Exclusive: Inside the Army Spy Ring & Attempted Entrapment of Peace Activists, Iraq Vets, Anarchists (2014)6 maart 2014
More details have come to light showing how the U.S. military infiltrated and spied on a community of antiwar activists in the state of Washington. Democracy Now! first broke this story in 2009 when it was revealed that an active member of Students for a Democratic Society and Port Militarization Resistance was actually an informant for the U.S. military. The man everyone knew as “John Jacob” was in fact John Towery, a member of the Force Protection Service at Fort Lewis. He also spied on the Industrial Workers of the World and Iraq Veterans Against the War. A newly made public email written by Towery reveals the Army informant was building a multi-agency spying apparatus. The email was sent from Towery using his military account to the FBI, as well as the police departments in Los Angeles, Portland, Eugene, Everett and Spokane. He wrote, “I thought it would be a good idea to develop a leftist/anarchist mini-group for intel sharing and distro.” Meanwhile, evidence has also emerged that the Army informant attempted to entrap at least one peace activist, Glenn Crespo, by attempting to persuade him to purchase guns and learn to shoot. We speak to Crespo and his attorney Larry Hildes, who represents all the activists in the case.
TRANSCRIPT
This is a rush transcript. Copy may not be in its final form.
AMY GOODMAN: More details have come to light showing the U.S. military infiltrated and spied on a community of antiwar activists in the state of Washington and beyond. Democracy Now! first broke the story in 2009 that an active member of Students for a Democratic Society and Port Militarization Resistance was actually an informant for the U.S. military. At the time, Port Militarization Resistance was staging nonviolent actions to stop military shipments bound for Iraq and Afghanistan. The man everyone knew as “John Jacob” was in fact John Towery, a member of the Force Protection Service at Fort Lewis. He also spied on the Industrial Workers of the World and Iraq Veterans Against the War. The antiwar activist Brendan Maslauskas Dunn helped expose John Towery’s true identity as a military spy. In 2009, Dunn spoke on Democracy Now!
BRENDAN MASLAUSKAS DUNN: After it was confirmed that he was in fact John Towery, I knew he wouldn’t call me, so I called him up the day after. This was this past Thursday. And I called him up; I said, “John, you know, what’s the deal? Is this true?” And he told me; he said, “Yes, it is true, but there’s a lot more to this story than what was publicized.” So he wanted to meet with me and another anarchist in person to further discuss what happened and what his role was.
So, when I met him, he admitted to several things. He admitted that, yes, he did in fact spy on us. He did in fact infiltrate us. He admitted that he did pass on information to an intelligence network, which, as you mentioned earlier, was composed of dozens of law enforcement agencies, ranging from municipal to county to state to regional, and several federal agencies, including Immigration Customs Enforcement, Joint Terrorism Task Force, FBI, Homeland Security, the Army in Fort Lewis.
So he admitted to other things, too. He admitted that the police had placed a camera, surveillance camera, across the street from a community center in Tacoma that anarchists ran called the Pitch Pipe Infoshop. He admitted that there were police that did put a camera up there to spy on anarchists, on activists going there.
AMY GOODMAN: That was Brendan Maslauskas Dunn speaking in 2009 on Democracy Now! He’s now a plaintiff in a lawsuit against John Towery, the military and other law enforcement agencies.
Since 2009, there have been numerous developments in the case. A newly made public email written by Towery reveals the Army informant was building a multi-agency spying apparatus. The email was sent by Towery using his military account. It was sent to the FBI as well as the police departments in Los Angeles, in Portland, Eugene, Everett and Spokane, Washington. He wrote, quote, “I thought it would be a good idea to develop a leftist/anarchist mini-group for intel sharing and distro.” Towery also cites “zines and pamphlets,” and a “comprehensive web list” as source material, but cautions the officials on file sharing becase, quote, “it might tip off groups that we are studying their techniques, tactics and procedures,” he wrote. The subject of the email was “Anarchist Information.”
Meanwhile, evidence has also emerged that the Army informant may have attempted to entrap at least one of the peace activists by attempting to persuade him to purchase guns and learn to shoot.
We’re joined now by two guests. Glenn Crespo is a community organizer in the Bay Area who used to live in Washington state, one of the plaintiffs in the lawsuit against the military and other agencies. He’s joining us from Berkeley. And with us in Seattle, Washington, longtime attorney Larry Hildes, who represents the activists in the case.
The Joint Base Lewis-McChord Public Affairs Office declined to join us on the program, saying, quote, “Because this case is still in litigation we are unable to provide comment.”
Let’s go first to Washington state, to Larry Hildes. Can you talk about the latest developments in this case, and what has just come out?
LARRY HILDES: Sure. Good morning, Amy. It’s interesting. What came out did not come out from this case. It came out from a Public Records Act request from a different client of ours who was arrested in an anti-police-brutality march and falsely charged with assaulting an officer, that the civil case is coming to trial in a couple weeks. He put in a Public Records Act request because he was active with PMR and was concerned that he had been targeted, and he was then subject to a number of citations and arrests.
And, yeah, the Army’s investigative reports claimed that, well, there may have been some rules broken, but Towery was doing this off the job in his off-hours, unpaid, for the sheriff—for the Pierce County Sheriff’s Office and the fusion center. Here he is at his desk, 10:00 in the morning, using his military ID, his military email address, and identifying himself by his military titles, writing the law enforcement agencies all over the country about forming this mini-group to target and research anarchists and leftists, and it’s coming out of what’s called the DT Conference that the State Patrol was hosting here in Washington, Domestic Terrorism Conference. They created a book for this conference based on information largely from Towery that included Brendan Dunn and one of our other plaintiffs, Jeff Berryhill, and two other activists with PMR, listed them as domestic terrorists and a violent threat because of their—basically, because they were targeted by Towery and because of their activism and their arrests for civil disobedience. So, he’s taking something he created, labeling these people as terrorists, going to a conference with this information, and saying, “We should disseminate this and work on this more broadly.”
It also puts the lie to Towery’s claim and his supervisor Tom Rudd’s claim that Towery was simply working to protect troop movements from—between Fort Lewis and the public ports of Stryker vehicles going to the occupations in Iraq and Afghanistan. They’re not shipping out of L.A. They’re not shipping out of Portland or Eugene. And they’re not—none of these are agencies that are directly involved in protecting military shipments from Fort Lewis. So it’s clear there’s a much larger agenda here.
And we’ve seen that in some other ways. There are extensive notes that we’ve received of Towery’s spying on a conference of the Evergreen State College in Olympia about tactics for the protests at the DNC in Denver in ’08, Republican—Democratic National Convention, and the Republican National Convention in St. Paul in ’08, and who was going to do what, the red, yellow and green zones, and specifically what was going to happen on the Monday of the convention. And it was the RNC Welcome Committee, which then got raided and became the RNC 8—claimed that they were planning acts of terrorism, which were in reality acts of nonviolent civil disobedience. So this goes way beyond Fort Lewis and PMR, and there’s a full—there seems to be a much larger agenda, as we’ve seen in other places, of nonviolent activism equals terrorism equals anarchism equals justification for whatever spying or law enforcement action we want to take.
AMY GOODMAN: I want to—
LARRY HILDES: And obviously this is not—sorry, go ahead, Amy.
AMY GOODMAN: I want to read from your lawsuit. You write, quote, “In addition to the Army, Coast Guard, and Olympia Police Department, the following agencies are known to have spied on, infiltrated, or otherwise monitored the activities of PMR and/or related or associated activists: Thurston County Sheriff’s Office, Grays Harbor Sheriff’s Office, Pierce County Sheriff’s Office, Tacoma Police Department, Lakewood Police Department, Ft. Lewis Police Department, 504th Military Police Division, Aberdeen Police Department, The Evergreen State College Police Department, the Lacey Police Department, the [Tumwater] Police Department, the Seattle Police Department, the King County Sheriff’s Office, Immigration and Customs Enforcement, the Federal Protective Service, other Divisions of the Department of Homeland Security, Naval Investigative Services, Air Force Intelligence (which has created a special PMR SDS taskforce at McGwire Air Force Base in New Jersey), The Federal Bureau of Investigation, and the Seattle Joint Terrorism Taskforce, as well as the previously discussed civilian employees of the City of Olympia. This list is likely incomplete,” you write. That is a very extensive list, Larry Hildes.
