deportation to France from Iraq, to which he was exiled from Iran in the 1960s. Iraq had suggested killing Khomeini, but the shah rejected the idea at the time. Saddam Hussein subsequently deported him, and Khomeini found refuge in a town near Paris from where he successfully orchestrated the revolution by phone and telex machine.

    Khomeini (C) in Paris before his return to Iran (Photo: AFP)
    Khomeini (C) in Paris before his return to Iran (Photo: AFP)

    Tsafrir passed on Bakhtiar’s request to Mossad headquarters in Tel Aviv, where the heads of the agency convened to discuss the matter.

    “Mossad chief Hofi declared at the start of the meeting that because he was opposed in principle to the use of assassination against political leaders, he was inclined to reject the request; but he asked for the thoughts of those in attendance,” Alpher recounts. “Hofi looked at me quizzically. I was frustrated due to the dearth of information that I had about Khomeini. In a split second, I ran through all we knew about him in my mind.

    “But before I get a chance to respond, one division dead butts in and says: ‘Let Khomeini return to Tehran. He won’t last. The army and the SAVAK will deal with him and the clergy who are demonstrating in the streets. He represents Iran’s past, not its future.’

    “Hofi looked at me again. I thought about the positions of Washington and Moscow, about the implications of the success of such an operation for the Middle East, and the consequences of its failure vis-à-vis our relations with France and the Muslim world. I took a deep breath and said: We don’t have enough information about Khomeini’s viewpoints and his chances to realize them, so I cannot accurately assess whether the risk is justified.”

    And indeed, the Mossad rejected the request to assassinate Khomeini. Alpher says he “deeply regrets” not supporting the Iranian prime minister’s request and the fact that the Mossad chose not to kill the Islamic leader. “Just two months after that meeting, I realized who we were dealing with, and already then I regretted not supporting Bakhtiar’s request,” Alpher says.

    Bakhtiar ended up in exile in Paris, where he was assassinated a decade later by Iranian intelligence agents.

    Taken for a ride
    The Periphery strategy has also known its fair share of setbacks and disappointments; but above all, according to Alpher’s book, hovers the shadow of the terrible failure in connection with the Christian Maronites in Lebanon.

    “They took the Mossad and all of Israel for a ride with deceit and terrible lies,” Alpher says. “They knew exactly how to take advantage of us, of our desire to support persecuted minorities; and they led very senior officials in the security establishment and Mossad to believe that they would side with us in the event of a military invasion of Lebanon.

    “I was less enamored with them at the time, perhaps because I was born in the United States and I was familiar with traditional Catholic anti-Semitism, into which they too were born. The heavy blow Israel suffered in the Lebanon War and its aftermath led to a pullback, perhaps excessive, in our desire to support persecuted minorities in the years to follow.”

    Alpher warns against undertaking to intervene militarily on behalf of a different minority because of the existence of a lobby within Israel itself. Israel’s Druze citizens are an important minority with a very strong parliamentary and government lobby, Alpher says, adding: “I am concerned by the statement of former chief of staff Benny Gantz, who for some reason made a commitment to the Druze dignitaries that the State of Israel would act to safeguard their fellow Druze across the border during the civil war in Syria.

    “This could push us into a very hazardous adventure. We need to think things over very carefully based on our past experience. What are the risks? What is the extent of our moral obligation towards another minority in the region that runs into trouble with radical Islam?”

    The successes and failures aside, what about the moral issue? After all, as part of the Periphery strategy, the Mossad forged tied with a series of dark regimes, terrible dictatorships, actively supporting them and sometimes tipping the scales in their favor.

    “And to all of that you can add the fact that we knew that the issue of the Protocols of the Elders of Zion plays a very important role for them. To a certain degree even, we played that card, so they’d think we have immense influence over the world, and could manipulate US policy in their favor in particular. The Moroccans, the Iranians, the Turks, Idi Amin – they were all sure that one word from us would change Washington’s position towards them.

    “What did we say to ourselves? A. It allows us to survive; B. It allows us to deter Arab aggression; C. It gives us the money, in the case of Iran for example, to launch arms development programs we couldn’t otherwise afford. Without it, you have no military industry and you cannot survive.”

    “We knew we were dealing with unpleasant, oppressive, anti-Semitic regimes – call them what you want. Of course we knew. But was there an alternative? In other words, the alternative was to remain an isolated state, to wallow in our solitude in the face of a ring of Arab hostility.

    “Now, even if you accept Professor Shimon Shamir’s thesis (presented in the book and highly critical of the Mossad’s Periphery strategy) that with a little more effort we could actually have made peace with our close neighbors, were those regimes any better than the ones of Idi Amin and the shah? This is the environment. This is the neighborhood in which we live. It demands tough decisions sometimes.”

    Ronen Bergman
    Published: 06.21.15, 23:52 / Israel News

    Find this story at 21 June 2015

    Copyright © Yedioth Internet.

    (TS//REL TO USA, ISR) Subject: NSA Intelligence Relationship with Israel

    (U) Introduction
    (TS//N F) NSA maintains a far-reaching technical and analytic relationship with the
    Israeli SIGINT National Unit (ISNU) sharing information on access, intercept, targeting,
    language, analysis and reporting. This SIGINT relationship has increasingly been the
    catalyst for a broader intelligence relationship between the United States and Israel.
    Significant changes in the way NSA and ISNU have traditionally approached SIGINT
    have prompted an expansion to include other Israeli and U.s. intelligence organizations
    such as CIA, Mossad, and Special Operation Division (SOD).
    (U) Key Issues
    (TS//SI//N F) The single largest exchange between N SA and ISN U is on targets in the
    Middle East which constitute strategic threats to U.s. and Israeli interests. Building
    upon a robust analytic exchange, NSA and ISNU also have explored and executed
    unique opportunities to gain access to high priority targets. The mutually agreed upon
    geographic targets include the countries of North Africa, the Middle East, the Persian
    Gulf, South Asia, and the Islamic republics of the former Soviet Union. Within that set of
    countries, cooperation covers the exploitation of internal governmental, military, civil,
    and diplomatic communications; and external security/intelligence organizations.
    Regional Weapons of Mass Destruction Proliferation and “Stateless”/lnternational
    Terrorism comprise the exchanged transnational target set. A dedicated
    communications line between NSA and ISN U supports the exchange of raw material, as
    well as daily analytic and technical correspondence. Both N SA and ISN U have liaison
    officers, who conduct foreign relations functions, stationed at their respective
    embassies.
    (TS//REL TO USA, ISR) What NSA Provides to ISNU
    (TS//SI//REL TO USA, ISR) The Israeli side enjoys the benefits of expanded geographic
    access to world-class NSA cryptanalytic and SIGINT engineering expertise, and also
    gains controlled access to advanced U.s. technology and equipment via
    accommodation buys and foreign military sales.
    (TS//REL TO USA, ISR) What ISNU Provides to NSA
    (TS//SI//RE L TO USA, ISR) Benefits to the U.s. include expanded geographic access to
    high priority SIGINT targets, access to world-class Israeli cryptanalytic and SIGINT
    engineering expertise, and access to a large pool of highly qualified analysts.
    Derived From: NSA/CSSM 1-52
    Dated: 20070108
    Declassify On: 20371101
    TOP SECRET//SI//NOFORN
    TOP SECRET//SII/NOFORN
    (U) Success Stories _
    (TS//SI//REL TO USA, ISR) A key priority for ISN U is the Iranian nuclear development
    program, followed by Syrian nuclear efforts, Lebanese Hizballah plans and intentions,
    Palestinian terrorism, and Global Jihad. Several recent and successful joint operations
    between N SA and IS N U have broadened both organizations’ ability to target and exploit
    Iranian nuclear efforts. In addition, a robust and dynamic cryptanalytic relationship has
    enabled breakthroughs on high priority Iranian targets.
    (TS//REL TO USA, ISR) NSA and ISNU continue to initiate joint targeting of Syrian and
    Iranian leadership and nuclear development programs with CIA, ISNU, SOD and
    Massad. This exchange has been particularly important as unrest in Syria continues,
    and both sides work together to identify threats to regional stability. N SA’s cyber
    partnerships expanded beyond IS N U to include Israeli Defense Intelligence’s soD and
    Massad, resulting in unprecedented access and collection breakthroughs that all sides
    acknowledge would not have been possible to achieve without the others.
    (TS//SI//N F) In July 2012, the Office of the Director of N ationallntelligence (ODN I)
    provided guidance for expanded sharing with the GOI (Government of Israel) on Egypt.
    This approval has allowed N SA to task for ISN U on select strategic issues, specifically
    terrorist elements in the Sinai.
    (S//N F) Beyond the traditional SIGI NT relationship, N SA and ISN U signed a M 0 U in
    September 2011 providing for Information Assurance/Computer Network Defense
    collaboration. N SA’s Information Assurance Deputy Director anended an lAIC N D
    conference in Tel Aviv in January 2012 during which N SA and ISN U established
    objectives for the relationship. NSA intends to focus the collaboration on cyber threats
    from Iran, H izballah and other regional actors and may provide limited, focused support
    on specific Russian and Chinese cyber threats. Conferences to further develop this
    partnership were held in May 2012 and December 2012.
    (TS//SI//REL TO USA, ISR) NSA and ISNU led their communities in the establishment
    of U.s. – Israeli Intelligence Community VTC connectivity that allows both sides to
    broaden and accelerate the pace of collaboration against targets’ use of advanced
    telecommunications. Target sets include, but are not limited to Iran Nuclear, Syrian
    Foreign Fighter movements, Lebanese Hizballah and Iranian Revolutionary Guard
    Corps activities. Dialogue is ongoing, with each potential new intelligence or technology
    initiative considered for approval individually.
    (U) Problems/Challenges
    (TS//N F) The three most common concerns raised by ISN U regarding the partnership
    with NSA is NSA’s reluctance to share on technology that is not directly related to a
    specific target, ISN U’s perceived reduction in the amount and degree of cooperation in
    certain areas, and the length of time NSA takes to decide on ISN U proposals. Efforts in
    these three areas have been addressed with the partner and NSA continues to work to
    TOP SECRET//SI//NOFORN 2
    TOP SECRET//SII/NOFORN
    increase cooperation with IS N U, where appropriate and mindful of U.s. policy and
    equity concerns.
    (U//FOUO) Updated by:
    Country Desk Officer
    Fo n Affairs Directorate

    view the file at

    NSA shares raw intelligence including Americans’ data with Israel

    • Secret deal places no legal limits on use of data by Israelis
    • Only official US government communications protected
    • Agency insists it complies with rules governing privacy
    • Read the NSA and Israel’s ‘memorandum of understanding’

    The National Security Agency routinely shares raw intelligence data with Israel without first sifting it to remove information about US citizens, a top-secret document provided to the Guardian by whistleblower Edward Snowden reveals.

    Details of the intelligence-sharing agreement are laid out in a memorandum of understanding between the NSA and its Israeli counterpart that shows the US government handed over intercepted communications likely to contain phone calls and emails of American citizens. The agreement places no legally binding limits on the use of the data by the Israelis.

    The disclosure that the NSA agreed to provide raw intelligence data to a foreign country contrasts with assurances from the Obama administration that there are rigorous safeguards to protect the privacy of US citizens caught in the dragnet. The intelligence community calls this process “minimization”, but the memorandum makes clear that the information shared with the Israelis would be in its pre-minimized state.

    The deal was reached in principle in March 2009, according to the undated memorandum, which lays out the ground rules for the intelligence sharing.

    The five-page memorandum, termed an agreement between the US and Israeli intelligence agencies “pertaining to the protection of US persons”, repeatedly stresses the constitutional rights of Americans to privacy and the need for Israeli intelligence staff to respect these rights.

    But this is undermined by the disclosure that Israel is allowed to receive “raw Sigint” – signal intelligence. The memorandum says: “Raw Sigint includes, but is not limited to, unevaluated and unminimized transcripts, gists, facsimiles, telex, voice and Digital Network Intelligence metadata and content.”

    According to the agreement, the intelligence being shared would not be filtered in advance by NSA analysts to remove US communications. “NSA routinely sends ISNU [the Israeli Sigint National Unit] minimized and unminimized raw collection”, it says.

    Although the memorandum is explicit in saying the material had to be handled in accordance with US law, and that the Israelis agreed not to deliberately target Americans identified in the data, these rules are not backed up by legal obligations.

    “This agreement is not intended to create any legally enforceable rights and shall not be construed to be either an international agreement or a legally binding instrument according to international law,” the document says.

    In a statement to the Guardian, an NSA spokesperson did not deny that personal data about Americans was included in raw intelligence data shared with the Israelis. But the agency insisted that the shared intelligence complied with all rules governing privacy.

    “Any US person information that is acquired as a result of NSA’s surveillance activities is handled under procedures that are designed to protect privacy rights,” the spokesperson said.

    The NSA declined to answer specific questions about the agreement, including whether permission had been sought from the Foreign Intelligence Surveillance (Fisa) court for handing over such material.

    The memorandum of understanding, which the Guardian is publishing in full, allows Israel to retain “any files containing the identities of US persons” for up to a year. The agreement requests only that the Israelis should consult the NSA’s special liaison adviser when such data is found.

    Notably, a much stricter rule was set for US government communications found in the raw intelligence. The Israelis were required to “destroy upon recognition” any communication “that is either to or from an official of the US government”. Such communications included those of “officials of the executive branch (including the White House, cabinet departments, and independent agencies), the US House of Representatives and Senate (member and staff) and the US federal court system (including, but not limited to, the supreme court)”.

    It is not clear whether any communications involving members of US Congress or the federal courts have been included in the raw data provided by the NSA, nor is it clear how or why the NSA would be in possession of such communications. In 2009, however, the New York Times reported on “the agency’s attempt to wiretap a member of Congress, without court approval, on an overseas trip”.

    The NSA is required by law to target only non-US persons without an individual warrant, but it can collect the content and metadata of Americans’ emails and calls without a warrant when such communication is with a foreign target. US persons are defined in surveillance legislation as US citizens, permanent residents and anyone located on US soil at the time of the interception, unless it has been positively established that they are not a citizen or permanent resident.

    Moreover, with much of the world’s internet traffic passing through US networks, large numbers of purely domestic communications also get scooped up incidentally by the agency’s surveillance programs.

    The document mentions only one check carried out by the NSA on the raw intelligence, saying the agency will “regularly review a sample of files transferred to ISNU to validate the absence of US persons’ identities”. It also requests that the Israelis limit access only to personnel with a “strict need to know”.

    Israeli intelligence is allowed “to disseminate foreign intelligence information concerning US persons derived from raw Sigint by NSA” on condition that it does so “in a manner that does not identify the US person”. The agreement also allows Israel to release US person identities to “outside parties, including all INSU customers” with the NSA’s written permission.

    Although Israel is one of America’s closest allies, it is not one of the inner core of countries involved in surveillance sharing with the US – Britain, Australia, Canada and New Zealand. This group is collectively known as Five Eyes.

    The relationship between the US and Israel has been strained at times, both diplomatically and in terms of intelligence. In the top-secret 2013 intelligence community budget request, details of which were disclosed by the Washington Post, Israel is identified alongside Iran and China as a target for US cyberattacks.

    While NSA documents tout the mutually beneficial relationship of Sigint sharing, another report, marked top secret and dated September 2007, states that the relationship, while central to US strategy, has become overwhelmingly one-sided in favor of Israel.

    “Balancing the Sigint exchange equally between US and Israeli needs has been a constant challenge,” states the report, titled ‘History of the US – Israel Sigint Relationship, Post-1992′. “In the last decade, it arguably tilted heavily in favor of Israeli security concerns. 9/11 came, and went, with NSA’s only true Third Party [counter-terrorism] relationship being driven almost totally by the needs of the partner.”

    newtear3

    In another top-secret document seen by the Guardian, dated 2008, a senior NSA official points out that Israel aggressively spies on the US. “On the one hand, the Israelis are extraordinarily good Sigint partners for us, but on the other, they target us to learn our positions on Middle East problems,” the official says. “A NIE [National Intelligence Estimate] ranked them as the third most aggressive intelligence service against the US.”

    Later in the document, the official is quoted as saying: “One of NSA’s biggest threats is actually from friendly intelligence services, like Israel. There are parameters on what NSA shares with them, but the exchange is so robust, we sometimes share more than we intended.”

    newtear1

    The memorandum of understanding also contains hints that there had been tensions in the intelligence-sharing relationship with Israel. At a meeting in March 2009 between the two agencies, according to the document, it was agreed that the sharing of raw data required a new framework and further training for Israeli personnel to protect US person information.

    It is not clear whether or not this was because there had been problems up to that point in the handling of intelligence that was found to contain Americans’ data.

    However, an earlier US document obtained by Snowden, which discusses co-operating on a military intelligence program, bluntly lists under the cons: “Trust issues which revolve around previous ISR [Israel] operations.”

    newtear2

    The Guardian asked the Obama administration how many times US data had been found in the raw intelligence, either by the Israelis or when the NSA reviewed a sample of the files, but officials declined to provide this information. Nor would they disclose how many other countries the NSA shared raw data with, or whether the Fisa court, which is meant to oversee NSA surveillance programs and the procedures to handle US information, had signed off the agreement with Israel.

    In its statement, the NSA said: “We are not going to comment on any specific information sharing arrangements, or the authority under which any such information is collected. The fact that intelligence services work together under specific and regulated conditions mutually strengthens the security of both nations.

    “NSA cannot, however, use these relationships to circumvent US legal restrictions. Whenever we share intelligence information, we comply with all applicable rules, including the rules to protect US person information.”

    Glenn Greenwald, Laura Poitras and Ewen MacAskill
    The Guardian, Wednesday 11 September 2013 15.40 BST

    Find this story at 11 September 2013

    Memorandum of understanding

    © 2015 Guardian News and Media Limited or its affiliated companies. All rights reserved.

    The Story of ‘Operation Orchard’ How Israel Destroyed Syria’s Al Kibar Nuclear Reactor

    In September 2007, Israeli fighter jets destroyed a mysterious complex in the Syrian desert. The incident could have led to war, but it was hushed up by all sides. Was it a nuclear plant and who gave the orders for the strike?

    The mighty Euphrates river is the subject of the prophecies in the Bible’s Book of Revelation, where it is written that the river will be the scene of the battle of Armageddon: “The sixth angel poured out his bowl on the great river Euphrates, and its water was dried up to prepare the way for the kings from the East.”

    Today, time seems to stand still along the river. The turquoise waters of the Euphrates flow slowly through the northern Syrian provincial city Deir el-Zor, whose name translates as “monastery in the forest.” Farmers till the fields, and vendors sell camel’s hair blankets, cardamom and coriander in the city’s bazaars. Occasionally archaeologists visit the region to excavate the remains of ancient cities in the surrounding area, a place where many peoples have left their mark — the Parthians and the Sassanids, the Romans and the Jews, the Ottomans and the French, who were assigned the mandate for Syria by the League of Nations and who only withdrew their troops in 1946. Deir el-Zor is the last outpost before the vast, empty desert, a lifeless place of jagged mountains and inaccessible valleys that begins not far from the town center.

    But on a night two years ago, something dramatic happened in this sleepy place. It’s an event that local residents discuss in whispers in teahouses along the river, when the water pipes glow and they are confident that no officials are listening — the subject is taboo in the state-controlled media, and they know that drawing too much attention to themselves in this authoritarian state could be hazardous to their health.

    Some in Deir el-Zor talk of a bright flash which lit up the night in the distant desert. Others report seeing a gigantic column of smoke over the Euphrates, like a threatening finger. Some talk of omens, while others relate conspiracy theories. The pious older guests at Jisr al-Kabir, a popular restaurant near the city’s landmark suspension bridge, believe it was a sign from heaven.

    All the rumors have long since muddied the waters as to what people may or may not have seen. But even the supposedly advanced Western world, with its state-of-the-art surveillance technology and interconnectedness through the mass media, has little more solid information than the people in this Syrian desert town. What happened in the night of Sept. 6, 2007 in the desert, 130 kilometers (81 miles) from the Iraqi border, 30 kilometers from Deir el-Zor, is one of the great mysteries of our times.

    ‘This Incident Never Occurred’

    At 2:55 p.m. on that day, the Damascus-based Syrian Arab News Agency (SANA) reported that Israeli fighter jets coming from the Mediterranean had violated Syrian airspace at “about one o’clock” in the morning. “Air defense units confronted them and forced them to leave after they dropped some ammunition in deserted areas without causing any human or material damage,” a Syrian military spokesman said, according to the news agency. There was no explanation whatsoever for why such a dramatic event was concealed for half a day.

    At 6:46 p.m., Israeli government radio quoted a military spokesman as saying: “This incident never occurred.” At 8:46 p.m., a spokesperson for the US State Department said during a daily press briefing that he had only heard “second-hand reports” which “contradict” each other.

    To this day, Syria and Israel, two countries that have technically been at war since the founding of the Jewish state in 1948, have largely adhered to a bizarre policy of downplaying what was clearly an act of war. Gradually it became clear that the fighter pilots did not drop some random ammunition over empty no-man’s land on that night in 2007, but had in fact deliberately targeted and destroyed a secret Syrian complex.

    Was it a nuclear plant, in which scientists were on the verge of completing the bomb? Were North Korean, perhaps even Iranian experts, also working in this secret Syrian facility? When and how did the Israelis learn about the project, and why did they take such a great risk to conduct their clandestine operation? Was the destruction of the Al Kibar complex meant as a final warning to the Iranians, a trial run of sorts intended to show them what the Israelis plan to do if Tehran continues with its suspected nuclear weapons program?

    In recent months, SPIEGEL has spoken with key politicians and experts about the mysterious incident in the Syrian desert, including Syrian President Bashar Assad, leading Israeli intelligence expert Ronen Bergman, International Atomic Energy Agency head Mohammed ElBaradei and influential American nuclear expert David Albright. SPIEGEL has also talked with individuals involved in the operation, who have only now agreed to reveal, under conditions of anonymity, what they know.

    These efforts have led to an account that, while not solving the mystery in its entirety, at least delivers many pieces of the puzzle. It also offers an assessment of an operation that changed the Middle East and generated shock waves that are still being felt today.

    Syria’s Unpredictable President

    Tel Aviv, late 2001. An inconspicuous block of houses located among eucalyptus trees is home to the headquarters of the legendary Israeli foreign intelligence agency, the Mossad. A memorial to agents who died in commando operations behind enemy lines stands in the small garden. There are already more than 400 names engraved on the gray marble, with room for many more. In the main building, intelligence analysts are trying to assemble a picture of the new Syrian president.

    In July 2000, Bashar Assad succeeded his deceased father, former President Hafez Assad. The Israelis believed that the younger Assad, a politically inexperienced ophthalmologist who had lived in London for many years and who was only 34 when he took office, would be a weak leader. Unlike his father, an unscrupulous political realist nicknamed “The Lion” who had almost struck a deal with the Israelis over the Golan Heights in the last few months of his life, Bashar Assad was considered relatively unpredictable.

    According to Israeli agents in Damascus, the younger Assad was trying to consolidate his power by espousing radical and controversial positions. He supplied massive amounts of weapons to the Iranian-backed Hezbollah in Lebanon, for their “struggle for independence” from the “Zionist regime.” He received high-ranking delegations from North Korea. The Mossad was convinced that the subject of these secret talks was a further upgrading of Syria’s military capabilities. Pyongyang had already helped Damascus in the past in the development of medium-range ballistic missiles and chemical weapons like sarin and mustard gas. But when Israeli military intelligence informed their Mossad counterparts that a Syrian nuclear program was apparently under discussion, the intelligence professionals were dismissive.

    Nuclear weapons for Damascus, a nuclear plant literally on Israel’s doorstep? For the experts, it seemed much too implausible.

    Besides, the senior Assad had rebuffed Abdul Qadeer Khan, the Pakistani “father of the atom bomb,” when Khan tried to sell him centrifuges for uranium enrichment on the black market in the early 1990s. The Israelis also knew all too well how complex the road to the bomb is, after having spent a lengthy period of time in the 1960s to covertly procure uranium and then develop nuclear weapons at their secret laboratories in the town of Dimona in the Negev desert. They took extreme measures to prevent then-Iraqi dictator Saddam Hussein from following their example: On a June night in 1981, Israeli F-16s, in violation of international law, entered Iraqi airspace and destroyed the Osirak nuclear reactor near Baghdad.

    Key Phase

    The Israelis took a pinprick approach to dealing with the “little” Assad. In 2003, the air force conducted multiple air strikes against positions on the Syrian border, and in October Israeli fighter jets flew a low-altitude mission over Assad’s residence in Damascus. It was an arrogant show of power that even had many at the Mossad shaking their heads, wondering how Assad would respond to such humiliating treatment.

    At that time, the nuclear plant on Euphrates had likely entered its first key phase. In the spring of 2004, the American National Security Agency (NSA) detected a suspiciously high number of telephone calls between Syria and North Korea, with a noticeably busy line of communication between the North Korean capital Pyongyang and a place in the northern Syrian desert called Al Kibar. The NSA dossier was sent to the Israeli military’s “8200” unit, which is responsible for radio reconnaissance and has its antennas set up in the hills near Tel Aviv. Al-Kibar was “flagged,” as they say in intelligence jargon.

    In late 2006, Israeli military intelligence decided to ask the British for their opinion. But almost at the same time as the delegation from Tel Aviv was arriving in London, a senior Syrian government official checked into a hotel in the exclusive London neighborhood of Kensington. He was under Mossad surveillance and turned out to be incredibly careless, leaving his computer in his hotel room when he went out. Israeli agents took the opportunity to install a so-called “Trojan horse” program, which can be used to secretly steal data, onto the Syrian’s laptop.

    The hard drive contained construction plans, letters and hundreds of photos. The photos, which were particularly revealing, showed the Al Kibar complex at various stages in its development. At the beginning — probably in 2002, although the material was undated — the construction site looked like a treehouse on stilts, complete with suspicious-looking pipes leading to a pumping station at the Euphrates. Later photos show concrete piers and roofs, which apparently had only one function: to modify the building so that it would look unsuspicious from above. In the end, the whole thing looked as if a shoebox had been placed over something in an attempt to conceal it. But photos from the interior revealed that what was going on at the site was in fact probably work on fissile material.

    One of the photos showed an Asian in blue tracksuit trousers, standing next to an Arab. The Mossad quickly identified the two men as Chon Chibu and Ibrahim Othman. Chon is one of the leading members of the North Korean nuclear program, and experts believe that he is the chief engineer behind the Yongbyon plutonium reactor. Othman is the director of the Syrian Atomic Energy Commission.

    By now, both Israeli military intelligence and the Mossad were on high alert. After being briefed, then-Prime Minister Ehud Olmert asked: “Will the reactor be up and running soon, and is there is a need to take action?” Hard to say, the experts said. The prime minister asked for more detailed information, preferably from first hand.

    The CIA Catches a Big Fish

    Istanbul , a CIA safe house for high-profile defectors, February 2007. An Iranian general had decided to switch sides. He was a big fish, of the sort rarely caught in the nets of the CIA and the Mossad.

    Ali-Reza Asgari, 63, a handsome man with a moustache, was the head of Iran’s Revolutionary Guard in Lebanon in the 1980s and became Iran’s deputy defense minister in the mid-1990s. Though well-liked under the relatively liberal then-President Mohammad Khatami, Asgari fell out of favor after the election victory of hardliner Mahmoud Ahmadinejad in 2005. Because he had branded several men close to Ahmadinejad as corrupt, there was suddenly more at stake for Asgari than his career: His life was in danger.

    Sources in the intelligence community claim that Asgari’s defection to the West was meticulously planned over a period of months. However Amir Farshad Ebrahimi, a former Iranian media attaché in Beirut who fled to Berlin in 2003 and who had known Asgari personally for many years, told SPIEGEL that the general contacted him twice to ask for help in his escape — first from Iran in the second half of 2006 and later from Damascus. In Ebrahimi’s version of events, Asgari succeeded in crossing the border into Turkey at night with the help of a smuggler. Ebrahimi says he only notified the CIA and turned his friend over to the Americans after Asgari had reached Istanbul.

    But from that point on, the versions of the story coincide again. The Americans and Israelis soon discovered that the Tehran insider was an intelligence goldmine. For the Israelis, the most alarming part of Asgari’s story was what he had to say about Iran’s nuclear program. According to Asgari, Tehran was building a second, secret plant in addition to the uranium enrichment plant in Natanz, which was already known to the West. Besides, he said, Iran was apparently funding a top-secret nuclear project in Syria, launched in cooperation with the North Koreans. But Asgari claimed he did not know any further details about the plan.

    After a few days, the general’s handlers flew him from Istanbul, considered relatively unsafe, to the highly secure Rhein-Main Air Base near Frankfurt. “I brought my computer along. My entire life is in there,” Asgari told his friend Ebrahimi, who identified him for the Americans. Asgari contacted Ebrahimi another two times, once from Washington and then from “somewhere in Texas.” The defector wanted his friend to let his wife know that he was safe and in good hands. The Iranian authorities had announced that Asgari had been “kidnapped by the Mossad and probably killed.” But then nothing further was heard from Asgari. The American authorities had apparently created a new identity for their high-level Iranian source. Ali-Reza Asgari had ceased to exist.

    The Need for US Support

    Olmert was kept apprised of the latest developments. In March 2007, three senior experts from the political, military and intelligence communities were summoned to his residence on Gaza Street in Jerusalem, where Olmert swore them to absolute secrecy. The trio was to advise him on matters relating to the Syrian nuclear program. Olmert wanted results, knowing that he would have to gain the support of the Americans before launching an attack. At the very least, he needed the Americans’ tacit consent if he planned to send aircraft into regions that were only a few dozen kilometers from military bases in Turkey, a NATO member.

    In August, Major General Yaakov Amidror, the trio’s spokesman, delivered a devastating report to the prime minister. While the Mossad had tended to be reserved in its assessment of Al Kibar, the three men were now more than convinced that the site posed an existential threat to Israel and that there was evidence of intense cooperation between Syria and North Korea. There also appeared to be proof of connections to Iran. Mohsen Fakhrizadeh-Mahabadi, who experts believed was the head of Iran’s secret “Project 111” for outfitting Iranian missiles with nuclear warheads, had visited Damascus in 2005. Iranian President Mahmoud Ahmadinejad traveled to Syria in 2006, where he is believed to have promised the Syrians more than $1 billion (€675 million) in assistance and urged them to accelerate their efforts.

    According to this version of the story, Al Kibar was to be a backup plant for the heavy-water reactor under construction near the Iranian city of Arak, designed to provide plutonium to build a bomb if Iran did not succeed in constructing a weapon using enriched uranium. “Assad apparently thought that, with his weapon, he could have a nuclear option for an Armageddon,” says Aharon Zeevi-Farkash, the former director of Israeli military intelligence.

    Suspicious Ships

    Olmert approved a highly risky undertaking: a fact-finding mission by Israeli agents on foreign soil. On an overcast night in August 2007, says intelligence expert Ronen Bergman, Israeli elite units traveling in helicopters at low altitude crossed the border into Syria, where they unloaded their testing equipment in the desert near Deir el-Zor and took soil samples in the general vicinity of the Al Kibar plant. The group had to abort its daring mission prematurely when it was discovered by a patrol. The Israelis still lacked the definitive proof they needed. However those in Tel Aviv who favored quick action argued that the results of the samples “provided evidence of the existence of a nuclear program.”

    One of them was the head of the trio of experts, Yaakov Amidror. Amidror, a deeply religious man strongly influenced by his fear of a new Holocaust, also found evidence suggesting that construction on the Syrian plant was to be accelerated. He told Olmert about a ship called the Gregorio, which was coming from North Korea and which was seized in Cyprus in September 2006. It was found to have suspicious-looking pipes bound for Syria on board. And in early September 2007, the freighter Al-Ahmad, also coming from Pyongyang, arrived at the Syrian port of Tartous — with a cargo of uranium materials, according to the Mossad’s information.

    At the time, no one was claiming that Al Kibar represented an immediate threat to Israel’s security. Nevertheless, Olmert wanted to attack, despite the tense conditions in the region, the Iraq crisis and the conflict in the Gaza Strip. Olmert notified then-US National Security Advisor Stephen Hadley and gave his own military staff the authority to bomb the Syrian plant. The countdown for Operation Orchard had begun.

    ‘Target Destroyed’

    Ramat David Air Base, Sept. 5, 2007. Israel’s Ramat David air base is located south of the port city of Haifa. It is also near Megiddo, which according to the Bible will be the site of Armageddon, the final battle between good and evil.

    The order that the pilots in the squadron received shortly before 11 p.m. on Sept. 5, 2007 seemed purely routine: They were to be prepared for an emergency exercise. All 10 available aircraft, known affectionately by their pilots as “Raam” (“Thunder”), took off into the night sky and headed westward, out into the Mediterranean. It was a maneuver designed to deflect attention from the extraordinary mobilization that had been taking place behind the scenes.

    Three of the 10 F-15’s were ordered to return home, while the remaining seven continued flying east-northeast, at low altitude, toward the nearby Syrian border, where they used their precision-guided weapons to eliminate a radar station. Within an additional 18 flight minutes, they had reached the area around Deir el-Zor. By then, the Israeli pilots had the coordinates of the Al Kibar complex programmed into their on-board computers. The attack was filmed from the air, and as is always the case with these strikes, the bombs were far more destructive than necessary. For the Israelis, it made little difference whether a few guards were killed or a larger number of people.

    Immediately following the brief report from the military (“target destroyed”), Prime Minister Ehud Olmert called Turkish Prime Minister Recep Tayyip Erdogan, explained the situation, and asked him to inform President Assad in Damascus that Israel would not tolerate another nuclear plant — but that no further hostile action was planned. Israel, Olmert said, did not want to play up the incident and was still interested in making peace with Damascus. He added that if Assad chose not to draw attention to the Israeli strike, he would do the same.

    In this way, a deafening silence about the mysterious event in the desert began. Nevertheless, the story did not end there, because there were many who chose to shed light on the incident — and others who were intent on exacting revenge.

    Washington , DC , late October 2007. The independent Institute for Science and International Security (ISIS) is located less than a mile from the White House. It is more important than some US federal departments.

    The office of its founder and president, David Albright, who holds a degree in physics and was a member of the United Nation’s International Atomic Energy Agency (IAEA) group of experts in Iraq, is in suite 500 of the brick building that houses the ISIS. As relaxed as he seems to his staff, in his pleated khaki trousers and rolled up shirtsleeves, they know that it is no accident that Albright has managed to turn the ISIS into one of the leading think tanks in Washington. Albright’s words carry significant weight in the world of nuclear scientists.

    The ISIS spent four weeks analyzing the initial reports about the mysterious air strike in Syria, combing over satellite images covering an area of 25,000 square kilometers (9,650 square miles) before they discovered the destroyed complex of buildings in the desert.

    In April 2008, Albright received an unexpected invitation from the CIA to attend a meeting. There, then-CIA Director Michael Hayden showed him images that the Israelis had obtained from the Syrian computer in London (much to the outrage of officials in Tel Aviv, incidentally, as it provided insights into Mossad sources). The photos enabled Albright, who was familiar with the dimensions and characteristics of North Korea’s Yongbyon reactor, to compare the various stages at Al Kibar. “There are no longer any serious doubts that we were dealing with a nuclear reactor in Syria,” the scientist concluded.

    Albright believes that the CIA’s strange behavior had to be understood in the context of the Iraq disaster. At the time, the administration of then-President George W. Bush, citing CIA information, constantly repeated the false claim that Saddam Hussein possessed weapons of mass destruction. This time around, American intelligence wanted to prove that the threat was real.

    But where did the Syrians get the uranium they needed for their heavy-water reactor, and in which secret plants was it enriched? In addition to the North Koreans, were the Iranians also involved? And what did the latest images of this “Manhattan project” in the Syrian desert actually depict — the conversion of an existing plant or a completely new facility?

    The Sisyphus of Non-Proliferation

    Vienna, the UN complex on Wagramer Straße, headquarters of the IAEA’s nuclear detectives. An impressive collection of national flags hangs in the lobby, like sails waiting for a tailwind. Of the 192 UN member states, 150 are also members of the IAEA, and almost all UN members have signed the Nuclear Non-Proliferation Treaty (NPT). The problem children of the nuclear world, Israel, Pakistan and India, have not signed the treaty. All three of them possess — or in the case of Israel, are believed to possess — nuclear weapons.

    Signatory states like Syria and Iran are entitled to support in pursuing the peaceful use of nuclear energy. They are also required to either phase out nuclear weapons and prevent their proliferation (in the case of the nuclear “haves”) or refrain from developing them in the first place (in the case of the “have-nots”).

    The IAEA, whose job is to verify compliance with the provisions of the NPT, has 2,200 employees and an annual budget of roughly $300 million. That may sound impressive, but it is really just peanuts if the claim repeatedly made by politicians around the world is true, namely that the possibility of nuclear weapons falling into the hands of blackmailing dictators or terrorists poses the greatest danger to humanity.

    During an interview with SPIEGEL in his Vienna office in May 2009, IAEA Director General Mohamed ElBaradei, 67, sighed as he took stock of his life. At times, the IAEA boss says, he has felt like Sisyphus, the tragic figure in Greek mythology who is constantly pushing a boulder up a mountain, only to lose hold of it shortly before the summit. ElBaradei, the winner of the 2005 Nobel Peace Prize, has repeatedly pointed out that his organization is subject to the whims of the member states. The nuclear detectives can admittedly be deployed to use their highly sensitive testing equipment to obtain a “nuclear fingerprint” in any particular place, but they also need access to reactors. Libya has caused problems in the past, while today’s recalcitrants are North Korea and Iran — in other words, the usual suspects. And now Syria. The news about the desert nuclear plant came as a great shock to the IAEA.

    “What the Israelis did was a violation of international law. If the Israelis and the Americans had information about an illegal nuclear facility, they should have notified us immediately,” says ElBaradei, who only learned of the dramatic incident from media reports. “When everything was over, we were supposed to head out and search for evidence in the rubble — a virtually impossible task.”

    Alarming Findings

    But he had underestimated his inspectors. In June 2008, a team of IAEA experts visited the destroyed Al Kibar plant. The Syrians had given in to pressure from the weapons inspectors, but they had also done everything possible to dispose of the evidence first. They removed all the debris from the bombed facility and paved over the entire site with concrete. They told the inspectors that it had been a conventional weapons factory, and not a nuclear reactor, which they would have been required to report to the IAEA. They also insisted that foreigners had not been involved.

    The IAEA experts painstakingly collected soil samples, and used special wipes to remove minute traces of material from furnishings or pipes still on the site. The samples were sent to the IAEA special laboratories in Seibersdorf, a town near Vienna, where they were subjected to ultrasensitive isotope analyses capable of determining whether samples had come into contact with suspicious uranium. And indeed, the analysis produced some very alarming findings.

    In its report, the IAEA describes “a significant number of anthropogenic natural uranium particles (i.e. produced as a result of chemical processing)” which were “of a type not included in Syria’s declared inventory of nuclear material.” The Syrian authorities claimed that the uranium was introduced by the Israeli bombing, something that the IAEA said was of “low probability.”

    In its latest report, released in June 2009, the IAEA demanded, in no uncertain terms, that Damascus grant it permission for another series of inspections, this time with access to “three other locations” that may have been related to Al Kibar. “The characteristics of the complex, including the cooling water capacities, bear a strong similarity to those of a nuclear reactor, something which urgently requires clarification,” says one IAEA expert. In the cautious language of UN officials, this is practically a guilty verdict.

    In the Crosshairs

    “Syria is not giving us the transparency we require,” ElBaradei says angrily. A picture hanging in his office seems to reflect his mood. It is a print of “The Scream,” by the Norwegian painter Edvard Munch, which depicts a deeply distraught person. ElBaradei does not believe that he is too lenient with those suspected of illegally pursuing nuclear weapons programs, as the Bush administration repeatedly claimed, particularly in relation to Iran. The IAEA, he says, will probably receive permission for a new inspection trip to Syria soon. Or at least he hopes it will.

    If and when that happens, a different host will greet the UN team. The affable Brigadier General Mohammed Suleiman, an Assad confidant in charge of all manner of “sensitive security issues,” was formerly in charge of presiding over the inspections. However he was assassinated in 2008. He landed in the crosshairs of his pursuers, just like Hezbollah commander Imad Mughniyah.

    For the Israelis, Mughniyah was the epitome of terror, the most notorious terrorist mastermind in the Middle East. He was responsible for the bloody attack on American military headquarters in Beirut in the 1980s and on Jewish institutions in Argentina in the 1990s, attacks in which hundreds of innocent people died. He is regarded by some as the inventor of the suicide attack and was deeply rooted in Iranian power structures.

    The Mossad had information that Mughniyah was planning to avenge the air strike on Al Kibar with an attack on an Israeli embassy — either in the Azerbaijani capital Baku, Cairo or the Jordanian capital Amman.

    Assassinated in an SUV

    Damascus, the building complex of the Atomic Energy Commission of Syria in the city’s Kafar Soussa diplomatic quarter, February 2008. Visitors are not welcome. “Please contact post office box 6091,” says the guard at the entrance. There is also an email address (atomic@aec.org.sy). But inquiries sent to both addresses remain unanswered. No wonder, say experts, who speculate that the threads of a secret nuclear weapons program come together in the inconspicuous AECS complex.

    It was precisely on the street where the AECS complex is located that Imad Mughniyah, a.k.a. “The Fox,” parked his Mitsubishi Pajero on Feb. 12, 2008 while he attended a reception at the nearby Iranian embassy. It was a rare appearance by a man who normally avoided being seen in public. But on that evening Mughniyah knew that he would be among friends, including Hamas leader Khaled Mashal and Syrian General Mohammed Suleiman, whom he had met many times in Tehran and at Hezbollah centers in Lebanon.

    Shortly after 10:30 p.m., Mughniyah drank his last glass of freshly squeezed orange juice. Then he kissed the host, the newly installed Iranian diplomat Ahmed Mousavi, on both cheeks, as local custom dictates, and left the party. Mughniyah was “probably the most intelligent, most capable operative we’ve ever run across,” said former CIA agent Robert Baer, who had been tracking him for a long time. The terrorist knew that he was at the very top of the Mossad’s hit list, and he also knew that the FBI was offering a $5 million reward for information leading to his arrest. But he felt relatively safe in Syria, as he did in Beirut and Tehran, which he visited on a regular basis.

    The explosion completely destroyed the SUV and ripped apart Mughniyah’s body. He was killed instantly. But the explosive charge was apparently calculated so carefully that nearby buildings were barely harmed. The terrorist leader remained the only victim on that night in Damascus.

    Whoever committed the act, “the world is a better place without this man,” the American government announced the next day through State Department spokesman Sean McCormack. Hezbollah, which had no doubts as to who was responsible for the killing, called Mughniyah a “martyr” and vowed to retaliate against the “Zionists.”

    The Israel government neither confirmed nor denied any involvement in the assassination. But agents at the Mossad could hardly contain their delight. According to information leaked to intelligence expert Uzi Mahnaimi, Israeli agents had removed the driver’s seat headrest and filled it with a compound that would detonate on contact. Intelligence expert Ronen Bergman can even describe the reaction of Israelis who were involved. “It was a shame about that nice new Pajero,” one of them reportedly said.

    Tartous, a medieval stronghold of the Knights Templar on the Syrian Mediterranean coast, five months later. It was at this port city, 160 kilometers northwest of Damascus, that the mysterious freighter Hamed had once berthed with its supposed cargo of cement from North Korea. Here, on a beach 13 kilometers north of the medieval city walls, General Suleiman had a weekend house, not far from the Rimal al-Zahabiya luxury beach resort. In the summer, Suleiman traveled to his weekend house almost every Friday to review files, relax and swim. On this first August weekend in 2008, President Assad’s eminence grise must have taken along a particularly large number of documents. A few days later, he had planned to accompany Assad on a secret visit to Tehran.

    As always, Suleiman drove from Damascus to Tartous in an armored vehicle. Additional bodyguards were waiting for him at his chalet. They never let him out of their sight, even escorting him into the water when he went swimming. After Mughniyah’s murder on a busy Damascus street, security was at the highest possible level. The general, who interacted with the global community as the regime’s senior representative on nuclear issues, was considered particularly at risk.

    The sea was calm that morning. Yachts were cruising off the coast, and there was nothing to raise suspicions in Tartous, a popular sailing destination for Syria’s moneyed aristocracy where boats can be chartered for visits to nearby Arwad Island and its fish restaurants. An unusually sleek yacht came within 50 meters of the coast, but it was not close enough to raise any red flags with the bodyguards when their boss decided to jump into the sea.

    No one even heard the gunshots, which were probably fired from precision rifles equipped with silencers. But they clearly came from offshore, striking Sulaiman in the head, chest and neck. The general died before his bodyguards could do anything for him. The yacht carrying the snipers turned away and disappeared into international waters.

    Hushed Up

    The Syrian authorities kept the news of the murder from the public for days. After that, it issued terse statements about the “vicious crime.” According to the official account, the general was “found shot dead near Tartous.” There was no mention of a yacht or of the angle from which the shots were fired.

    Speculation was rife in Damascus. Diplomats assumed that Suleiman had become too powerful for his fellow cabinet members, and that his killing was evidence of an internal Syrian power struggle. According to Western critics of the president, Suleiman had become a burden for Assad after the debacle involving the bombed nuclear plant and the Mughniyah murder, and he was eliminated on orders from Assad. For experts, however, the most likely scenario is that the Israelis were behind the highly professional assassination.

    Suleiman, who was nicknamed “the imported general” because of his European appearance, was buried in a private ceremony in his native village of Draykish two days after his murder. President Assad sent his younger brother Maher to attend the secret funeral, while he himself embarked on his scheduled trip to Tehran. It was important for him to put on a show of self-control, no matter how distressed he may have felt.

    Can bomb attacks and hit squads against real or presumed terrorists bring about progress in the Middle East? Is it true that Arabs and Israelis only understand the language of violence, as many in Tel Aviv are now saying? Did the operation against the Al Kibar complex, which violated international law, bring the Syrian president to his senses, or did it merely encourage him to harden his position?

    And what does all this mean for a possible Iranian nuclear bomb?

    The Consequences of Operation Orchard

    “The facility that was bombed was not a nuclear plant, but rather a conventional military installation,” Syrian President Bashar Assad insisted during a SPIEGEL interview at his palace near Damascus in mid-January 2009. “We could have struck back. But should we really allow ourselves to be provoked into a war? Then we would have walked into an Israeli trap.” What about the traces of uranium? “Perhaps the Israelis dropped it from the air to make us the target of precisely these suspicions.”

    Damascus, he said, is not interested in becoming a nuclear power, nor does it believe that Tehran is developing the bomb. “Syria is fundamentally opposed to the proliferation of nuclear weapons. We want a nuclear-free Middle East, Israel included.”

    Assad, outraged over Israeli belligerence in the Gaza Strip, has suspended secret peace talks with the enemy, which had been brokered by Turkey. But it is also abundantly clear that Assad is eager to remove himself from the list of global political pariahs and enter into dialogue with the United States and Europe.

    In the autumn of 2009, relations between Damascus and the West seem to be on the mend, probably as the result of American concessions rather than Israeli bombs. French President Nicolas Sarkozy received Assad at the Elysée Palace and told him that the normalization of relations would depend on the Syrians meeting a provocatively worded condition: “End nuclear weapons cooperation with Iran.” In the first week of October, Syrian Deputy Foreign Minister Faisal Mekdad traveled to Washington to meet with his counterparts there. And Saudi Arabia’s King Abdullah, with Washington’s explicit blessing, went to Damascus in an attempt to make a shift to the moderate camp more palatable for Assad.

    President Barack Obama will probably send a US military attaché to Damascus soon, followed by an ambassador. Syria could be removed from the US’s list of state sponsors of terrorism, a list which also includes Iran, Cuba and Sudan. The prospect of billions in aid, as well as transfers of high technology, is being held out to Assad. The Syrian president knows that this is probably his only hope to revive his ailing economy in the long term.

    Relations between Damascus and Tehran have worsened considerably in recent weeks. Western intelligence agencies report that the Iranian leadership is demanding that Syria return — in full and without compensation — substantial shipments of uranium, which it no longer needs now that its nuclear program has been destroyed.

    The latest news from Damascus, the ancient city where Saulus turned into Paulus according to the old scripts: According to information SPIEGEL has obtained from sources in Damascus, Assad has been considering taking a sensational political step. He is believed to have suggested to contacts in Pyongyang that he is considering the disclosure of his “national” nuclear program, but without divulging any details of cooperation with his North Korean and Iranian partners. Libyan revolutionary leader Moammar Gadhafi reaped considerable benefits from the international community after a similar “confession” about his country’s nuclear program.

    The reaction from North Korea was swift and extremely harsh: Pyongyang sent a senior government representative to Damascus to inform Syrian authorities that the North Koreans would terminate all cooperation on chemical weapons if Assad proceeded with his plan. And this regardless whether he mentioned Pyongyang in this context or not.

    Tehran’s reaction is believed to have been even more severe. Saeed Jalili, the country’s leading nuclear negotiator and a close associate of Iran’s supreme religious leader, apparently brought along an urgent message from the Ayatollah Ali Khamenei, in which Khamenei called Assad’s plan “unacceptable” and threatened that it would spell the end of the two countries’ strategic alliance and a sharp decline in relations.

    According to intelligence sources, Assad has backed down — for the time being. However he is also looking for ways to do business with his enemies, even Israel’s hard-line prime minister, Benjamin Netanyahu. Nevertheless, Assad is loath to give up his contacts to Hezbollah and Tehran completely, and he will demand a very high price for the possible recognition of Israel and for playing the role of mediator with Tehran, namely the return of the entire Golan Heights.

    Time on Its Side

    Did Operation Orchard make an impression on the Iranians, and did they understand it the way it was probably intended by the Israelis: as a final warning to Tehran?

    The Iranians have — literally — entrenched themselves, and not only since the Israeli attack on Syria. Many of the centrifuges they use for uranium enrichment are now operating in underground tunnels. Not even the bunker-busting super-bombs the Pentagon has requested be made available soon, citing “urgent operational requirements,” are capable of fully destroying facilities like the one in Natanz.

    The Americans — or the Israelis — would have to conduct air strikes for several weeks and destroy more than a dozen known nuclear facilities to set back the Iranian nuclear program by more than a few weeks. It would be a far more complex undertaking than the Israelis’ past attacks on the Osirak reactor in Iraq and Syria’s Al Kibar nuclear plant. And even after such a comprehensive operation, which would expose them to counterattacks, they could not be entirely sure of having wiped out all key elements of the Iranian nuclear program. Just in September, Tehran surprised the world with the confession that it had built a previously unreported uranium enrichment plant near Qom.

    Operation Orchard achieved only one thing: If the Iranians had planned to build a “spare” nuclear plant in Syria, that is, a backup plutonium factory, their plans were thwarted. But Tehran has time on its side. The Iranians are already believed to have reached breakout capacity — in other words, the ability to begin building a nuclear weapon if they so desire. Iran is on the verge of becoming a nuclear power.

    And Syria? There is nothing to suggest that Damascus will or is even able to play with fire once again. A conventional factory has in fact been built over the ruins of the Al Kibar plant. There is no access to the plant — for “security reasons,” as residents of Deir el-Zor say tersely — at the roadblock near the great river and the desert village of Tibnah.

    The turquoise-colored river flows slowly, the river that Moses, according to the Bible, promised to the Israelites as part of their holy land. To this day, many radical Israelis take the relevant passage in the Bible as seriously as an entry in the land register: “Every place that your foot shall tread upon shall be yours. From the desert, and from Libanus, from the great river Euphrates unto the western sea.”

    Referring to the same river, the Prophet Muhammad is supposed to have said: “The Euphrates reveals the treasures within itself. Whoever sees it should not take anything from it.”

    Translated from the German by Christopher Sultan
    SPIEGEL ONLINE
    11/02/2009 04:53 PM
    By Erich Follath and Holger Stark

    Find this story at 11 February 2009

    © SPIEGEL ONLINE 2009

    Ripe for Abuse Palestinian Child Labor in Israeli Agricultural Settlements in the West Bank

    Hundreds of Palestinian children work on Israeli settlement farms in the occupied West Bank, the majority located in the Jordan Valley. This report documents rights abuses against Palestinian children as young as 11 years old, who earn around US $19 for a full day working in the settlement agricultural industry. Many drop out of school and work in conditions that can be hazardous due to pesticides, dangerous equipment, and extreme heat.

    Children working on Israeli settlements pick, clean, and pack asparagus, tomatoes, eggplants, sweet peppers, onions, and dates, among other crops. Children whom Human Rights Watch interviewed said they begin work as early as 5:30 or 6 a.m. and usually work around 8 hours a day, six or seven days a week. During peak harvest periods, some children reported working up to 12 hours a day, over 60 hours a week. Some children described pressure from supervisors to keep working, and not to take breaks.

    Although international law, as well as Israeli and Palestinian law, sets 15 as the minimum age of employment, many children told Human Rights Watch that they began working at age 13 or 14. Even younger children work part-time, and one boy interviewed by Human Rights Watch said that he worked together with a boy who was only 10 years old.

    The work that children perform can be both grueling and hazardous. Some children who work on settlement farms described vomiting, dizziness, and skin rashes after spraying pesticides with little protection, and experienced body pain or numbness from carrying heavy pesticide containers on their back. Many suffered cuts from using sharp blades to cut onions, sweet peppers, and other crops. Heavy machinery also causes injuries. One child said he saw another child who was pinned under a tractor that rolled over. Another boy said he caught his finger in a date-sorting machine. Children risk falls from climbing ladders to prune and pick dates. Two children had been stung by scorpions while working in settlers’ fields.

    Temperatures in the fields often exceed 40 degrees Celsius in summer (over 100 degrees Fahrenheit) and can be as high as 50 degrees Celsius (122 degrees Fahrenheit) in greenhouses. Some children described nausea and other symptoms indicating they were susceptible to heat stroke from working in such extreme temperatures. One boy told Human Rights Watch that he had repeatedly fainted while working in a hot greenhouse.

    None of the children interviewed received medical insurance or social insurance benefits, and the majority of those who needed medical treatment due to work injuries or illness said they had to pay their own medical bills and transportation costs to Palestinian hospitals. Three Palestinian children who got sick or were injured while working and had to go home or to the hospital said they were not even paid for the hours they had worked that day, much less for the time they had to take off work.

    To research this report, Human Rights Watch interviewed 38 children and 12 adults in Palestinian communities in the Jordan Valley who said they were employed to work on settlement farms in the area, as well as teachers and principals in those communities, Israeli and Palestinian labor lawyers, development-agency staff and labor rights advocates. Children are a minority of Palestinians employed on settlement farms, but most Palestinian children who work in settlements do so in the agricultural sector. All of the children and adults Human Rights Watch interviewed said they took the work due to a lack of alternative jobs and because of the dire economic conditions faced by their families – conditions for which Israel’s policies throughout the occupied West Bank including the Jordan Valley, which severely restrict Palestinians’ access to land, water, agricultural inputs like fertilizers, and their ability to transport goods, are largely responsible. One 18-year-old said that he quit school in Grade 10 because, as he explained, “so what if you get an education, you’ll wind up working for the settlements.”

    The vast majority of the children working in settlements whom Human Rights Watch interviewed said they had dropped out of school. Teachers and principals told Human Rights Watch that children often dropped out around Grade 8, or age 14. Of the 33 children that Human Rights Watch interviewed who were then working full-time in agricultural settlements, 21 had dropped out of schools in Grade 10 or earlier; the other 12 dropped out of secondary school in Grade 11 or 12. Other children worked part-time while still attending school, often at the expense of their studies. “It’s very obvious which kids go to work in the settlements, because they are exhausted in class,” said a school administrator.

    All the children Human Rights Watch interviewed said that they were working to provide money for their families. When asked why children chose to work, a Palestinian middleman who supplied Palestinian workers to settlers told an Israeli human rights worker: “Ask [the children] if they have any bread in the house.” Palestinian children and adults who work in settlements told Human Rights Watch that they hoped the international community would pressure Israel to end settlement agriculture and lift related restrictions on Palestinian land-use, access to water, freedom of movement, and market access, and instead, allow Palestinians to cultivate their own lands and to create an economic environment in which they could support their children to stay in school and receive an education. In some cases, Palestinian workers said that they worked on farmland that Israel had, in violation of international law, confiscated from their own villages and allocated to settlements.

    Most of the children and adults live in villages in the Jordan Valley. Some of the children came from villages elsewhere in the West Bank, moved to the Jordan Valley, and lived for months at a time in empty warehouses there, working in settlements during the day, in order to save on the cost and time required to travel from home.

    Children working in agricultural settlements earn very low wages. All of the Palestinian adults and children whom Human Rights Watch interviewed earned far less than the Israeli minimum wage, which was 23 shekels ($6.20) per hour for adults and between 16 and 18 shekels ($4.30 and $4.86) per hour for children at the time the research for this report was conducted. Most earned only 60 to 70 shekels per day ($16 to $19), and some children took home 50 shekels per day ($13.50) after paying for transportation to and from settlements to work; most workdays lasted 7 or 8 hours, except during peak harvesting times.[1] Military orders issued by the Israeli military commander in the West Bank make provisions of Israel’s domestic Minimum Wage Law applicable to Palestinian workers in settlements. However, many children either did not know that Israel had a minimum wage law or that the law’s provisions were supposed to apply to Palestinians working in settlements.

    All the children Human Rights Watch interviewed said they were employed through unwritten agreements with Palestinian middlemen working on behalf of Israeli settlers. Israeli settlers’ practice of using Palestinian middlemen to hire Palestinian laborers, including children, means that there is no work contract or any other documents linking the children directly to the settler-employer. In practice, it is extremely difficult for Palestinians who work in settlements to demand their rights under Israeli labor law without such proof of employment. According to a Palestinian middleman, workers are paid “in cash, [get] no pay slips, and there are no [work] permits, so there is no paper trail to demand severance pay or anything else.”

    Most labor disputes that Palestinian workers and middlemen described to Human Rights Watch involved severance pay, presumably because workers demanding severance pay have already lost their jobs and so have less to lose from making legal claims than workers who are employed. Israel’s Minimum Wage Law – which is applicable, via military orders, to Palestinian workers in settlements – states that workers cannot waive their rights to minimum wages, but none of the Palestinian children or adults interviewed said they expected or had demanded to be paid minimum wages. The Palestinian middleman believed that if a worker asked a settler-employer for a raise, “they’d fire you.”

    Find this story at 13 April 2015

    the report

    © 2015 Human Rights Watch

    HEAD of the FBI’s Anthrax Investigation Says the Whole Thing Was a SHAM

    Agent In Charge of Amerithrax Investigation Blows the Whistle

    The FBI head agent in charge of the anthrax investigation – Richard Lambert – has just filed a federal whistleblower lawsuit calling the entire FBI investigation bullsh!t:

    In the fall of 2001, following the 9/11 attacks, a series of anthrax mailings occurred which killed five Americans and sickened 17 others. Four anthrax-laden envelopes were recovered which were addressed to two news media outlets in New York City (the New York Post and Tom Brokaw at NBC) and two senators in Washington D.C. (Patrick Leahy and Tom Daschle). The anthrax letters addressed to New York were mailed on September 18, 2001, just seven days after the 9/11 attacks. The letters addressed to the senators were mailed 21 days later on October 9, 2001. A fifth mailing of anthrax is believed to have been directed to American Media, Inc. (AMI) in Boca Raton, Florida based upon the death of one AMI employee from anthrax poisoning and heavy spore contamination in the building.

    Executive management at FBI Headquarters assigned responsibility for the anthrax investigation (code named “AMERITHRAX”) to the Washington Field Office (WFO), dubbing it the single most important case in the FBI at that time. In October 2002, in the wake of surging media criticism, White House impatience with a seeming lack of investigative progress by WFO, and a concerned Congress that was considering revoking the FBI’s charter to investigate terrorism cases, Defendant FBI Director Mueller reassigned Plaintiff from the FBI’s San Diego Field Office to the Inspection Division at FBI Headquarters and placed Plaintiff in charge of the AMERITHRAX case as an “Inspector.” While leading the investigation for the next four years, Plaintiff’s efforts to advance the case met with intransigence from WFO’s executive management, apathy and error from the FBI Laboratory, politically motivated communication embargos from FBI Headquarters, and yet another preceding and equally erroneous legal opinion from Defendant Kelley – all of which greatly obstructed and impeded the investigation.

    On July 6, 2006, Plaintiff provided a whistleblower report of mismanagement to the FBI’s Deputy Director pursuant to Title 5, United States Code, Section 2303. Reports of mismanagement conveyed in writing and orally included: (a) WFO’s persistent understaffing of the AMERITHRAX investigation; (b) the threat of WFO’s Agent in charge to retaliate if Plaintiff disclosed the understaffing to FBI Headquarters; (c) WFO’s insistence on staffing the AMERITHRAX investigation principally with new Agents recently graduated from the FBI Academy resulting in an average investigative tenure of 18 months with 12 of 20 Agents assigned to the case having no prior investigative experience at all; (d) WFO’s eviction of the AMERITHRAX Task Force from the WFO building in downtown Washington and its relegation to Tysons Corner, Virginia to free up space for Attorney General Ashcroft’s new pornography squads; (e) FBI Director’s Mueller’s mandate to Plaintiff to “compartmentalize” the AMERITHRAX investigation by stove piping the flow of case information and walling off task force members from those aspects of the case not specifically assigned to them – a move intended to stem the tide of anonymous media leaks by government officials regarding details of the investigation. [Lambert complained about compartmentalizing and stovepiping of the investigation in a 2006 declaration. See this, this and this]

    This sequestration edict decimated morale and proved unnecessary in light of subsequent civil litigation which established that the media leaks were attributable to the United States Attorney for the District of the District of Columbia and to a Supervisory Special Agent in the FBI’s National Press Office, not to investigators on the AMERITHRAX Task Force; (f) WFO’s diversion and transfer of two Ph.D. Microbiologist Special Agents from their key roles in the investigation to fill billets for an 18 month Arabic language training program in Israel; (g) the FBI Laboratory’s deliberate concealment from the Task Force of its discovery of human DNA on the anthrax-laden envelope addressed to Senator Leahy and the Lab’s initial refusal to perform comparison testing; (h) the FBI Laboratory’s refusal to provide timely and adequate scientific analyses and forensic examinations in support of the investigation; (i) Defendant Kelley’s erroneous and subsequently quashed legal opinion that regulations of the Occupational Safety and Health Administration (OSHA) precluded the Task Force’s collection of evidence in overseas venues; (j) the FBI’s fingering of Bruce Ivins as the anthrax mailer; and, (k) the FBI’s subsequent efforts to railroad the prosecution of Ivins in the face of daunting exculpatory evidence.

    Following the announcement of its circumstantial case against Ivins, Defendants DOJ and FBI crafted an elaborate perception management campaign to bolster their assertion of Ivins’ guilt. These efforts included press conferences and highly selective evidentiary presentations which were replete with material omissions. Plaintiff further objected to the FBI’s ordering of Plaintiff not to speak with the staff of the CBS television news magazine 60 Minutes or investigative journalist David Willman, after both requested authorization to interview Plaintiff.

    In April 2008, some of Plaintiff’s foregoing whistleblower reports were profiled on the CBS television show 60 Minutes. This 60 Minutes segment was critical of FBI executive management’s handling of the AMERITHRAX investigation, resulting in the agency’s embarrassment and the introduction of legislative bills calling for the establishment of congressional inquiries and special commissions to examine these issues – a level of scrutiny the FBI’s Ivins attribution could not withstand.

    After leaving the AMERITHRAX investigation in 2006, Plaintiff continued to publicly opine that the quantum of circumstantial evidence against Bruce Ivins was not adequate to satisfy the proof-beyond-a-reasonable doubt threshold required to secure a criminal conviction in federal court. Plaintiff continued to advocate that while Bruce Ivins may have been the anthrax mailer, there is a wealth of exculpatory evidence to the contrary which the FBI continues to conceal from Congress and the American people.

    Exonerating Evidence for Ivins

    Agent Lambert won’t publicly disclose the exculpatory evidence against Ivins. As the New York Times reports:

    [Lambert] declined to be specific, saying that most of the information was protected by the Privacy Act and was unlikely to become public unless Congress carried out its own inquiry.

    But there is already plenty of exculpatory evidence in the public record.

    For example:

    Handwriting analysis failed to link the anthrax letters to known writing samples from Ivins
    No textile fibers were found in Ivins’ office, residence or vehicles matching fibers found on the scotch tape used to seal the envelopes
    No pens were found matching the ink used to address the envelopes
    Samples of his hair failed to match hair follicles found inside the Princeton, N.J., mailbox used to mail the letters
    No souvenirs of the crime, such as newspaper clippings, were found in his possession as commonly seen in serial murder cases
    The FBI could not place Ivins at the crime scene with evidence, such as gas station or other receipts, at the time the letters were mailed in September and October 2001
    Lab records show the number of late nights Ivins put in at the lab first spiked in August 2001, weeks before the 9/11 attacks
    As noted above, the FBI didn’t want to test the DNA sample found on the anthrax letter to Senator Leahy. In addition, McClatchy points out:

    After locking in on Ivins in 2007, the bureau stopped searching for a match to a unique genetic bacterial strain scientists had found in the anthrax that was mailed to the Post and to NBC News anchor Tom Brokaw, although a senior bureau official had characterized it as the hottest clue to date.

    Anthrax vaccine expert Meryl Nass. M.D., notes:

    The FBI’s alleged motive is bogus. In 2001, Bioport’s anthrax vaccine could not be (legally) relicensed due to potency failures, and its impending demise provided room for Ivins’ newer anthrax vaccines to fill the gap. Ivins had nothing to do with developing Bioport’s vaccine, although in addition to his duties working on newer vaccines, he was charged with assisting Bioport to get through licensure.

    ***

    The FBI report claims the anthrax letters envelopes were sold in Frederick, Md. Later it admits that millions of indistinguishable envelopes were made, with sales in Maryland and Virginia.

    ***

    FBI emphasizes Ivins’ access to a photocopy machine, but fails to mention it was not the machine from which the notes that accompanied the spores were printed.

    FBI Fudged the Science

    16 government labs had access to the same strain of anthrax as used in the anthrax letters.

    The FBI admitted that up to 400 people had access to flask of anthrax in Dr. Ivins’ lab. In other words, even if the killer anthrax came from there, 399 other people might have done it.

    Moreover, even the FBI’s claim that the killer anthrax came from Ivins’ flask has completely fallen apart. Specifically, both the National Academy of Science and the Government Accountability Office – both extremely prestigious, nonpartisan agencies – found that FBI’s methodology and procedures for purportedly linking the anthrax flask maintained by Dr. Ivins with the anthrax letters was sloppy, inconclusive and full of holes. They found that the alleged link wasn’t very strong … and that there was no firm link. Indeed, the National Academy of Sciences found that the anthrax mailed to Congressmen and the media could have come from a different source altogether than the flask maintained by Ivins.

    Additionally, the Ft. Detrick facility – where Ivins worked – only handled liquid anthrax. But the killer anthrax was a hard-to-make dry powder form of anthrax. Ft. Detrick doesn’t produce dry anthrax; but other government labs – for example Dugway (in Utah) and Batelle (in Ohio) – do.

    The anthrax in the letters was also incredibly finely ground; and the FBI’s explanation for how the anthrax became so finely ground doesn’t even pass the smell test.

    Further, the killer anthrax in the letters had a very high-tech anti-static coating so that the anthrax sample “floated off the glass slide and was lost” when scientists tried to examine it. Specifically, the killer anthrax was coated with polyglass and each anthrax spore given an electrostatic charge, so that it would repel other spores and “float”. This was very advanced bio-weapons technology to which even Ivins’ bosses said he didn’t have access.

    Top anthrax experts like Richard Spertzel say that Ivins didn’t do it. Spertzel also says that only 4 or 5 people in the entire country knew how to make anthrax of the “quality” used in the letters, that Spertzel was one of them, and it would have taken him a year with a full lab and a staff of helpers to do it. As such, the FBI’s claim that Ivins did it alone working a few nights is ludicrous.

    Moreover, the killer anthrax contained silicon … but the anthrax in Ivins’ flask did not. The FBI claimed the silicon present in the anthrax letters was absorbed from its surroundings … but Lawrence Livermore National Laboratories completely debunked that theory. In other words, silicon was intentionally added to the killer anthrax to make it more potent. Ivins and Ft. Detrick didn’t have that capability … but other government labs did.

    Similarly, Sandia National Lab found the presence of iron and tin in the killer anthrax … but NOT in Ivins’ flask of anthrax.

    Sandia also found that there was a strain of bacteria in one of the anthrax letters not present in Ivins’ flask. (The bacteria, iron, tin and silicon were all additives which made the anthrax in the letters more deadly.)

    The Anthrax Frame Up

    Ivins wasn’t the first person framed for the anthrax attacks …

    Although the FBI now admits that the 2001 anthrax attacks were carried out by one or more U.S. government scientists, a senior FBI official says that the FBI was actually told to blame the Anthrax attacks on Al Qaeda by White House officials (remember what the anthrax letters looked like). Government officials also confirm that the white House tried to link the anthrax to Iraq as a justification for regime change in that country. And see this.

    People don’t remember now, but the “war on terror” and Iraq war were largely based on the claim that Saddam and Muslim extremists were behind the anthrax attacks (and see this and this)

    And the anthrax letters pushed a terrified Congress into approving the Patriot Act without even reading it. Coincidentally, the only Congressmen who received anthrax letters were the ones who were likely to oppose the Patriot Act.

    And – between the bogus Al Qaeda/Iraq claims and the FBI’s fingering of Ivins as the killer – the FBI was convinced that another U.S. government scientist, Steven Hatfill, did it. The government had to pay Hatfill $4.6 million to settle his lawsuit for being falsely accused.

    Ivins’ Convenient Death

    It is convenient for the FBI that Ivins died.

    The Wall Street Journal points out:

    No autopsy was performed [on Ivins], and there was no suicide note.