LARRY HILDES: It is. And it turns out it is incomplete. And those were all agencies that we had documents obtained from Public Records Act requests showing that they were directly involved. So now we’re finding out there’s more agencies. The Evergreen State College was giving regular reports to the State Patrol, to the Thurston County Sheriff’s Office and to Towery and Rudd about activities of SDS on campus at Evergreen. And there’s an extensive discussion about the conference about the DNC and RNC protests and that the chief of police is the source for the information. But, yeah, now we’ve got L.A. This gets bizarre. And we received 9,440 pages of sealed documents from the Army as a Christmas present on December 21st that—that I can’t even talk about, because they insisted that everything was privileged. It was supposed to be privileged as to private information and security information, but it’s everything, all kinds of emails. So, yeah, I mean, it starts out sounding very encompassing, and we’re finding out we were conservative about what agencies were involved.
AMY GOODMAN: I wanted to bring Glenn Crespo into this conversation, a Bay Area community organizer. You were the peace activist who John Towery, you say, attempted to persuade you to purchase guns, to learn to shoot. How did you meet him, and what happened when he tried to get you to do this?
GLENN CRESPO: Well, this kind of relationship spanned over a two-, maybe two-and-a-half-year period of time. I first met him at a weapons symposium demonstration in Tacoma, Washington, in downtown Tacoma. I didn’t introduce myself to him at that point, but I saw him there. He came out—he actually came out of the symposium, and this was a conference where Lockheed Martin and all these other weapons manufacturers and distributors were showing their wares. He came out of that, and it appeared to me as if other activists in Olympia had already become friends with them. He was very friendly with them, they were very friendly with him. That was the first time I saw him. That was in mid-2007. Not long after that, he organized a Tacoma PMR meeting, and I wasn’t really involved—
AMY GOODMAN: Port Militarization Resistance.
GLENN CRESPO: Yeah, exactly. And I wasn’t very involved in that, but I did get the mass email. So I figured, because I lived in Tacoma, I might as well go check it out. He was the first person there. I was the second person there. He introduced himself. I introduced myself. And he asked me about a poster that he had made regarding an upcoming demonstration, and he said he was going to bring it to the group and see if we could get consensus on whether or not it was OK if he put it up. And I told him that—I looked at the poster and said, you know, “This is pretty general.” There’s no particular reason I really think that he has to get consensus on whether or not he can put a poster up that’s kind of basically just time and place and description of the event. And that was the first time I met him.
He later on used that conversation as a way to boost our rapport between each other, when he said that he thought that that conversation was really profound to him, that he believed that it was interesting that I kind of wanted to—or suggested that he bypass some sort of consensus process regarding this poster, so that he can just do—you know, that he could do what he wants. You know, he could put the poster up if he wants to. That was very interesting. I realized that in retrospect, that that was a way that he tried to broaden or expand upon our friendship in the beginning.
AMY GOODMAN: And then, where did the guns come in?
GLENN CRESPO: Probably within the six to seven months after meeting him, so late—late 2007. He had started coming to events at the house I was living at in Tacoma. We were doing—we did a lending library. And we were doing a lot of organizing regarding the Tacoma Immigration and Customs detention center, so the ICE detention center. He would go to those meetings. He would come over for potlucks. So both public and private events, he kind of worked his way in as a friend.
He produced handgun to me in our kitchen, just between he and I. He carried it in his side pocket. He said he always carried a handgun on him. And he emptied it. He put the magazine out. He cleared the chamber, and he handed it to me. And he said he always carries one on him. And that, that was the first time he really talked about guns with me. And I was caught off guard, because at the time I was in my early twenties. I had never held a—I don’t even think I had seen a handgun, really, like that before. And that was kind of the beginning of him starting to talk more about guns. And he said—he had said that if we ever wanted to go shooting, being me and my friends, or myself in particular, that he would take us shooting, or, you know, he knows where all the gun shows are at, so we could go to gun shows if—you know, if we’re interested. And then, later on, these things did happen, when he prompted myself and others to go to the Puyallup Gun Show and purchase—purchase a rifle. And then, that went into going to shooting ranges that he was already a member of. He would drive us to all of these things, take us to these shooting ranges.
And this seemed fairly innocuous to me, in the beginning. I mean, Washington is a pretty gun-owner-friendly state. It didn’t—it didn’t really surprise me, because he wasn’t saying anything crazy or really implying anything crazy at that point. But about a year into that, there was a significant shift in his personality. Whereas in the beginning he was very optimistic and very—seemed very hopeful and kind of seemed lonely—I mean, he was, you know, in his early forties, early to mid-forties. He primarily surrounding himself with people who were in their early twenties. And he just came off as if he was kind of a sweet, harmless guy and was kind of lonely and wanted to hang out with people that he felt like he had something in common with, as far as his ideas went. But like I said, into a year into that relationship, he started to become a little bit more sinister and dark in his demeanor, in his—the things he would talk about.
And this continued to go into him giving myself and another friend a set of documents that were military strategy documents, and he said that he—he suggested that “we,” whatever that meant, use those documents in “our actions.” And these were documents on how to properly execute military operations. And then, following that, he showed people at my house, including myself, how to clear a building with a firearm. And these things were prompted by him. He would basically say, “Hey, do you—you know, check this out. Look, I could explain this stuff.” And he would just go into it, on how to, for example, in this case, clear a building with a firearm. So he had a mock—you know, he would hold a rifle up, or a make-believe rifle, and clear—stalk around the lower levels of our house and up the stairwell, all the way up the second stairwell into the attic, and the whole time talking about how he would—you know, how he was clearing corners and checking angles and all this stuff that nobody particularly had any interest in.
And around the same time, he had, you know, conversations with me about how he believed that anarchists were very similar to fascists, in a—almost in a positive light, where he was saying that they both don’t care about the law and don’t use the law to get what they need or what they want, and that he believed that the only way anarchism or anarchy would ever work, in his words, would be if five billion people died. So this is kind of in his—in the midst of his weird, sinister behavior that started to happen, that I thought that he was depressed. I thought that he was basically going through some sort of like maybe existential crisis, or maybe he was fed up with things. I wasn’t really sure. He always talked about him having issues at the house—at his home. He had implied that his wife was concerned that he was cheating on her, and that’s why we could never go to his house, because his wife didn’t like us, his other friends, or whatever.
He submitted an article in the same—like the last—you know, that last half of the time that I knew him as a friend. He submitted an article to a magazine that I was editor of in early 2009, that was written from the perspective of 9/11 hijackers. And I remember this very specifically, because he gave me a copy, a physical copy, when we were on our way to go get coffee. And I remember reading it, and probably about a quarter of the way through realizing I didn’t even feel comfortable touching it, like touching the physical document with my hands. It was the weirdest thing in the world, because it was kind of—it was basically implying—or seeming sympathetic with the 9/11 hijackers. And he wanted me to publish this in his—in the next issue of the magazine I was editor of. So I just—I actually—because he was being so forceful, I just didn’t do the magazine again. That first issue was the last issue. And once he submitted that paper, I didn’t publish it ever again.
AMY GOODMAN: Let me ask your lawyer, Larry Hildes, is this entrapment, I mean, when you’re talking about this whole progression that Glenn Crespo went through with the man he thought was named John Jacob, who in fact is John Towery, working at Fort Lewis? He’s military personnel.
LARRY HILDES: I think, absolutely, it was an attempted entrapment. He went step by step. He misjudged our folks. He thought our—he correctly saw that our folks were angry and upset about what was going on, but misjudged them. It feels like we could have ended up with a Cleveland Five or an 803 situation very easily, if he had had his way. Fortunately, our folks’ reaction was: “This is really weird and creepy. Get away from me.” And it speaks to how little he understood the nature of the antiwar movement and how little he understood people’s actual commitment to nonviolent action, to not seeing the troops themselves as the enemies—
AMY GOODMAN: Larry—
LARRY HILDES: —but seeing the war—yeah, I’m—yeah, go ahead.