    Dr. Nass points out:

    FBI fails to provide any discussion of why no autopsy was performed, nor why, with Ivins under 24/7 surveillance from the house next door, with even his garbage being combed through, the FBI failed to notice that he overdosed and went into a coma. Nor is there any discussion of why the FBI didn’t immediately identify tylenol as the overdose substance, and notify the hospital, so that a well-known antidote for tylenol toxicity could be given (N-acetyl cysteine, or alternatively glutathione). These omissions support the suggestion that Ivins’ suicide was a convenience for the FBI. It enabled them to conclude the anthrax case, in the absence of evidence that would satisfy the courts.

    Indeed, one of Ivins’ colleagues at Ft. Deitrich thinks he was murdered.

    Whether murder or suicide, Ivins’ death was very convenient for the FBI, as dead men can’t easily defend themselves.

    Posted on April 17, 2015 by WashingtonsBlog

    Find this story at 17 April 2015

    © 2007 – 2015 Washington’s Blog

    Former F.B.I. Agent Sues, Claiming Retaliation Over Misgivings in Anthrax Case

    WASHINGTON — When Bruce E. Ivins, an Army microbiologist, took a fatal overdose of Tylenol in 2008, the government declared that he had been responsible for the anthrax letter attacks of 2001, which killed five people and set off a nationwide panic, and closed the case.

    Now, a former senior F.B.I. agent who ran the anthrax investigation for four years says that the bureau gathered “a staggering amount of exculpatory evidence” regarding Dr. Ivins that remains secret. The former agent, Richard L. Lambert, who spent 24 years at the F.B.I., says he believes it is possible that Dr. Ivins was the anthrax mailer, but he does not think prosecutors could have convicted him had he lived to face criminal charges.

    In a lawsuit filed in federal court in Tennessee last Thursday, Mr. Lambert accused the bureau of trying “to railroad the prosecution of Ivins” and, after his suicide, creating “an elaborate perception management campaign” to bolster its claim that he was guilty. Mr. Lambert’s lawsuit accuses the bureau and the Justice Department of forcing his dismissal from a job as senior counterintelligence officer at the Energy Department’s lab in Oak Ridge, Tenn., in retaliation for his dissent on the anthrax case.

    Photo

    The late Bruce Ivins in 2003, when he was a microbiologist at Fort Detrick, Md. Credit Sam Yu/Frederick News Post, via Assocaited Press
    The anthrax letters were mailed to United States senators and news organizations in the weeks after the Sept. 11, 2001, terrorist attacks, causing a huge and costly disruption in the postal system and the federal government. Members of Congress and Supreme Court justices were forced from their offices while technicians in biohazard suits cleaned up the lethal anthrax powder. Decontamination costs nationwide exceeded $1 billion. At least 17 people were sickened, in addition to the five who died.

    The bureau’s investigation, one of the longest-running and most technically complex inquiries in its history, has long been seen as troubled. Investigators initially lacked the forensic skills to analyze bioterrorist attacks. For several years, agents focused on a former Army scientist and physician, Dr. Steven J. Hatfill, who was subsequently cleared and given a $4.6 million settlement to resolve a lawsuit. Reviews by the National Academy of Sciences and the Government Accountability Office faulted aspects of the F.B.I.’s scientific work on the case.

    Mr. Lambert, who was himself criticized for pursuing Dr. Hatfill for so long, has now offered, in his lawsuit and in an interview, an insider’s view of what hampered the investigation.

    “This case was hailed at the time as the most important case in the history of the F.B.I.,” Mr. Lambert said. “But it was difficult for me to get experienced investigators assigned to it.”

    He said that the effort was understaffed and plagued by turnover, and that 12 of 20 agents assigned to the case had no prior investigative experience. Senior bureau microbiologists were not made available, and two Ph.D. microbiologists who were put on the case were then removed for an 18-month Arabic language program in Israel. Fear of leaks led top officials to order the extreme compartmentalization of information, with investigators often unable to compare notes and share findings with colleagues, he said.

    Mr. Lambert said he outlined the problems in a formal complaint in 2006 to the F.B.I.’s deputy director. Some of his accusations were later included in a report on the anthrax case by the CBS News program “60 Minutes,” infuriating bureau leaders.

    Photo

    The police in Frederick, Md., spoke with a woman they identified as Diane Ivins, the wife of Bruce E. Ivins, 62, at the couple’s home in Frederick, Md., in 2008. Credit Rob Carr/Associated Press
    The F.B.I., which rarely comments on pending litigation, did not respond to requests for comment on Mr. Lambert’s claims.

    Although the lethal letters contained notes expressing jihadist views, investigators came to believe the mailer was an insider in the government’s biodefense labs. They eventually matched the anthrax powder to a flask in Dr. Ivins’s lab at Fort Detrick in Maryland and began intense scrutiny of his life and work.

    They discovered electronic records that showed he had spent an unusual amount of time at night in his high-security lab in the periods before the two mailings of the anthrax letters. They found that he had a pattern of sending letters and packages from remote locations under assumed names. They uncovered emails in which he described serious mental problems.

    The investigators documented Dr. Ivins’s obsession with a national sorority that had an office near the Princeton, N.J., mailbox where the letters were mailed. They detected what they believed to be coded messages directed at colleagues, hidden in the notes in the letters.

    As prosecutors prepared to charge him with the five murders in July 2008, Dr. Ivins, 62, took his own life at home in Frederick, Md. Days later, at a news conference, Jeffrey A. Taylor, then the United States attorney for the District of Columbia, said the authorities believed “that based on the evidence we had collected, we could prove his guilt to a jury beyond a reasonable doubt.”

    But Mr. Lambert says the bureau also gathered a large amount of evidence pointing away from Dr. Ivins’s guilt that was never shared with the public or the news media. Had the case come to trial, he said, “I absolutely do not think they could have proved his guilt beyond a reasonable doubt.” He declined to be specific, saying that most of the information was protected by the Privacy Act and was unlikely to become public unless Congress carried out its own inquiry.

    After retiring from the F.B.I. in 2012, Mr. Lambert joined the Energy Department. But an F.B.I. ethics lawyer ruled that because Mr. Lambert had to work with F.B.I. agents in his new job, he was violating a conflict-of-interest law that forbade former federal employees from contacting previous colleagues for a year after they had left their government jobs.

    That ruling led to his dismissal, Mr. Lambert said, and he has not been able to find work despite applying for more than 70 jobs. His lawsuit asserts that several other former F.B.I. agents were able to take identical intelligence jobs with the Energy Department and that he was singled out for mistreatment.

    By SCOTT SHANEAPRIL 8, 2015

    Find this story at 8 April 2015

    © 2015 The New York Times Company

    Defense Department anthrax error triggers anger in Congress (2015)

    The Pentagon wouldn’t say which labs received the live anthrax by mistake or who might have been exposed. The shipments went to facilities in nine states.

    Military officials said Thursday that the Pentagon was in close contact with officials at research labs in California, Texas and seven other states that received potentially live anthrax spores, but they refused to identify the labs or to disclose how many people were being treated with antibiotics to stave off the disease.

    A Defense Department spokesman, Army Col. Steven Warren, said 22 personnel at Osan Air Base in South Korea were taking the antibiotic Cipro as a precaution against anthrax exposure. But he declined to talk about whether workers at labs or other facilities in the United States were also taking Cipro.

    The lack of information was criticized by members of Congress, who demanded answers on how the mistaken shipments happened and who had been affected.

    “This incident represents a serious breach of trust in the United States Army’s obligation to keep our citizens and service members safe,” Sen. Bill Nelson, D-Fla., a member of the Senate Armed Services Committee, said in a letter to Army Secretary John McHugh. “Moreover, the shipments to a South Korea air base weaken the United States’ credibility as a global leader in chemical weapons control.”

    In a separate letter, a bipartisan group of members of the House of Representatives told Defense Secretary Ash Carter and Tom Frieden, the director of the Centers for Disease Control and Prevention, that the inadvertent shipments of live anthrax “raise serious safety concerns” about the way the military handles “dangerous pathogens.”

    The letter was signed by Rep. Fred Upton, R-Mich., the chair of the House Energy and Commerce Committee, and the panel’s senior Democrat, Rep. Frank Pallone of New Jersey, as well as two committee members, Republican Rep. Tim Murphy of Pennsylvania and Democratic Rep. Diana DeGette of Colorado.

    In comments to reporters Thursday, Warren acknowledged that he did not “have a whole lot of details on the exact purpose” of the anthrax shipments to Osan Air Base. In an earlier statement, Warren had said the anthrax shipments were part of a pilot program to develop a field test to identify biological threats in the environment.

    In addition to Osan, the Defense Department said it suspected that labs in nine states had received live anthrax because they had been recipients of the same “cluster” of shipments.

    In addition to facilities in California and Texas, those labs included military, university or commercial enterprises in Delaware, New Jersey, New York, Tennessee, Virginia, Maryland and Wisconsin. The anthrax was shipped from a Defense Department lab in Dugway, Utah.

    Warren said the the Centers for Disease Control and Prevention was working to determine who might have handled the anthrax shipments before they reached the nine destinations.

    He declined to describe what kind of packaging was used to ship the anthrax or to confirm news reports that FedEx had transported at least some of the shipments.

    Live anthrax requires strict handling protocols, and anthrax samples are supposed to be rendered inactive before being shipped for research uses. All military, government and civilian labs that might have received such samples are now reviewing their anthrax inventories.

    “Out of an abundance of caution, DOD has stopped the shipment of this material from its labs pending completion of the investigation,” Warren said.

    “The ongoing investigation includes determining if the labs also received other live samples, epidemiological consultation, worker safety review, laboratory analysis and handling of laboratory waste,” said Jason McDonald, a spokesman for the CDC.

    Anthrax burst into the American psyche one week after the 2001 terror attacks in New York and Washington, when over the course of several weeks five people died and 17 survived infection after anthrax-laced letters were sent to several news organization and to the offices of two U.S. senators.

    Two of the dead in 2001 were postal workers who’d come in contact with anthrax when the letters containing the spores passed through the Brentwood mail facility in Washington, D.C. Another was an employee of a Florida media company that had received one of the letters. How the other two victims were exposed has never been determined.

    Over the next seven years, the FBI and other prosecutors named two men as having possible ties to those anthrax attacks, Steven Hatfill and Bruce Ivins, but the government never brought charges against either of them.

    In the current case, four Defense Department employees in the United States who’d handled the samples have been placed in post-exposure treatment in addition to the 22 in South Korea, CNN reported.

    Warren defended the speed with which the Pentagon made public the information that live anthrax had inadvertently been shipped. That notification came five days after a research lab in Maryland told the Pentagon that it had received live anthrax in a package that was supposed to contain only inactive spores.

    “We got the information out as rapidly as we could,” he said. “It’s important to have as much accurate information as possible. Once we understood that there was no threat to the public, we understood that we had additional time to gather more information and present a more complete picture.”

    Osan Air Base in South Korea said in a statement that “all personnel were provided appropriate medical precautionary measures to include examinations, antibiotics and in some instances, vaccinations. None of the personnel have shown any signs of possible exposure.”

    The base added: “Hazardous material teams immediately cordoned off the facility, decontaminated it under Centers for Disease Control protocol, and destroyed the agent.”

    BY JAMES ROSEN – MCCLATCHY WASHINGTON BUREAU
    28 May 2015

    Find this story at 28 May 2015

    Copyright mcclatchydc.com

    New Report Casts Doubt on FBI Anthrax Investigation (2014)

    For a second time in three years, an independent inquiry cast doubt Friday on the FBI’s assertion that genetic testing had cinched its conclusion that a now-dead Army bioweapons researcher mailed anthrax-laced letters that killed five people and terrorized the East Coast in 2001.

    The long-awaited report from the Government Accountability Office found that the FBI’s exhaustive, cutting-edge attempt to trace the killer with matches of genetic mutations of anthrax samples at times lacked precision, consistency and adequate standards.

    The 77-page report, perhaps the final official word on the FBI’s seven-year investigation known as Amerithrax, lent credence to a National Academy of Sciences panel’s finding in 2011 that the bureau’s scientific evidence did not definitely show that the anthrax came from the Maryland bioweapons laboratory of Bruce Ivins.

    The report’s findings also mirrored some of the conclusions of a joint investigation by FRONTLINE, McClatchy and ProPublica that was published and aired in the fall of 2011.

    Shortly after Ivins took a suicidal drug overdose on July 29, 2008, federal prosecutors said they’d been drafting criminal charges against him, and they declared the scientist at Fort Detrick, Md., the culprit. In 2010, they laid out an extensive circumstantial case against him, presenting as a smoking gun the findings of genetic testing by outside laboratories that matched four distinct mutations in the anthrax spores in the letters with those in a flask full of anthrax in Ivins’ laboratory.

    “The significance of using such mutations as genetic markers for analyzing evidentiary samples to determine their origins is not clear,” the auditors wrote. “This gap affects both the development of genetic tests targeting such mutations and statistical analyses of the results of their use.”

    The auditors pointed out that an FBI team recommended in 2007 that the bureau conduct experiments to determine whether the mutations the FBI was seeking to match might not have been unique to Ivins’ flask, known as RMR-1029. However, those tests were never done.

    That omission also drew concern from the National Academy of Sciences panel, which noted that it was possible that four identical “morphs” could have grown in another laboratory in what it termed “parallel evolution.”

    The auditors also focused on contradictory test results from samples collected from a colleague of Ivins who’d used anthrax from RMR-1029. That colleague – Henry Heine, though he wasn’t named in the report – submitted one sample that tested positive in all five genetic tests, but a duplicate sample from his vial tested negative for all five markers, the report said.

    The report said that Heine, in the presence of an FBI investigator, didn’t follow instructions for collecting one sample as laid out in a grand jury subpoena. The disclosure raises the possibility that inconsistent collection methods undercut the massive testing effort.

    While praising the FBI for turning to four outside laboratories for genetic tests on more than 1,000 anthrax samples it had gathered, the report said the bureau’s laboratory had failed to ensure that all the samples were collected in the same fashion, gave “minimal” instruction to the outside labs and set insufficient standards for validating the results. It also failed to measure the uncertainty in its results, leaving it unclear how much weight they deserve, the report said.

    Also unstudied was whether the anthrax spores grew differently in varying conditions, the report said.

    The FBI said Friday that it stood by its conclusion, saying it “has complete confidence in the scientific results that provided investigators with leads” to the anthrax used in the attacks.

    “As noted in the National Academy of Sciences Report, the genetic tests used by the FBI were well validated,” the bureau said, adding that after a review of all scientific analysis it “is satisfied that the analysis was conducted in a quality manner.”

    “It is important to note that the scientific results alone were not the sole basis for concluding that Bruce Ivins committed the 2001 anthrax-letter attacks,” the bureau said.

    However, Democratic Rep. Rush Holt of New Jersey, who was among three members of the House of Representatives who requested the audit from Congress’ investigative arm, said “the GAO report confirms what I have often said: that the FBI’s definitive conclusions about the accuracy of their scientific findings in the Amerithrax case are not, in fact, definitive.”

    Holt, a scientist who’s retiring from Congress at month’s end, also said “the United States needs a comprehensive, independent review of the Amerithrax investigation to ensure we have learned the lessons from this bio attack.”

    Paul Kemp, an attorney for Ivins, echoed Holt’s call for a fuller investigation.

    “I only wish we could have had a trial,” he said. “They never had any evidence he prepared the anthrax . . . only that he worked some unexplained overtime. Many scientists in and out of Fort Detrick asserted that there wouldn’t have been enough time for one person to do this – especially in a building and a lab that was open all day every day – without somebody seeing something.”

    December 19, 2014, 7:38 pm ET by Greg Gordon McClatchy Washington Bureau and Mike Wiser, FRONTLINE

    Find this story at 19 December 2014

    Web Site Copyright ©1995-2015 WGBH Educational Foundation

    New Evidence Adds Doubt to FBI’s Case Against Anthrax Suspect (2011)

    A U.S. Army scientist stands near the letters used in the 2001 anthrax attacks (Photo courtesy of FBI).

    This story is a joint project with ProPublica, PBS Frontline and McClatchy. The story will air on Frontline on Oct. 11. Check local listings.

    WASHINGTON – Months after the anthrax mailings that terrorized the nation in 2001, and long before he became the prime suspect, Army biologist Bruce Ivins sent his superiors an email offering to help scientists trace the killer.

    Part 1: New Evidence Adds Doubt to FBI’s Case Against Anthrax Suspect

    Part 2: Did Bruce Ivins Hide Attack Anthrax From the FBI?

    Part 3: Was FBI’s Science Good Enough to ID Anthrax Killer?

    Video: The Anthrax Files

    Interactive: Read and annotate the case documents

    Editor’s Note: About the Case of the Anthrax Letters

    Already, an FBI science consultant had concluded that the attack powder was made with a rare strain of anthrax known as Ames that’s used in research laboratories worldwide.

    In his email, Ivins volunteered to help take things further. He said he had several variants of the Ames strain that could be tested in “ongoing genetic studies” aimed at tracing the origins of the powder that had killed five people. He mentioned several cultures by name, including a batch made mostly of Ames anthrax that had been grown for him at an Army base in Dugway, Utah.

    Seven years later, as federal investigators prepared to charge him with the same crimes he’d offered to help solve, Ivins, who was 62, committed suicide. At a news conference, prosecutors voiced confidence that Ivins would have been found guilty. They said years of cutting-edge DNA analysis had borne fruit, proving that his spores were “effectively the murder weapon.”

    To many of Ivins’ former colleagues at the germ research center in Fort Detrick, Md., where they worked, his invitation to test the Dugway material and other spores in his inventory is among numerous indications that the FBI got the wrong man.

    What kind of murderer, they wonder, would ask the cops to test his own gun for ballistics?

    To prosecutors, who later branded Ivins the killer in a lengthy report on the investigation, his solicitous email is trumped by a long chain of evidence, much of it circumstantial, that they say would have convinced a jury that he prepared the lethal powder right under the noses of some of the nation’s foremost bio-defense scientists.

    PBS’ Frontline, McClatchy and ProPublica have taken an in-depth look at the case against Ivins, conducting dozens of interviews and reviewing thousands of pages of FBI files. Much of the case remains unchallenged, notably the finding that the anthrax letters were mailed from Princeton, N.J., just steps from an office of the college sorority that Ivins was obsessed with for much of his adult life.

    Bruce Ivins
    Bruce Ivins

    But newly available documents and the accounts of Ivins’ former colleagues shed fresh light on the evidence and, while they don’t exonerate Ivins, are at odds with some of the science and circumstantial evidence that the government said would have convicted him of capital crimes. While prosecutors continue to vehemently defend their case, even some of the government’s science consultants wonder whether the real killer is still at large.

    Prosecutors have said Ivins tried to hide his guilt by submitting a set of false samples of his Dugway spores in April 2002. Tests on those samples didn’t display the telltale genetic variants later found in the attack powder and in sampling from Ivins’ Dugway flask.

    Yet records discovered by Frontline, McClatchy and ProPublica reveal publicly for the first time that Ivins made available at least three other samples that the investigation ultimately found to contain the crucial variants, including one after he allegedly tried to deceive investigators with the April submission.

    Paul Kemp, who was Ivins’ lawyer, said the government never told him about two of the samples, a discovery he called “incredible.” The fact that the FBI had multiple samples of Ivins’ spores that genetically matched anthrax in the letters, Kemp said, debunks the charge that the biologist was trying to cover his tracks.

    Asked about the sample submissions, as well as other inconsistencies and unanswered questions in the Justice Department’s case, lead federal prosecutor Rachel Lieber said she was confident that a jury would have convicted Ivins.

    “You can get into the weeds, and you can take little shots of each of these aspects of our vast, you know, mosaic of evidence against Dr. Ivins,” she said in an interview. But in a trial, she said, prosecutors would have urged jurors to see the big picture.

    “And, ladies and gentlemen, the big picture is, you have, you know, brick upon brick upon brick upon brick upon brick of a wall of evidence that demonstrates that Dr. Ivins was guilty of this offense.”

    Scientists who worked on the FBI’s case do not all share her certainty. Claire Fraser-Liggett, a genetics consultant whose work provided some of the most important evidence linking Ivins to the attack powder, said she would have voted to acquit.

    “I don’t know how it would have been possible to convict him,” said Fraser-Liggett, the director of the University of Maryland’s Institute for Genome Sciences. “Should he have had access to a potential bio-weapon, given everything that’s come to light? I’d say no. Was he just totally off the wall, from everything I’ve seen and read? I’d say yes.

    “But that doesn’t mean someone is a cold-blooded killer.”

    The Justice Department formally closed the anthrax case last year. In identifying Ivins as the perpetrator, prosecutors pointed to his deceptions, his shifting explanations, his obsessions with the sorority and a former lab technician, his penchant for taking long drives to mail letters under pseudonyms from distant post offices and, after he fell into drinking and depression with the FBI closing in, his violent threats during group therapy sessions. An FBI search of his home before he died turned up a cache of guns and ammunition.

    Most of all, though, prosecutors cited the genetics tests as conclusive evidence that Ivins’ Dugway spores were the parent material to the powder.

    Yet, the FBI never could prove that Ivins manufactured the dry powder from the type of wet anthrax suspensions used at Fort Detrick. It couldn’t prove that he scrawled letters mimicking the hateful rhetoric of Islamic terrorists. And it couldn’t prove that he twice slipped away to Princeton to mail the letters to news media outlets and two U.S. senators; it could prove only that he had an opportunity to do so undetected.

    The $100 million investigation did establish that circumstantial evidence could mislead even investigators armed with unlimited resources.

    Before focusing on Ivins, the FBI spent years building a case against another former Army scientist. Steven Hatfill had commissioned a study on the effectiveness of a mailed anthrax attack and had taken ciprofloxacin, a powerful antibiotic used to treat or prevent anthrax, around the dates of the mailings. Then-Attorney General John Ashcroft called Hatfill a “person of interest,” and the government eventually paid him a $5.8 million settlement after mistakenly targeting him.

    Ivins’ colleagues and some of the experts who worked on the case wonder: Could the FBI have made the same blunder twice?

    Did Ivins have a motive?

    Growing up in Ohio, the young Bruce Ivins showed an early knack for music and science. But his home life, described as “strange and traumatic” in a damning psychological report released after his death, left scars that wouldn’t go away.

    The report, written by a longtime FBI consultant and other evaluators with court-approved access to Ivins’ psychiatric records, said Ivins was physically abused by a domineering and violent mother and mocked by his father. Ivins developed “the deeply felt sense that he had not been wanted,” the authors found, and he learned to cope by hiding his feelings and avoiding confrontation with others.

    Ivins attended the University of Cincinnati, staying there until he earned a doctoral degree in microbiology. In his sophomore year, prosecutors say, the socially awkward Ivins had a chance encounter that influenced his life: A fellow student who belonged to the Kappa Kappa Gamma sorority spurned him.

    For more than 40 years, even as a married man, Ivins was obsessed with KKG, a fixation that he later admitted drove him to multiple crimes. Twice he broke into chapters, once climbing through a window and stealing the sorority’s secret code book.

    After taking a research job at the University of North Carolina at Chapel Hill, Ivins discovered that a doctoral student, Nancy Haigwood, was a KKG alumna, and he tried to strike up a friendship. When she kept him at a distance, Ivins turned stalker, swiping her lab book and vandalizing her fiance’s car and the fence outside her home. Two decades later, when Haigwood received an FBI appeal for scientists nationwide to help find the anthrax mailer, she instantly thought of Ivins and phoned the FBI. Investigators didn’t home in on him for years.

    When they did, the mailbox in Princeton, which also was near the home of a former Fort Detrick researcher whom Ivins disliked, loomed large.

    “This mailbox wasn’t a random mailbox,” said Edward Montooth, a recently retired FBI agent who ran the inquiry. “There was significance to it for multiple reasons. And when we spoke to some of the behavioral science folks, they explained to us that everything is done for a reason with the perpetrator. And you may never understand it because you don’t think the same way.”

    Ivins was a complicated, eccentric man. Friends knew him as a practical jokester who juggled beanbags while riding a unicycle, played the organ in church on Sundays and spiced office parties with comical limericks. William Hirt, who befriended Ivins in grad school and was the best man at his wedding, described him as “a very probing, spiritual fellow that wouldn’t hurt a fly.”

    Ivins gained self-esteem and status in his job as an anthrax researcher at the U.S. Army Medical Research Institute of Infectious Diseases at Fort Detrick in Frederick, Md.

    Even so, his fixations wouldn’t quit.

    He became so obsessed with two of his lab technicians that he sent one of them, Mara Linscott, hundreds of email messages after she left to attend medical school in Buffalo, N.Y. Ivins drove to her home to leave a wedding gift on her doorstep. When she left, he wrote a friend, “it was crushing,” and called her “my confidante on everything, my therapist and friend.”

    Later, after snooping on email messages in which the two technicians discussed him, Ivins told a therapist that he’d schemed to poison Linscott but aborted the plan at the last minute.

    USAMRIID was once a secret germ factory for the Pentagon, but the institute’s assignment shifted to vaccines and countermeasures after the United States and Soviet Union signed an international treaty banning offensive weapons in 1969. A decade later, a deadly leak from a secret anthrax-making facility in the Soviet city of Sverdlovsk made it clear that Moscow was cheating and prompted the United States to renew its defensive measures.

    Ivins was among the first to be hired in a push for new vaccines.

    By the late 1990s, he was one of USAMRIID’s top scientists, but the institute was enmeshed in controversy. Worried that Iraqi leader Saddam Hussein had made large quantities of anthrax before the 1991 Persian Gulf War, President Bill Clinton had ordered that all military personnel, not just those in war zones, be inoculated with a 1970s-era vaccine. But soldiers complained of ill health from the vaccine, some blaming it for the symptoms called Gulf War Syndrome.

    Later, Karl Rove, political adviser to new President George W. Bush, suggested that it was time to stop the vaccinations. Further, a Pentagon directive—although quickly reversed in 2000—had ordered a halt to research on USAMRIID’s multiple anthrax-vaccine projects.

    Federal prosecutors say these developments devastated Ivins, who’d devoted more than 20 years to anthrax research that was now under attack.

    “Dr. Ivins’ life’s work appeared destined for failure, absent an unexpected event,” said the Justice Department’s final report on the anthrax investigation, called Amerithrax. Told by a supervisor that he might have to work on other germs, prosecutors say Ivins replied: “I am an anthrax researcher. This is what I do.”

    Ivins’ former bosses at Fort Detrick call that Justice Department characterization wrong. Ivins had little to do with the existing vaccine; rather, he was working to replace it with a better, second-generation version, they say.

    In the summer of 2001, Ivins shouldn’t have had any worries about his future, said Gerard Andrews, who was then his boss as the head of USAMRIID’s Bacteriology Division. “I believe the timeline has been distorted by the FBI,” Andrews said. “It’s not accurate.”

    Months earlier, Andrews said, the Pentagon had approved a full year’s funding for research on the new vaccine and was mapping out a five-year plan to invest well over $15 million.

    Published reports have suggested that Ivins had another motive: greed. He shared patent rights on the new vaccine. If it ever reached the market, after many more years of testing and study, federal rules allowed him to collect up to $150,000 in annual royalties.

    If that was his plan, it didn’t go well. After the attacks, Congress approved billions of dollars for bio-defense and awarded an $877.5 million contract to VaxGen Inc. to make the new vaccine but scrapped it when the California firm couldn’t produce the required 25 million doses within two years.

    Ivins received modest royalty payments totaling at least $6,000. He told prosecutors he gave most of the money to others who had worked with him on the project, said Kemp, his defense attorney.

    Kemp said prosecutors told him privately that they’d dismissed potential financial returns as a motive. That incentive wasn’t cited in the Justice Department’s final report.

    Did Ivins have an opportunity?

    The relatively lax security precautions in place at U.S. defense labs before the mailings and Sept. 11 terrorist attacks offered many opportunities for a deranged scientist. Prosecutors said Ivins had easy access to all the tools needed to make the attack spores and letters.

    Researchers studying dangerous germs work in a “hot suite,” a specially designed lab sealed off from the outside world. The air is maintained at “negative pressure” to prevent germs from escaping. Scientists undress and shower before entering and leaving.

    Watch the video report
    Like many of his colleagues at Fort Detrick, Ivins dropped by work at odd hours. In the summer and fall of 2001, his night and weekend time in the hot suite spiked: 11 hours and 15 minutes in August, 31 hours and 28 minutes in September and 16 hours and 13 minutes in October. He’d averaged only a couple of hours in prior months. Swiping a security card each time he entered and left the suite, he created a precise record of his visits. Rules in place at the time allowed him to work alone.

    Sometime before the mailings, prosecutors theorize, Ivins withdrew a sample of anthrax from his flask—labeled RMR-1029—and began to grow large quantities of the deadly germ. If so, his choice of strains seemed inconsistent with the FBI’s portrait of him as a cunning killer. Surrounded by a veritable library of germs, they say, Ivins picked the Dugway Ames spores, a culture that was expressly under his control.

    Using the Ames strain “pointed right at USAMRIID,” said W. Russell Byrne, who preceded Andrews as the chief of the Bacteriology Division and who’s among those convinced of Ivins’ innocence. “That was our bug.”

    Federal prosecutors have declined to provide a specific account of when they think Ivins grew spores for the attacks or how he made a powder. But the steps required are no mystery.

    First, he would have had to propagate trillions of anthrax spores for each letter. The bug can be grown on agar plates (a kind of petri dish), in flasks or in a larger vessel known as a fermenter. Lieber, then an assistant U.S. attorney and lead prosecutor, said the hot suite had a fermenter that was big enough to grow enough wet spores for the letters quickly.

    To make the amount of powder found in the letters, totaling an estimated 4 to 5 grams, Ivins would have needed 400 to 1,200 agar plates, according to a report by a National Academy of Sciences panel released in May. Growing it in a fermenter or a flask would have been less noticeable, requiring between a few quarts and 14 gallons of liquid nutrients.

    Next was drying. Simple evaporation can do the job, but it also would expose other scientists in a hot suite. Lieber said the lab had two pieces of equipment that could have worked faster: a lyophilizer, or freeze dryer; and a smaller device called a “Speed Vac.”

    Investigators haven’t said whether they think the Sept. 11 attacks prompted Ivins to start making the powder or to accelerate a plan already under way. However, records show that on the weekend after 9/11, Ivins spent more than two hours each night in the hot suite on Friday, Saturday and Sunday.

    The next afternoon, Monday, Sept. 17, 2001, he took four hours of annual leave but was back at USAMRIID at 7 p.m. Because of their Sept. 18 postmarks, the anthrax-laced letters had to have been dropped sometime between 5 p.m. Monday and Tuesday’s noon pickup at a mailbox at 10 Nassau St. in Princeton.

    If Ivins did make the seven-hour round-trip drive from Fort Detrick, he would’ve had to travel overnight. Investigators said he reported to USAMRIID at 7 a.m. Tuesday for a business trip to Pennsylvania.

    Did Ivins have the means?

    Colleagues who worked with Ivins in the hot suite and think that he’s innocent say he’d never worked with dried anthrax and couldn’t have made it in the lab without spreading contamination.

    Andrews, Ivins’ former boss, said Ivins didn’t know how to use the fastest process, the fermenter, which Andrews described as “indefinitely disabled,” with its motor removed. He said the freeze dryer was outside the hot suite, so using it would have exposed unprotected employees to lethal spores.

    Without a fermenter, it would have taken Ivins “30 to 50 weeks of continuous labor” to brew spores for the letters, said Henry Heine, a former fellow Fort Detrick microbiologist who’s now with the University of Florida. Prosecutors and a National Academy of Sciences panel that studied the case said the anthrax could have been grown as quickly as a few days, though they didn’t specify a method.

    FBI searches years later found no traces of the attack powder in the hot suite, lab and drying equipment.

    Fraser-Liggett, the FBI’s genetics consultant, questioned how someone who perhaps had to work “haphazardly, quickly” could have avoided leaving behind tiny pieces of forensically traceable DNA from the attack powder.

    Lieber, the Justice Department prosecutor, said the FBI never expected to find useable evidence in the hot suite after the equipment had been cleaned multiple times.

    “This notion that someone could have stuck a Q-tip up in there and found, you know, a scrap of ‘1029’ DNA, I think is, with all due respect, it’s inconsistent with the reality of what was actually happening,” she said.

    Yet, in 2007, six years after the letters were mailed, the FBI carefully searched Ivins’ home and vehicles looking for, among other things, anthrax spores. None were found.

    The first round of anthrax letters went to an eclectic media group: Tom Brokaw, the NBC anchor; the tabloid newspaper the New York Post; and the Florida offices of American Media Inc., which publishes the National Enquirer. Just over two weeks later, on Oct. 4, jittery Americans were startled to learn that a Florida photo editor, Robert Stevens, had contracted an extremely rare case of inhalation anthrax.

    Stevens died the next day. As prosecutors tell the story, Ivins would hit the road to New Jersey again as early as Oct. 6, carrying letters addressed to the offices of Democratic Sens. Patrick Leahy, the Judiciary Committee chairman from Vermont, and Tom Daschle of South Dakota, the Senate majority leader.

    Unlike the brownish, granular, impure anthrax in the earlier letters, this batch was far purer, with tiny particles that floated like a gas, making them more easily inhaled and therefore deadlier.

    Just a few hours before those letters were dropped at Nassau Street, investigators had a scientific breakthrough: Paul Keim, an anthrax specialist at Northern Arizona University, verified that the spores in Stevens’ tissues were the Ames strain of anthrax.

    “It was a laboratory strain,” Keim recalled later, “and that was very significant to us.”

    On Oct. 15, an intern in Daschle’s office opened a nondescript envelope with the return address “4th Grade, Greendale School, Franklin Park, NJ 08852.” A white powder uncoiled from the rip, eventually swirling hundreds of feet through the Hart Senate Office Building, where dozens of senators work and hold hearings. It would take months and millions of dollars to fully cleanse the building of spores.

    Ill-prepared to investigate America’s first anthrax attack, the FBI didn’t have a properly equipped lab to handle the evidence, so the Daschle letter and remaining powder were taken to Fort Detrick.

    Among those immediately enlisted to examine the attack powder: Bruce Ivins.

    The FBI would turn to Ivins time and again in the months and years ahead. At this early moment, he examined the Daschle spores and logged his observations with scientific exactitude. The quality, he determined, suggested “professional manufacturing techniques.”

    “It is an extremely pure preparation, and an extremely high concentration,” Ivins wrote on Oct. 18, 2001. “These are not ‘garage’ spores.”

    Part 2: Did Bruce Ivins Hide Attack Anthrax From the FBI?

    In early 2002, federal agents who were hunting the anthrax killer were trying to winnow a suspect list that numbered in the hundreds. They knew only that they were looking for someone with access to the rare Ames strain of anthrax used in research labs around the world. Profilers said the perpetrator probably was an American with “an agenda.”

    The powder-laced letters, which killed five people, contained no fingerprints, hair or human DNA but did offer one solid microscopic clue: The lethal spores in the powder were dotted with genetically distinct variants known as morphs.

    So agents set out on an arduous task: Collect samples from Ames anthrax cultures around the world, sort through them and find one with morphs that matched the attack powder. Then they’d have a line on where the murder weapon was made and, perhaps, the identity of the killer.

    Bruce Ivins, an Army scientist at Fort Detrick, Md., had a good idea where the inquiry was headed. In the months after the attacks, he’d schooled federal agents in the intricacies of anthrax, explaining how the telltale morphs can arise from one generation to the next.