AMY GOODMAN: Larry Hildes, we don’t have much time, but I just want to ask about Posse Comitatus and the laws that separate the military—I mean, they’re not supposed to be marching through the streets of the United States.
LARRY HILDES: Yeah, right.
AMY GOODMAN: What about this issue of investigating? And how far and extensive is this infiltration campaign, where you put in people, they change their names, and they try to entrap or they change the nature of what these actions are?
LARRY HILDES: I think they crossed the line. They claim they’re allowed to do some level of investigative work to protect military activities, military shipments. But entrapping people—attempting to entrap people into conspiracies where they can get charged with major felonies they had no intention of committing, dealing with law enforcement agencies around the country to keep tabs on activists, following them to protests in Denver and St. Paul that have absolutely nothing to do with military shipments, they crossed the line into law enforcement, into civilian law enforcement.
And they did so quite knowingly and deliberately, and created this cover story that Towery was working for the fusion center, reporting to the sheriff’s office, not doing this during his work time, because they were well aware—in fact, he got paid overtime for attending the RNC, DNC conference at Evergreen, by the Army. So the Army was expressly paying him to monitor, disrupt and destroy these folks’ activism and their lives. I mean, we had—at one point, Brendan Dunn had four cases at the same time in four counties, because they kept stopping him. Seven times he got arrested or cited; Jeff Berryhill several times; Glenn Crespo. People would get busted over and over and over. Towery was attending their personal parties, their birthday parties, their going-away parties, and taking these vicious notes and passing them on about how to undermine these folks, how to undermine their activities, how to destroy their lives. This is way into Posse Comitatus. This is way beyond any legitimate military role.
And it’s exactly why Posse Comitatus exists. The job of the military, as they see it, is to seek out the enemy and destroy them, neutralize them. When the enemy is nonviolent dissenters and the First Amendment becomes the enemy, as Chris Pyle, our expert, who was the investigator for the Church Committee, put it—the First Amendment, the Fourth Amendment are an inconvenience to the Army; they ignore them; they’re not sworn to uphold them in the same way—it becomes a very dangerous situation. And yes, they are way over into illegal conduct. They’re into entrapment operations. They’re into trying to silence dissent against them, and apparently much larger. This case just keeps getting bigger as we go. And we’re set for trial, I should say, on June 2nd—
AMY GOODMAN: And we will continue to cover this.
LARRY HILDES: —at this point.
AMY GOODMAN: I want to thank you both for being with us. Larry Hildes, lead attorney representing the antiwar activists spied on by the military, civil rights attorney with the National Lawyers Guild, speaking to us from Seattle, Washington. And Glenn, thank you so much for being with us. Glenn Crespo is a plaintiff in the lawsuit, a community organizer in the Bay Area of California.
This is Democracy Now!, democracynow.org, The War and Peace Report. When we come back, spies in the movement. We’re going to go back some time to the civil rights movement. Stay with us.
TUESDAY, FEBRUARY 25, 2014
Find this story at 25 February 2014
Creative Commons License The original content of this program is licensed under a Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 United States License. Please attribute legal copies of this work to democracynow.org. Some of the work(s) that this program incorporates, however, may be separately licensed. For further information or additional permissions, contact us.
Christopher Pyle, Whistleblower Who Sparked Church Hearings of 1970s, on Military Spying of Olympia Peace Activists (2009)6 maart 2014
The news of peace activists in Olympia, Washington exposing Army spying, infiltration and intelligence gathering on their groups may strengthen congressional demands for a full-scale investigation of US intelligence activities like those of the 1970s. We speak with law professor and former Army whistleblower Christopher Pyle, whose 1970 disclosure of the military’s widespread surveillance of civilian groups triggered scores of congressional probes, including the Church Committee hearings, where he served as an investigator. [includes rush transcript]
TRANSCRIPT
This is a rush transcript. Copy may not be in its final form.
AMY GOODMAN: We turn to a follow-up on our exclusive broadcast yesterday. We spent the hour looking at a story out of Olympia, Washington, where antiwar activists exposed Army spying and infiltration of their groups, as well as intelligence gathering by the Air Force, the federal Capitol Police and the Coast Guard. Declassified documents obtained by the activists revealed that an active member of Students for a Democratic Society and Port Militarization Resistance in Washington state was actually an informant for the US military. The man everyone knew as “John Jacob” was in fact John Towery, a member of the Force Protection Service at Fort Lewis.
The infiltration appears to be in direct violation of the Posse Comitatus Act preventing US military deployment for domestic law enforcement and may strengthen congressional demands for a full-scale investigation of US intelligence activities, like the Church Committee hearings of the ’70s.
Well, Christopher Pyle was a captain in Army intelligence in 1970, when he first disclosed the military’s widespread surveillance of civilian groups. The disclosure triggered fifty congressional inquiries within a month. Pyle went on to work for Senator Sam Ervin’s Subcommittee on Constitutional Rights and Senator Frank Church’s Select Committee on Intelligence, that led to the founding of the Foreign Intelligence Surveillance Act.
Christopher Pyle joins us now from Chicopee, Massachusetts. He teaches constitutional law and civil liberties at Mount Holyoke College, and he’s the author of four books. His most recent is called Getting Away with Torture.
We welcome you to Democracy Now!
CHRISTOPHER PYLE: Good morning, Amy.
AMY GOODMAN: I wanted you to first start off by talking about the significance of these revelations yesterday, with the young activists on Democracy Now! having simply applied under Freedom of Information Act [ed: public records request] for any information on anarchists or on their organizations in Olympia, Washington, and finding this one email inside that referred to this man named John Towery. They started doing some digging, and they realized it was their friend. Well, they knew him as “John Jacob.” He came out of Fort Lewis base. Christopher Pyle, the significance of this?
CHRISTOPHER PYLE: I think the significance is less that the Army is monitoring civilian political activity than that there is a network, a nationwide network, of fusion centers, these state police intelligence units, these municipal police intelligence units, that bring together the services of the military, of police, and even private corporations to share information about alleged terrorist groups in cities throughout the country. I was fascinated by the story of the Air Force officer from New Jersey making an inquiry to the police in the state of Washington about this group. This is an enormous network. It’s funded by the Homeland Security Department. Police departments get a great deal of money to set up these intelligence units. And they monitor, largely, lawful political activity, in violation of the First Amendment and, when the military is involved, in violation of the Posse Comitatus Act.
AMY GOODMAN: I wanted to play just two clips from yesterday. This is one of the activists in Olympia who exposed that his friend John Jacob was actually John Towery, a military informant and a member of the Force Protection Service at Fort Lewis. I asked Brendan Maslauskas Dunn, the Olympia activist with Students for a Democratic Society and Port Militarization Resistance, what his first reaction was when he found out.
BRENDAN MASLAUSKAS DUNN: John Jacob was actually a close friend of mine, so this week has been pretty difficult for me. He was — he said he was an anarchist. I met him over two years ago through community organizing and antiwar organizing I was involved with in Tacoma and Olympia with other anarchists and other activists.
And he was really interested in Students for a Democratic Society. He wanted to start a chapter of Movement for a Democratic Society, which is connected to SDS. He got involved with Port Militarization Resistance, with Iraq Vets Against the War. He was — you know, knew a lot of people involved with that organization.
But he was a friend of mine. We hung out. We gave workshops together on grassroots direct democracy and anarchist struggle. I mean, he was a friend. A lot of people really, really did like him. He was a kind person. He was a generous person. So it was really just a shock for me this week when all of this was determined.
AMY GOODMAN: Brendan Maslauskas Dunn went on to describe exactly what his so-called friend, John Towery, said when he confronted him with the evidence.
BRENDAN MASLAUSKAS DUNN: He admitted that, yes, he did in fact spy on us. He did in fact infiltrate us. He admitted that he did pass on information to an intelligence network, which, as you mentioned earlier, was composed of dozens of law enforcement agencies, ranging from municipal to county to state to regional, and several federal agencies, including Immigration Customs Enforcement, Joint Terrorism Task Force, FBI, Homeland Security, the Army in Fort Lewis.
So he admitted to other things, too. He admitted that the police had placed a camera, surveillance camera, across the street from a community center in Tacoma that anarchists ran called the Pitch Pipe Infoshop. He admitted that there were police that did put a camera up there to spy on anarchists, on activists going there.
He also — one other thing he spoke of — I don’t know if this is true. I mean, honestly, I don’t know what to believe from John, but he said that the police in Tacoma and Olympia had been planning for a while on raiding the anarchist Pitch Pipe Infoshop and also the house I lived in with several other activists in Olympia. And they had approached John several times, saying, you know, “Do they have bombs and explosives and drugs and guns and things like that?” which is just disgusting to even think that they would suggest that. They’re just trying to silence us politically. They’re going after us for our politics and for our work, you know, around Port Militarization Resistance and around antiwar organizing. And, of course, John told them, no, we didn’t have any of those stuff. He told them the truth.
But he also mentioned that there were other informants that are amongst us.
AMY GOODMAN: Brendan Maslauskas Dunn, the Olympia activist with Students for a Democratic Society and Port Militarization Resistance, the one who put in the Freedom of Information Act request [ed: public records request] and found out his friend, who he thought was named “John Jacob,” was John Towery out of Fort Lewis base in Washington state.
Christopher Pyle, you’re now a professor. You were in military intelligence, a captain. When you started to uncover the military, what, almost forty years ago, investigating civilian groups, give us the history.
CHRISTOPHER PYLE: Well, I was teaching law at the US Army Intelligence School, and I was asked to teach a class on CONUS intelligence and spot reports. CONUS is the acronym for continental United States. So I delivered a lecture about the need for the use of the military to put down riots, which did not require identifying any persons. You simply go in, clear the streets, declare a curfew, quiet things down, restore order.
And an officer came up to me after class and said, “Captain Pyle, you don’t know much about this, do you?” And I said, “No.” And he said, “Well, I can arrange a briefing.” And he did.
He took to me across the post to the headquarters of the US Army Intelligence Command’s CONUS Intelligence Section. There I discovered thirteen teletype machines reporting on every demonstration around the country of twenty people or more. The reports were coming from 1,500 Army plainclothes agents working out of 300 offices. They had it all covered.
They showed me a mug book of persons who could be rounded up in case of a civil disturbance. The military really believed that if you had a civil disturbance or a protest, it was very important to know the names of the people who might be protesting, because, you never know, they might be connected with a cadre of agitators and communists behind them.
Well, the same pattern is now developing under the Northern — the US Army’s Northern Command, which coordinates domestic intelligence work for the US Army and tries to prepare for what they call “military assistance to civil authorities.” It was out of this that the TALON reports came, but I also helped to disclose, reports on lawful, constitutionally protected antiwar activities. And so, history is repeating itself.
AMY GOODMAN: Who were some of the people in the mug shots, Christopher Pyle?
CHRISTOPHER PYLE: Well, the first one —-
AMY GOODMAN: Who did they say could be rounded up?
CHRISTOPHER PYLE: The first volume, under letter A, was Ralph David Abernathy, who was head of the Southern Christian Leadership Conference and a close associate of Dr. Martin Luther King. And there were many more of that type.
AMY GOODMAN: So, you’re saying -—
CHRISTOPHER PYLE: Perfectly law-abiding citizens.
AMY GOODMAN: So, you’re saying some protest happened somewhere, or a riot, and they can go to where Ralph David Abernathy is, in a wholly different place, and round him up.
CHRISTOPHER PYLE: Yes, today, particularly, with the power of computers and internet communications and monitoring the public airwaves, this network of seventy-two fusion centers, plus all of the subordinate groups that provide information and seek information, can follow you and me and just about anybody all around the country. They don’t have to put transponders in our cars. They could use E-ZPass on the highway. But in your case from the state of Washington, they apparently used a transponder in an antiwar protester’s automobile. This is the kind of surveillance society this country does not need.
AMY GOODMAN: Who else was listed at the time?
CHRISTOPHER PYLE: Say that again?
AMY GOODMAN: Who else was listed at the time, both individuals and organizations that you saw targeted?
CHRISTOPHER PYLE: Well, one of the printouts that the military gave me of their surveillance for a particular week in 1968 included the infiltration of a Unitarian Church. In more recent years, surveillance of Quaker groups, the infiltration of Quaker groups in Florida, who were planning to protest military recruitment in their local high school. These are the people who, according to the TALON reports, are considered to be potential threats to military security.
AMY GOODMAN: And explain what you mean by TALON.
CHRISTOPHER PYLE: TALON is a collection of intelligence reports of threats to military bases that were collected by an unknown group for many years after 9/11 called the Counterintelligence Field Activity. It had a thousand employees. It was located in the Pentagon. And it was monitoring civil disturbances around the country, following a pattern very much like the 1960s and ’70s.
The idea was that if you could follow enough protesters in the — protests in the country, or enough disturbances, you could tell when the country was going to overheat and the military would have to be called in. In the 1960s, they thought that if they could tell how many protests there were on college campuses, they could then predict riots in the black ghettos of the major cities of the United States. It was ludicrous intelligence work, but that’s what they had in mind.
AMY GOODMAN: So, you left there that day, saying you were going to write an article. You were going to expose this. You learned about huge databases, places like in — where? In Baltimore, Maryland.
CHRISTOPHER PYLE: Well, a big center was in Baltimore, Maryland, and — but there were six other computer databanks back then. Computers were still in their infancy. They were still being fed with computer punch cards. Nothing like we have today. They were bush league compared to what now exists in these fusion centers, that you’ve reported on, from the state of Washington.
AMY GOODMAN: And what happened as a result of this information? You’re a military intelligence captain. You’re appalled by what you see: the targeting of civilians. You write an article. What ensued?
CHRISTOPHER PYLE: Well, what was really interesting is I began to hear from my former students, who had been doing this work on active duty. And I eventually recruited 125 counterintelligence agents to tell what they knew about the domestic intelligence operations of the US Army. I shared this information with the press and with congressional committees. Senator Ervin, in the Subcommittee on Constitutional Rights, held hearings, which I organized and disclosed the existence of this system. The military was embarrassed by the system and eventually disbanded it and burned all the records. I checked on that by interviewing the guys who did the burning of the records.
AMY GOODMAN: There’s a discussion right now among the people who are involved — Congress member Barbara Lee; in New Jersey, Rush Holt, congressman; chair of the Judiciary Committee, Conyers — weighing a committee be set up to once again investigate, as the Church Committee did, intelligence in this country and its far-reaching effects. For example, the example we brought out yesterday of the military infiltrating peace groups, and this was just one individual that we looked at. Talk about what came from the Ervin and the Church Committee hearings.
CHRISTOPHER PYLE: Well, the Church Committee did the most extensive investigation of all the agencies. Ervin’s committee just did Army intelligence. But nobody had ever done anything to investigate intelligence agencies before Senator Ervin took it upon himself to do so. Once Ervin proved that there was extensive misconduct and abuse of authority, then others got interested. And the House created a committee under Otis Pike, and the Senate created a special committee under Frank Church. They had to create special committees, because there were no standing committees to oversee the intelligence agencies.
And as the result of the work of those two committees, we now have standing congressional committees whose job is supposed to be to oversee the work of the intelligence committees. So the proposal for yet another select committee to do the work of existing committees seems to me a political nonstarter, but maybe Barbara Lee knows something more about the politics of Capitol Hill than I do.
AMY GOODMAN: What do you think needs to be done right now?
CHRISTOPHER PYLE: I think that we need to prosecute the torturers. I think that’s the biggest single message that we could give to the intelligence community, that it is not above the law. That’s even more important than the domestic intelligence, and the domestic intelligence, to me, is extremely important. That’s the untold story that you’ve begun to tell, but there have been many other abuses of authority. And when you get into torture, kidnapping, secret illegal detention and assassination, it seems to me you’ve gone over the hill to the most serious abuses any intelligence community can possibly commit, and that’s the place to start. Don’t lose our focus on that.