    In April 2002, Ivins did something that investigators would highlight years later as a pillar in the capital murder case that was being prepared against him before he committed suicide in 2008: He turned over a set of samples from his flask of Ames anthrax that tested negative, showing no morphs. Later, investigators would take their own samples from the flask and find four morphs that matched those in the powder.

    Rachel Lieber, the lead prosecutor in a case that will never go to trial, thinks that Ivins manipulated his sample to cover his tracks. “If you send something that is supposed to be from the murder weapon, but you send something that doesn’t match, that’s the ultimate act of deception. That’s why it’s so important,” Lieber said.

    However, a re-examination of the anthrax investigation by Frontline, McClatchy and ProPublica turned up new evidence that challenges the FBI’s narrative of Ivins as a man with a guilty conscience who was desperately trying to avoid being discovered.

    Records recently released under the Freedom of Information Act show that Ivins made available a total of four sets of samples from 2002 to 2004, double the number the FBI has disclosed. And in subsequent FBI tests, three of the four sets ultimately tested positive for the morphs.

    Paul Kemp, Ivins’ lawyer, said the existence of Ivins’ additional submissions was significant because it discredits an important aspect of the FBI’s case against his client. “I wish I’d known that at the time,” he said.

    Heroes and suspects

    To understand how investigators eventually came to see almost everything Ivins did or said as proof of his guilt, you have to return to the fall of 2001.

    The FBI wasn’t equipped to handle deadly germs, so the attack powder was rushed to Fort Detrick, the home of the U.S. Army Medical Research Institute of Infectious Diseases.

    From the beginning, Fort Detrick researchers played a prominent role in the inquiry. Ivins was among the most voluble, offering advice and a steady stream of tips about co-workers, foreign powers and former employees who might have carried out the attacks.

    Investigators quickly recognized they were in an awkward situation. Any of the scientists could be the killer. Agents canvassed the tight-knit laboratory, inviting the researchers to finger their colleagues. “We were heroes in the morning and suspects in the afternoon,” recalled Jeffrey Adamovicz, at the time the deputy chief of the Bacteriology Division, where Ivins worked.

    At 8:45 a.m. on Dec. 16, 2001, Ivins typed out an email to colleagues offering to provide Ames strain “for genetic analysis or sequencing by whomever.” He offered a sample of the original Ames anthrax taken in 1981 from a Texas cow and a collection of spores sent to Fort Detrick in 1997, mostly from the U.S. Army base in Dugway, Utah. Seven years later, prosecutors announced that they were certain the attack powder had been grown with germs from the Dugway flask Ivins was offering for scrutiny.

    John Ezzell, a USAMRIID scientist at the time who assisted the FBI, said in an interview that Ivins likely didn’t think the technology could distinguish among Ames variants. But the record suggests otherwise.

    On Jan. 23, 2002, Ivins gave an FBI agent a detailed tutorial on how to spot morphs in anthrax colonies. He also volunteered the names of two people who had the “knowledge and character” to have prepared and sent the letters while explaining that he’d never worked with powdered anthrax.

    Ivins then showed the agent photos of anthrax morphs and said that “DNA sequencing should show the differences in genetics,” the mutations that make morphs grow differently. Ivins had good reason to understand the biology of morphs: One of his best friends at the lab, Patricia Worsham, had published a pioneering paper on the subject several years earlier.

    In suggesting that the FBI use morphs to catch a killer, Ivins was proposing some cutting-edge science. No one had ever attempted to genetically fingerprint morphs, and the researchers advising the FBI weren’t even sure it could be done. Such genetic detective work, now commonplace, was in its infancy. Today, this technique is recognized as a precise but not foolproof method of identification.

    A few weeks later, Ivins gave several people the sort of evidence he seemed to be suggesting they collect. He provided a sample to a colleague who wanted to look at the spores under a microscope. Then, on Feb. 27, Ivins drew anthrax from his flask, which he labeled RMR-1029, and provided it to investigators who were assembling the FBI’s worldwide library of anthrax. If prosecutors are right, the murderer had handed over his gun for testing.

    But then the narrative took a strange twist. Perhaps deliberately, perhaps by chance, Ivins placed the spores in the wrong type of glass vessel. Investigators rejected the sample and told him to try again.

    Sometime in the next few weeks, prosecutors contend, Ivins figured out for the first time that the morphs might trap him. Until then, they assert, he’d assumed that the anthrax in his flask was pure and therefore without morphs. But Paul Keim, the scientist who helped the FBI identify the attack strain, said it seemed implausible that Ivins thought his spores were morph-free. The Dugway culture included dozens of separate batches, most of which were grown at the Utah Army base in fermenters, an ideal breeding ground for morphs. Ivins, Keim said, was likely to have understood this.

    In April 2002, Ivins prepared a third sample from RMR-1029. This time, his lawyer said, he plucked a sample using a technique called a “single colony pick,” a method biologists use to maintain purity when growing bacteria. Ultimately, this sample tested negative for the morphs. Prosecutors said they’re not even sure that the sample Ivins submitted came from the flask. If it did, they said, he obstructed justice, since their subpoena instructed scientists to capture diverse samples of spores that would be sure to reproduce any morphs. Ivins told investigators he’d followed standard procedures for microbiologists when he sampled just one colony.

    Investigators eventually seized and tested the germs Ivins turned over to his colleague for microscopic examination, and found they tested positive for the morphs. Separately, they stumbled across a duplicate first submission from February: the material that had been rejected. It, too, was positive.

    Curious conduct in the lab

    In late April 2002, investigators confronted Ivins about reports that he’d been furtively testing for anthrax spores in his office and other areas outside the “hot suites,” the sealed rooms where researchers worked with deadly pathogens.

    Ivins said that that was true and volunteered that he’d also conducted cleanups in the lab not once but twice — in December 2001, when he bleached over areas he’d found to be contaminated, and again in mid-April, when he conducted a search for errant anthrax spores.

    These acts violated the lab’s standard procedure, which called for the safety office to investigate and clean up any contamination.

    Ivins offered curious explanations. He said that in December, he had been trying to address the worries of a junior technician that sloppy handling of the attack powder had spread deadly spores through the lab. In April, against the advice of his supervisor, he launched his own tests after two researchers accidentally spilled a small amount of anthrax in the hot suite.

    Asked why he didn’t inform safety officials of the possible dangers, Ivins told investigators he didn’t want to disrupt the FBI inquiry or alarm colleagues.

    Whatever his motivation, subsequent tests showed Ivins had a point about failures to contain anthrax in the labs. His sampling showed that tiny amounts of anthrax of various strains had somehow seeped out of the hot suite and into his office. The Army ordered an investigation into why the lab’s safety procedures weren’t followed.

    Despite Ivins’ puzzling behavior, investigators wouldn’t focus on him for years.

    The anthrax inquiry was following another course and had zeroed in on a virologist named Steven Hatfill. A blunt character who boasted of his years in Rhodesia, Hatfill had a penchant for publicity, holes in his résumé and an unpublished novel that featured a Palestinian terrorist who attacks Washington with the bubonic plague. The evidence against him was entirely circumstantial.

    Investigators remained on Hatfill’s trail until late 2006. By then, they’d searched his home, deployed anthrax-sniffing dogs and even emptied a pond, from which they removed a suspicious contraption. It was a turtle trap. No evidence of anthrax turned up. (Hatfill sued the government and received $5.8 million to settle the case).

    A new Ivins sample

    In early April 2004, Ivins was asked to help the FBI collect a complete set of cultures from Fort Detrick. Earlier, FBI agents had found 22 vials of anthrax that hadn’t been turned over. On April 6, a lab assistant found a test tube of material that appeared to have been removed from Ivins’ flask.

    The assistant gave the germs to Henry Heine, a colleague of Ivins’ who happened to be in the building. Heine said he checked with Ivins, who told him to send a sample from the tube to the FBI. In an April 6 email, Ivins thanked Heine, acknowledging that the anthrax “was probably RMR-1029.”

    Heine views this moment as a sign of his colleague’s innocence, pointing out that Ivins willingly turned over a sample he thought had originated from his flask. In an interview, Heine said there were no cameras in the building, that FBI agents weren’t monitoring the search and that Ivins easily could have prepared the sample himself and tampered with the evidence.

    A day later, investigators seized Ivins’ flask, locking it in a safe double-sealed with evidence tape.

    What happened next raises questions about the reliability of the FBI’s method for detecting morphs. The bureau separately ordered tests on Heine’s sample and a second one drawn from the same test tube. Records show conflicting results, one negative and one positive.

    Does this mean the FBI’s tests for morphs were unreliable?

    An FBI scientist said Ivins had told investigators the anthrax in the refrigerator had been diluted. This perhaps made the morphs undetectable in testing, said the scientist, who was made available to discuss the matter on the condition of anonymity.

    Heine said the sample he sent wasn’t diluted.

    “We can only go by what Bruce told us,” the FBI scientist replied.

    Heine said he sent the FBI at least two additional samples from RMR-1029 that Ivins had shared with him. He said the FBI later told him both had tested negative for the morphs. The FBI scientist said the bureau could find no record of this.

    Ivins’ hidden obsessions come out

    In September 2006, the FBI assigned Edward Montooth to lead the anthrax inquiry. Montooth looked at the evidence through fresh eyes, and his attention quickly focused on the background and conduct of Ivins. By December, he told FBI Director Robert Mueller that Ivins had emerged as the prime suspect.

    Investigators saw mounting evidence that the Fort Detrick scientist was hiding something.

    They learned about his lifelong obsession with the Kappa Kappa Gamma sorority and discovered that the Princeton, N.J., mailbox into which the letters had been dropped was just yards from a KKG office. Ivins had mailed packages under assumed names, and his email messages expressed fears that he was paranoid, delusional or suffering from a split personality.

    “When I get all steamed up, I don’t pout. I push Bruce aside, then I’m free to run about!” one read.

    The genetic evidence seemed persuasive. Investigators had tested 1,059 Ames samples from U.S. and foreign labs and found only 10 with three or more of the morphs that genetically matched the letter powder. All traced back to Ivins’ flask.

    The FBI identified 419 people at Fort Detrick and other labs who could have had access to the material. Prosecutors say each was investigated and cleared of possible involvement.

    All of Ivins’ actions in the early days of the investigation were reinterpreted as signs of his guilt. Investigators recovered a portion of his first sample from RMR-1029—the test tubes that had been rejected because they were the wrong kind—and found that they contained the incriminating morphs. They contrasted that with the second sample from 2002—no morphs—and saw it as proof that Ivins had learned before submitting it that the Ames strain could be traced to his flask.

    Asked about the April 2004 sample turned up by PBS Frontline, McClatchy and ProPublica that tested positive, prosecutor Lieber said it could be easily explained. Ivins had no choice: FBI agents were swarming through Fort Detrick looking for cultures of anthrax that hadn’t been submitted for genetic testing.

    The unauthorized cleanup of the lab, the Justice Department said in its report last year, reflected a “guilty conscience.”

    “The evidence suggests that Dr. Ivins knew where to swab because he knew where he had contaminated the building,” prosecutors wrote.

    Even Ivins’ defenders had questioned his actions at the time. “I said, ‘Bruce, do you realize how bad this looks?’ And he was a little bit puzzled,” Adamovicz said. “I said, ‘This makes you look suspicious because it looks like you’re trying to hide something.’ Bruce, of course, denied that he was trying to hide anything. And again, in my view, I don’t think he was trying to hide anything. I think he couldn’t keep a secret if he had to.”

    Watch the video report
    The Army’s report on the incident didn’t portray it as nefarious. It confirmed the presence of Ames anthrax and two other anthrax strains in Ivins’ office. Ames also was found near a “pass box” through which Ivins had transferred one of the letters to the hot suite, the men’s changing area and Ivins’ office. But investigators were unable to nail down an original source for the contamination. They determined that it was unrelated to the minor spill in the hot suite and speculated that it could have resulted from the handling of the anthrax letters.

    Investigators executed a search warrant at Ivins’ home and office. They found guns, a shooting range in his basement and Tasers. But swab after swab taken from every conceivable nook and cranny found not a single spore from the attack powder. Lieber said that was to be expected with a microbiologist trained to handle dangerous germs.

    Claire Fraser-Liggett, a key genetics consultant for investigators, found such a dismissal troubling. “You think about all the efforts that had to go into decontaminating postal facilities, and the volatility of those spores and the fact that they were around for so long,” she said. “I think it represents a big hole, really gives me pause to think: How strong was this case against Dr. Ivins?”

    Ivins sat down for detailed interviews with prosecutors in early 2008 and volunteered a series of damaging admissions with his lawyer present. He acknowledged making long drives at night while his wife slept and calmly recounted his obsession with Kappa Kappa Gamma, blindfolding and bondage. Sometimes his answers were incoherent, FBI summaries show. He couldn’t explain, for example, why he had spent so many late nights in the lab in the weeks before the letter attacks.

    By the summer of 2008, Ivins was coming apart. He told his group therapy session, which he’d begun attending in recent months, that he was planning to get a gun so he could kill his enemies. The FBI searched his home again and seized several guns, bulletproof vests and 250 rounds of ammunition.

    Ivins was briefly committed and then released. On July 26, he took an overdose of over-the-counter medication. Three days later, he was dead at 62. Neither he nor the prosecutors would ever have their day in court.

    ‘This was not an airtight case’

    A week later, Justice Department officials called a news conference to describe their evidence against Ivins as some in Congress called for an independent investigation of the case.

    “We believed that based on the evidence we had collected, we could prove his guilt to a jury beyond a reasonable doubt,” U.S. Attorney Jeffrey Taylor told reporters at the time. “Based on the totality of the evidence we had gathered against him, we are confident that Dr. Ivins was the only person responsible for these attacks.”

    Prosecutors and investigators patiently laid out the case against Ivins. At its heart, they said, was the revolutionary science that had improbably traced the attack powder to a single flask.

    “RMR-1029 was conclusively identified as the parent material to the anthrax powder used in the mailings,” the Justice Department wrote in its summary of the case.

    Fraser-Liggett, who did some of the pioneering genetics work for the investigation, remains unconvinced.

    “This was not an airtight case, by any means. You know, I think that, for an awful lot of people, there is a desire to really want to say that ‘yes, Ivins was the perpetrator. This case can reasonably be closed. And we can put this tragic chapter in U.S. history behind us,’ ” she said. “But I think part of what’s driving that is the fact that, if he wasn’t the perpetrator, then it means that person is still out there.”

    Part 3: Was FBI’s Science Good Enough to ID Anthrax Killer?

    WASHINGTON — In March 2007, federal agents convened an elite group of outside experts to evaluate the science that had traced the anthrax in the letters to a single flask at an Army lab in Maryland.

    Laboratory work had built the heart of the case against Bruce Ivins, an Army researcher who controlled the flask. Investigators had invented a new form of genetic fingerprinting for the case, testing anthrax collected from U.S. and foreign labs for mutations detected in the attack powder.

    Out of more than 1,000 samples, only eight had tested positive for four mutations found in the deadly germs sent to Congress and the news media.

    Even so, the outside scientists, known as the “Red Team,” urged the FBI to do more basic research into how and when the mutations arose to make sure the tests were “sound” and the results unchallengeable.

    Jenifer Smith, a senior manager at the FBI’s laboratory, shared the team’s concerns. Smith recalled that she was worried the FBI didn’t have a full understanding of the mutations and might see a trial judge throw out the key evidence.

    “The admissibility hearing would have been very difficult,” Smith recalled in an interview. “They had some good science, but they also had some holes that would have been very difficult to fill.”

    The FBI rebuffed the Red Team’s suggestion, describing it as “an academic question with little probative value to the investigation.”

    Ivins committed suicide in July 2008 as prosecutors were preparing to charge him with capital murder in the cases of the five people killed by the anthrax mailings. Prosecutors announced that Ivins was the sole perpetrator and the parent material for the letters had come from his flask.

    Three years later, that assertion remains an open question. A separate panel, from the National Academy of Sciences, found that prosecutors had overstated the certainty of their finding. Committee members said newly available testing methods could prove the FBI’s case much more definitively or lead to other potential suspects. But federal investigators, who closed the case more than a year ago, have expressed no interest in further scientific study of the evidence.

    A re-examination of the anthrax case by PBS Frontline, McClatchy and ProPublica has raised new questions about some of the evidence against Ivins. The reporting uncovered previously undisclosed tensions between researchers who were trying to create a new form of forensic science and criminal investigators whose boss was under intense pressure from the president of the United States to crack a case that had few leads and hundreds of plausible suspects.

    Paul Keim, an anthrax expert at Northern Arizona University who assisted in the FBI investigation, said he had qualms about whether the bureau’s groundbreaking laboratory method would have survived a rigorous legal review.

    “I don’t think that it was ready for the courtroom at the time Bruce committed suicide,” Keim said.

    If Ivins hadn’t killed himself, he said, the FBI would have launched a “hard push” for additional data that showed the method was reliable. Such research, he said, also could have shown it wasn’t valid.

    Keim, a member of the Red Team who attended the March 2007 meeting in Quantico, Va., said he didn’t find out that the team’s call for further research had been rejected until a year later, after Ivins had committed suicide and prosecutors were hastily organizing a news conference to describe the science.

    Keim and other scientists involved in the case said the strictures of a criminal investigation prevented them from talking to one another or sharing information as they would on a typical research effort.

    “The investigation was being driven by a small group of bureau scientists and investigators,” Keim said. “Broader engagement with an expert panel sworn to secrecy would have been good. Having the best scientific consultants embedded would have been good.”

    Jenifer Smith was the section chief of the Intelligence and Analysis Section in the FBI’s Weapons of Mass Destruction Directorate until 2009, and she observed the process from inside. During the anthrax case, she said, the FBI lab departed from its traditional procedures and allowed top investigators to influence how the science was conducted.

    “They deviated from traditional lab practice in this particular case,” Smith said. “There were some political things going on behind the scenes, and it was embarrassing not to have this solved. Yes, it was a long, drawn-out investigation. But that’s when you don’t deviate from your practices.”

    Rachel Lieber, the lead prosecutor, said law-enforcement officials did try to make sure the science was rigorously vetted. But Lieber said there were limits and that the science was only a piece of a much larger mosaic of evidence against Ivins.

    “You look at the lines of a trial and where do we spend our resources,” Lieber said. “Are we doing a science project or are we looking for proof at trial? These are two very different standards.”

    Unprecedented effort on science

    Questions about the definitiveness of the scientific findings began to arise soon after prosecutors said Ivins was the anthrax mailer. U.S. Attorney Jeffrey Taylor declared without equivocation in August 2008 that the FBI had proved that Ivins’ flask, RMR-1029, “was the parent flask for the spores” used in the mailings — “effectively the murder weapon.”

    At a briefing a few weeks later, the FBI’s lab director, Christian Hassell, was asked to give a “level of confidence” for the findings. “It’s very high,” he replied. “This whole exercise shows that they were traced back to a single flask.”

    Another official at the briefing, who spoke on condition of anonymity as a ground rule, claimed that the Red Team of outside experts had vetted and approved the work and the FBI had heeded its calls for further research.

    “We invited a cadre of scientists to conduct a Red Team review of the science that we performed, and we took their suggestions,” the official said. “We made additional experiments and the data available to the Red Team at their suggestion. And so all of the science that went behind this was well-reviewed.”

    Critics on Capitol Hill weren’t mollified. Sen. Patrick Leahy, a Vermont Democrat and one of the intended recipients of an anthrax letter, said he didn’t believe that Ivins had acted alone. So FBI Director Robert Mueller announced in September 2008 that a panel of the National Academy of Sciences would conduct an independent review of the scientific findings.

    The FBI didn’t wait for the outcome of those deliberations. In February 2010, with the panel still taking testimony, prosecutors announced that the case was closed, Ivins was the sole perpetrator and RMR-1029 was “conclusively identified as the parent material to the anthrax powder used in the mailings.”

    Nearly a year to the day later, the outside committee looked at the same evidence differently, saying scientific data “provided leads” as to where the spores had come from but “alone did not rule out other sources.”

    The tests that identified the flask as the source of the parent spores for the attack showed an association but didn’t “definitively demonstrate such a relationship,” the panel said.

    When the case of the anthrax mailings broke in late 2001, genetic sequencing was in its early days. It was only a year earlier that two teams of American scientists had announced that they’d mapped the human genome. Work on anthrax was under way but incomplete.

    Watch the video report
    A fortuitous lab miscue may have provided the biggest break. Early in the investigation, a colleague of Ivins’ at the Army research facility in Fort Detrick, Md., left spores from one of the letters growing in a dish longer than she’d planned. When she next looked, the researcher, Terry Abshire, noticed something potentially significant: The cultures had small numbers of visually distinguishable colonies, or morphs, which are caused by genetic mutations.

    One of the leading scientists in the field describes morphs this way: Imagine a jar of M&M’s that are almost all chocolate — the anthrax spores — but sprinkled with a few blues and reds — the morphs. Scoop out a big enough portion of spores, grow the anthrax on plates, and a morph or two probably will appear.

    Morphs that look the same can be caused by different mutations. To create a true genetic fingerprint of the attack powder, scientists had to find and sequence the mutations that spawned the morphs.

    Once they had that fingerprint, investigators could look for a match with the stocks of anthrax in bio-defense labs. The Ames strain used in the letter attacks had been cultured from a dead cow in Texas in 1981, and the Army frequently used it for animal testing of vaccines.

    More than 1,000 samples tested

    The attack powder had multiple morphs. Over several years, contractors developed tests for four morphs that produced what the FBI said were reliable results.

    It was no easy task. Just a year before the anthrax attacks, it would have been inconceivable, Keim said. By late 2001, it was merely revolutionary.

    When the anthrax samples from U.S. and foreign bio-weapons labs were screened, only 10 out of more than 1,000 tested positive for three or more of the morphs. All came from Ivins’ flask, RMR-1029.

    In its report earlier this year, the National Academy of Sciences panel raised numerous questions about this finding, some of which had been posed by the Red Team back in 2007.

    The panel also noted that the FBI didn’t have a complete understanding of how temperature or other growth conditions might affect how many morphs appeared. Perhaps a particular morph would become visible only under certain growth conditions. It was this question that the Red Team had suggested for additional research in 2007.

    The FBI’s own records show that the tests didn’t always deliver reliable results. In trying to prove that a sample Ivins provided from his flask in April 2002 was deceptive because it contained none of the morphs from the attack powder, investigators sampled the flask 30 times. All came back with at least one morph, and 16 came back with all four. Six of them showed only two or fewer, even though they were grown directly from the Ivins culture.

    The National Academy of Sciences panel’s report raised the possibility that some of the morphs could arise through the process of “parallel evolution,” in which identical mutations occur in separately growing colonies of bacteria.

    Richard Lenski, a Michigan State University professor and specialist in this field, said the FBI faced a significant challenge. In what he termed a “dream world” with unlimited resources, researchers could separately grow hundreds of colonies of the anthrax in both Ivins’ flask and the attack powder and compare the morphs that evolve.

    Such an experiment, of course, would be an expensive long shot, because the person who made the powder did so in secret with methods that remain unknown.

    Claire Fraser-Liggett, a pioneering genetics researcher, was part of the effort to track the morphs. In August 2008, she sat onstage alongside senior FBI science officials as the findings were presented. By then, she said, the technology had leapfrogged far beyond the techniques used in 2001 and 2002 to compare morphs.

    Beginning in about 2006, she said, “next generation” sequencing came on line. What cost $250,000 and took one to two months of work in 2001 now could be done for about $150 in a week. With price no longer an issue, the DNA in a colony of anthrax could be sampled over and over and over, assuring accuracy. And you wouldn’t be limited to four morphs; you could test as many as you felt were useful.

    Fraser-Liggett doesn’t fault the FBI for not switching to an untried technique in 2006. But she said the enhanced precision now available could bring new evidence to light, confirming investigators’ original conclusion or pointing in other directions.

    Chemical signals never fully explained

    For now, the case remains a matter of dispute, with prosecutors and law-enforcement officials insisting that the combination of science and circumstantial evidence would have been more than sufficient to win a conviction.

    One area of contention is whether the killer tried to add a chemical to make the spores float more easily, so they’d have a better chance of being inhaled. McClatchy first reported last spring that the FBI had failed to explain the presence of unusual levels of silicon and tin in two of the letters, since those elements aren’t part of the process of growing spores.

    Scientists pressing for answers to those questions published a paper in a scientific journal this month. The FBI says the silicon was present through a natural process, not from any special treatment by Ivins.

    David A. Relman, vice chairman of the National Academy study committee and a professor at the Stanford University School of Medicine, said the scientific picture remained incomplete.

    Relman said, for example, that the high level of silicon measured in the letter sent to the New York Post remained a “big discrepancy,” one for which the panel received no explanation. None of the spores in Ivins’ now-infamous flask contained any silicon.

    Relman said the panel questioned FBI officials about whether the high silicon measurement had arisen from an anomaly in the testing.

    “We asked: ‘Is it nonrepresentative sampling?'” he said.

    “And they said, ‘No, we don’t think that’s the answer.’ ”

    “There is no answer,” Relman said, “That’s why we said it’s not resolved.”

    Lieber, the prosecutor, said she would have moved to exclude the high-silicon reading at trial since it came from a single measurement.

    According to the FBI, the anthrax from RMR-1029 was used as starter germs for the attack powder. Investigators suspect that there were at least two separate production runs. The powder sent to the media was relatively coarse; the anthrax mailed to Congress had much smaller particles and floated like a gas.

    The germs in the flask were a mix of anthrax grown by Ivins and the Army base in Dugway, Utah. During the growth phase, the anthrax killer introduced several impurities, including silicon, trace elements of tin and, in two of the letters, an unusual strain of another bacterium, Bacillus subtilis.

    Had Ivins not committed suicide, his trial very likely would have included vigorous sparring over the scientific evidence. Experts probably would have offered conflicting testimony about the reliability and certainty of the genetic tests.

    Relman said a trial would have been the only way in which the prosecution’s evidence “could have been weighed and challenged by experts.”

    It’s worth considering whether an independent panel should evaluate the full case against Ivins, looking at the science, the evidence investigators gathered and all other relevant material, Relman said.

    “We have to decide … how important this case is to us as a society, and I’m not presupposing it is,” he said.

    Fraser-Liggett and Lenski said it would be valuable to continue testing the anthrax samples in the case as new, more sensitive technologies come on line.

    “Speaking as an individual citizen,” Lenski wrote in an email, “I think it would benefit the public. Even if it didn’t resolve the Amerithrax case with respect to criminal culpability, it would be a valuable test run of what science could contribute if a similar terrorist event were to occur.”

    by Stephen Engelberg, ProPublica, Greg Gordon, McClatchy, Jim Gilmore and Mike Wiser, PBS Frontline, Oct. 10, 2011, 11:04

    Find the story at 10 October 2011 part 1

    Find the story at 10 October 2011 part 2

    Find the story at 10 October 2011 part 3

    Copyright Propublica.org

    The Anthrax Files: The Essential Documents (2011)

    FRONTLINE closely examined more than 27,000 pages of FBI documents for this investigation. Here are some of the key documents and significant reports on the investigation and the government’s conclusion that Dr. Bruce Ivins was the perpetrator of the attacks.

    October 1997 — USAMRIID Reference Material Receipt Record
    This document shows Dr. Bruce Ivins at the U.S. Army Medical Research Institute of Infectious Diseases (USAMRIID) was the custodian of a 1000 ml flask of liquid anthrax labeled RMR-1029. The FBI later claims RMR-1029 is the parent material of the anthrax used in the mailings.

    October 2001 — Bruce Ivins’ Analysis of the Daschle Sample
    The anthrax from the letter addressed to Sen. Tom Daschle (D-S.D.) was sent to USAMRIID for analysis by Ivins and his colleagues. In his report, Ivins wrote:

    If this is a preparation of bacterial spores, it is an extremely pure preparation, and an extremely high concentration. These are not “garage” spores. The nature of the spore preparation suggests very highly that professional manufacturing techniques were used in the production and purification of the spores, as well as converting the spores into an extremely fine powder.

    March 2005 — Ivins Interviewed by FBI
    In the spring of 2005, investigators were narrowing in on RMR-1029, and they began interviewing people with access to the flask. They interview Ivins on March 31. He is asked detailed questions about the flask, anthrax production at USAMRIID, and personal e-mail exchanges:

    IVINS was aware that many of these e-mails reveal aspects of his personal life and mental health at the time, including an acknowledgement by him that he was seeing a psychologist and had been diagnosed with “paranoid personality disorder.” IVINS offered that at the time some of these e-mails were written he was taking the antidepressant prescription medication Celexa (citalopram hydrobromide). IVINS said he is better now and no longer takes Celexa. IVINS related that he internalizes his negative emotions and, as a result, suffers from ulcers and irritable bowel syndrome. When asked whether his psychological condition had ever caused him to do anything which surprised him, IVINS responded in the negative. IVINS offered that he does not “act out” and has never hit his wife.

    Ivins is also asked whether, as the patent-holder on an anthrax vaccine, he could have financially benefited from the attacks. Ivins says that he received $6,000 in royalties after his vaccine was mass-produced and that he shared the payment with his colleagues.

    Ivins also addresses his late hours and weekends at work, saying he would sometimes go to the lab “‘to escape’ the stresses of his family” and that he spent time in the hot suites to escape a security guard who bothered him.

    And he talks about taking long, “mindless drives,” equating them with “the way some people go for a long walk,” but denies driving to Princeton, N.J. (the location from which the anthrax letters were mailed).

    Years later, Ivins would e-mail a friend about this interrogation, which he says put him into a deep depression:

    Up until that time I felt that I had been helping officials with the anthrax letters case, providing as much as I could that I thought was relevant. Then at the end of March I had an interrogation from two people who said I was suspicious … and asked me lots more accusatory questions. I was crushed and had to be taken out of the biocontainment suites for several months.

    September 2006 — FBI Report on the USAMRIID Anthrax Samples
    This FBI report shows all the samples that tested positive for the morphs that were in the attack anthrax. Three of those samples — highlighted in the document — came from Ivins. The report also notes an additional sample from Ivins that tested negative for the morphs; investigators would later accuse Ivins of having deliberately obscured this sample to hide his involvement in the attacks.

    Summer 2007 — Ivins’ E-mails Following His Grand Jury Appearance
    As pressure increased throughout the investigation, particularly following his May 2007 appearances before the grand jury, Ivins’ e-mail activity revealed an increasingly distraught man:

    “Eventually a trial will come and we’ll be dragged up to the witness chair to testify, and that’s when the other side wil [sic] start dragging us through the dirt. It’s a lawyer’s job to sully the personal and professional reputations of witnesses on the other side. For me it means people finding out that I’m a slob, keep poor records, am lousy at math, and see a psychiatrist. There are things that others would prefer not to be spread around. I’m planning on leaving at the end of September of 2008.” (May 23, 2007)
    “Who knows. I’m just so beat. I was at the grand jury for five hours, 3 hours on one day and 2 hours on the next. The questions were so accusatory on so many fronts. … I’m not planning on jumping off a bridge or something, so don’t think I’m going suicidal or something. I honestly don’t know what anybody can do. … I don’t think there’s much anybody can do. I search emails and documents, trying to find things, trying to help, and look at what it gets me. It makes me wish that I had never gone into biomedical research.” (May 24, 2007)
    “The grand jury was also very accusatory. I’m fortunately taking a lot of medication for depression, but that’s only helping some. I also have to use a lot of caffeine in the morning, and then alcohol and sleeping pills at night. Do you realize that if anybody gets indicted for even the most remote reason with respect to the anthrax letters — something as simple as not locking up spore preps to restrict them from only people in our lab — they face the death penalty? Playing any part, even a minor part such as providing information about how to make spores, or how to make them in broth, how to harvest and purify that could wind up putting one or more hapless persons on death row. Not pleasant to think about.” (June 10, 2007)
    November 2007 — FBI Searches Ivins’ Home
    On Nov. 1, agents interview Ivins at work and ask him a series of questions about RMR-1029 and his submissions to the FBI repository.

    Towards the end of the interview, agents tell Ivins that a search is underway of his home, vehicles and office space. The agents ask Ivins if he “worried”; he acknowledged he was and after a few minutes said that he does things “a middle age man should not do” and that would “not be acceptable to most people,” including cross-dressing.

    “It was the worst day of my life,” Ivins would later e-mail a friend.

    January 2008 — Ivins Interviewed by Federal Prosecutors
    This is the FBI’s report of Ivins’ first major sit-down interview with federal prosecutors. During the interview, he details his obsession with the Kappa Kappa Gamma sorority, which began in the early 1960s after a KKG member rejected a date with him.

    Ivins admits visiting several KKG houses across the south and stealing secret ritual materials from KKG chapters at the University of North Carolina and West Virginia University. He says he committed the burglaries during spring breaks “to ensure nobody would be present in the houses.”
    Ivins says his wife had no knowledge of his obsession or his clandestine visits to KKG houses. In her interview with FRONTLINE, prosecutor Rachel Lieber underscored the significance of this admission: “He said to us, effectively, ‘I don’t have an alibi.’”
    Ivins also tells investigators that after he learned his colleague Nancy Haigwood was a Kappa, “he set out to learn everything about and befriend her.” He admits to stealing her lab notebook while in graduate school, and to later spray painting “KKG” on the sidewalk near her house and vandalizing her car.
    Ivins admits to having several aliases and to maintaining a P.O. box from which he distributed copies of the KKG ritual book using a name prosecutors say was based on the name of Haigwood’s then-husband. He says he had a second P.O. box where he received bondage literature.
    February 2008 — Ivins’ Second Interview by Federal Prosecutors
    In a second sit-down interview with Ivins, prosecutors follow up on many of the statements he made in his first interview, including his KKG obsession. Ivins describes in detail breaking into the Chapel Hill and West Virginity University sorority houses:

    He entered the house at night through a first floor bathroom window which was located behind a shrub. Although there were several lights on inside, he knew nobody was there as those lights were always left on. IVINS, using a small pen light to help him see, went upstairs and looked for anything which was locked and may contain secretive sorority documents or materials. There was a hallway closet which was locked, so IVINS used a coat hanger or some similar object to open the door. Inside the closet he found the “Cipher” and some documents regarding KKG rituals. The Cipher was a document encased in glass, and it referred to a book of ritual which IVINS also looked for but did not find. In an unlocked closet directly across from that which contained the Cipher were some blindfolds made from torn bed sheets. IVINS assumed the blindfolds were used for the KKG initiation, but he did not take them. IVINS left after spending about an hour in the house, taking with him the Cipher and ritual materials.

    He also says he took long drives “as a way to relieve stress or as a form of therapy,” but says his wife never knew where he went or questioned him.

    During the interview, investigators showed Ivins a diagram he drew early on in the investigation that showed how he prepared very pure anthrax spores. But when shown the diagram, Ivins said he didn’t remember drawing it and was “non-responsive” to questions about how to interpret the drawing.

    Investigators would later contrast Ivins’ precise memory of events long past with his inability to explain how his time was spent during late nights in the laboratory. And they would argue that Ivins’ admissions of long drives was significant because it showed a pattern of behavior, and because he undercut an alibi by acknowledging his wife didn’t know when or where he was going.