And then, after that, we need to investigate ways of curbing domestic intelligence activity. And there’s an area of this which has not yet become publicly known, and that is the role of corporations working with the intelligence agencies, corporations which do data processing and data mining, which are totally exempt from any state or federal privacy laws. There’s no control on them at all. And when they’re part of this network, they can use Google and techniques like Google, sophisticated techniques, to gather a great deal of information on the personal lives of the young men you had on your program yesterday.
AMY GOODMAN: Christopher Pyle, this is just the beginning, and we’re going to have you back. Your new book, Getting Away with Torture
. Christopher Pyle was a military intelligence captain when he exposed the surveillance of civilian groups in this country, now a professor at Mount Holyoke College. Thank you for being with us.
Creative Commons License The original content of this program is licensed under a Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 United States License. Please attribute legal copies of this work to democracynow.org. Some of the work(s) that this program incorporates, however, may be separately licensed. For further information or additional permissions, contact us.
WEDNESDAY, JULY 29, 2009
Find this story at 29 July 2009
Democracy Now! Broadcast Exclusive: Declassified Docs Reveal Military Operative Spied on WA Peace Groups, Activist Friends Stunned (2009)6 maart 2014
Newly declassified documents reveal that an active member of Students for a Democratic Society and Port Militarization Resistance in Washington state was actually an informant for the US military. The man everyone knew as “John Jacob” was in fact John Towery, a member of the Force Protection Service at Fort Lewis. The military’s role in the spying raises questions about possibly illegal activity. The Posse Comitatus law bars the use of the armed forces for law enforcement inside the United States. The Fort Lewis military base denied our request for an interview. But in a statement to Democracy Now!, the base’s Public Affairs office publicly acknowledged for the first time that Towery is a military operative. “This could be one of the key revelations of this era,” said Eileen Clancy, who has closely tracked government spying on activist organizations. [includes rush transcript]
TRANSCRIPT
This is a rush transcript. Copy may not be in its final form.
ANJALI KAMAT: We begin with a Democracy Now! broadcast exclusive. Peace activists in Washington state have revealed an informant posing as an anarchist has spied on them while working under the US military. The activists are members of the group Students for a Democratic Society and Port Militarization Resistance, which protests military shipments bound for Iraq and Afghanistan.
Before his true identity was revealed, the informant was known as “John Jacob,” an active member of antiwar groups in the towns of Olympia and Tacoma. But using documents obtained under a Freedom of Information Act request [ed: public records request], the activists learned that “John Jacob” is in fact John Towery, a member of the Force Protection Service at the nearby Fort Lewis military base.
The activists claim Towery has admitted to them he shared information with an intelligence network that stretches from local and state police to several federal agencies, to the US military. They also say he confirmed the existence of other government spies but wouldn’t reveal their identity.
The military’s role in the spying raises questions about possibly illegal activity. The Posse Comitatus law bars the use of the armed forces for law enforcement inside the United States.
AMY GOODMAN: The Fort Lewis military base denied our request for an interview. But in a statement to Democracy Now!, the base’s Public Affairs office publicly acknowledged for the first time that Towery is a military operative. The statement says, quote, “John Towery performs sensitive work within the installation law enforcement community, and it would not be appropriate for him to discuss his duties with the media.” Fort Lewis also says it’s launched an internal inquiry. We invited John Towery on the broadcast, but he didn’t respond to our interview request.
In a Democracy Now! broadcast exclusive, we’re now joined in Seattle by the two activists who exposed John Towery as a military informant. Brendan Maslauskas Dunn counted John Towery, or “John Jacob,” as a close friend. But he discovered Towery’s identity after obtaining government documents under a Freedom of Information Act request [ed: public records request]. Brendan is an Olympia-based activist with Students for a Democratic Society and Port Militarization Resistance. We’re also joined in Seattle by Drew Hendricks. He is an Olympia activist with Port Militarization Resistance who worked closely with John Towery, aka “John Jacob.” This is their first broadcast interview since coming forward with their story.
Brendan, let’s begin with you. Just lay out how you found out about this military spy.
BRENDAN MASLAUSKAS DUNN: Well, thanks for having us, Amy.
I actually did a public records request through the city of Olympia several months ago on behalf of the union I’m in, the Industrial Workers of the World, and the records request I did, I had asked for any documents or emails, etc., that the city had, especially in discussions or any kind of communications between the Olympia police and the military in the city generally, anything on anarchists, anarchy, anarchism, Students for a Democratic Society or the Industrial Workers of the World. I got back hundreds of documents from the city.
One of the documents was an email that was sent between personnel in the military, and the email address that was attached to this email was of John J. Towery. We didn’t know who that was, but several people did a lot of research to find out who that was, and they identified that person as being John Jacob.
AMY GOODMAN: And what was your first reaction? Who was John Jacob to you?
BRENDAN MASLAUSKAS DUNN: John Jacob was actually a close friend of mine, so this week has been pretty difficult for me. He was — he said he was an anarchist. I met him over two years ago through community organizing and antiwar organizing I was involved with in Tacoma and Olympia with other anarchists and other activists.
And he was really interested in Students for a Democratic Society. He wanted to start a chapter of Movement for a Democratic Society, which is connected to SDS. He got involved with Port Militarization Resistance, with Iraq Vets Against the War. He was — you know, knew a lot of people involved with that organization.
But he was a friend of mine. We hung out. We gave workshops together on grassroots direct democracy and anarchist struggle. I mean, he was a friend. A lot of people really, really did like him. He was a kind person. He was a generous person. So it was really just a shock for me this week when all of this was determined.
ANJALI KAMAT: And, Brendan, what did John Towery, who you used to know as “John Jacob,” say to you when you confronted him?
BRENDAN MASLAUSKAS DUNN: Well, after it was confirmed that he was in fact John Towery, I knew he wouldn’t call me, so I called him up the day after. This was this past Thursday. And I called him up; I said, “John, you know, what’s the deal? Is this true?” And he told me; he said, “Yes, it is true, but there’s a lot more to this story than what was publicized.” So he wanted to meet with me and another anarchist in person to further discuss what happened and what his role was.
So, when I met him, he admitted to several things. He admitted that, yes, he did in fact spy on us. He did in fact infiltrate us. He admitted that he did pass on information to an intelligence network, which, as you mentioned earlier, was composed of dozens of law enforcement agencies, ranging from municipal to county to state to regional, and several federal agencies, including Immigration Customs Enforcement, Joint Terrorism Task Force, FBI, Homeland Security, the Army in Fort Lewis.
So he admitted to other things, too. He admitted that the police had placed a camera, surveillance camera, across the street from a community center in Tacoma that anarchists ran called the Pitch Pipe Infoshop. He admitted that there were police that did put a camera up there to spy on anarchists, on activists going there.
He also — one other thing he spoke of — I don’t know if this is true. I mean, honestly, I don’t know what to believe from John, but he said that the police in Tacoma and Olympia had been planning for a while on raiding the anarchist Pitch Pipe Infoshop and also the house I lived in with several other activists in Olympia. And they had approached John several times, saying, you know, “Do they have bombs and explosives and drugs and guns and things like that?” which is just disgusting to even think that they would suggest that. They’re just trying to silence us politically. They’re going after us for our politics and for our work, you know, around Port Militarization Resistance and around antiwar organizing. And, of course, John told them, no, we didn’t have any of those stuff. He told them the truth.
But he also mentioned that there were other informants that are amongst us.
AMY GOODMAN: Brendan, we’re going to break. Then we’re going to come back to this discussion. I really want to talk to Drew Hendricks about John’s involvement in IT, in the technical aspects, the coordination of the LISTSERVs.
Today, a Democracy Now! exclusive, an exposé on a military spy in peace groups in Olympia, Washington. Brendan Dunn is our guest, Olympia activist with Students for a Democratic Society and Port Militarization Resistance. He discovered that his friend, fellow activist “John Jacob,” was actually a military spy. And Drew Hendricks will be joining us in a minute, talking about his involvement. John Towery, their friend, “John Jacob.” Stay with us.