    July 2008 — Fredericksburg Police Report
    View the report (PDF)

    Threatening to take revenge on his colleagues, Ivins broke down during a group therapy session in July 2008. His therapist, Jean Duley petitioned for Ivins to be involuntarily confined to a mental institution, and police forcibly removed Ivins from the lab the following day. Duley’s notes are included in this police report, released after Ivins’ suicide.

    The client appeared angry, hostile, and jumpy. He was asked if there was an issue he wanted to discuss. The client was evasive, pressed he started talking about anger towards investigators, the government, the whole system. He began to detail the anger, asked to focus he described he wasn’t going to face the death penalty. He described his plan, the bullet proof vest, a gun, a list of co-workers, people that had wronged him, etc. He had a tone of anger but a smile on his face. He was very agitated, shaky and pressed I his speech, very delibrate, [sic] thoughtful and certain in manner. He explained that he had been on the streets looking for someone to pick a fight with him so that he could hurt them, showing a sharp pen he could use as a weapon. He stated that he was not going to drink, but when he did it would be the 1st time, he kept asking for sleeping pills, several times he asked. He repeated his plan with the bullet proof vest, gun, list, explaining that a well thought out plan cleaning up etc could be done, he was stopped because others in the group were unnerved by that speech. He was very clear in his thought patterns, is [sic] anger towards certain individuals and his ideas of harming others and himself.

    February 2010 — Justice Department Releases Summary of Amerithrax Investigation
    View the report (PDF)

    The government publicly named Bruce Ivins as the suspect in a hastily arranged press conference days after his August 2008 suicide; the Justice Department’s final summary of the Amerithrax investigation was released 18 months later.

    The 92-page report details the government’s case against Ivins, including his access to RMR-1029, his late nights and weekends in the lab, his mental health issues, his suspicious submissions to the FBI anthrax repository, his KKG obsession, his habit of long drives, and the threats made during his July 2008 therapy session. Regarding Ivins’ motive, investigators wrote:

    … it is clear that by the summer of 2001, Dr. Ivins was under an extraordinary amount of stress in his professional life. The anthrax vaccine research program that Dr. Ivins had invested essentially his entire career of more than 20 years was in jeopardy of failure. … Under extreme pressure from so many different assaults on his career and life’s work, Dr. Ivins had a motive to commit the crime.”

    February 2011 — National Academies of Sciences Questions FBI Scientific Findings
    View the report

    Under criticism about the FBI’s conclusions in the case, FBI Director Robert Mueller asked an independent panel from the National Academies of Sciences to independently review the investigation’s scientific findings.

    “It is not possible to reach a definitive conclusion about the origins of the B. anthracis in the mailings based on the available scientific evidence alone,” the panel concluded in a 191-page report.

    And the report particularly called into question the conclusions about RMR-1029: “The scientific link between the letter material and flask number RMR-1029 is not as conclusive as stated in the DOJ Investigative Summary,” though the panel did say that genetic evidence supported “an association” between the attack anthrax and RMR-1029.

    In its official response, the FBI maintained that its scientific conclusions were only one part of its case against Ivins:

    … while science played a significant role, it was the totality of the investigative process that determined the outcome of the anthrax case. Although there have been great strides in forensic science over the years, rarely does science alone solve an investigation. The scientific findings in this case provided investigators with valuable investigative leads that led to the identification of the late Dr. Bruce Ivins as the perpetrator of the anthrax attacks.

    August 2011 — Expert Behavioral Analysis Panel Report
    View the report (PDF)

    Following Ivins’ suicide, a federal court judge asked a panel of experts to review Ivins’ psychiatric records. The panel’s review of the records found that:

    Dr. Ivins was psychologically disposed to undertake the mailings; his behavioral history demonstrated his potential for carrying them out; and he had the motivation and the means. The psychiatric records offer considerable additional circumstantial evidence in support of the DOJ’s finding.

    The report details Ivins’ “traumatic, damaging childhood,” his KKG obsession and his “intense emotional attachments” to two of his female lab technicians. It suggests his “lifelong preoccupation” with revenge, “personal validation” and “professional redemption” as possible motives behind the attacks.

    Ivins’ “significant and lengthy history of psychological disturbance and diagnosable mental illness” should have precluded him from holding a security clearance, the report concludes.

    October 10, 2011, 11:57 pm ET

    Find this story at 10 October 2011

    Web Site Copyright ©1995-2015 WGBH Educational Foundation

    THE CIA CAMPAIGN TO STEAL APPLE’S SECRETS

    RESEARCHERS WORKING with the Central Intelligence Agency have conducted a multi-year, sustained effort to break the security of Apple’s iPhones and iPads, according to top-secret documents obtained by The Intercept.

    The security researchers presented their latest tactics and achievements at a secret annual gathering, called the “Jamboree,” where attendees discussed strategies for exploiting security flaws in household and commercial electronics. The conferences have spanned nearly a decade, with the first CIA-sponsored meeting taking place a year before the first iPhone was released.

    By targeting essential security keys used to encrypt data stored on Apple’s devices, the researchers have sought to thwart the company’s attempts to provide mobile security to hundreds of millions of Apple customers across the globe. Studying both “physical” and “non-invasive” techniques, U.S. government-sponsored research has been aimed at discovering ways to decrypt and ultimately penetrate Apple’s encrypted firmware. This could enable spies to plant malicious code on Apple devices and seek out potential vulnerabilities in other parts of the iPhone and iPad currently masked by encryption.

    The CIA declined to comment for this story.

    The security researchers also claimed they had created a modified version of Apple’s proprietary software development tool, Xcode, which could sneak surveillance backdoors into any apps or programs created using the tool. Xcode, which is distributed by Apple to hundreds of thousands of developers, is used to create apps that are sold through Apple’s App Store.

    The modified version of Xcode, the researchers claimed, could enable spies to steal passwords and grab messages on infected devices. Researchers also claimed the modified Xcode could “force all iOS applications to send embedded data to a listening post.” It remains unclear how intelligence agencies would get developers to use the poisoned version of Xcode.

    Researchers also claimed they had successfully modified the OS X updater, a program used to deliver updates to laptop and desktop computers, to install a “keylogger.”

    Other presentations at the CIA conference have focused on the products of Apple’s competitors, including Microsoft’s BitLocker encryption system, which is used widely on laptop and desktop computers running premium editions of Windows.

    The revelations that the CIA has waged a secret campaign to defeat the security mechanisms built into Apple’s devices come as Apple and other tech giants are loudly resisting pressure from senior U.S. and U.K. government officials to weaken the security of their products. Law enforcement agencies want the companies to maintain the government’s ability to bypass security tools built into wireless devices. Perhaps more than any other corporate leader, Apple’s CEO, Tim Cook, has taken a stand for privacy as a core value, while sharply criticizing the actions of U.S. law enforcement and intelligence agencies.

    “If U.S. products are OK to target, that’s news to me,” says Matthew Green, a cryptography expert at Johns Hopkins University’s Information Security Institute. “Tearing apart the products of U.S. manufacturers and potentially putting backdoors in software distributed by unknowing developers all seems to be going a bit beyond ‘targeting bad guys.’ It may be a means to an end, but it’s a hell of a means.”

    Apple declined to comment for this story, instead pointing to previous comments Cook and the company have made defending Apple’s privacy record.

    lockheed
    Lockheed Martin Dulles Executive Plaza, Herndon, Virginia.
    SECURITY RESEARCHERS from Sandia National Laboratories presented their Apple-focused research at a secret annual CIA conference called the Trusted Computing Base Jamboree. The Apple research and the existence of the conference are detailed in documents provided to The Intercept by National Security Agency whistleblower Edward Snowden.

    The conference was sponsored by the CIA’s Information Operations Center, which conducts covert cyberattacks. The aim of the gathering, according to a 2012 internal NSA wiki, was to host “presentations that provide important information to developers trying to circumvent or exploit new security capabilities,” as well as to “exploit new avenues of attack.” NSA personnel also participated in the conference through the NSA’s counterpart to the CIA’s Trusted Computing Base, according to the document. The NSA did not provide comment for this story.

    The Jamboree was held at a Lockheed Martin facility inside an executive office park in northern Virginia. Lockheed is one of the largest defense contractors in the world; its tentacles stretch into every aspect of U.S. national security and intelligence. The company is akin to a privatized wing of the U.S. national security state — more than 80 percent of its total revenue comes from the U.S. government. Via a subsidiary, Lockheed also operates Sandia Labs, which is funded by the U.S. government. The lab’s researchers have presented Apple findings at the CIA conference.

    “Lockheed Martin’s role in these activities should not be surprising given its leading role in the national surveillance state,” says William Hartung, director of the Arms and Security Project at the Center for International Policy and author of Prophets of War, a book that chronicles Lockheed’s history. “It is the largest private intelligence contractor in the world, and it has worked on past surveillance programs for the Pentagon, the CIA and the NSA. If you’re looking for a candidate for Big Brother, Lockheed Martin fits the bill.”

    The Apple research is consistent with a much broader secret U.S. government program to analyze “secure communications products, both foreign and domestic” in order to “develop exploitation capabilities against the authentication and encryption schemes,” according to the 2013 Congressional Budget Justification. Known widely as the “Black Budget,” the top-secret CBJ was provided to The Intercept by Snowden and gives a sprawling overview of the U.S. intelligence community’s spending and architecture. The White House did not respond to a request for comment.

    As of 2013, according to the classified budget, U.S. intelligence agencies were creating new capabilities against dozens of commercially produced security products, including those made by American companies, to seek out vulnerabilities.

    Last week, CIA Director John Brennan announced a major reorganization at the agency aimed, in large part, at expanding U.S. cyber-operations. The Information Operations Center, which organized the Jamboree conferences, will be folded into a new Directorate of Digital Innovation. Notwithstanding its innocuous name, a major priority of the directorate will be offensive cyberattacks, sabotage and digital espionage. Brennan said the CIA reorganization will be modeled after the agency’s Counterterrorism Center, which runs the U.S. targeted killing and drone program.

    THE DOCUMENTS do not address how successful the targeting of Apple’s encryption mechanisms have been, nor do they provide any detail about the specific use of such exploits by U.S. intelligence. But they do shed light on an ongoing campaign aimed at defeating the tech giant’s efforts to secure its products, and in turn, its customers’ private data.

    “Spies gonna spy,” says Steven Bellovin, a former chief technologist for the U.S. Federal Trade Commission and current professor at Columbia University. “I’m never surprised by what intelligence agencies do to get information. They’re going to go where the info is, and as it moves, they’ll adjust their tactics. Their attitude is basically amoral: whatever works is OK.”

    Bellovin says he generally supports efforts by U.S. intelligence to “hack” devices — including Apple’s — used by terrorists and criminals, but expressed concern that such capabilities could be abused. “There are bad people out there, and it’s reasonable to seek information on them,” he says, cautioning that “inappropriate use — mass surveillance, targeting Americans without a warrant, probably spying on allies — is another matter entirely.”

    In the top-secret documents, ranging from 2010 through 2012, the researchers appear particularly intent on extracting encryption keys that prevent unauthorized access to data stored — and firmware run — on Apple products.

    “The Intelligence Community (IC) is highly dependent on a very small number of security flaws, many of which are public, which Apple eventually patches,” the researchers noted in an abstract of their 2011 presentation at the Jamboree. But, they promised, their presentation could provide the intelligence community with a “method to noninvasively extract” encryption keys used on Apple devices. Another presentation focused on physically extracting the key from Apple’s hardware.

    A year later, at the 2012 Jamboree, researchers described their attacks on the software used by developers to create applications for Apple’s popular App Store. In a talk called “Strawhorse: Attacking the MacOS and iOS Software Development Kit,” a presenter from Sandia Labs described a successful “whacking” of Apple’s Xcode — the software used to create apps for iPhones, iPads and Mac computers. Developers who create Apple-approved and distributed apps overwhelmingly use Xcode, a free piece of software easily downloaded from the App Store.

    The researchers boasted that they had discovered a way to manipulate Xcode so that it could serve as a conduit for infecting and extracting private data from devices on which users had installed apps that were built with the poisoned Xcode. In other words, by manipulating Xcode, the spies could compromise the devices and private data of anyone with apps made by a poisoned developer — potentially millions of people. “Trying to plant stuff in Xcode has fascinating implications,” says Bellovin.

    The researchers listed a variety of actions their “whacked” Xcode could perform, including:

    — “Entice” all Mac applications to create a “remote backdoor” allowing undetected access to an Apple computer.

    — Secretly embed an app developer’s private key into all iOS applications. (This could potentially allow spies to impersonate the targeted developer.)

    — “Force all iOS applications” to send data from an iPhone or iPad back to a U.S. intelligence “listening post.”

    — Disable core security features on Apple devices.

    THE INTELLIGENCE COMMUNITY IS HIGHLY DEPENDENT ON A VERY SMALL NUMBER OF SECURITY FLAWS, MANY OF WHICH ARE PUBLIC, WHICH APPLE EVENTUALLY PATCHES.
    For years, U.S. and British intelligence agencies have consistently sought to defeat the layers of encryption and other security features used by Apple to protect the iPhone. A joint task force comprised of operatives from the NSA and Britain’s Government Communications Headquarters, formed in 2010, developed surveillance software targeting iPhones, Android devices and Nokia’s Symbian phones. The Mobile Handset Exploitation Team successfully implanted malware on iPhones as part of WARRIOR PRIDE, a GCHQ framework for secretly accessing private communications on mobile devices.

    That program was disclosed in Snowden documents reported on last year by The Guardian. A WARRIOR PRIDE plugin called NOSEY SMURF allowed spies to remotely and secretly activate a phone’s microphone. Another plugin, DREAMY SMURF, allowed intelligence agents to manage the power system on a phone and thus avoid detection. PARANOID SMURF was designed to conceal the malware in other ways. TRACKER SMURF allowed ultra-precise geolocating of an individual phone. “[If] its [sic] on the phone, we can get it,” the spies boasted in a secret GCHQ document describing the targeting of the iPhone.

    All of the SMURF malware — including the plugin that secretly turns on the iPhone’s microphone — would first require that agencies bypass the security controls built into the iOS operating system. Spies would either need to hack the phone in order to plant their malware on it, or sneak a backdoor into an app the user installed voluntarily. That was one of the clear aims of the Apple-focused research presented at the CIA’s conference.

    “The U.S. government is prioritizing its own offensive surveillance needs over the cybersecurity of the millions of Americans who use Apple products,” says Christopher Soghoian, the principal technologist at the American Civil Liberties Union. “If U.S. government-funded researchers can discover these flaws, it is quite likely that Chinese, Russian and Israeli researchers can discover them, too. By quietly exploiting these flaws rather than notifying Apple, the U.S. government leaves Apple’s customers vulnerable to other sophisticated governments.”

    Security experts interviewed by The Intercept point out that the SMURF capabilities were already available to U.S. and British intelligence agencies five years ago. That raises the question of how advanced the current capacity to surveil smartphone users is, especially in light of the extensive resources poured into targeting the products of major tech companies. One GCHQ slide from 2010 stated that the agency’s ultimate goal was to be able to “Exploit any phone, anywhere, any time.”

    jobs_stage
    Steve Jobs unveiling the first iPhone on January 9, 2007.
    THE FIRST JAMBOREE took place in 2006, just as Apple was preparing to unveil its highly-anticipated iPhone. In March 2010, according to a top-secret document, during a talk called “Rocoto: Implanting the iPhone,” a presenter discussed efforts to target the iPhone 3G. In addition to analyzing the device’s software for potential vulnerabilities, the presentation examined “jailbreak methods,” used within the iPhone community to free phones from their built-in constraints, that could be leveraged by intelligence agencies. “We will conclude with a look ahead at future challenges presented by the iPhone 3GS and the upcoming iPad,” the abstract noted. Over the years, as Apple updates its hardware, software and encryption methods, the CIA and its researchers study ways to break and exploit them.

    The attempts to target vulnerabilities in Apple’s products have not occurred in a vacuum. Rather, they are part of a vast multi-agency U.S./U.K. effort to attack commercial encryption and security systems used on billions of devices around the world. U.S. intelligence agencies are not just focusing on individual terrorists or criminals — they are targeting the large corporations, such as Apple, that produce popular mobile devices.

    “Every other manufacturer looks to Apple. If the CIA can undermine Apple’s systems, it’s likely they’ll be able to deploy the same capabilities against everyone else,” says Green, the Johns Hopkins cryptographer. “Apple led the way with secure coprocessors in phones, with fingerprint sensors, with encrypted messages. If you can attack Apple, then you can probably attack anyone.”

    According to the Black Budget, U.S. intelligence agencies have tech companies dead in their sights with the aim of breaking or circumventing any existing or emerging encryption or antiviral products, noting the threat posed by “increasingly strong commercial” encryption and “adversarial cryptography.”

    The Analysis of Target Systems Project produced “prototype capabilities” for the intelligence community, enabled “the defeat of strong commercial data security systems” and developed ways “to exploit emerging information systems and technologies,” according to the classified budget. The project received $35 million in funding in 2012 and had more than 200 personnel assigned to it. By the end of 2013, according to the budget, the project would “develop new capabilities against 50 commercial information security device products to exploit emerging technologies,” as well as new methods that would allow spies to recover user and device passwords on new products.

    Among the project’s missions:

    — Analyze “secure communications products, both foreign and domestic produced” to “develop exploitation capabilities against the authentication and encryption schemes.”

    — “[D]evelop exploitation capabilities against network communications protocols and commercial network security products.”

    — “Anticipate future encryption technologies” and “prepare strategies to exploit those technologies.”

    — “Develop, enhance, and implement software attacks against encrypted signals.”

    — “Develop exploitation capabilities against specific key management and authentication schemes.”

    — “[D]evelop exploitation capabilities against emerging multimedia applications.”

    — Provide tools for “exploiting” devices used to “store, manage, protect, or communicate data.”

    — “Develop methods to discover and exploit communication systems employing public key cryptography” and “communications protected by passwords or pass phrases.”

    — Exploit public key cryptography.

    — Exploit Virtual Private Networks, or VPNs, which allow people to browse the Internet with increased security and anonymity.

    The black budget also noted that the U.S. intelligence community partners with “National Laboratories” to conduct the type of research presented at the CIA’s annual Jamboree conference. It confirms the U.S. government’s aggressive efforts to steal encryption and authentication keys, as occurred in the NSA and GCHQ operations against Gemalto, the world’s largest manufacturer of SIM cards, through the use of Computer Network Exploitation attacks. In that case, spy agencies penetrated Gemalto’s internal networks and cyberstalked its employees to steal mass quantities of keys used to encrypt mobile phone communications.

    The CIA’s Information Operations Center is currently the second largest of the spy agency’s specialized centers. It not only conducts cyber-ops, but has operated covertly in other nations, working to develop assets from targeted countries to assist in its cyber-surveillance programs, according to the Black Budget. At times, its personnel brief the president.

    obama_ipad
    U.S. President Barack Obama holds up an iPad.
    AT THE CIA’s Jamboree in 2011, the computer researchers conducted workshops where they revealed the specifics of their efforts to attack one of the key privacy elements of Apple’s mobile devices. These machines have two separate keys integrated into the silicon of their Apple-designed processors at the point of manufacture. The two, paired together, are used to encrypt data and software stored on iPhones and iPads. One, the User ID, is unique to an individual’s phone, and is not retained by Apple. That key is vital to protecting an individual’s data and — particularly on Apple’s latest devices — difficult to steal. A second key, the Group ID, is known to Apple and is the same across multiple Apple devices that use the same processor. The GID is used to encrypt essential system software that runs on Apple’s mobile devices.

    The focus of the security researchers, as described at the CIA conferences, was to target the GID key, which Apple implants on all devices that use the same processors. For instance, Apple’s A4 processor was used in the iPhone 4, the iPod Touch and the original iPad. All of those devices used the same GID. As Apple designs new processors and faster devices that use those processors, the company creates new GIDs. If someone has the same iPhone as her neighbor, they have the exact same GID key on their devices. So, if intelligence agencies extract the GID key, it means they have information useful to compromising any device containing that key.

    At the 2011 Jamboree conference, there were two separate presentations on hacking the GID key on Apple’s processors. One was focused on non-invasively obtaining it by studying the electromagnetic emissions of — and the amount of power used by — the iPhone’s processor while encryption is being performed. Careful analysis of that information could be used to extract the encryption key. Such a tactic is known as a “side channel” attack. The second focused on a “method to physically extract the GID key.”

    Whatever method the CIA and its partners use, by extracting the GID — which is implanted on the processors of all Apple mobile devices — the CIA and its allies could be able to decrypt the firmware that runs on the iPhone and other mobile devices. This would allow them to seek out other security vulnerabilities to exploit. Taken together, the documents make clear that researching each new Apple processor and mobile device, and studying them for potential security flaws, is a priority for the CIA.

    According to the 2011 document describing the Jamboree presentations on Apple’s processor, the researchers asserted that extracting the GID key could also allow them to look for other potential gateways into Apple devices. “If successful, it would enable decryption and analysis of the boot firmware for vulnerabilities, and development of associated exploits across the entire A4-based product-line, which includes the iPhone 4, the iPod touch and the iPad.”

    At the CIA conference in 2012, Sandia researchers delivered a presentation on Apple’s A5 processor. The A5 is used in the iPhone 4s and iPad 2. But this time, it contained no abstract or other details, instructing those interested to contact a CIA official on his secure phone or email.

    “If I were Tim Cook, I’d be furious,” says the ACLU’s Soghoian. “If Apple is mad at the intelligence community, and they should be, they should put their lawyers to work. Lawsuits speak louder than words.”

    tim_cook
    Apple CEO Tim Cook testifies on Capitol Hill in Washington, May 21, 2013.
    FOR YEARS, Apple has included encryption features in the products it sells to consumers. In 2014, the company dramatically broadened the types of data stored on iPhones that are encrypted, and it incorporated encryption by default into its desktop and laptop operating system. This resulted in criticism from leading law enforcement officials, including the FBI director. The encryption technology that Apple has built into its products — along with many other security features — is a virtual wall that separates cybercriminals and foreign governments from customer data. But now, because Apple claims it can no longer extract customer data stored on iPhones, because it is encrypted with a key the company does not know, the U.S. government can be locked out too — even with a search warrant. The FBI director and other U.S. officials have referred to the advent of the encryption era — where previously accessible data and communications may now be off limits because of the security technology protecting them — as “going dark.”

    In the face of this rising challenge to its surveillance capabilities, U.S. intelligence has spent considerable time and resources trying to find security vulnerabilities in Apple’s encryption technology, and, more broadly, in its products, which can be leveraged to install surveillance software on iPhones and Macbooks. “The exploitation of security flaws is a high-priority area for the U.S. intelligence community, and such methods have only become more important as U.S. technology companies have built strong encryption into their products,” says the ACLU’s Soghoian.

    Microsoft has, for nearly a decade, included BitLocker, an encryption technology that protects data stored on a computer, in its Windows operating system. Unlike Apple, which made encryption available to all customers, Microsoft had included this feature only in its more expensive premium and professional versions of Windows, up until a few years ago. BitLocker is designed to work with a Trusted Platform Module, a special security chip included in some computers, which stores the encryption keys and also protects against unauthorized software modification.

    Also presented at the Jamboree were successes in the targeting of Microsoft’s disk encryption technology, and the TPM chips that are used to store its encryption keys. Researchers at the CIA conference in 2010 boasted about the ability to extract the encryption keys used by BitLocker and thus decrypt private data stored on the computer. Because the TPM chip is used to protect the system from untrusted software, attacking it could allow the covert installation of malware onto the computer, which could be used to access otherwise encrypted communications and files of consumers. Microsoft declined to comment for this story.

    In the wake of the initial Snowden disclosures, Apple CEO Tim Cook has specifically denounced the U.S. government’s efforts to compel companies to provide backdoor access to their users’ data.

    “I want to be absolutely clear that we have never worked with any government agency from any country to create a backdoor in any of our products or services. We have also never allowed access to our servers. And we never will,” Cook said last September in announcing Apple’s new privacy policy. More recently, Cook said, “None of us should accept that the government or a company or anybody should have access to all of our private information. This is a basic human right. We all have a right to privacy. We shouldn’t give it up. We shouldn’t give in to scare-mongering.”

    As corporations increasingly integrate default encryption methods and companies like Apple incorporate their own indigenous encryption technologies into easy-to-use text, voice and video communication platforms, the U.S. and British governments are panicking. “Encryption threatens to lead all of us to a very dark place,” declared FBI Director James Comey in an October 2014 lecture at the Brookings Institution. Citing the recent moves by Apple to strengthen default encryption on its operating systems, and commitments by Google to incorporate such tools, Comey said, “This means the companies themselves won’t be able to unlock phones, laptops, and tablets to reveal photos, documents, e-mail, and recordings stored within.”

    Under current U.S. regulations, law enforcement agencies can get a court order to access communications channeled through major tech companies and wireless providers. But if those communications are encrypted through a process not accessible by any involved company, the data is essentially meaningless, garbled gibberish. “In a world in which data is encrypted, and the providers don’t have the keys, suddenly, there is no one to go to when they have a warrant,” says Soghoian. “That is, even if they get a court order, it doesn’t help them. That is what is freaking them out.”

    Comey alleged that “even a supercomputer would have difficulty with today’s high-level encryption,” meaning a “brute force” attempt to decrypt intercepted communications would be ineffective, and, even if successful, time-consuming.

    “Encryption isn’t just a technical feature; it’s a marketing pitch,” Comey added. “But it will have very serious consequences for law enforcement and national security agencies at all levels. Sophisticated criminals will come to count on these means of evading detection. It’s the equivalent of a closet that can’t be opened. A safe that can’t be cracked.”

    A few months after Comey’s remarks, Robert Litt, the general counsel for the Office of the Director of National Intelligence, also appeared at Brookings. “One of the many ways in which Snowden’s leaks have damaged our national security is by driving a wedge between the government and providers and technology companies, so that some companies that formerly recognized that protecting our nation was a valuable and important public service now feel compelled to stand in opposition,” Litt said. He appealed to corporations to embrace “a solution that does not compromise the integrity of encryption technology but that enables both encryption to protect privacy and decryption under lawful authority to protect national security.”

    Green, the Johns Hopkins professor, argues that U.S. government attacks against the products of American companies will not just threaten privacy, but will ultimately harm the U.S. economy. “U.S. tech companies have already suffered overseas due to foreign concerns about our products’ security,” he says. “The last thing any of us need is for the U.S. government to actively undermine our own technology industry.”

    The U.S. government is certainly not alone in the war against secure communications. British Prime Minister David Cameron has suggested that if he is re-elected, he may seek to ban encrypted chat programs that do not provide backdoor access to law enforcement. “Are we going to allow a means of communications which it simply isn’t possible to read?” Cameron said in a speech in England earlier this year. “My answer to that question is: ‘No, we must not.’”

    When the Chinese government recently tried to force tech companies to install a backdoor in their products for use by Chinese intelligence agencies, the U.S. government denounced China. “This is something that I’ve raised directly with President Xi,” President Obama said in early March. “We have made it very clear to them that this is something they are going to have to change if they are to do business with the United States.” But China was actually following the U.S. government’s lead. The FBI has called for an expansion of U.S. law, which would require Apple and its competitors to design their products so that all communications could be made available to government agencies. NSA officials have expressed similar sentiments.

    “Obama’s comments were dripping with hypocrisy,” says Trevor Timm, executive director of the Freedom of the Press Foundation. “Don’t get me wrong, his actual criticism of China for attempting to force tech companies to install backdoors was spot on — now if only he would apply what he said to his own government. Since he now knows backdooring encryption is a terrible policy that will damage cybersecurity, privacy, and the economy, why won’t he order the FBI and NSA to stop pushing for it as well?”

    ———

    Documents published with this article:

    TCB Jamboree 2012 Invitation
    Strawhorse: Attacking the MacOS and iOS Software Development Kit
    TPM Vulnerabilities to Power Analysis and An Exposed Exploit to Bitlocker
    TCB Jamboree 2012
    Apple A4/A5 Application Processors Analysis
    Differential Power Analysis on the Apple A4 Processor
    Secure Key Extraction by Physical De-Processing of Apple’s A4 Processor
    Rocoto: Implanting the iPhone
    Smurf Capability – iPhone
    Black Budget: Cryptanalysis & Exploitation Services – Analysis of Target Systems
    ———

    Andrew Fishman, Alleen Brown, Andrea Jones, Ryan Gallagher, Morgan Marquis-Boire, and Micah Lee contributed to this story.

    Note: An earlier draft of this story incorrectly suggested that the iOS Group ID is used to sign software. An earlier draft also incorrectly stated that Lockheed Martin owns Sandia National Laboratories. Sandia Corporation, a wholly owned subsidiary of Lockheed Martin, operates Sandia National Laboratories as a contractor for the U.S. Department of Energy’s National Nuclear Security Administration.

    Disclosure: Freedom of the Press Foundation, which Trevor Timm represents, has received grant funding from First Look Media, The Intercept’s parent company. Intercept co-founders Glenn Greenwald and Laura Poitras are on the board of the organization.

    Photo: Google Maps; Simon Dawson/Bloomberg/Getty Images; Tony Avelar/Getty Images; Kevin Lamarque/Reuters/Landov; J. Scott Applewhite/AP

    Email the authors: jeremy.scahill@theintercept.com, josh.begley@theintercept.com

    BY JEREMY SCAHILL AND JOSH BEGLEY @jeremyscahill@joshbegley 10 MAR 2015

    Find this story at 10 March 2015

    Copyright firstlook.org

    The Intercept, Mass Surveillance and the State

    Like a proud father CIA director John Brennan has announced that he’s creating a new directorate to conduct cyberespionage. Never mind all those classified documents published recently by the Intercept which prove that the CIA has been active in the cyber domain for years. While it goes without saying that the CIA’s subversion campaign is unsettling what’s equally thought-provoking is the manner in which the Intercept frames the involvement of the private sector.

    Every year the CIA showcases its latest batch of subversion tools, taking them for a victory lap at a secret conference which internal documents refer to glibly as a “Jamboree.” In 2012 the Jamboree was hosted by Lockheed Martin at a campus in northern Virginia. Journalists at the Intercept describe Lockheed as follows:

    “Lockheed is one of the largest defense contractors in the world; its tentacles stretch into every aspect of U.S. national security and intelligence. The company is akin to a privatized wing of the U.S. national security state — more than 80 percent of its total revenue comes from the U.S. government.”

    Note how this description subtly creates the impression that the ultimate culprit with regard to mass surveillance is the government. Lockheed is merely a “wing” of an overarching “national security state”. All roads lead to U.S. intelligence, it’s all about the state.

    Yet close examination of the history of the CIA yields a different picture. Contractors like Lockheed Martin aren’t a subordinate extension of the national security state. Quite the opposite. It’s probably more accurate to conclude that intelligence agencies, like the NSA, represent a public sector appendage of a much larger corporate power structure whose nexus resides in profound sources of wealth and influence outside of the government. A Deep State, if you will, that’s fundamentally driving what goes on in Washington.

    In the absence of mass public outcry private capital sets the rules. It’s been this way since Ferdinand Lundberg wrote America’s Sixty Families back in 1937. Or perhaps Mr. Scahill hasn’t glimpsed politicians on both sides of the aisle trotting out in front of billionaires to audition for public office?

    Hence there is a recurring theme in L’affaire Snowden that arises from the Intercept’s coverage of mass surveillance. Focus is maintained almost exclusively on the government without acknowledging the central role that corporations play. According to the Intercept’s worldview hi-tech companies are but helpless pawns being coerced and assailed by runaway security services rather than willing symbiotic accomplices that directly benefit from the global panopticon.

    Honestly, doesn’t Ed Snowden have more information on Booz Allen?

    When a doctor is faced with a serious medical condition the diagnosis typically informs the subsequent course of treatment. So it is with mass surveillance. Only in the case of mass surveillance the diagnosis is being shaped by certain actors to fit a preconceived solution. The agenda of the far right is clear. Nothing short of corporate feudalism. Libertarian political operator Grover Norquist boldly spelled it out: “I don’t want to abolish government. I simply want to reduce it to the size where I can drag it into the bathroom and drown it in the bathtub.”

    A messaging scheme which depicts the government as the chief villain is a godsend for people who are itching for reasons to demolish the state. Techno libertarians rejoice and present the public with their version of salvation. “Crypto everywhere” roar CEOs across Silicon Valley. How predictably shallow and self-serving. Their counter-surveillance talking points provide them with something new to sell us. It also absolves them of responsibility while redirecting the public’s attention away from more far-reaching systemic measures.

    In light of this it’s hard not to notice the various twists of fate in L’affaire Snowden. Classified documents gradually trickled into the public record thanks to a whistle-blower who donated money to Ron Paul and exhibited some decidedly right-wing inclinations online. A copy of the classified documents were provided to a journalist who wrote a policy whitepaper for the CATO Institute (formerly known as the Charles Koch Foundation). Then out of the woodwork appears a kindly libertarian billionaire who dazzles the said journalist with fame and fortune, “a dream opportunity that was impossible to decline.”

    The product of coincidence? To an extent. But what’s undeniable is that a member of the financial elite, a man who has clocked over a dozen visits to the Obama White House, deliberately leveraged his assets to inject himself into the unfolding course of events. Once more the narrative about mass surveillance that his news organization conveys tends to cast corporations as champions against mass surveillance while omitting to acknowledge how they stand to benefit from the global panopticon. It appears that elements within the ruling class would have us believe that the Deep State will solve the very problem that it intentionally created.

    Bill Blunden is an independent investigator whose current areas of inquiry include information security, anti-forensics, and institutional analysis. He is the author of several books, including The Rootkit Arsenal , and Behold a Pale Farce: Cyberwar, Threat Inflation, and the Malware-Industrial Complex. Bill is the lead investigator at Below Gotham Labs.

    by BILL BLUNDEN
    WEEKEND EDITION MARCH 13-15, 2015

    Find this story at March 2015

    Copyright © CounterPunch

    CIA Aided Program to Spy on U.S. Cellphones

    WASHINGTON—The Central Intelligence Agency played a crucial role in helping the Justice Department develop technology that scans data from thousands of U.S. cellphones at a time, part of a secret high-tech alliance between the spy agency and domestic law enforcement, according to people familiar with the work.

    The CIA and the U.S. Marshals Service, an agency of the Justice Department, developed technology to locate specific cellphones in the U.S. through an airborne device that mimics a cellphone tower, these people said.

    Today, the Justice Department program, whose existence wasreported by The Wall Street Journal last year, is used to hunt criminal suspects. The same technology is used to track terror suspects and intelligence targets overseas, the people said.

    The program operates specially equipped planes that fly from five U.S. cities, with a flying range covering most of the U.S. population. Planes are equipped with devices—some past versions were dubbed “dirtboxes” by law-enforcement officials—that trick cellphones into reporting their unique registration information.
    The surveillance system briefly identifies large numbers of cellphones belonging to citizens unrelated to the search. The practice can also briefly interfere with the ability to make calls, these people said.

    Some law-enforcement officials are concerned the aerial surveillance of cellphone signals inappropriately mixes traditional police work with the tactics and technology of overseas spy work that is constrained by fewer rules. Civil-liberties groups say the technique amounts to a digital dragnet of innocent Americans’ phones.

    ….

    The cooperation between technical experts at the CIA and the Marshals Service, which law-enforcement officials have described as a “marriage,” represents one way criminal investigators are increasingly relying on U.S. intelligence agencies for operational support and technical assistance in the wake of the Sept. 11, 2001, attacks. Many Justice Department officials view the joint effort with the CIA as having made valuable contributions to both domestic and overseas operations.

    A CIA spokesman declined to comment on whether the CIA or any other agency uses the devices. Some technologies developed by the agency “have been lawfully and responsibly shared with other U.S. government agencies,” the spokesman said. “How those agencies use that technology is determined by the legal authorities that govern the operations of those individual organizations—not CIA.” He also said the relationship between the Marshals Service and CIA tech experts couldn’t be characterized as a marriage.

    A Justice Department spokesman said Marshals Service techniques are “carried out consistent with federal law, and are subject to court approval.” The agency doesn’t conduct “domestic surveillance, intelligence gathering, or any type of bulk data collection,” the spokesman said, adding that it doesn’t gather any intelligence on behalf of U.S. spy agencies.

    By DEVLIN BARRETT
    Updated March 10, 2015 7:39 p.m. ET

    Find this story at 10 March 2015
    Copyright wsj.com

    CIA looks to expand its cyber espionage capabilities

    CIA Director John Brennan is planning a major expansion of the agency’s cyber-espionage capabilities as part of a broad restructuring of an intelligence service long defined by its human spy work, current and former U.S. officials said.

    The proposed shift reflects a determination that the CIA’s approach to conventional espionage is increasingly outmoded amid the exploding use of smartphones, social media and other technologies.

    U.S. officials said Brennan’s plans call for increased use of cyber capabilities in almost every category of operations — whether identifying foreign officials to recruit as CIA informants, confirming the identities of targets of drone strikes or penetrating Internet-savvy adversaries such as the Islamic State.

    Several officials said Brennan’s team has even considered creating a new cyber-directorate — a step that would put the agency’s technology experts on equal footing with the operations and analysis branches, which have been pillars of the CIA’s organizational structure for decades.

    U.S. officials emphasized that the plans would not involve new legal authorities and that Brennan may stop short of creating a new directorate. But the suggestion underscores the scope of his ambitions, as well as their potential to raise privacy concerns or lead to turf skirmishes with the National Security Agency, the dominant player in electronic espionage.

    “Brennan is trying to update the agency to make sure it is prepared to tackle the challenges in front of it,” said a U.S. official familiar with the reorganization plan. “I just don’t think you can separate the digital world people operate in from the human intelligence” mission that is the CIA’s traditional domain.

    Like others, the official spoke on the condition of anonymity to discuss internal decision-making.

    The expanded emphasis on cyber is part of a broader restructuring envisioned by Brennan that is expected to break down long-standing boundaries between the CIA’s operations and analysis directorates, creating hybrid “centers” that combine those and other disciplines.

    Brennan is expected to begin implementing aspects of his plan this month, officials said. He recently met with senior members of the House and Senate Intelligence Committees to outline the proposed changes.

    CIA spokesman Dean Boyd declined to comment, saying that “final decisions have not yet been made with respect to agency reorganization efforts.” In a notice to the CIA workforce last year, Brennan said that he had become “increasingly convinced that the time has come to take a fresh look at how we are organized.”

    The changes are designed to replicate the model of the CIA’s Counterterrorism Center, which has surged in size and influence since the Sept. 11, 2001, attacks. The restructuring could lead to new reporting lines for thousands of CIA employees, as long-standing units such the Latin America and Near East divisions give way to new centers that combine analysis, collection and covert operations.

    The National Clandestine Service and the Directorate of Intelligence — the formal names for the operations and analysis branches — would continue to exist, but would focus more on developing talent and resources that could be distributed to the new centers.

    “It would be a huge deal,” said Michael Allen, a former White House and congressional aide who wrote a 2013 book about intelligence reform. Unlike at the FBI and other security agencies, Allen said, “there hasn’t been wholesale structural reform in the CIA post-9/11.”

    Former officials who are familiar with the plan said it has caused generational friction within the CIA’s ranks, with longtime officers resisting changes that younger employees are more eager to embrace.

    The head of the clandestine service recently resigned, in part over objections to the scope of Brennan’s plan, officials said. Brennan quickly replaced him with a longtime officer who had led an internal review panel that broadly endorsed the director’s reform agenda.

    Although limited compared with the larger NSA, the CIA has substantial cyber capabilities. Its Information Operations Center, which handles assignments such as extracting information from stolen laptops and planting surveillance devices, is now second only to the Counterterrorism Center in size, former officials said.

    The CIA also oversees the Open Source Center, an intelligence unit created in 2005 to scour publicly available data, including Twitter feeds, Facebook postings and Web forums where al-Qaeda and other terrorist groups post material.

    Brennan hopes to make the use of such capabilities more pervasive, U.S. officials said, ensuring that expertise and tools that now reside in the Information Operations Center are distributed across the agency.

    The move comes at a time when the CIA has struggled to gain traction against adversaries — including the Islamic State and the Jabhat al-Nusra terrorist group — that recruit and communicate extensively online but operate in combat zones that CIA officers are generally not able to enter.

    But officials said digital changes have transformed even the most conventional cloak-and-dagger scenarios. Secrets that were once obtained by recruiting a source or meeting in a safe house increasingly reside in clouds of digital transmissions that surround espionage targets.

    To recruit a Russian spy, “you may need to manipulate someone’s e-mail, read someone’s e-mail and track the whereabouts of the FSB,” a former official said, referring to the Russian security service. “Cyber is now part of every mission. It’s not a specialized, boutique thing.”

    Beyond elevating the role of the Information Operations Center, U.S. officials said, Brennan is seeking to ensure that the agency is not lagging in other areas, such as counterintelligence work and the CIA’s internal e-mail system.

    Brennan provided only broad outlines of his plan in recent congressional meetings, which excluded all but the four highest-ranking members of the House and Senate intelligence panels. A senior U.S. intelligence official said some senior NSA executives remain in the dark on Brennan’s cyber ambitions.

    In recent years, the CIA has collaborated extensively with the NSA on a range of covert programs, including its drone campaign against al-Qaeda. Documents released by former NSA contractor Edward Snowden showed that e-mails and cellphone signals intercepted by the NSA were used to confirm the identities of targets in strikes.

    But the CIA also has fought budget and bureaucratic battles to maintain its standalone capability, prompting some to view the latest push as an attempt to capi­tal­ize on Washington’s growing alarm over cyberthreats — and the corresponding shifts in federal budgets.

    Former CIA officials said that the agency is mainly concerned about having direct control over the cyber components of its operations and that Brennan’s plans would not encroach on the global surveillance programs run by the NSA. Nor would they interfere with the work of a new agency the Obama administration is creating to fuse intelligence on cyberattacks.

    Brennan’s push to expand the CIA’s cyber capabilities is “entirely appropriate, even overdue,” said Stephen Slick, a former CIA official who directs the Intelligence Studies Project at the University of Texas at Austin. “Advances in digital technology are having a revolutionary impact on the intelligence business, and it’s important for CIA to adapt its collection and covert action missions to account for the new opportunities and dangers.”

    Ellen Nakashima and Julie Tate contributed to this report.

    By Greg Miller February 23

    Find this story at 23 February 2015

    Copyright washingtonpost.com

    Selected extracts of “top” NSA intercepts of French leadership and chief officials, taken from various editions of the National Security Agency’s Top Secret Global SIGINT Highlights executive briefings.

    EU and French diplomats who strongly criticize U.S. trade policies and call TPP treaty a confrontation against China.
    High-ranking French official complaining about President Sarkozy’s inflammatory and inaccurate statements on WTO that no-one in government backs
    French ministerial agenda for planned G7 and G20 meeting intercepted
    French economy in dire straits according to intercepted communications between French Finance Minister and French Senator
    Spying on French Ambassador who contemplated exposing U.S. misuse of UN Oil-for-food program in Iraq
    NSA Eavesdrops as Hollande Tries End Run Around Merkel on Greek Eurozone Exit
    US Intercepts of France Complaining About US Intercepts of France
    US Spying On Chirac Discussing UN Appointments
    US Spying on Sarkozy Talking Tough on Israel-Palestine
    US Eavesdrops as Sarkozy Plots French Leadership on Financial Crisis
    EU and French diplomats who strongly criticize U.S. trade policies and call TPP treaty a confrontation against China.

    Date 2 August 2011
    Classification TOP SECRET//COMINT//ORCON/NOFORN
    WikiLeaks Synopsis
    Intercepted communication between French Minister-Counselor for Economic and Financial Affiars Jean-Francois Boittin and EU Trade Section head Hiddo Houben, reveals Boittin’s discontent with U.S. approach towards a WTO pact. Additionally Houben stated that the TPP (being an American initiative) seems devised as a confrontation with China.
    Download PDF

    EU Officials Perceive Lack of U.S. Leadership on Trade Issues, Skeptical of Pacific Initiative (TS//SI//OC/NF)

    (TS//SI//OC/NF) Washington-based EU trade officials ascertained in late July that the U.S. administration is severely lacking in leadership when it comes to trade matters, as shown by the absence of a clear consensus on the future course of the WTO Doha Development Agenda (DDA). French Minister-Counselor for Economic and Financial Affairs Jean-Francois Boittin expressed astonishment at the level of “narcissism” and wasteful contemplation currently on display in Washington, while describing the idea of scrapping the DDA in favor of another plan–which some U.S. officials are seen to favor–as stupefying. The Frenchman further asserted that once a country makes deep cuts in its trade barriers, as the U.S. has done, it no longer has incentives to offer nor, as a consequence, a strong position from which to negotiate with emerging nations. Boittin’s interlocutor, EU Trade Section head Hiddo Houben, after noting the leadership void in the Office of the U.S. Trade Representative, declared that with regard to the disagreement within his host government on DDA, a political decision must be made about what direction is to be followed. On another subject, Houben insisted that the Trans-Pacific Partnership (TPP), which is a U.S. initiative, appears to be designed to force future negotiations with China. Washington, he pointed out, is negotiating with every nation that borders China, asking for commitments that exceed those countries’ administrative capacities, so as to “confront” Beijing. If, however, the TPP agreement takes 10 years to negotiate, the world–and China–will have changed so much that that country likely will have become disinterested in the process, according to Houben. When that happens, the U.S. will have no alternative but to return to the WTO. Finally, he assessed that this focus on Asia is added proof that Washington has no real negotiating agenda vis-´-vis emerging nations, including China and Brazil, or an actual, proactive WTO plan of action.

    Unconventional

    EU diplomatic

    Z-3/OO/531614-11, 011622Z
    High-ranking French official complaining about President Sarkozy’s inflammatory and inaccurate statements on WTO that no-one in government backs

    Date July 2008
    Classification TOP SECRET//COMINT/NOFORN
    WikiLeaks Synopsis
    Intercepted communication reveals discontent of head of Trade Policy Renaud Lassus regarding some statements from Sarkozy regarding a potential negative impact of a WTO trade negotiation pact on France economy.
    Download PDF

    Sarkozy Remarks on WTO Deemed Injurious to France; Rules Clarity Sought (TS//SI//NF)

    (TS//SI//NF) A high-ranking French treasury official lamented in early July recent inflammatory and inaccurate statements by President Nicolas Sarkozy, statements that the official said were certain to complicate French efforts to balance its national interests with its responsibilities as current EU President. Assuming his duties as head of the Trade Policy and Investment Office in the Treasury and Economic Policy Directorate, Renaud Lassus indicated that Sarkozy’s declaration that there will be no WTO Doha Round accord has effectively set the bar extremely high, while also increasing the chances of a dark scenario in which France finds itself as the lone dissenter on a national level, but responsible as EU President for representing the views of the entire union. The choice for France then becomes one of either capitulating or provoking a crisis within the EU. Paris is totally unprepared to deal with this scenario, Lassus confirmed, as no one wants to try to “spin” the situation in which Sarkozy has placed the country when doing so would be admitting that the President had been wrong in the first place. He further commented that Sarkozy’s assertion that a WTO pact would bring a 20-percent drop in production and the loss of 100,000 French jobs was patently incorrect and believed by no one in the government. As for those who thought that Sarkozy would dampen his rhetoric when France actually assumed the Presidency on 1 July, their hopes were dashed, Lassus insisted, by the President’s most virulent personal attack yet on the EU Trade Commissioner. In other WTO-related commentary, knowledgeable insiders believed that the 21 July WTO ministerial could be disrupted if Rules Committee chairman Guillermo Valles Galmes does not make his intentions clear in advance. If this is not done, it is possible that rules issues will be raised at the ministerial, leading to heated negotiations. In addition, fish subsidies could cause problems. India could threaten to torpedo the ministerial unless it were to get a carve-out on special and differential treatment on fish. This would leave developed countries as the only ones that would have disciplines on fish subsidies and would be unacceptable to Europe and Japan.

    Unconventional

    French, EU, Japanese diplomatic

    Z-3/OO/5427-08, 111833Z; Z-3/OO/5416-08, 111607Z
    French ministerial agenda for planned G7 and G20 meeting intercepted

    Date 2012
    Classification TOP SECRET//COMINT//NOFORN
    WikiLeaks Synopsis
    Intercepted communication reveals French Minister of Economy, Finance, and Industry Francois Baroin’s intentions to emphasize the need for the implementation of the Basel Accords on banking laws in the G7 and G20 meeting in 2012 and his support of the U.S. initiative on oil reserves.
    Download PDF

    G-7/G-20: French Minister to Push U.S. on Banking Reform, Warn Against Stifling Growth (TS//SI//NF)

    (TS//SI//NF) With some messages targeted for the United States, the French Treasury Directorate has drafted talking points for Minister of Economy, Finance, and Industry Francois Baroin to use during meetings of the Group of 7 and Group of 20 on 19 and 20 April, just before the spring meetings of the IMF and World Bank. Baroin will emphasize the need to stay on schedule for implementing the Basel Accords (recommendations on banking laws and regulations), given Washington’s slowness to act. He will also support the U.S. initiative on strategic oil reserves in his remarks on the threat to global growth posed by rising oil prices. While repeatedly reminding his colleagues of the hard choices the EU has made the deal with its financial situation, he will also caution against endangering growth by acting too quickly.

    Unconventional
    French diplomatic

    Z-3/OO/512583-12, 171712Z
    French economy in dire straits according to intercepted communications between French Finance Minister and French Senator

    Date 31 July 2012
    Classification TOP SECRET//COMINT//NOFORN
    WikiLeaks Synopsis
    Intercepted communication reveals that Finance, Economy, and Trade Minister Pierre Moscovici believes the French economic situation was far worse than perceived. Additionally, he remarks about that the situation with the automotive industry was more critical than a pre-retirement unemployment supplement known as AER, which he also thought wouldn’t have had a severe impact on elections (while senator Bourquin thought would have driven voters to right-wing National Front).
    Download PDF

    French Finance Minister Says Economy in Dire Straits, Predicts Two Atrocious Years Ahead (TS//SI//NF)

    (TS//SI//NF) The French economic situation is worse than anyone can imagine and drastic measures will have to be taken in the next 2 years, according to Finance, Economy, and Trade Minister Pierre Moscovici. On 19 July, Moscovici, under pressure to re-establish a pre-retirement unemployment supplement known as the AER, warned that the situation is dire. Upon learning that there are no funds available for the AER, French Senator Martial Bourquin warned Moscovici that without the AER program the ruling Socialist Party will have a rough time in the industrial basin of the country, with voters turning to the right-wing National Front. Moscovici disagreed, asserting that the inability to reinstitute the AER will have no impact in electoral terms, besides, the situation with faltering automaker PSA Peugeot Citroen is more important than the AER. (COMMENT: PSA has announced plans to close assembly plants and lay off some 8,000 workers.) Moscovici warned that the 2013 budget is not going to be a “good news budget,” with the government needing to find at least an additional 33 billion euros ($39.9 billion). Nor will 2014 be a good year. Bourquin persisted, warning that the Socialist Party will find itself in a situation similar to that of Socialist former Spanish President Zapatero, who was widely criticized for his handling of his country’s debt situation. Moscovici countered that it was not Zapatero whose behavior the French government would emulate, but rather Social Democrat former German Chancellor Gerhard Schroeder. (COMMENT: Schroeder, chancellor from 1998 to 2005, was widely credited with helping to restore German competitiveness. He favored shifting from pure austerity measures to measures that encourage economic growth and advocated a common EU financial policy.)

    Unconventional

    French diplomatic

    Z-3/OO/524122-12, 271748Z
    Spying on French Ambassador who contemplated exposing U.S. misuse of UN Oil-for-food program in Iraq

    Date 2004
    Classification TOP SECRET//COMINT
    WikiLeaks Synopsis
    Intercepted communication between French Ambassador in Washington Jean-David Levitte reveals his frustration towards a report he defines “scandalous” regarding a possible misuse of the UN Oil-For-Food (OFF) program by French companies during the regime of Saddam Hussein in Iraq, while he claims some of these French companies where in fact U.S. companies’ subsidiaries and no American company was mentioned in such report. Levitte likely refers to the report filed by the US Senate that accused Russian, British and French politicians of receiving oil allocations from Iraq in exchange for their political alliance. Levitte planned to present a list of such U.S. companies to U.S. Congress and the media.
    Download PDF

    (TS//SI) French Envoy Plans to Release List of U.S. Firms Who Allegedly Profited From OFF

    (TS//SI//REL TO USA, AUS, CAN, GBR and NZL) French Ambassador Jean-David Levitte in Washington plans to respond as early as today to information in the Iraq Survey Group report regarding possible misuse of the UN Oil-for-Food (OFF) program by companies from France and other countries during the former Iraqi regime. The ambassador termed the report scandalous, since it named no U.S. companies and he claimed that many French companies with contracts under the OFF program were actually subsidiaries of U.S. firms that also profited from the business dealings. He therefore planned, with foreign ministry backing, to present a list of these U.S. companies to both the U.S. Congress and the media.

    Unconventional

    French diplomatic

    3/OO/27079-04, 071948Z
    NSA Eavesdrops as Hollande Tries End Run Around Merkel on Greek Eurozone Exit

    Date 22 May 2012
    Classification TOP SECRET//COMINT-GAMMA//ORCON/NOFORN
    WikiLeaks Synopsis
    Intercepted communication reveals that Francois Hollande has approved holding a secret meeting with French officials as well as German opposition (without the knowledge of Merkel) to discuss the euro-zone crisis.
    Download PDF

    French President Approves Secret Eurozone Consultations, Meeting With German Opposition (TS//SI-G//OC/NF)

    (TS//SI-G//OC/NF) French President Francois Hollande has approved holding secret meetings in Paris to discuss the eurozone crisis, particularly the consequences of a Greek exit from the eurozone. On 18 May, Hollande directed Prime Minister (PM) Jean-Marc Ayrault to set up a meeting at the Office of the President (the Elysee) for the following week. Hollande, Ayrault, and “appropriate ministers” would attend, and special emphasis would be given to consequences for the French economy in general and for French banks in particular. Hollande stressed that the meeting would be secret. (COMMENT: The French president seems worried that if word were to get out that Paris is seriously considering the possibility of a Greek exit, it would deepen the crisis.) In addition, secret meetings are to be held in Paris between French officlans and members of the German Social Democratic Party (SPD). Hollande assured the PM that hosting the meeting at the Elysee was “doable,” although Ayrault warned the president to keep the event a secret so as to avoid diplomatic problems. (COMMENT: By “diplomatic problems,” Ayrault is referring to what could happen if German Chancellor Angela Merkel finds out that Hollande is going behind her back to meet with the German opposition.) Earlier reporting reveals that following talks last week in Berlin with Merkel, Hollande complained that nothing of substance was achieved; it was purely for show. Hollande had found the chancellor fixated on the Fiscal Pact and above all on Greece, on which he claimed she had given up and was unwilling to budge. This made Hollande very worried for Greece and the Greek people, who might react by voting for an extremist party. After meeting Merkel, the French president contacted SPD Chairman Sigmair Gabriel and invited him to Paris so that they could talk.

    Foreign Satellite, Unconventional

    French, German governmental

    Z-G/OO/503643-12, 211549Z; Z-G/OO/503541-12, 161711Z
    US Intercepts of France Complaining About US Intercepts of France

    Date 24 March 2010
    Classification TOP-SECRET//COMINT/NOFORN
    WikiLeaks Synopsis
    Intercepted communication between French Ambassador in Washington Pierre Vimont and Sarkozy’s diplomatic advisor Jean-David Levitte, reveals potential topics of discussion for a meeting between Sarkozy and U.S. President, particularly Sarkozy’s frustration regarding Washington step back on a bilateral intelligence cooperation agreement and the U.S. desire to continue spying on France.
    Download PDF

    Sensitive Issues on the Agenda When French, U.S. Presidents Meet Next Week in Washington (TS//SI//NF)

    (TS//SI//NF) French President Sarkozy intends to raise a number of sensitive topics with the U.S. President when the two leaders meet in Washington on 31 March, according to an exchange last week between the French ambassador in Washington Pierre Vimont, and Sarkozy’s diplomatic advisor, Jean-David Levitte. Vimont conveyed that the French President will express his frustration that Washington has backed away from its proposed bilateral intelligence cooperation agreement and Sarkozy intends to continue to push for closure. As Vimont and Levitte understand it, the main sticking point is the U.S. desire to continue spying on France. On the topic of Afghanistan, Levitte noted that Sarkozy is ready to authorize more military trainers but wants clarification on how many are needed, given the conflicting figures from U.S. sources. Another proposed topic was efforts by the European Aeronautic, Defense, and Space Corporation (EADS) to win a tanker aircraft contract with the U.S. military. Vimont revealed cryptically that the deal is moving forward but did not provide any details. Levitte had not expected to put the labeling dispute with Pernod Ricard (the world’s second largest spirits group) on the agenda, but Sarkozy had just spoken to the company’s chairman who had asked the president to intercede on his behalf. (COMMENT: Patrick Ricard, chairman of the Pernod Ricard board of directors, is said to be one of Sarkozy’s wealthy backers.) Vimont characterized the issue as a very political matter in the U.S., and suggested that a direct appeal to the White House might be useful. While Sarkozy intends to broach the issue with the U.S. President, Levitte will talk to the U.S. President’s Economic Adviser and Deputy National Security Adviser. Finally, Levitte expected the two leaders to discuss other pressing subjects including Iran, the Middle East Peace Process, Afghanistan and Pakistan, Yemen, Somalia, the Sahel, Russia, China, Turkey, climate change, and the financial situation of several European countries; however, he provided no details on those topics.

    Unconventional

    French diplomatic

    Z-3/OO/507179-10, 231635Z
    US Spying On Chirac Discussing UN Appointments

    Date 2006
    Classification TOP SECRET//COMINT-GAMMA//ORCON/REL TO USA, AUS, CAN, GBR, NZL
    WikiLeaks Synopsis
    Intercepted communication between French President Jacques Chirac and French Foreign Minister Philippe Douste-Blazy reveals that Chirac gave specific instructions to approach UNSYG Ban Ki-Moon and ask the appointment of Terje Roed-Larsen as Deputy UNSYG or another position of equal responsibility.
    Download PDF

    (TS//SI-G//OC) French President Presses for Selection of Roed-Larsen as Deputy UNSYG

    (TS//SI-G//OC/REL TO USA, AUS, CAN, GBR, NZL) French President Jacques Chirac told Foreign Minister Philippe Douste-Blazy on 23 December to work to ensure that current UN Special Envoy for the Implementation of UNSC Resolution 1559 Terje Roed-Larsen is selected as Deputy UNSYG or at least offered a position of similar responsibility. Chirac spelled out in deliberate fashion exactly how he wanted Douste-Blazy to proceed, instructing him to approach new UNSYG Ban Ki-moon and report back on Ban’s sentiments regarding the deputy post. (COMMENT: Chirac’s detailed orders may be in response to the foreign minister’s propensity, amply demonstrated in the past and the impetus behind a number of presidential reprimands, for making ill-timed or inaccurate remarks.) The President was keen on Roed-Larsen’s selection for several reasons, including his belief that the situation in the Middle East requires a skilled hand with experience in the region and the realization that–for once–France, Russia, and the U.S. all support the same man. Other considerations were that Ban intends to keep Frenchman Jean-Marie Guehenno on as head of the UN Department of Peacekeeping Operations, which is to be divided into two parts, with the newer organization handling logistics. That planned division, however, has drawn fire from Douste-Blazy, who thinks that it would be a catastrophe.

    Unconventional

    French leadership, UN diplomatic

    G/OO/6411-06, 271650Z
    US Spying on Sarkozy Talking Tough on Israel-Palestine

    Date 10 June 2011
    Classification TOP SECRET//COMINT-GAMMA//ORCON/NOFORN
    WikiLeaks Synopsis
    Intercepted communication reveals that Sarkozy was determined to resume peace talks between Israel and Palestine, possibly without the involvement of the U.S.
    Download PDF

    Sarkozy Determined to Proceed With Mideast Initiative, May Pressure U.S. President (TS//SI-G//OC/NF)

    (TS//SI-G//OC/NF) In spite of an apparent lack of interest on the part of some major players, French President Nicolas Sarkozy affirmed on 7 June his determination of go forward with an initiative to restart direct Mideast peace talks between Israel and the Palestinians. It was also disclosed in a conversation between Sarkozy and his foreign minister, Alain Juppe, that consideration was given to including the Quartet in the process; however, they were wary about such an invitation because that group might not bow to Paris’s wishes. Not being a member of the Quartet, they surmised, France would have no control over what transpired in one of its meetings, and if the group elected not to support direct talks, the French initiative would be a non-starter. Another concern centered on the dynamics of the Quartet: the fear in Paris was that in any session involving the EU High Representative for Foreign Affairs and Security Policy, UNSYG Ban Ki-moon, Russian Foreign Minister Sergey Lavrov, and the U.S. Secretary of State, the last two individuals would dominate the proceedings. Finally, the president was giving thought to appealing to Russian President Dmitriy Medvedev for a possible joint initiative without the United States or, as another option, issuing an ultimatum to the U.S. President regarding Palestinian statehood. The ultimatum would demand that Washington back France’s efforts to restart the peace process, failing which Sarkozy would tell the U.S. President that Paris will not side with the U.S. in September (presumably referring to the deliberations in the UN General Assembly on Palestinian statehood).

    Unconventional

    French leadership

    Z-G/OO/513370-11, 091416Z
    US Eavesdrops as Sarkozy Plots French Leadership on Financial Crisis

    Date 2008
    Classification TOP SECRET//COMINT-GAMMA//ORCON/REL TO USA, AUS, CAN, GBR, NZL
    WikiLeaks Synopsis
    Intercepted communication reveals that Sarkozy blamed U.S. Government’s many mistakes for the world economic crisis, and given a lack of engagement by the U.S., France, as EU president at the time, had to take the lead in devising solutions.
    Download PDF

    Sarkozy Sees Himself as Only One Who Can Resolve World Financial Crisis (TS//SI-G//OC)

    (TS//SI-G//OC/REL TO USA, AUS, CAN, GBR, NZL) French President Nicolas Sarkozy considers it his responsibility to Europe and the world to step up to the plate and resolve the world financial crisis. He further declared that he is the only one, given France’s EU Presidency, who can step into the breach at this time. The President blamed many of the current economic problems on mistakes made by the U.S. Government, but believes that Washington is now heeding some of his advice. In his view, this is the first time that the U.S. has not taken the lead in managing a global crisis and France will now take the helm. Sarkozy is determined that the mid-November financial summit, which he proposed, will bring drastic change to the world financial system. Finally, the French President was pleased by some progress made within the EU to ease the crisis and by his excellent working relationship with the British and Spanish prime ministers.

    Unidentified

    French leadership

    G/OO/503290-08, 291640Z

    Find this story at 29 June 2015

    WikiLeaks – Chirac, Sarkozy et Hollande : trois présidents sur écoute

    WIKILEAKS Les documents obtenus par WikiLeaks et que publie «Libération» révèlent que la NSA a, au moins de 2006 à mai 2012, espionné Jacques Chirac, Nicolas Sarkozy et François Hollande.
    Un adage en vogue dans les milieux du renseignement veut qu’en matière d’espionnage, on n’ait pas d’alliés – ou, à tout le moins, qu’ils ne soient pas forcément des amis. «S’espionner entre amis, cela ne se fait pas», s’était d’ailleurs indignée Angela Merkel en apprenant en octobre 2013, par des révélations du Spiegel, que l’Agence nationale de sécurité (NSA) américaine avait ciblé son téléphone portable. Une sélection de documents que publient Libération et Mediapart en collaboration avec WikiLeaks révèle qu’en France, ce sont trois présidents successifs, et certains de leurs collaborateurs, qui ont été espionnés sur une période allant au moins de 2006, lors du second mandat de Jacques Chirac, à mai 2012, juste après l’installation à l’Elysée de François Hollande.

    Ces documents obtenus par WikiLeaks – regroupés sous le titre «Espionnage Elysée» – consistent notamment en cinq rapports d’analyse émanant de la NSA, sous l’intitulé «Global SIGINT Highlights», autrement dit, des «faits marquants» tirés du renseignement d’origine électromagnétique, les interceptions de communications. Tous sont classés «Top Secret», et destinés à des responsables de la NSA et de la communauté américaine du renseignement ; seuls deux d’entre eux, les plus anciens, sont voués à être partagés au sein des «Five Eyes», l’alliance des services de renseignement des Etats-Unis, de l’Australie, du Canada, de la Nouvelle-Zélande et du Royaume-Uni, les autres étant exclusivement à usage américain. Ces comptes rendus émanent, selon des experts interrogés par WikiLeaks, d’un bureau identifié comme étant celui des Summary Services («le service des synthèses»).

    «SÉLECTEURS»
    On peut y lire, notamment, comment Jacques Chirac a, en 2006, poussé son candidat pour le poste de sous-secrétaire général adjoint des Nations unies, mais aussi que, selon la NSA, le ministre des Affaires étrangères de l’époque, Philippe Douste-Blazy, avait une «propension […] à faire des déclarations inexactes ou inopportunes». On peut y lire aussi – ce qui ne surprendra personne – que Nicolas Sarkozy se voyait, en 2008, comme «le seul homme capable de résoudre la crise financière». Ou qu’il se plaignait, en 2010, du «recul de Washington sur sa proposition d’accord de coopération bilatérale sur le renseignement», accord que les deux interlocuteurs mentionnés dans la note, l’ambassadeur de France à Washington, Pierre Vimont, et le conseiller diplomatique, Jean-David Levitte, attribuaient précisément au «souhait des Etats-Unis de continuer à espionner la France»…

    Le mémo le plus récent date du 22 mai 2012 – soit après la mise en place d’un protocole d’échanges d’informations ­entre la Direction générale de la sécurité extérieure (DGSE) et la NSA, qui remonterait, selon le Monde, à la fin 2011 – et fait état de «réunions secrètes» pour discuter d’une possible sortie de la Grèce de la zone euro, mais également des inquiétudes de Jean-Marc Ayrault quant aux réactions d’Angela Merkel si elle venait à avoir vent de la rencontre entre le nouveau président et l’opposition allemande.

    A vrai dire, si le contenu des notes est classé comme hautement confidentiel, il ne révèle pas pour autant de secrets d’Etat. Il témoigne, en tout état de cause, de l’intérêt porté par la NSA à la France. A ce titre, l’autre type de document obtenu par WikiLeaks est au moins aussi frappant. Il s’agit d’un extrait d’une base de données de la NSA mentionnant une série de numéros de téléphone, fixes et mobiles, identifiés comme des «sélecteurs». Autrement dit, sur la base d’une collecte massive d’informations, l’agence identifie des cibles qui motivent par la suite des recherches précises de contenus. Le tout en fonction de «besoins d’information» formalisés à partir de 2002, qui touchent à la politique intérieure ou aux enjeux économiques.

    Extrait d’une base de données de la NSA montrant les personnalités politiques qu’ils ont ciblé.

    «NOUVELLES POSSIBILITÉS DE COLLECTE»
    Dans cette liste, qui date d’après nos recoupements de l’année 2010, Libération a pu identifier les numéros de portable de membres de l’exécutif – le président Nicolas Sarkozy, les secrétaires d’Etat aux Affaires européennes et au Commerce Jean-Pierre Jouyet et Pierre Lellouche –, mais aussi des cibles plus larges : le standard du ministère des Finances, celui de l’Agriculture, ainsi que l’antenne à l’Elysée du Centre de transmissions gouvernemental, qui dépend du Secrétariat général de la défense et de la sécurité nationale (SGDSN). Ce service est précisément responsable de la sécurisation des communications de l’exécutif, ainsi que de la permanence des liaisons gouvernementales, le «téléphone rouge». Rien n’indique pour autant que les liaisons sécurisées aient, elles, été compromises.

    Parmi les autres noms, la liste témoigne d’une identification plutôt précise des interlocuteurs. Les téléphones mobiles de conseillers du Président, comme le secrétaire général de l’Elysée de l’époque, Claude Guéant, ou Jean-David Levitte, sont aussi listés. Contactés par Libération, ni l’un ni l’autre ne se disent surpris. Le premier juge le procédé «inadmissible». Le second, philosophe, indique être «toujours parti du principe [qu’il était] écouté, et pas seulement par nos amis et partenaires américains».

    On trouve aussi des membres du cabinet ou de l’administration du ministère des Affaires étrangères – son porte-parole d’alors, Bernard Valero, ainsi que Laurence Tubiana, fonctionnaire au Quai d’Orsay qui a été chargée en 2009 des négociations pour la conférence sur le climat de Copenhague. A la différence des autres cibles, cette dernière ne relève d’ailleurs pas de la branche chargée d’intercepter les communications européennes, le «S2C32» (déjà identifié dans le scandale Merkel), mais d’un bureau chargé notamment d’«améliorer l’accès à la cible», d’«accroître les efforts de ciblage et d’exploitation» et de «développer de nouvelles possibi­lités de collecte». En clair, de voir dans quelle mesure il serait possible de pirater son téléphone, voire d’installer des logiciels espions dans son ordinateur.

    Cette sélection de documents ne révèle qu’une partie des activités de la NSA en matière d’espionnage des dirigeants français : rien ne permet de connaître la quantité de comptes rendus d’écoutes ayant été communiqués aux dirigeants de la NSA, et les présidents prennent également des précautions pour évoquer les sujets les plus sensibles – rencontres bilatérales ou communications chiffrées. Mais les documents confirment, en tout état de cause, à quel point les Etats-Unis peuvent s’intéresser au détail des communications de dirigeants de pays alliés. En octobre 2013, le ­député ­socialiste Jean-Jacques Urvoas, rapporteur du projet de loi sur le renseignement, se plaignait d’ailleurs dans les colonnes du Monde que «les Etats-Unis n’ont pas d’alliés, ils n’ont que des cibles ou des vassaux».

    «ZONE GRISE»
    Reste désormais à savoir si ces pratiques se sont poursuivies au-delà de la date des derniers documents que nous publions en collaboration avec WikiLeaks. Sollicité par Libération et Mediapart, l’entourage de François Hollande assure qu’au moment de la visite d’Etat du Président à Washington, en février 2014, «l’engagement a été pris [par Barack Obama] de ne plus pratiquer d’écoutes indifférenciées concernant les services de l’Etat des pays alliés». Egalement sollicités, ni la NSA ni la Maison Blanche n’avaient encore réagi, mardi soir à l’heure du bouclage.