[break]
AMY GOODMAN: Today, a national broadcast exclusive. A military spy in the ranks of antiwar activists in Olympia, Washington.
We have a number of guests. We’ve just been speaking with Brendan Maslauskas Dunn, Olympia activist with Students for a Democratic Society and Port Militarization Resistance. He discovered, through an FOIA request, a Freedom of Information Act request [ed: public records request], that his friend, fellow activist “John Jacob,” was actually working with Fort Lewis base in Washington state, was a military spy in his organizations.
Drew Hendricks is with us, as well, in Seattle, also an Olympia activist with the same groups, Port Militarization Resistance. He worked with John Towery, his real name — “John Jacob” is how they knew him — before the exposé that has now coming out.
Drew, tell us how you met John and how he was involved in the organizations.
DREW HENDRICKS: I first met John in September of 2007, and he approached me as somebody who claimed to have base access, which turned out to be true. He did admit that he was a civilian employee for the Army. And what he was offering me were observations and inside knowledge of operations on Fort Lewis.
I let him know that I wasn’t willing to have any classified information from him and that I wasn’t engaged in espionage. I was looking for open source information and looking for insight into movements of military materials over the public roads, so that people other than myself could organize protests or organize blockades, as they might see fit, and it wasn’t appropriate for me to be involved in their plans. It was only appropriate for him let me know things that I could confirm from open ground, from public spaces. He abided by those rules, for the most part.
And he did not reveal his role to me that he was actually part of a force protection cell, that he was actually reporting to DES fusion and part of the intelligence operation of Fort Lewis. He wasn’t admitting to me that his reports were going to Washington Joint Analytical Center, which is a function of the Washington State Patrol and the Federal Bureau of Intimidation — I’m sorry, Investigation.
But he did provide what he purported to be observations of operations on Fort Lewis, and he was involved with the group for a few months before I mistakenly and stupidly, in retrospect, trusted him with co-administration of our LISTSERV, our shared means of talking to each other over electronic media.
AMY GOODMAN: And the LISTSERV involvement, how much control he had over who was involved in your groups, Drew?
DREW HENDRICKS: Well, he could tell from that access who all was subscribed to the LISTSERV. He couldn’t control who was coming into or out of meetings, but he could find out who people were, if they were subscribed to the LISTSERV. And he did challenge some people who were attempting to get to the LISTSERV for their credentials, for people who could vouch for them being people who were not law enforcement or people who were not military intelligence who were coming into that activity. He wasn’t in control of what messages people could send, but as an administrator on RiseUp, he could have unsubscribed people, and there were some people that were disruptive that he did unsubscribe, in a way that the other LISTSERV administrators, for the most part, agreed with.
He wasn’t found to be abusing his authorities as a LISTSERV administrator directly, although he probably reported that list upwards in his chain of command or his chain of employment. And that served a significant chilling role for him as a military employee. He’s a civilian employee, but he is a former military-enlisted person. And so, he understood, or should have understood, that what he was doing was legally inappropriate. I’m not a lawyer, but in my opinion and from the history I’ve read, what he was doing was rather extraordinary, from the histories that I’ve read.
ANJALI KAMAT: I want to bring three others into this discussion. Joining us from Washington, DC is Mike German. He’s the National Security Policy Counsel for the American Civil Liberties Union. He previously served as an FBI agent specializing in domestic counterterrorism from 1988 to 2004.
Also joining us here in New York is Eileen Clancy. She’s a founding member of I-Witness Video, a video collective that has documented government surveillance of activist groups for years. Her group was targeted by police raids last summer during the Republican National Convention in St. Paul, Minnesota.
And on the line with us from Bellingham, Washington is Larry Hildes, an attorney and National Lawyers Guild member who has represented Washington state-based activists with Students for a Democratic Society and Port Militarization Resistance in criminal and civil cases.
Larry, I want to go to you. Can you talk about your involvement with this and on what bases you have represented these activists?
LARRY HILDES: Absolutely. Good morning, by the way.
Yeah, I’ve been — I got involved — there was a sit-in at the gate of the Port of Olympia back in May of 2006 to protest use of the port for military shipments to Iraq and Afghanistan. And it’s been a wonderful experience. I have represented these folks through several rounds of criminal cases throughout Pierce and Thurston Counties, Tacoma and Olympia. And now we are suing, based in part on spying, in conjunction with the Seattle office of the ACLU.
And it got strange fairly early. We were in trial in March of 2007, arguing that these folks were not guilty of criminal violations for sitting at the gate, when they weren’t allowed into the port itself. The prosecutors kind of hinted that there was — that they had inside information that they shouldn’t have had. And the fourth day of the trial, as it’s clear that we have the jury, prosecutor’s office came out with a confidential jury analysis sheet that my office had done, that was circulated only on the internal attorney-client LISTSERV that was exclusively for the defense team, and announced that this was all over the internet and got a mistrial.
And we’re trying to figure out in the courtroom what’s going on here. Never seen anything like this. We know it’s not on the internet. And the person who set up the LISTSERV — so we’ve got LISTSERV stuff going on even before Mr. Towery’s involvement — person on the LISTSERV discovers that there’s two people who we never heard of, who they had not subscribed, he had not allowed onto the list. Those two turned out to be Tacoma police officers. And we’ve now found that the Tacoma police knew that this document was going to be revealed, knew it would probably be a mistrial, and was speculating — and knew exactly when it would be and was speculating what the effects would be. So, the spying started early.
It was very clear that they treated these folks — the worst thing they’ve ever done is acts of civil disobedience, peacefully, nonviolently trying to stop military blockades by standing in front of tanks and Strykers — that they were treating this like a very, very serious situation. So we knew that early. And it’s become clear that there was a lot of spying going on throughout this process. We kind of knew that this was coming.
Right now I’m defending a group of demonstrators who were arrested in Olympia in November of ’07, allegedly trying to block a troop convoy or a Stryker convoy from coming out of the port to go back to Fort Lewis to be repaired and sent back to Iraq again. And the police reports talk about —- the incident commander talks about the fact that they had Army intelligence sources reporting to them detailed discussions that were going on in private meetings that Port Militarization Resistance was having, where they were discussing tactics and strategies. And based on that information, they decided that our clients from that action, who were sitting in an empty road outside of a closed gate, with no military vehicles in sight, were intending to blockade traffic and were arrested for attempted disorderly conduct, a charge we’ve never seen in our lives.
So we started trying to find out what’s going. We got the judge to agree to sign subpoenas, which were immediately refused by the head of the civil division of the US attorney’s office in Seattle, Brian Kipnis, saying they had no standing and they weren’t going to respond, and ordered the Army not to give us this information. So -—
AMY GOODMAN: Tell us more about this US attorney. And also, isn’t he the attorney who prosecuted Ehren Watada —-
LARRY HILDES: That’s exactly -—
AMY GOODMAN: — the first officer to say no to going to war in Iraq, refusing to lead young men and women there for a war he felt was immoral?
LARRY HILDES: That’s exactly right, Amy. He handled the Ninth Circuit appeals and stood up in the courtroom and said, “OK, he’s had his appeal. Now we need to go forward. He needs to be prosecuted. We want a second court-martial,” and continued to argue that. And the day that the decision came — Ninth Circuit decision came down saying, “No, this was double jeopardy; you can’t do this,” he said, “Well, we’re going to prosecute him on the remaining claims anyway,” which, of course, has not happened.
He was also involved in a number of the Guantanamo cases and has been arguing that evidence of torture shouldn’t come out, because it would reveal confidential information about how Guantanamo was set up. So, his role has been, throughout this, to obstruct.
I sent him a letter saying, “OK, now we have this information. I ask for your help in investigating this, because this is a crime.” Under the Posse Comitatus Act of 1887, it is a crime for the US military to become involved in civilian law enforcement. And they’ve chipped away at it, but it’s still a crime. I got a letter back now telling me I have to ask the Army. I got this yesterday, saying, “You have to go through channels with the Army.” I’ve gone through channels with the Army, and the Army has told me they’re not allowed to talk to me, because he told them not to. So we’re going back and forth with this guy.
He has been in the US attorney’s office throughout much of the Bush administration. And apparently his job is to obstruct and punish those involved in protesting the war and those protesting torture. Interesting character. I had never heard of him before this. Apparently has a close relative — there aren’t that many Kipnises, but there are some —- who runs a security firm that specializes in analysis of national security issues. So it’s a cozy little family network there. So -—
ANJALI KAMAT: I’d like to turn to Mike German and bring him into the conversation, National Security Policy Counsel for the American Civil Liberties Union in Washington, DC. Mike German, what’s your response to all of this?
MIKE GERMAN: Well, I think his analysis is exactly right. This is a pretty clear violation of Posse Comitatus. Now, what the military would argue, and has argued, is that they have a right to engage in force protection, which obviously, in its normal understanding of that term, is a defensive sort of capability, i.e. they can put guards at the gates of military bases and protect from threats from without. But they seem to have been, since 2002, considering that as an offensive capability, where they’re actually sending operatives out to spy on community activists, which is, of course, prohibited and something that, you know, the First and the Fourth Amendment become engaged.
And, you know, this is something that we found out through a FOIA back in 2005 the military was engaged in through a group called the Counterintelligence Field Activity. And they had a database of activists called TALON that, again, collected this US person information that the military has no business collecting. And that was shut down. But unfortunately, you know, they just created a new mechanism. This appears to be the fusion centers and these fusion cells that they’re using that, they seem to think, give them a method of circumventing Posse Comitatus and the restrictions on military intelligence gathering in the United States.
AMY GOODMAN: Explain what you mean, Mike, by fusion centers.
MIKE GERMAN: About two years ago, me and a colleague at the ACLU started investigating a lot of federal money going to what were called intelligence fusion centers. And I was only two years out of federal law enforcement at that point, and I had never heard this term, so I became concerned. And what these centers are is multi-jurisdictional intelligence centers that involve state, local and federal law enforcement, as well as other government entities — you know, a lot of times there are emergency services type of entities, but actually can’t involve any government entity — but also involve oftentimes the military and private companies.
So we produced a report in November of 2007 warning of the potential dangers that these multi-jurisdictional centers had, because it was unclear whose rules applied. Were we using federal rules? Were we using state rules? Local rules? And what was military and private company — what rules govern their conduct? So we put out this report in November of 2007. At that point, there were forty-two fusion centers. By July of 2008, we had found so many instances of abuse, we put out an updated report. At that point, there were fifty-eight fusion centers. Today, the DHS recognizes at least seventy-two fusion centers. So these things are rapidly growing, without any sort of proper boundaries on what activities happen within them and without really any idea of what it is the military is doing in these fusion centers and what type of access they have to US person information.
AMY GOODMAN: I wanted to turn back for a moment to the two activists in Olympia. They’re speaking to us from Seattle today, first time they’re speaking out nationally, Brendan Dunn and Drew Hendricks. Just give us a sense, Brendan, of why you got involved in activism. People might be listening and watching right now and wondering, “I’ve never even heard of Port Militarization Resistance,” or perhaps the new Students for a Democratic Society, based on the old. What’s your background, Brendan?
BRENDAN MASLAUSKAS DUNN: Well, I guess I really started to get involved with activism and organizing — it was in high school, but it wasn’t until after high school, when my friend’s brother was shot and killed by the police in Utica, New York. His name was Walter Washington. And the community developed a response to that, and, you know, that’s what really started to get me thinking and actively organizing. That’s really when I got involved.
I moved to Olympia a little over three years ago. Since then, I’ve been involved with a lot, with Students for a Democratic Society. And, you know, the more police repression I’ve learned about or experienced and just repression, generally, that it’s moved me in a more radical direction. That’s when I started to pick up anarchist politics and organizing.
So I’ve been involved with Students for a Democratic Society and Port Militarization Resistance — just makes sense to me, because the military — this is one of the most highly militarized areas of the country, if not the world, western Washington is. And it just makes sense to me that if we want to throw a gear in the war machine, the best way to do it is in our own backyard, our own towns. And in our case, it’s in the Port of Olympia, the Port of Tacoma, the Port of Grays Harbor in Aberdeen. And that’s where direct action makes sense and community struggle makes sense.
AMY GOODMAN: And, Drew Hendricks, your involvement in Port Militarization Resistance, known for trying to stop some of the — for example, the Stryker vehicles from being sent to Iraq?
DREW HENDRICKS: Yes. My primary activity with Port Militarization Resistance is as a coordinator for intelligence collection, so that people have the time that they need to make good decisions about what it is that they’re going to do. I’ve taken one direct action myself against said activity early on in the end of May 2006. I blocked a couple of gates shut overnight and was arrested during that action and found and put in jail for a few hours. But for the most part, my role has been to collect information and disseminate it to the people who need to know, so that they can make timely decisions.
AMY GOODMAN: We’re going to break, then come back to this conversation. We are doing a national exposé today on a person who worked in the military spying on peace groups in Washington state. His name — well, they thought his name was John Jacob. His name is John Towery. We asked that he come — we wanted him to come on the broadcast, but he didn’t respond to our request. We also asked the military to join us; we read the statement earlier, yes, admitting that John Towery worked with them. We’ll continue this conversation in a minute.
[break]
AMY GOODMAN: We bring you this exclusive on peace activists in Washington state revealing an informant posing as an anarchist has spied on them while working under the US military — the activists, members of the group Students for a Democratic Society and Port Militarization Resistance, which protests military shipments bound for Iraq and Afghanistan.
Yes, this is Democracy Now!, and we urge you to go to our website at democracynow.org, where we’re video and audio podcasting, where you can see the documents that they got under Freedom of Information Act [ed: public records request].
Anjali?
ANJALI KAMAT: The government documents also show that intelligence officers from other government and military agencies inquired Olympia police about the Washington state peace activists. In an email to an Olympia police officer from February 2008, Thomas Glapion, Chief Investigations/Intel of New Jersey’s McGuire Air Force, writes, quote, “Good Morning, first let me thank you for the effort. To the contrary you were quite the help to me. You are now part of my Intel network. I’m still looking at possible protests by the PMR SDS MDS and other left wing anti war groups so any Intel you have would be appreciated…In return if you need anything from the Armed Forces I will try to help you as well,” end-quote.
Now, we contacted the McGuire Air Base, and they also denied our interview request. They released a short statement saying only, quote, “Our force protection specialists routinely research local and national groups in response to potential risks and threats to Air Force installations and to ensure the safety of our personnel,” end-quote.
Another declassified email from February 2008 comes from Andrew Pecher of the US Capitol Police Intelligence Investigations Section in Washington, DC. The email is also addressed to an Olympia police contact. It says, quote, “I am just droppjng [sic] in to see if you had a problems with the below action that we had talked about a few weeks ago. Any information that you have would be helpful. Thank you!!” end-quote. The “action” Pecher refers to is the “Northwest DNC/RNC Resistance Conference,” an event that was held at Evergreen State College to prepare for protests at last summer’s Democratic and Republican conventions.
I want to go to Brendan Maslauskas Dunn. Brendan, how did you find this information? When you first saw this information, can you talk about your reaction?
BRENDAN MASLAUSKAS DUNN: Well, when it all surfaced through the public records requests, I wasn’t surprised. I guess I had been expecting this, especially with the level of activity that activists have been involved with in Olympia, in the last few years, especially. But, I mean, it still was a shock. I didn’t know it was that extensive. I guess that’s why it was a shock to me.
I didn’t know that the Air Force from New Jersey was interested in activities that activists in Olympia were involved with. And I didn’t know that the Capitol police in Washington, DC was trying to extract information from people in Olympia, as well.
So I always suspected that there was surveillance going on. It was obvious it was going on locally from local agencies and local police agencies. I had no idea how widespread it is. And I think this is just the tip of the iceberg. I have no clue what’s below the water.