    L’espionnage à l’étranger est l’ultime «zone grise» du renseignement – il est d’ailleurs, en France, le véritable point aveugle du projet de loi sur le renseignement, voué à être adopté ce mercredi. En avril, une résolution de l’Assemblée parlementaire du Conseil de l’Europe préconisait la mise en place d’un «code du renseignement multilatéral». On en est évidemment encore très loin.

    AMAELLE GUITON , ALEXANDRE LÉCHENET , JEAN-MARC MANACH ET AVEC JULIAN ASSANGE 23 JUIN 2015 À 21:55 (MIS À JOUR : 23 JUIN 2015 À 22:56)

    Find this story at 23 June 2015

    Copyright liberation.fr

    NSA Economic Spy Order

    Information Need (IN) – France: Economic Developments
    EEI: H – Foreign Contracts/Feasibility Studies/Negotiations
    Information Need (IN) – France: Economic Developments

    Date 2012
    Classification SECRET
    WikiLeaks Synopsis
    This classified US intelligence “Information Need” spying order mandates long term economic espionage against France in order to obtain details about the economic activities of French companies and the economic policies and decisions of the French government. Information Needs (IN) are collection requirements extracted from the National SIGINT Requirements List, and are used to broadly justify the interception of communications in order to satisfy generic intelligence demands from U.S. policy makers and the U.S. Intelligence Community. This IN, identified as 2002-204 (first created in 2002 and updated for more than a decade) and referenced in the list of Top NSA French Targets previously published by WikiLeaks, shows which particular information of interest (“Essential Elements of Information”, EEI) the relevant Signals Intelligence units are instructed to collect and report about. Such requirements include France’s economic relations with the United States, other countries and international institutions, France’s financial and trade policies, and its views on G-8 and G-20 agendas. “Supported Elements” are those parts of the US government which are supported by (i.e receive intelligence reports derived from) the espionage.
    Download PDF

    IN Standard Report: S-C-2002-204

    Title : (S//REL TO USA, AUS, CAN, GBR, NZL) France: Economic Developments

    Originator Classification : SECRET//REL TO USA, AUS, CAN, GBR, NZL

    Table of Contents

    EEI A : (U//FOUO) Economic Relations with the United States
    EEI B : (S//REL TO USA, AUS, CAN, GBR, NZL) French Business Practices
    EEI C : (S//REL TO USA, AUS, CAN, GBR, NZL) French Financial/Macroeconomic Policy Development
    EEI D : (U//FOUO) Views On G-8, G-20 Developments/Issues
    EEI E : (U//FOUO) Budgetary Constraints/Contributions To NATO
    EEI F : (S//REL TO USA, AUS, CAN, GBR, NZL) French Views
    EEI G : (U//FOUO) Relations With Least Developed Countries (LDCs) And Transitional States
    EEI H : (U//FOUO) Foreign Contracts/Feasibility Studies/Negotiations
    EEI I : (U//FOUO) Relations With International Financial Institutions
    EEI J : (S//REL TO USA, AUS, CAN, GBR, NZL) French Trade Policies
    EEI K : (U//FOUO) Questionable Trade Activities

    (U//FOUO) Supported Element(s):

    CIA
    COMMERCE
    DHS
    DIA/DI
    DIA/OSR-2
    DIA/USEUCOM
    FEDERAL RESERVE BOARD
    STATE/INR
    TREASURY
    US TRADE REP
    DOE/IN
    EEI: H – Foreign Contracts/Feasibility Studies/Negotiations

    Date 2012
    Classification SECRET//NOFORN
    WikiLeaks Synopsis
    This US economic espionage order (“Essential Elements of Information) for France instructs US spies to collect information on all French sales and financing of significant projects related to telecommunications, electrical generation, gas, oil, nuclear and renewable energy and environmental and healthcare technologies. Most substantially it also mandates the interception and reportage of all French company negotiations and contracts valued at over $200 million. The results of the spying are to be reported to various US trade, political and intelligence agencies (“Supported Elements”).
    Download PDF

    EEI : H

    EEI Classification : SECRET//NOFORN

    Originator EEI Classification : SECRET//REL TO USA, AUS, CAN, GBR, NZL

    EEI Title : (U//FOUO) Foreign Contracts/Feasibility Studies/Negotiations
    Question(s) :

    1. (S//REL TO USA, AUS, CAN, GBR, NZL) Report impending French contract proposals or feasibility studies and negotiations for international sales or investments in major projects or systems of significant interest to the foreign host country or $200 million or more in sales and/or services, including financing information or projects of high interest including:

    A. Information and telecommunications facilities networks and technology?

    B. Electric power, natural gas, and oil facilities and infrastructure to include nuclear power and renewable energy generation?

    C. Transportation infrastructure and technology to include ports, airports, high-speed rail, and subways?

    D. Environmental technologies used domestically and for export?

    E. Health care infrastructure, services, and technologies, including biotechnology developments?

    Find this story at 29 June 2015

    DOSSIER: LA RÉPUBLIQUE SUR ÉCOUTE ENQUÊTE 2006-2012: Hollande, Sarkozy et Chirac écoutés

    Au-delà des trois chefs d’État français, des ministres, des hauts fonctionnaires, des parlementaires et des diplomates ont été surveillés téléphoniquement pendant près d’une décennie par les services secrets américains, selon des documents obtenus par WikiLeaks.

    Les États-Unis ont placé la République sur écoute. Les présidents François Hollande, Nicolas Sarkozy et Jacques Chirac, ainsi que de nombreux ministres, des hauts fonctionnaires, des parlementaires ou des diplomates, ont été écoutés directement ou par ricochet pendant près d’une décennie par les services secrets américains, selon des documents confidentiels de la National Security Agency (NSA) obtenus par WikiLeaks (lire aussi notre version en anglais de cet article).

    D’après des notes de synthèse de la NSA auxquelles Mediapart et Libération ont eu accès, en collaboration avec WikiLeaks, dans le cadre de l’opération Espionnage Élysée, les interceptions se sont étalées de 2006 à 2012 – mais rien ne dit qu’elles n’ont pas commencé plus tôt et ne se sont pas poursuivies depuis. Toutes classifiées « top secret », ces notes détaillent les dessous d’un espionnage obsessionnel de la France par les États-Unis sur des questions diplomatiques, de politique locale ou économiques de tous ordres.

    Les trois présidents français écoutés par la NSA
    Les trois présidents français écoutés par la NSA © DR
    Que les États-Unis écoutent les principaux dirigeants d’un pays allié comme la France relève pour certains du secret de polichinelle. L’information est désormais prouvée par des documents issus du cœur de l’appareil d’État américain.

    Surtout, les éléments que nous rendons publics à partir d’aujourd’hui (voir ici l’analyse des documents) révèlent l’ampleur jusqu’ici insoupçonnée de l’espionnage états-unien, réalisé en dehors de tout cadre judiciaire et de tout réel contrôle. Car ce ne sont pas seulement les présidents de la République successifs qui ont été écoutés ces dernières années, mais toutes les strates de la puissance publique qui ont été, à un moment ou à un autre, la cible des États-Unis, qu’il s’agisse de directeurs d’administration, de ministres, de conseillers présidentiels et ministériels, de diplomates, de porte-parole. Au sein même de l’Élysée, par exemple, de très nombreuses lignes téléphoniques (fixes ou portables) ont été branchées.

    Déjà passablement écornée par les révélations de l’ancien agent Edward Snowden, l’image de la NSA et, avec elle, des États-Unis ne devrait pas sortir grandie de ces nouvelles révélations, qui jettent une lumière crue sur les pratiques agressives et déloyales de la première puissance mondiale à l’encontre d’un pays normalement considéré comme « ami ». Du moins, en façade.

    Contactée, la NSA n’a pas souhaité faire de commentaire.

    Comme ses deux prédécesseurs de droite, l’actuel président socialiste François Hollande n’a pas échappé à la curiosité des grandes oreilles de Washington. Un rapport du 22 mai 2012 de la NSA fait ainsi explicitement référence à une conversation tenue quatre jours plus tôt entre le président fraîchement élu et son premier ministre de l’époque, Jean-Marc Ayrault. La conversation porte sur la volonté de François Hollande d’organiser des « consultations secrètes » avec l’opposition allemande, concernant l’éventualité d’une sortie de la Grèce de la zone euro – un sujet toujours d’actualité.

    Les analystes de la NSA évoquent dans le même document l’existence de « précédents rapports » concernant des entretiens passés au sujet de la chancelière Angela Merkel. Ce qui laisse donc supposer que les interceptions américaines du président français ont bel et bien été monnaie courante.

    À l’Élysée, on indiquait mardi 23 juin que, sans avoir conservé la trace de cette conversation, celle-ci est « tout à fait crédible ». Mais sur le fond, la présidence de la République n’a souhaité faire aucun commentaire à ce stade. Dans l’entourage du président, on précise toutefois qu’en amont de la rencontre entre François Hollande et Barack Obama, le 11 février 2014 à Washington, puis lors de cette entrevue, « l’engagement a été pris de ne plus pratiquer d’écoutes indifférenciées des services de l’État d’un pays allié ».

    Le directeur général de LR (ex-UMP), Frédéric Péchenard, a communiqué l’information à Nicolas Sarkozy, qui « ne souhaite pas réagir pour l’instant ».

    Comme pour la plupart des documents obtenus par WikiLeaks, le rapport de mai 2012 de la NSA ciblant François Hollande est surmonté de nombreuses initiales qui, une fois décryptées, donnent la mesure du caractère ultrasensible des données désormais publiques. Estampillées « top secret » (TS), ces notes traitent de renseignements obtenus par des interceptions de signaux électroniques (SI pour SIGINT, soit “signal intelligence”) et ne doivent sous aucun prétexte être partagées avec un pays étranger (NF pour NOFORN, soit “no foreigner”).

    La note Hollande est également accompagnée, comme pour de nombreuses autres, de la mention « unconventional », une catégorie particulière dans la nomenclature de la NSA qui correspond aux opérations non conventionnelles.

    LIRE AUSSI
    Revealed: how US tapped phones of three French presidents
    PAR FABRICE ARFI ET JÉRÔME HOURDEAUX ET JULIAN ASSANGE (WIKILEAKS)

    US phone taps on France – why Paris would prefer to keep a low profile
    PAR LÉNAÏG BREDOUX ET MATHIEU MAGNAUDEIX

    WikiLeaks documents on US snooping on France – what the presidents said
    PAR LÉNAÏG BREDOUX ET ELLEN SALVI ET JULIAN ASSANGE (WIKILEAKS)

    France condemns ‘unacceptable’ spying on its presidents
    PAR LÉNAÏG BREDOUX ET MATHIEU MAGNAUDEIX ET ELLEN SALVI

    35 « leaders internationaux » espionnés par la NSA
    PAR LA RÉDACTION DE MEDIAPART

    Espionnage d’intérêts français par le renseignement allemand : la France se tait
    PAR MATHIEU MAGNAUDEIX

    Espionnage : à droite et à gauche, l’allié américain a déçu
    PAR LÉNAÏG BREDOUX ET MATHIEU MAGNAUDEIX ET ELLEN SALVI
    Toujours dans cette même note Hollande figure une petite mention supplémentaire, qui est tout sauf anodine : « Foreign Satellite ». Ce terme, FORNSAT en abrégé, désigne un réseau mondial de stations d’écoutes de la NSA réparties dans les pays alliés. Tous les regards se portent aujourd’hui, sans qu’il soit possible d’en avoir la certitude absolue, vers des antennes satellites allemandes.

    La presse a en effet plusieurs fois fait état ces derniers mois de la sous-traitance par les services secrets allemands (le BND) de l’espionnage américain, ce qui a provoqué une forte indignation en Allemagne et l’ouverture d’une enquête parlementaire qui cherche précisément le type de documents que WikiLeaks a obtenus.

    En dehors de l’actuel chef de l’État français, d’autres hautes personnalités françaises ont été écoutées. D’après les documents en notre possession, sur lesquels nous reviendrons dans les prochains jours, les anciens présidents Nicolas Sarkozy et Jacques Chirac, l’ancien ministre socialiste de l’économie Pierre Moscovici (aujourd’hui commissaire européen) ou l’ex-ambassadeur de France à Washington Pierre Vimont ont ainsi été espionnés.

    Il faut dire que l’appétit de renseignements des États-Unis pour la France relève de la boulimie. Un autre document confidentiel (voir ci-dessous) de la NSA, rédigé sous la présidence Sarkozy (2007-2012), révèle quant à lui la liste des cibles françaises définies par les États-Unis. Sont concernés, pêle-mêle : le portable personnel du président de l’époque, Nicolas Sarkozy, ceux du conseiller diplomatique Jean-David Levitte, du secrétaire général de l’Élysée Claude Guéant, du porte-parole du ministère des affaires étrangères Bernard Valero, de l’ancien ministre Jean-Pierre Jouyet (aujourd’hui secrétaire général de l’Elysée), celui d’un responsable du Quai d’Orsay non identifié, ou du ministre du commerce extérieur Pierre Lellouche.

    La liste des cibles françaises établie par la NSA sous la présidence Sarkozy
    La liste des cibles françaises établie par la NSA sous la présidence Sarkozy
    Pour Claude Guéant, ancien secrétaire général de l’Elysée et ex-ministre de l’intérieur, « cette pratique est scandaleuse ». « Le gouvernement français doit réagir comme il se doit. Au minimum, cela nécessite une explication au plus haut niveau, un engagement absolu à mettre un terme à ces pratiques. Nous nous acheminons vers un monde qui est extrêmement préoccupant, où plus personne n’a plus d’intimité, de confidentialité », se plaint ce proche de Nicolas Sarkozy.

    « Si les Américains ont écouté Merkel, on ne voit pas pourquoi les autres n’auraient pas été écoutés », commente Frédéric Péchenard, ancien patron de la police nationale et actuel directeur général des Républicains. « Mais si l’on veut être capables de se défendre, il faut que nos services soient à la hauteur. Il nous faut des moyens techniques humains et juridiques plus efficaces. Être espionné par ceux qui sont censés être nos amis, ça peut poser un problème d’ordre diplomatique », précise-t-il.

    « Moi qui étais un grand ami de l’Amérique, je le suis de moins en moins », réagit pour sa part le député Pierre Lellouche auprès de Mediapart. « Je ne suis pas surpris. Ça ne m’étonne pas d’avoir été écouté lorsque j’étais au commerce extérieur, ça intéresse beaucoup les Américains, l’espionnage industriel. On a tout le temps ce genre de conversations. C’est d’ailleurs l’argument qu’on nous rétorque en ce moment dans le cadre de la loi sur le renseignement : on est écouté par tout le monde, pourquoi s’empêcher de nous écouter ? On s’écoute de partout. Malheureusement, je le dirai à l’Assemblée nationale, on est dans un imperium global sur le plan économique, où les États-Unis n’hésitent pas à mettre en réseaux la CIA, la NSA, mais aussi la justice américaine, qui ensuite fait des saisines. Je le dénonce sans arrêt », ajoute-t-il.

    D’après les documents de la NSA, les lignes fixes des conseillers africains en poste à l’Élysée et les numéros des… standards des ministères de l’agriculture et des finances sont également visés. On trouve encore dans la liste des cibles l’antenne du Centre de transmission gouvernemental (CTG) situé à l’Élysée. Celui-ci est chargé d’assurer, à l’abri du “secret défense”, la permanence des liaisons gouvernementales et tout particulièrement celles du chef de l’État et du Premier ministre. Un autre numéro, référencé sous l’intitulé « FR VIP AIRCRAFT REL », renvoie après vérification à une ligne de la flotte aérienne du gouvernement, l’Etec, qui dépend de l’armée de l’air.

    Au-delà du scandale que peut susciter aujourd’hui cet espionnage américain, la facilité avec laquelle les États-Unis paraissent pouvoir intercepter la moindre conversation des plus hauts dirigeants français interroge aujourd’hui la faiblesse des capacités de contre-ingérence des services de renseignement français. À ce propos, l’Élysée a coutume de rappeler que sur les questions diplomatiques et militaires, il n’y a jamais eu de fuite quelle qu’elle soit, précisant que s’agissant des sujets les plus sensibles, toutes les précautions sont prises. Jusqu’à preuve du contraire.

    23 JUIN 2015 | PAR FABRICE ARFI ET JÉRÔME HOURDEAUX ET JULIAN ASSANGE (WIKILEAKS)

    Find this story at 23 June 2015

    Copyright mediapart.fr

    Espionnage Élysée (2015)

    Press Release Top French NSA Targets Top French NSA Intercepts Economic Spy Order

    Today, 29 June 2015, WikiLeaks continues “Espionnage Élysée”, our ongoing publication of a collection of TOP SECRET documents from United States surveillance operations against France.

    Today’s publication comprises seven top secret documents detailing how the US has had a decade- long policy of economic espionage against France, including the interception of all French corporate contracts and negotiations valued at more than $200 million. The documents demonstrate that the US National Security Agency, far from being a rogue organisation, is carrying out an economic espionage policy created by the US Director of National Intelligence. The documents detail the intelligence process, from the tasking of the NSA with collection of desired economic information to the production of developed intelligence reports, which are sent to “Supported Elements” of the US government, including the US Department of Commerce, the US Trade Represenative, the US Treasury and the Central Intelligence Agency.

    Central within the cache of documents are two long-term spying orders (“collection requirements”) which define the kinds of intelligence the NSA is tasked with collecting in its surveillance operations against France. The documents make clear that the NSA has been tasked with obtaining intelligence on all aspects of the French economy, from government policy, diplomacy, banking and participation in international bodies to infrastructural development, business practices and trade activities. The documents establish that the US economic intelligence operations against France have run for more than a decade and started as early as 2002. Some of the documents are authorised for sharing with the “Five Eyes” partners – the group of Anglophone countries in close intelligence co-operation with the United States: Canada, New Zealand, Australia and France’s fellow member state of the European Union, the United Kingdom, strongly suggesting that the United Kingdom has also benefited from the United States’ economic espionage activities against France.

    The cache also includes five TOP SECRET intelligence summaries from US spying on the conversations and communications of French officials. The documents show US spying on the French Finance Minister, a French Senator, officials within the Treasury and Economic Policy Directorate, the French ambassador to the United States, and officials with direct responsibility for EU trade policy. The intercepts reveal internal French deliberation and policy on the World Trade Organization, the Trans-Pacific Partnership Agreement, the G7 and the G20, the 2013 French budget, the decline of the automotive industry in France, and the involvement of French companies in the Oil for Food programme in Iraq during the 1990s.

    WikiLeaks founder Julian Assange said: “The United States has been conducting economic espionage against France for more than a decade. Not only has it spied on the French Finance Minister, it has ordered the interception of every French company contract or negotiation valued at more than $200 million. That covers not only all of France’s major companies, from BNP Paribas, AXA and Credit Agricole to Peugeot and Renault, Total and Orange, but it also affects the major French farming associations. $200 million is roughly 3,000 French jobs. Hundreds of such contracts are signed every year. The United States not only uses the results of this spying itself, but swaps these intercepts with the United Kingdom. Do French citizens deserve to know that their country is being taken to the cleaners by the spies of supposedly allied countries? Mais oui!”

    For French-language interviews/comment regarding Espionnage Élysée please contact WikiLeaks’ Paris-based legal advisor, Juan Branco: Tel. +33 671 19 21 47

    Cartoon
    Today, 23 June 2015, WikiLeaks began publishing “Espionnage Élysée”, a collection of TOP SECRET intelligence reports and technical documents from the US National Security Agency (NSA) concerning targeting and signals intelligence intercepts of the communications of high-level officials from successive French governments over the last ten years.

    The top secret documents derive from directly targeted NSA surveillance of the communications of French Presidents Francois Hollande (2012–present), Nicolas Sarkozy (2007–2012), and Jacques Chirac (1995–2007), as well as French cabinet ministers and the French Ambassador to the United States. The documents also contain the “selectors” from the target list, detailing the cell phone numbers of numerous officials in the Elysee up to and including the direct cell phone of the President.

    Prominent within the top secret cache of documents are intelligence summaries of conversations between French government officials concerning some of the most pressing issues facing France and the international community, including the global financial crisis, the Greek debt crisis, the leadership and future of the European Union, the relationship between the Hollande administration and the German government of Angela Merkel, French efforts to determine the make-up of the executive staff of the United Nations, French involvement in the conflict in Palestine and a dispute between the French and US governments over US spying on France.

    A founding member state of the European Union and one of the five permanent members of the UN Security Council, France is formally a close ally of the United States, and plays a key role in a number of US-associated international institutions, including the Group of 7 (G7), the North Atlantic Treaty Organization (NATO) and the World Trade Organization (WTO).

    The revelation of the extent of US spying against French leaders and diplomats echoes a previous disclosure in the German press concerning US spying on the communications of German Chancellor Angela Merkel and other German officials. That disclosure provoked a political scandal in Germany, eventuating in an official inquiry into German intelligence co-operation with the United States, which is still ongoing.

    While the German disclosures focused on the isolated fact that senior officials were targeted by US intelligence, WikiLeaks’ publication today provides much greater insight into US spying on its allies, including the actual content of intelligence products deriving from the intercepts, showing how the US spies on the phone calls of French leaders and ministers for political, economic and diplomatic intelligence.

    WikiLeaks founder Julian Assange said: “The French people have a right to know that their elected government is subject to hostile surveillance from a supposed ally. We are proud of our work with leading French publishers Liberation and Mediapart to bring this story to light. French readers can expect more timely and important revelations in the near future.”

    Find this story at 29 June 2015

    Trade Secrets : Is the U.S.’s most advanced surveillance system feeding economic intelligence to American businesses? (1999)

    No one is surprised that the United States uses sophisticated electronic spying techniques against its enemies. But Europeans are increasingly worried about allegations that the U.S. uses those same techniques to gather economic intelligence about its allies.
    The most extensive claims yet came this spring in a report written for the European Parliament. The report says that the U.S.

    National Security Agency, through an electronic surveillance system called Echelon, routinely tracks telephone, fax, and e-mail transmissions from around the world and passes on useful corporate intelligence to American companies.

    Among the allegations: that the NSA fed information to Boeing and McDonnell Douglas enabling the companies to beat out European Airbus Industrie for a $ 6 billion contract; and that Raytheon received information that helped it win a $ 1.3 billion contract to provide radar to Brazil, edging out the French company Thomson-CSF. These claims follow previous allegations that the NSA supplied U.S. automakers with information that helped improve their competitiveness with the Japanese (see “Company Spies,” May/June 1994).

    Is there truth to these allegations? The NSA is among the most secretive of U.S. intelligence agencies and won’t say much beyond the fact that its mission is “foreign signals intelligence.” The companies involved all refused to comment.

    “Since the NSA’s collection capabilities are so grotesquely powerful, it’s difficult to know what’s going on over there,” says John Pike, an analyst at the watchdog group Federation of American Scientists, who has tracked the NSA for years.

    This much is known: The NSA owns one of the largest collections of supercomputers in the world, and it’s an open secret–as documented in the European Parliament report–that Echelon vacuums up massive amounts of data from communications satellites and the Internet and then uses its computers to winnow it down. The system scans communications for keywords–“bomb,” for instance–that might tip off analysts to an interesting topic.

    Fueling allegations of corporate espionage is the fact that defense contractors and U.S. intelligence agencies are linked extensively through business relationships. Raytheon, for instance, has large contracts to service NSA equipment, according to the European report.

    Englishman Glyn Ford, the European Parliament member who initiated the study, wants the NSA to come clean about its activities in Europe. And the Europeans have some leverage on this issue, if they decide to use it. In a drive to improve surveillance, the United States is pressuring European governments to make telephone companies build eavesdropping capabilities into their new systems. But if that’s what the U.S. wants, says Ford, it’s going to have to be open about what information it’s collecting: “If we are going to leave the keys under the doormat for the United States, we want a guarantee that they’re not going to steal the family silver,” he says.

    In the meantime, congressional critics have started to wonder if all that high-powered eavesdropping is limited to overseas snooping. In April, Bob Barr (R-Ga.), a member of the House Government Reform Committee, said he was worried by reports that the NSA was engaged in illicit domestic spying.

    “We don’t have any direct evidence from the NSA, since they’ve refused to provide any reports, even when asked by the House Intelligence Committee,” Barr says. “But if in fact the NSA is pulling two million transmissions an hour off of these satellites, I don’t think there’s any way they have of limiting them to non-U.S. citizens.”

    Last May, after the NSA stonewalled requests to discuss the issue, Congress amended the intelligence appropriations bill to require the agency to submit a report to Congress. (The bill is still in a conference committee.) And the NSA will face more questions when the Government Reform Committee holds hearings on Echelon and other surveillance programs.

    “We ought to prevent any agency from the dragnet approach–where they throw out a net and drag anything in,” Barr says.

    Kurt Kleiner
    Mother Jones November 1, 1999

    Find this story at 1 November 1999

    Copyright Mother Jones

    KGB spy shares details of his escape to Britain in 1985

    Oleg GordievskyA Soviet double spy, who secretly defected to Britain 30 years ago this month, has revealed for the first time the details of his exfiltration by British intelligence in 1985. Oleg Gordievsky was one of the highest Soviet intelligence defectors to the West in the closing stages of the Cold War. He joined the Soviet KGB in 1963, eventually reaching the rank of colonel. But in the 1960s, while serving in the Soviet embassy in Copenhagen, Denmark, Gordievsky began feeling disillusioned about the Soviet system. His doubts were reinforced by the Soviet invasion of Czechoslovakia in 1968. It was soon afterwards that he made the decision to contact British intelligence.
    Cautiously, Britain’s Secret Intelligence Service (known as MI6) communicated with Gordievsky, and in 1974 he secretly became an agent-in-place for the United Kingdom. Eight years later, in 1982, Gordievsky was promoted to KGB rezident (chief of station) in London. While there, he frequently made contact with his MI6 handlers, giving them highly coveted information on Soviet nuclear strategy, among other things. He is credited with informing London of Mikhail Gorbachev’s imminent ascendency to the premiership of the Soviet Union, long before he was seen by Western intelligence as a viable candidate to lead the country.
    But in May of 1985, Gordievsky was suddenly recalled to Moscow, where he was detained by the KGB. He was promptly taken to a KGB safe house in the outskirts of Moscow and interrogated for five hours, before being temporarily released pending further questioning. Remarkably, however, Gordievsky managed to escape his KGB surveillance and reappear in Britain less than a week later. How did this happen? On Sunday, the former double spy gave a rare rare interview to The Times, in which he revealed for the first time the details of his escape to London. He told The Times’ Ben Macintyre that he was smuggled out of the USSR by MI6 as part of Operation PIMLICO. PIMLICO was an emergency exfiltration operation that had been put in place by MI6 long before Gordievsky requested its activation in May of 1985.
    Every Tuesday, shortly after 7:00, a British MI6 officer would take a morning stroll at the Kutuzovsky Prospekt in Moscow. He would pass outside a designated bakery at exactly 7:24 a.m. local time. If he saw Gordievsky standing outside the bakery holding a grocery bag, it meant that the double agent was requesting to be exfiltrated as a matter of urgency. Gordievsky would then have to wait outside the bakery until a second MI6 officer appeared, carrying a bag from the Harrods luxury department store in London. The man would also be carrying a Mars bar (a popular British candy bar) and would bite into it while passing right in front of Gordievsky. That would be a message to him that his request to be exfiltrated had been received.
    Four days later, Gordievsky used his skills in evading surveillance and shook off (or dry-cleaned, in espionage tradecraft lingo) the KGB officers trailing him. He was then picked up by MI6 officers and smuggled out of the country in the trunk of a British diplomatic car that drove to the Finnish border. Gordievsky told The Times that Soviet customs officers stopped the car at the Finnish border and surrounded it with sniffer dogs. At that moment, a British diplomat’s wife, who was aware that Gordievsky was hiding in the car, came out of the vehicle and proceeded to change her baby’s diaper on the trunk, thus safeguarding Gordievsky’s hiding place and masking his scent with her baby’s used diaper. If it hadn’t been for the diplomat’s wife, Gordievsky told The Times that he might have been caught.
    After crossing the Soviet-Finnish border, Gordievsky traveled to Norway and from there he boarded a plane for England. Soviet authorities promptly sentenced him to death, but allowed his wife and children to join him in Britain six years later, after British Prime Minister Margaret Thatcher personally lobbied the Soviet government. Gordievsky’s death penalty still stands in Russia. In 2007, the Queen made Gordievsky a Companion of the Most Distinguished Order of St. Michael and St. George for services rendered to the security of the British state.

    JULY 6, 2015 BY JOSEPH FITSANAKIS LEAVE A COMMENT

    Find this story at 6 July 2015

    Copyright intelnews.org

    Top KGB defector begged Margaret Thatcher to secure release of his family

    Oleg Gordievsky told the prime minister that without his wife and young daughters his “life has no meaning”, papers released by the National Archives show

    Oleg Gordievsky, the most prominent Soviet agent to defect to Britain during the Cold War, personally pleaded with Margaret Thatcher to help secure the release of his family from Moscow.
    The KGB colonel told the prime minister that without his wife and young daughters, who were prevented from following him to London, his “life has no meaning”.
    Files released by the National Archives reveal that MI6 secretly sought to broker a deal with the Russians to secure the safe passage of his family. When the offer was rejected, Mrs Thatcher insisted on expelling every KGB agent in Britain.
    Mr Gordievsky, who was one of the most important spies during the Cold War, provided Britain with reports on Soviet operations for more than a decade.
    When he issued his appeal to Mrs Thatcher in 1985, she responded personally in an emotive note on Sept 7 1985 urging him to have hope.
    Related Articles
    Tony Benn, the veteran Labour politician, has died at the age of 88. The former cabinet minister, who served as an MP for more than 50 years, died at his home in west London surrounded by family members.
    Tony Benn, a KGB spy? No, he was far too dangerous for us 26 Dec 2014
    Former KGB colonel says he paid late union leader Jack Jones £200 for information 22 Apr 2009
    Sir Christopher Curwen 23 Dec 2013
    They can’t take their eyes off us 07 Dec 2010
    “Our anxiety for your family remains and we shall not forget them,” she said. “Having children of my own, I know the kind of thoughts and feelings which are going through your mind each and every day. But just as your concern is about them, so their concern will be for your safety and well-being.
    “Please do not say that life has no meaning. There is always hope. And we shall do all to help you through these difficult days.”
    Mrs Thatcher went on to suggest that the pair should meet when the “immediate situation” – the public announcement of Mr Gordievsky’s defection to Britain – had passed.
    Her personal involvement was greeted with extreme gratitude by Christopher Curwen, the MI6 chief who had arranged Mr Gordievsky’s extraction from Moscow.
    Curwen said: “The reassurance that his family would not be forgotten provided the help and support which he most needs at this difficult time.”
    Her comments “greatly assisted” MI6’s dealings with Mr Gordievsky at a “very dificult time,” he added.
    Mr Gordievsky arrived in London as a result of an emergency extraction sanctioned by Mrs Thatcher in the summer of 1985. Originally recruited in 1974, Mr Gordievsky became Britain’s star source inside the KGB after being posted to the Soviet secret service’s London bureau.
    However, on May 17 1985, having just been promised the job of head of station in London, he was suddenly summoned back to Moscow and subsequently accused of being a spy. He eventually escaped to London with the help of MI6, who smuggled him across the border into Finland, after giving his KBG minders the slip.
    When she formally announced Mr Gordievsky’s defection Mrs Thatcher said she hoped that “on humanitarian grounds” the Soviet authorities would agree to his request for his family to join him in London.
    However it was another six years before he was reunited with his wife Leila and children. His elder daughter Mariya was 11 on her arrival in London in 1991, and his second child Anna was 10.
    The National Archives files show that the prime minister took a close interest in Mr Gordievsky’s well-being, asking his handlers “whether he has some sort of companion to talk to and confide in at what is obviously a very difficult time for him.”

    By Edward Malnick7:00AM GMT 30 Dec 2014

    Find this story at 30 December 2014

    © Copyright of Telegraph Media Group Limited 2015

    Inside Toronto’s secret Cold War History

    In the 50s and 60s, Soviet and American spies waged a secret war of espionage across the city of Toronto.

    At the height of the Cold War, Toronto was the site of an elaborate game of espionage played between the U.S and the Soviet Union, declassified CIA documents show.
    The records provide new details about how the CIA and the KGB spied on the city’s growing community of eastern European immigrants.
    And those details came as a surprise to at least one Toronto target who learned she was the subject of the CIA investigations.
    “I’m amazed. I’m absolutely in shock,” says Ukrainian-born Natalie Bundza, 78, who worked as a travel agent at an agency on Bloor St. when the CIA first began to monitor her travels.
    Because of her line of work, Bundza was used to being singled out by Soviet authorities. But when the Star showed her the declassified CIA file bearing her name, Bundza was stunned. The depth and breadth of the information that had been collected on her was startling.
    In one of Bundza’s trips to Ukraine in the late ’60s, the CIA had amassed enough intelligence to describe everything from the people she met with overseas to the content of her suitcase, even going as far as to mention the art books she had packed.
    “Took many books to Ukraine: several copies of Archipenko’s monograph Hnizdovsky monograph, poetry collections of the New York group, a Bible for Ivan Mykolaychuk,” the file reads.
    As a young travel agent in her early 30s, Bundza, who now lives in a bungalow in Etobicoke, would often accompany performance groups and tourists across the Iron Curtain and to the Soviet Union. She believes her job and her friends in the art world made her an attractive target for CIA spies.
    Mykolaychuk, an actor, and her other friends, she says, were part of what she calls the “Ukrainian intelligentsia.”
    They included famous sculptor Ivan Honchar, poet Ivan Drach, and prominent political activist Dmytro Pavlychko — names which were all dutifully noted by the CIA spy.
    “I was constantly followed (by the Soviets). They just knew my background. They knew I was a patriot, that I wasn’t a communist,” she says.
    She kept abreast of news from her home country, and she wasn’t afraid to take risks. In her early 30s, Bundza was “all guts, no brains,” she remembers. “I would have knocked on the president’s door if I had to.”
    “We were great tourist guides. We took no BS from (the Soviets),” she says.
    During one of her organized trips, she noticed that a Soviet customs official had been eyeing the stack of Bibles she carried with her. And so, without prompting, Bundza handed him a copy.
    Still, as far as Bundza remembers, she never divulged the minutiae of her travels to anyone — let alone an American spy. How, then, was the CIA able to monitor her travels?
    In Toronto, many served as the agency’s eyes and ears.
    “This was a period of time when the United States did not know nearly as much about the Soviet Union, whether it be its intentions or its capabilities,” said Richard Immerman, a Cold War historian at Temple University in Philadelphia. For the CIA, the goal was to “put different pieces (together) in the hope that one pattern would emerge.”
    Eyewitness accounts were deemed especially important by American intelligence officials.
    At the time, it was not uncommon for those venturing beyond the Iron Curtain to spy on behalf of the CIA, says Immerman. “Our aerial surveillance was limited (so) in many cases, those who did travel to the Soviet Union willingly co-operated with the CIA to provide information — whatever information,” he says. “These could be tourists. These could be businessmen. This was not a time when thousands of people from the West would travel to the Soviet Union.”
    http://www.foia.cia.gov/sites/default/files/document_conversions/1705143/AERODYNAMIC%20%20%20VOL.%2021_0111.pdf
    But for the CIA, Toronto was also rife with potential enemies. In a 1959 declassified file, an American spy describes how 18 Canadians, 11 of whom lived in Toronto, were suspected of working for the KGB. According to the CIA agent, the Canadians had secretly travelled to the Soviet Union and received special training, only to return years later as undercover KGB operatives.
    Other suspected KGB spies, such as Ivan Kolaska, had apparently immigrated to Toronto as part of a bold Soviet plan to infiltrate Ukrainian communities overseas. Kolaska, along with other alleged KGB operatives, one of whom lived a double life as a Toronto City Hall employee, regularly met with Soviet diplomats in Toronto, the files say.
    http://www.foia.cia.gov/sites/default/files/document_conversions/1705143/AERODYNAMIC%20%20%20VOL.%2033%20%20%28OPERATIONS%29_0048.pdf
    In one of those meetings with Soviet embassy staff, the files say, Kolaska revealed the identities of dozens of Ukrainian students who had held a secret meeting in Kyiv. They were later arrested by Soviet authorities, according to the files.
    In many of the declassified documents, the CIA’s informants are named. Bundza’s file contains no such information, leaving only one clue as to the identity of the mysterious spy: Bundza’s full name.
    There is no mention of a “Natalie Bundza” in the file. Her name is listed as “Natalka” instead.
    Only another Ukrainian, she says, would have known her as “Natalka.”
    “It must have been someone from the community here.”

    By: Laurent Bastien Corbeil Staff Reporter, Published on Thu Jul 02 2015

    Find this story at 2 July 2015

    © Copyright Toronto Star Newspapers Ltd. 1996-2015

    The Spy Among Us

    Jack Barsky held a job at some of the top corporations in the U.S. and lived a seemingly normal life — all while spying for the Soviet Union

    The following is a script from “The Spy Among Us” which aired on May 10, 2015. Steve Kroft is the correspondent. Draggan Mihailovich, producer.

    Tonight, we’re going to tell you a story you’ve probably never heard before because only a few people outside the FBI know anything about it. It’s a spy story unlike any other and if you think your life is complicated, wait till you hear about Jack Barsky’s, who led three of them simultaneously. One as a husband and father, two as a computer programmer and administrator at some top American corporations and three as a KGB agent spying on America during the last decade of the Cold War.

    The FBI did finally apprehend him in Pennsylvania but it was long after the Soviet Union had crumbled. What makes Jack Barsky’s story even more remarkable is he’s never spent a night in jail, the Russians declared him dead a long time ago, he’s living a quiet life in upstate New York and has worked in important and sensitive jobs. He’s now free to tell his story…as honestly as a former spy ever can.

    Jack Barsky CBS NEWS
    Steve Kroft: So who are you?
    Jack Barsky: Who am I? That depends when the question is asked. Right now, I’m Jack Barsky. I work in the United States. I’m a U.S. citizen. But it wasn’t always the case.

    Steve Kroft: How many different identities do you have?

    Jack Barsky: I have two main identities. A German one, and an American one.

    “Who am I? That depends when the question is asked. Right now, I’m Jack Barsky. I work in the United States. I’m a U.S. citizen. But it wasn’t always the case.”
    Steve Kroft: What’s your real name?

    Jack Barsky: My real name is Jack Barsky.

    Steve Kroft: And what name were you born with?

    Jack Barsky: Albrecht Dittrich. Say that three times real fast.

    Steve Kroft: Just say it once slowly…(laughs)

    Jack Barsky: Albrecht Dittrich.

    How Albrecht Dittrich became Jack Barsky is one of the untold stories of the Cold War, an era when the real battles were often fought between the CIA and the KGB. Barsky was a rarity, a Soviet spy who posed as an American and became enmeshed in American society. For the 10 years he was operational for the KGB, no one in this country knew his real story, not even his family.

    Steve Kroft: Did you think you were going to get away with this?

    Jack Barsky: Yeah, otherwise I wouldn’t have done it (laughs).

    youngbarsky.jpg
    Young Jack Barsky
    What Barsky did can be traced back to East Germany, back to the days when he was Albrecht Dittrich. A national scholar at a renowned university in Jena, Dittrich was on the fast track to becoming a chemistry professor, his dream job.
    Jack Barsky: Didn’t work out that way, because I was recruited by the KGB to do something a little more adventurous.

    Steve Kroft: Spy?

    Jack Barsky: We called it something different. We used a euphemism. I was going to be a “scout for peace.”

    Steve Kroft: A KGB “scout for peace”?

    Jack Barsky: That is correct. The communist spies were the good guys. And the capitalist spies were the evil ones. So we didn’t use the word spy.

    He says his spying career began with a knock on his dorm room door one Saturday afternoon in 1970. A man introduced himself, claiming to be from a prominent optics company.

    Jack Barsky: He wanted to talk with me about my career, which was highly unusual. I immediately, there was a flash in my head that said, “That’s Stasi.”

    Steve Kroft: East German secret police?

    Jack Barsky: East German secret police, yeah.

    60 MINUTES: SEGMENT EXTRAS
    HOW DOES A COVERT SPY GET AROUND?
    It was a Stasi agent. He invited Dittrich to this restaurant in Jena where a Russian KGB agent showed up and took over the conversation. The KGB liked Dittrich’s potential because he was smart, his father was a member of the Communist party and he didn’t have any relatives in the West. Dittrich liked the attention and the notion he might get to help the Soviets.

    Steve Kroft: And what did you think of America?

    Jack Barsky: It was the enemy. And, the reason that the Americans did so well was because they exploited all the third-world countries. That’s what we were taught, and that’s what we believed. We didn’t know any better. I grew up in an area where you could not receive West German television. It was called the “Valley of the Clueless.”

    For the next couple of years, the KGB put Dittrich through elaborate tests and then in 1973 he was summoned to East Berlin, to this former Soviet military compound. The KGB, he says, wanted him to go undercover.

    Jack Barsky: At that point, I had passed all the tests, so they wanted, they made me an offer.

    Steve Kroft: But you had been thinking about it all along, hadn’t you?

    Jack Barsky: That’s true. With one counterweight in that you didn’t really know what was going to come. Is– how do you test drive becoming another person?

    It was a difficult decision, but he agreed to join the KGB and eventually found himself in Moscow, undergoing intensive training.

    Jack Barsky: A very large part of the training was operational work. Determination as to whether you’re being under surveillance. Morse code, short wave radio reception. I also learned how to do microdots. A microdot is, you know, you take a picture and make it so small with the use of microscope that you can put it under a postage stamp.

    60 MINUTES: SEGMENT EXTRAS
    JACK BARSKY SHARES SOME HOW-TOS OF SPYING
    The Soviets were looking to send someone to the U.S. who could pose as an American. Dittrich showed a command of English and no trace of an East German accent that might give him away. He learned a hundred new English words every day.

    Jack Barsky: It took me forever. I did probably a full year of phonetics training. The difference between “hot” and “hut.” Right? That, that’s very difficult and, and most Germans don’t get that one.

    Steve Kroft: Did you want to go to the United States?

    Jack Barsky: Oh yeah. Sure. There was New York, there was San Francisco, you know, we heard about these places.

    Steve Kroft: Your horizons were expanding…

    Jack Barsky: Oh, absolutely. Now I’m really in the big league, right?

    Dittrich needed an American identity. And one day a diplomat out of the Soviet embassy in Washington came across this tombstone just outside of D.C. with the name of a 10-year-old boy who had died in 1955. The name was Jack Philip Barsky.

    60 MINUTES: SEGMENT EXTRAS
    THE ORIGINAL JACK PHILIP BARSKY
    Jack Barsky: And they said, “Guess what? We have a birth certificate. We’re going to the U.S.”

    Steve Kroft: And that was the Jack Barsky birth certificate.

    Jack Barsky: The Jack Barsky birth certificate that somebody had obtained and I was given. I didn’t have to get this myself.

    Steve Kroft: Did you feel strange walking around with this identity of a child?

    Jack Barsky: No. No. When you do this kind of work, some things you don’t think about. Because if you explore, you may find something you don’t like.

    The newly minted Jack Barsky landed in New York City in the fall of 1978, with a phony back story called a legend and a fake Canadian passport that he quickly discarded. The KGB’s plan for him was fairly straightforward. They wanted the 29-year-old East German to get a real U.S. passport with his new name, then become a businessman, then insert himself into the upper echelons of American society and then to get close to National Security Adviser Zbigniew Brzezinski so that he could spy on him.

    Jack Barsky: That was the plan. It failed.

    Steve Kroft: Why?

    Jack Barsky: Because I was not given very good instructions with regard to how to apply for a passport.

    When he went to apply for a passport at Rockefeller Center, Barsky was thrown off by the list of questions.

    Jack Barsky: Specific details about my past, for which I had no proof. So I walked out of it.

    Steve Kroft: Did the KGB have a pretty good grasp on the United States and how things worked there?

    Jack Barsky: No.

    Steve Kroft: No?

    Jack Barsky: Absolutely not. They made a number of mistakes in terms of giving me advice, what to do, what not to do. They just didn’t know.

    Left to fend for himself in a country the KGB didn’t understand, he got himself a cheap apartment and tried to make do with a birth certificate and $6,000 dollars in cash the Soviets had given him. His spying career at that point more resembled the bumbling Boris Badenov than James Bond…

    Steve Kroft: So you were working as a bike messenger?

    Jack Barsky: Right.

    Steve Kroft: That doesn’t sound like a promising position for a spy.

    Jack Barsky: No. But there were a lot of things that I didn’t know…

    Steve Kroft: So how close did you ever get to Brzezinski?

    Jack Barsky: Not very.

    To get a Social Security card, which he would need if he wanted a real job, Barsky knew he would have to do some acting.

    Jack Barsky: It was unusual for a 30-plus-year-old person to, to say, “You know, I don’t have a Social Security card. Give me one.” So in order to make my story stick I made my face dirty. So I looked like somebody who just came off a farm. It worked! The lady asked me, she said, “So how come you don’t, you don’t have a card?” And when the answer was, “I didn’t need one.” “Why?” “Well, I worked on a farm.” And that was the end of the interview.

    The Social Security card enabled him to enroll at Baruch College in Manhattan, where he majored in computer systems. He was class valedictorian but you won’t find a picture of him in the school yearbook. In 1984, he was hired as a programmer by Metropolitan Life Insurance where he had access to the personal information of millions of Americans.

    Steve Kroft: You were writing computer code?

    Jack Barsky: Right. Yes. Lots of it. And I was really good at it.

    What he didn’t write, he stole, on behalf of the KGB.

    Steve Kroft: What was the most valuable piece of information you gave them?

    Jack Barsky: I would say that was the computer code because it was a very prominent piece of industrial software still in use today.

    Steve Kroft: This was IBM code?

    Jack Barsky: No comment.

    Steve Kroft: You don’t want to say?

    Jack Barsky: No. It was good stuff. Let’s put it this way, yeah.

    Steve Kroft: It was helpful to the Soviet Union…

    Jack Barsky: It would’ve been helpful to the Soviet Union and their running organizations and, and factories and so forth.

    Steve Kroft: How often did you communicate with the Russians?

    Jack Barsky: I would get a radiogram once a week.

    Steve Kroft: A radiogram, meaning?

    Jack Barsky: A radiogram means a transmission that was on a certain frequency at a certain time.

    Every Thursday night at 9:15 Barsky would tune into his shortwave radio at his apartment in Queens and listen for a transmission he believed came from Cuba.

    Jack Barsky: All the messages were encrypted that they became digits. And the digits would be sent over as, in groups of five. And sometimes that took a good hour to just write it all down, and then another three hours to decipher.

    During the 10 years he worked for the KGB, Barsky had a ready-made cover story.

    Steve Kroft: When somebody’d ask you, you know, “Where you from Jack?,” what’d you say?

    Jack Barsky: I’m originally from New Jersey. I was born in Orange. That’s it. American. Nobody ever questioned that. People would question my, “You have an accent.” But my comeback was, “Yeah, my mother was German and we spoke a lot of German at home.”

    Steve Kroft: You had to tell a lot of lies.

    Jack Barsky: Absolutely. I was living a lie.

    Steve Kroft: Were you a good liar?

    Jack Barsky: The best.

    You had to be a good liar to juggle the multiple lives he was leading. Every two years while he was undercover for the KGB, Barsky would return to East Germany and Moscow for debriefings. During one of his visits to East Berlin he married his old girlfriend Gerlinde and they had a son.

    Steve Kroft: Did that complicate matters?

    Jack Barsky: Initially it wasn’t complicated at all, it got complicated later.

    Steve Kroft: Because?

    Jack Barsky: Because I got married in the United States to somebody else.

    Steve Kroft: Did she know about your other wife in Germany?

    Jack Barsky: No.

    Steve Kroft: Did your wife in Germany know about the…

    Jack Barsky: Not at all.

    Steve Kroft: So you had two wives?

    Jack Barsky: I did. I’m, I was officially a bigamist. That’s, that’s the one thing I am so totally not proud of.

    Steve Kroft: Being a spy was all right. Being a bigamist…

    Jack Barsky: In hindsight, you know, I was a spy for the wrong people. But I, this one hurt because I had promised my German wife, that you know, we would be together forever. And I broke that promise. And the one way I can explain it to myself is I had separated the German, the Dittrich from the Barsky to the point where the two just didn’t know about each other.

    Not only did he have two different identities, and two wives, he had a son named Matthias in Germany and a daughter named Chelsea in America. And by November 1988, a radiogram from the KGB would force him to make an excruciating choice.

    Jack Barsky: I received a radiogram that essentially said, “You need to come home. Your cover may soon be broken and you’re in danger of being arrested by the American authorities.”

    Barsky was given urgent instructions from the KGB to locate an oil can that had been dropped next to a fallen tree just off this path on New York’s Staten Island. A fake passport and cash that he needed to escape the United States and return to East Germany would be concealed inside the can.

    Jack Barsky: I was supposed to pick up the container and go on, leave. Not even go back home to the apartment, just disappear. The container wasn’t there. I don’t know what I would have done if I had found it, but I know what I did when I didn’t find it. I did not tell them, “repeat the operation.” I made the decision to stay.

    Steve Kroft: Why?

    Jack Barsky: Because of Chelsea.

    Steve Kroft: Your daughter.

    Jack Barsky: Yes. If Chelsea’s not in the mix, that’s a no brainer, I’m outta here.

    Barsky had chosen Chelsea over Matthias.

    Jack Barsky: I had bonded with her. It was a tough one because on the one hand I had a wife and child in Germany but if I don’t take care of Chelsea, she grows up in poverty.

    Steve Kroft: This may be a little harsh but it sounds like the first time in your life that you thought about somebody besides yourself.

    Jack Barsky: You’re absolutely right. I was quite an egomaniac. I was.

    Jack Barsky was still left with the not insignificant matter of telling the KGB that he was staying in America. In a moment, we’ll tell you how he duped the KGB and how the FBI changed his life.

    PART TWO
    At the end of 1988, Jack Barsky’s 10-year run as a clandestine KGB agent in the United States was about to come to an end. He had ignored Soviet warnings that his cover had been blown and decided to remain in America and not return to his native East Germany. He was taking a chance that no one in America would ever find out who he really was. And he was taking a bigger chance that the KGB wouldn’t retaliate for disobeying an order. The urgency with which the Soviets seemed to view the situation became clear one morning in Queens.

    Jack Barsky says he was on his way to work in December 1988, standing and waiting for an “A” train on this subway platform when a stranger paid him a visit.

    Jack Barsky: There’s this character in, in a black coat and he sidles up to me and he whispers in my ear, he says, “You gotta come home or else you’re dead.” And then he walked out.

    Steve Kroft: Russian accent?

    Jack Barsky: Yes.

    Steve Kroft: That’s an incentive.

    Jack Barsky: It’s an incentive to go.

    Steve Kroft: I mean spies get killed all the time.

    Jack Barsky: They do. But not me. The entire time I always had this childlike belief that everything would be all right.

    “There’s this character in, in a black coat and he sidles up to me and he whispers in my ear, he says, ‘You gotta come home or else you’re dead.’ And then he walked out.”
    Steve Kroft: So what are you going to tell the Russians?

    Jack Barsky: Well, I (sighs) I sent them, this “Dear John” letter, the goodbye letter in which I stated that I had contracted AIDS and that the only way for me to get a treatment would be in the United States.

    Steve Kroft: You just wrote them a letter and said, ‘I can’t come back. I’ve got AIDS”?

    Jack Barsky: There’s three things I tell people that the Russians were afraid of. AIDS, Jewish people and Ronald Reagan. And they were deathly…

    Steve Kroft: In that order?

    Jack Barsky: I think Ronald Reagan took the top spot. They thought he would push the button.

    The AIDS letter apparently worked because in East Berlin the Soviets told his German wife Gerlinde he wasn’t coming back.

    Jack Barsky: They went to Gerlinde and told her that I had died of AIDS. So I think they just wrote me off completely.

    Steve Kroft: You were officially dead in East Germany?

    Jack Barsky: Right. After five years she was able to declare me dead.

    Once the Berlin Wall fell and the Soviet Union fell apart, Barsky was a man without a country. No one would want him back. He felt his secret was safe in America. He became a family guy, with a wife, two kids, Chelsea and Jessie, and a job. He burrowed himself into suburbia, keeping a low profile.

    Jack Barsky: I was settling down, I was living in the, in rural Pennsylvania at the time, in a nice house, with two children. I was, like, typical middle class existence.

    And his life would have stayed quiet if a KGB archivist named Vasili Mitrokhin hadn’t defected to the West in 1992 with a trove of notes on the Soviets’ spying operations around the world. Buried deep in his papers was the last name of a secret agent the KGB had deployed somewhere in America: Barsky.

    Joe Reilly: We were concerned that he might be running an agent operating in the federal government somewhere. Who knows? In the FBI, the CIA, the State Department. We had no idea.

    Joe Reilly was an FBI agent when the bureau got the Mitrokhin tip, and the Barsky case quickly became serious enough that FBI director Louis Freeh got personally involved. The FBI didn’t know who or where he was, but the best lead seemed to be a Jack Barsky who was working as an I.T. specialist in New Jersey, with a suburban home across the border in Mount Bethel, Pennsylvania.

    Steve Kroft: Aside from his name was there anything else that made you suspicious and make you think that this was the guy you were looking for?

    Joe Reilly: Yes. One thing was the fact that he had applied for a Social Security number late in life. Especially someone like him who was educated and intelligent.

    The FBI began following Barsky, and when this surveillance photo caught him talking to a native of Cuba, the bureau grew increasingly concerned.

    Joe Barsky: There were some indications that I could possibly be the head of a international spy ring, because I had a friend who was originally from Cuba. And it so happened that this friend owned an apartment that was rented to a Soviet diplomat. So that one and raised all kinds of flags and they investigated me very, very, very carefully.

    FBI agent Joe Reilly went so far as to set up an observation post on a hillside behind Barsky’s house. This is a picture he took of his view.

    Joe Reilly: I got a telescope and binoculars, as if I was a birdwatcher. But I was looking at his backyard and at him. Over time, I learned a great deal about him.

    Steve Kroft: Like what?

    Joe Reilly: …just watching him. Well, I became convinced that he loved his children. And that was important because I wanted to know if he would flee. There was less chance of that if, if he was devoted to his children. And he was.

    But that wasn’t enough for the FBI. The bureau bought the house next door to get a closer look at the Barskys.

    Steve Kroft: Did you get a good deal?

    Joe Reilly: I think we paid what he was asking. And we had agents living there so that we could be sure who was coming and going from his house without being too obvious in our surveillance.

    Steve Kroft: You had no idea the FBI was living next door to you?

    Jack Barsky: No.

    Steve Kroft: Never saw…

    Jack Barsky: No.

    Steve Kroft: …Joe Reilly up on the hill with the binoculars?

    Jack Barsky: Absolutely not.

    When the FBI finally got authorization from the Justice Department to bug Barsky’s home, the case broke wide open.

    Joe Reilly: Within, I’d say, the first two weeks that we had microphones in his house, he had an argument with his wife in the kitchen. And during the course of that dispute, he readily admitted that he was an agent, operating from the Soviet Union.

    It was all the FBI needed to move in on Barsky. They set a trap for him at a toll bridge across the Delaware River as he drove home from work late one Friday afternoon in May of 1997.

    Jack Barsky: I’m being waved to the side by a state trooper. And he said, “We’re doing a routine traffic check. Would you please get out of the car?” I get out of the car and somebody steps up from, from behind and shows me a badge. And he said, “FBI. We would like to talk to you.”

    Joe Reilly: His face just dropped. And we told him that he had to go with us.

    Jack Barsky: The first words out of my mouth were, “Am I under arrest?” And the answer was, “No.” Now that took a big weight off of me, so I figured there was a chance to get out of this in one piece. And the next question I asked, “So what took you so long?”

    The FBI had rented an entire wing of a motel off Interstate 80 in Pennsylvania for Barsky’s interrogation.

    Joe Reilly: But on the way to the motel, I remember turning to him. And I, I told him that this didn’t have to be the worst day of his life. And he immediately realized that he had an out.

    Jack Barsky: I said to them, “Listen, I know I have only one shot out of this and that means I need to come clean and be 100 percent honest and tell you everything I know.”

    The FBI questioned Barsky throughout the weekend and gave him a polygraph test that he passed. Convinced that his spying days were over, and that his friendship with the Cuban was just that, the FBI decided to keep the whole thing quiet and allowed Barsky to go back to work on Monday morning.

    Steve Kroft: Was he charged with something?

    Joe Reilly: No.

    Steve Kroft: Even though he confessed to being a Soviet spy?

    Joe Reilly: Yes.

    Steve Kroft: That seems odd.

    Joe Reilly: Well, we wanted him to cooperate with us. We didn’t want to put him in jail. He was no use to us there.

    Barsky continued to meet not only with the FBI but with the National Security Agency to offer his first-hand insights into the KGB and the Russians.

    Jack Barsky: I was able to provide them with a lot of valuable information how the KGB operated.

    The only people who were aware of his secret were the FBI and Penelope, his wife in America, who subsequently filed for divorce. His daughter Chelsea, then a teenager, knew only that he wanted to tell her something when she turned 18. That day finally arrived on a four-hour drive to St. Francis University.

    Chelsea: He started chuckling to himself and he said, “Well, I’m a, I was a spy. I was a KGB spy.” I was like “What? Really?”

    Jack also revealed to Chelsea why he had decided to stay in America.

    Chelsea: He said that, you know, he fell in love with me and my, my curls when I was a little baby. And then I cried.

    Steve Kroft: Did he tell you everything?

    Chelsea: No, he didn’t. He didn’t tell me 100 percent the whole truth. He left some things out at that point.

    Jack Barsky: I told her everything that you can tell in four hours that is age appropriate. She was still a teenager. I may not have told her that I was married in Germany.

    He waited another two years before he matter-of-factly dropped another bombshell about his past.

    Chelsea: He just looked straight ahead at the TV. And he said, “Did I tell you you have a brother?” And I turned my head. I’m like, “What? Are you serious?”

    The half brother was Matthias, the boy Jack had left behind in Germany. Chelsea was determined to find him. Jack didn’t like the idea.

    Jack Barsky: I did not feel comfortable getting in touch with him. I did not feel comfortable with my acknowledging my German past.

    After a year of trying to track him down online, Chelsea finally got a reply from Matthias…

    Chelsea: The subject line said, “Dear little sister.” And when I saw, “Dear little sister,” I just started weeping, because that meant everything to me. That meant that he accepted me.

    Matthias: And this is me…

    A month later, Matthias was in Pennsylvania visiting Chelsea and her brother Jessie. They hit it off. Matthias wasn’t interested in seeing his father, then changed his mind.

    barksys-american-kids-with-his-german-son.jpg
    Barsky’s children, from left: Jessie, Matthias and Chelsea
    Steve Kroft: Was it awkward?
    Jack Barsky: I just remember he stared at me for a couple of minutes. He just stared at me.

    Steve Kroft: I mean he had reason to be angry with you.

    Jack Barsky: When I told him the dilemma that I was faced with, he actually said, “I understand.”

    Steve Kroft: And what’s your relationship like with Matthias now?

    Jack Barsky: He feels like he’s my son.

    Gerlinde, the wife in Germany who thought he was dead, wants nothing to do with Jack today – or with 60 Minutes.

    He has remarried and has a four-year-old daughter. They live in upstate New York where Jack has worked as director of software development for a company that manages New York’s high voltage power grid, a critical piece of U.S. infrastructure. When he told his employer recently that he had once been a KGB spy, he was placed on a paid leave of absence. Before becoming an American citizen last year, he had been given a clean bill of health by the FBI and U.S. intelligence agencies. But in the world of espionage it’s often difficult to tell what’s true and what’s legend.

    Steve Kroft: Are you telling the truth right now?

    Jack Barsky: I am, absolutely. The truth as far as I know it. Yes.

    Steve Kroft: As far as you know it?

    Jack Barsky: Well, you know, sometimes memory fails you. But I am, I am absolutely not holding back anything.

    Steve Kroft: Why tell the story now?

    Jack Barsky: I want to meet my maker clean. I need to get clean with the past. I need to digest this fully.

    The FBI agent who apprehended him, Joe Reilly, still believes in Barsky. And in yet another twist to this story, the two are good friends and golfing buddies.

    Joe Reilly: He’s a very honest person. And if you want to find out how honest someone is, play golf with them.

    Steve Kroft: But you’re a former FBI guy and he’s a former spy. What’s the bond?

    Joe Reilly: It’s personal. He credits me for keeping him out of prison.

    After nearly 30 years, Jack Barsky went back to visit a unified Germany, first in October, then again last month.

    [Jack Barsky: So that was essentially the very beginning of my career…]

    He showed his kids where this improbable tale began and some other key settings in his odyssey. And he caught up with old classmates who knew him as Albrecht Dittrich.

    barsky-in-germany-with-his-american-kids.jpg
    Barsky in Germany with his American children CBS NEWS
    Steve Kroft: When you’re here in Germany…
    Jack Barsky: Yeah…

    Steve Kroft: …are you Albrecht or are you Jack?

    Jack Barsky: No, I’m Jack. I am 100 percent Jack. You know, the, I let the Albrecht out and sometimes he interferes, but they, they get along very well now (laughs)…

    The Berlin wall, which once divided east and west, is now gone except for a section that has been turned into an art display. Checkpoint Charlie, once the epicenter of the Cold War, is now a tourist attraction, full of kitsch. Statues of Karl Marx and Friedrich Engels still stand in the eastern part of Berlin, relics of another era as is the man who straddled two worlds and got away with it.

    2015 May 10 CORRESPONDENT Steve Kroft

    Find this story at 10 May 2015

    © 2015 CBS Interactive Inc. All Rights Reserved.

    Evidence of police complicity in blacklisting of trade unionists stretches back decades

    Police are alleged to have been covertly helping companies to blacklist trade unionists since before the Second World War

    The blacklisting of trade unionists by major firms over the years has been an inherently secretive practice. Even more secretive, it seems, has been the state’s covert collusion in such a practice.

    From time to time, the public get glimpses that reveal how the state has facilitated the blacklisting. These snapshots suggest that there has been regular collusion for many decades.

    The police and blacklisters have not welcomed public scrutiny of their relationship. However the trade unionists who were blacklisted are now pressing for the upcoming public inquiry into the failures of undercover policing – to be headed by Lord Justice Pitchford – to scrutinise the allegations (see here for more details).

    In all these years, there has never been an in-depth, independent, and public examination of these persistent allegations.

    Some of the evidence of this collusion is detailed below – the most recent dates from 2008. According to a leaked document, a secretive police unit that was involved in monitoring political activists met a blacklisting agency that was funded by large companies.

    The agency, operating under the bland name of the Consulting Association, unlawfully compiled confidential dossiers on thousands of workers who were considered by company directors to be politically active or potential trouble-makers. Many workers were denied employment for long periods.

    A note of the meeting at an Oxfordshire hotel on November 6 2008 records that the purpose of the police unit, which was then expanding, was “to liaise with industry”.

    Police ‘spied on activists for blacklisting agency’
    Read more
    More evidence dates from the 1990s. Peter Francis, a former undercover police officer who has now become a whistleblower, has disclosed that he believes that he personally collected some of the information that later appeared in the files of the Consulting Association. Francis infiltrated anti-racist groups between 1993 and 1997 as a member of the Metropolitan Police’s undercover unit, the Special Demonstration Squad.

    The blacklisting files recorded one bricklayer as being “under constant watch (officially) and seen as politically dangerous”.

    An official watchdog, the information commissioner, shut down the Consulting Association, after seizing many of its files in a raid. Dave Clancy, a former police officer who worked as an investigator for the watchdog, has testified that “there is information on the Consulting Association files that I believe could only be supplied by the police or the security services”. These details, he added, were specific and came from police records.

    An earlier incarnation of the blacklist was run by another clandestine agency, called the Economic League. This organisation had been set up shortly after the First World War, at a time of widespread industrial unrest, and, again, was financed by large corporations.

    The Economic League had began to compile secret dossiers on workers around the country.

    It seems that from early on, the Economic League received help from the police. Documents chronicle how Economic League officials worked closely with police in Lancashire in the 1930s.

    In 1937, they met detectives who were monitoring political “subversives”. The league’s Manchester organiser reported to his superiors that he had “Manchester police in here yesterday and found them extremely helpful and have now arranged to work in the closest co-operation with them. Among other things, they promised to give me as long as I like looking over their Communist industrial file in their office.”

    Blacklisted workers seek to prise open secrets of covert police surveillance
    Read more
    Days later, the league’s Manchester organiser wrote to the chief constable of the local force and thanked him for his help. At one point, the league asked police to carry out surveillance on a meeting of trade unionists as the blacklisters considered it “of considerable importance”.

    At another point, the league’s Manchester organiser told his boss that he was due to get a report of a Communist Party meeting from the police without having to send “one of our own men”.

    In that same year, Special Branch passed onto the Economic League a confidential list of Manchester communists.

    Fifty years on, and collaboration still seemed to exist. In the 1980s, an undercover television sting caught the candid thoughts of an Economic League official who said :”We give all our information to the police. In return, they’re not exactly unfriendly back.”

    Michael Noar, then the Economic League’s director-general, said in 1987 said that “of course, the police and Special Branch are interested in some of the things we are interested in. They follow the activities of these groups in much the same way as we do and therefore they do get in touch with us from time to time and talk to us and say ‘were you at this demonstration or that’.” He added that “in the course of discussions, there is an exchange of information just in the ordinary course of talking.”

    Phil Chamberlain, co-author of a book on blacklisting, being interviewed
    Police and Economic League officials have acknowledged they had meetings together, but say information about individuals was not passed to the league.

    One unnamed Special Branch officer recently told an internal police investigation into the undercover infiltration of political groups that the “flow of information was purely one way”. The Economic League was treated solely as a source of information, according to the officer, and it was Special Branch policy not to share any information with the league.

    Jack Winder, who worked for the Economic League from 1963 until its closure in the early 1990s, told a parliamentary inquiry two years ago that he had meetings with the Metropolitan Police’s Special Branch over a long time for what he called “general chit-chat”. He told MPs that the “exchange of detailed information” about individuals was “absolutely forbidden”.

    Sources : Dave Smith and Phil Chamberlain, Blacklisted :the secret war between big business and union activists (New Internationalist, 2015); Mark Hollingsworth and Richard Norton-Taylor, Blacklist – the inside story of political vetting (Hogarth Press, 1988). For a detailed and documented history of the Economic League, see the work of researcher Mike Hughes here.

    Rob Evans
    @robevansgdn
    Tuesday 16 June 2015 11.03 BST Last modified on Tuesday 16 June 2015 11.06 BST

    Find this story at 16 June 2015

    © 2015 Guardian News and Media Limited

    Blacklisted workers seek to prise open secrets of covert police surveillance

    Trade unionists blacklisted by major firms are pushing for the public inquiry into undercover policing to examine alleged collusion between covert police officers and company directors

    Blacklisted workers have intensified their campaign to uncover the extent of secret police surveillance operations against them.

    Covert police officers are alleged to have passed information they gathered on the trade unionists to multi-national firms who maintained a secret and unlawful blacklist.

    The blacklisted workers want the allegations examined by the public inquiry that has been established into the police’s use of undercover officers to infiltrate hundreds of political groups.

    That inquiry – to be headed by Lord Justice Pitchford – is drawing up its remit which is due to be announced by the end of July. This here and here gives some background on the inquiry that was set up by home secretary Theresa May.

    This week, the blacklisted workers said they have applied to be given a central role in the inquiry. In legal terms, they are seeking to be made a “core participant” in the inquiry.

    It is not yet known who will be the “core participants” in the Pitchford inquiry. The status is given to those who, for example, have a direct and significant interest in the issues that will be examined.

    On the blacklist: how did the UK’s top building firms get secret information on their workers?
    Read more
    It allows them to see evidence in advance of it being aired at the inquiry and to seek to cross-examine witnesses.

    The application by the Blacklist Support Group (BSG) has been made by Imran Khan, the lawyer who also represents Doreen Lawrence, the mother of murdered teenager Stephen. (For more details, see this).

    Dave Smith, the group’s spokesman, said: “Hopefully by the BSG applying for core participant status, we will be able to guarantee that spying on trade unions and passing over information to private companies becomes a theme within the Pitchford inquiry.”

    “Police and security services spying on trade unions is not a one-off aberration, it is standard operating procedure by the state.”

    An official watchdog closed down the blacklist in 2009 after discovering that major firms kept confidential files on workers deemed to be “trouble-makers”. Checks were run on trade unionists to deny them work if their names were on the list.

    The police’s role in giving information to the blacklist has yet to be fully brought into the public domain.

    Imran Khan, the lawyer working for the blacklisted workers. Facebook Twitter Pinterest
    Imran Khan, the lawyer working for the blacklisted workers. Photograph: Richard Saker/Richard Saker
    Read this, this, and this for accounts of how the police are alleged to have colluded with the blacklisters by gathering and sharing information on trade unionists.

    More than 580 blacklisted workers have launched legal action against 40 large construction firms in a case that is due to be heard in the High Court next year. They say the blacklisting files date from at least 1969.

    At a preliminary hearing this month, lawyers for the blacklisted workers told a court that the blacklisters had deliberately destroyed documents after they had been raided by the official watchdog, the information commissioner. (Read this for more details).

    Meanwhile, Smith, the co-author of a new book, Blacklisted : the Secret War between Big Business and Union Activists, is due to give a talk on the controversy on Tuesday June 2. This here gives details of the talk in London that is being organised by the Haldane Society of Socialist Lawyers and the Institute of Employment Rights.

    Rob Evans
    @robevansgdn
    Thursday 28 May 2015 11.51 BST Last modified on Thursday 28 May 2015 12.00 BST

    Find this story at 28 May 2015

    © 2015 Guardian News and Media Limited

    << oudere artikelen  nieuwere artikelen >>