AMY GOODMAN: Eileen Clancy, I’d like to bring you into this conversation. You have long been documenting police and federal authorities’ activities in antiwar and peace protests at the conventions in 2004 and then 2008. You, yourselves, at I-Witness were targeted. You were detained by police. The places that you were setting up video to video police actions on the streets were raided by the police in St. Paul. Your reaction to what you’re listening to and watching today?
EILEEN CLANCY: Well, I have to say, I think this is one of the most important revelations of spying on the American people that we’ve seen since the beginning of the Bush era. It’s very clear that there’s no such thing as one spy, especially not in the Army. So — and it’s very clear that this problem is national in scope, in that sort of casual manner that these folks are interacting with each other.
It’s really like in January 1970. Christopher Pyle, who was a former US Army intelligence officer, revealed in Washington Monthly that there was an extraordinary program of spying by the Army on political protest groups. And he said that — well, what was written in the New York Times was that the Army detectives would attend some of these events, but the majority of material that they gathered was from police departments, local governments and the FBI. And at that time, they had a special teletype, pre-internet, that connected the Army nationwide and where the police could load up their information on this stuff. They also published a small book that was a blacklist, which is similar now to the terrorist watch list, where the police share information about activists with maybe no criminal basis whatsoever. And at the time, in January 1970, Pyle said that there was a hope to link the teletype systems to computerized databanks in Baltimore, Maryland, which, of course, is the general area of the National Security Agency, which does most of the spying for — it’s supposed to be foreign, but apparently they do domestic spying, as well.
So this now, what we have here — and after these revelations, there was a Church Committee. There was a great deal of investigating that went on. And while a lot of it was covered up, the military was pushed back for a while on this front. But because now we have the capability of gathering an extraordinary amount of information and holding onto it and sharing it, through the internet and through other means, we really have this 1970s problem amped up on steroids, twenty-first-century-style. And this had been going on for a while.
Something terrible has been going on in the Pacific Northwest in terms of police spying. There are other documents that had been revealed — the Tacoma police, Homeland Security, meetings, minutes. And you can see that one of the essential problems with this kind of model and the fusion center model is that in the same meeting, they’re talking about a Grannies Against the War group handing out fliers at the local mall, and they’re talking about new information about what al-Qaeda is going to do. It’s a model that doesn’t make any sense whatsoever, and it’s a model that’s based really on hysteria.
When you see those pictures that were just shown on the screen, pictures of people with no weapons standing in the middle of a road with giant Army vehicles in front of them, you know, it’s clear that the protest is of a symbolic nature. There’s no violence involved on the part of the activists. It’s a traditional sit-in type of protest. The idea that the Army, the Navy and the Marines would become hysterical at this threat, I mean, it is the Army, it’s the Navy, it’s the Marines. And when — that’s the reason the Army shouldn’t be involved in this, because the job of an army — and they’ll tell you this — is to kill people and break things. The motto of the Stryker Brigade Combat Team that’s housed at Fort Lewis, that this force protection cell was trying to protect, their motto is “strike and destroy.” They’re really built for one thing, and it’s certainly not policing. It’s certainly not dealing with community activist groups, Grannies Against the War, or local activists in Olympia.
AMY GOODMAN: I want to ask about Rush Holt, the New Jersey congressman — we’re talking about McGuire Air Base, actually, in New Jersey — who has just in the last weeks been calling for a Church-like, Pike-like investigation of the intelligence community, starts by talking about the CIA. He’s raised this with the Washington Independent, with the Newark Star-Ledger, even raised it on Lou Dobbs a few days ago. And the significance of something at this level of the Church Committee hearings that investigated spying — Sy Hersh exposed it decades ago in a major article in the New York Times. Mike German, at this point, the significance of something like this? And do you think we would see this under President Obama?
MIKE GERMAN: I would hope so. You know, when we first came out with our report on fusion centers and warned about the military presence, you know, people told us that that wasn’t something we needed to be concerned about. And, you know, so this is a very important revelation, that there is actual evidence of abuse, that hopefully will open the eyes of the people who are responsible for overseeing these types of activities. And I believe something like a select investigative committee to investigate such activities is certainly called for. And, in fact, Representative Barbara Lee had introduced back in April a bill that would allow a select committee to investigate national security policy and practices. So, we’re hoping that this will bring support to that effort.
AMY GOODMAN: I also wanted to ask Brendan Dunn about the evidence of other spies in your organization. In fact, didn’t John — “John Jacob,” now known as John Towery, who worked at Fort Lewis — didn’t he tell you about others that he actually wanted out of the organization sometimes and called the military to get them out?
BRENDAN MASLAUSKAS DUNN: Yeah, that’s true. I mean, that’s his story, at least. He admitted that there were a few other informants that were sent.
He had a weird story, which, you know, we know isn’t true, based on the public records and the documents that we have in our hands, that he was, you know, forced into this position to spy on us, that he didn’t do it for pay, that he only reported to the Tacoma police and wasn’t connected to the military whatsoever. I mean, it’s a good cover story to, you know, let the military free and blame it on a bunch of Keystone cops in Tacoma, but there was actually another email I got through the records request that was sent between a couple Olympia police officers, and they had mentioned something about their Army guy that was working for them and something else about someone in the Coast Guard that was also perhaps, still perhaps, currently acting as an informant.
AMY GOODMAN: We also, in doing research on John Towery, have information, addresses that he had at both Fort Drum, Upstate New York, and also in Brussels, which we associate with NATO. Is there any understanding or knowledge you have of this, either Brendan or Drew? Did he talk about this in his past?
BRENDAN MASLAUSKAS DUNN: This is actually the first I’ve heard of it. I’m actually surprised, because I used to live near Fort Drum. I used to go to school near Fort Drum before I moved out to Olympia. So this is news to me. I’ve never heard anything.
AMY GOODMAN: Right now, in figuring out how you go forward, I wanted to bring Larry Hildes back into this conversation. Information about one activist actually having a locator put in his car to figure out where he was going from one protest to another, can you tell us about Phil Chin, Larry?
LARRY HILDES: Yes, I can. And we’re actually suing about this in conjunction with the Seattle ACLU now. Mr. Chin was on his way to a demonstration at the Port of Aberdeen. It was going to be a peaceful march, not even any civil disobedience. His license plate was called in, and Washington state patrol sent an attempt-to-locate code — we didn’t know what an attempt-to-locate code was until this — saying, “There are three known anarchists in this car, in this green Ford Taurus. Apprehend them, and then let the Aberdeen police know.”
So he gets pulled over for supposedly going five miles an hour under the speed limit in heavy traffic and charged with DUI, despite the fact he hasn’t had anything to drink, hasn’t done any drugs, total — every single test comes up absolutely negative, except for the fact that he had trouble standing on one foot because he had an inner ear infection. The lab tests come up negative. And they still go forward with this, until we move to dismiss and ask what this attempt-to-locate code is. And we find out that it’s — we’ve got the tape, the dispatch tapes of them calling in this car with the three known anarchists — by the way, none of whom was Phil. But on the dashboard of the car that takes him away is a picture of Phil’s other car.
ANJALI KAMAT: Eileen Clancy, we just have a minute left. What does this, all of this information that’s come out, what does this do for activists? Does it create a climate of fear? What you, who have been spied on, who have had so much experience with this — what are your final words?
EILEEN CLANCY: I think people should try not to be afraid. They should consider what these fine activists have done here, which is done an extraordinary public service by putting this information out. This could be one of the key revelations of this era, if this is followed up on. It’s very important that people be aggressive about this. And thank goodness they did it.
AMY GOODMAN: We want to thank you all for being with us, Eileen Clancy of I-Witness Video; Mike German of the American Civil Liberties Union; Larry Hildes, National Lawyers Guild, based in Bellingham; and the two activists who have exposed this story through their Freedom of Information Act request [ed: public records request], Brendan Maslauskas Dunn, Olympia-based activist, and Drew Hendricks, as well. Thank you both very much for being with us.
Creative Commons License The original content of this program is licensed under a Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 United States License. Please attribute legal copies of this work to democracynow.org. Some of the work(s) that this program incorporates, however, may be separately licensed. For further information or additional permissions, contact us.
TUESDAY, JULY 28, 2009
Find this story at 28 July 2009
Obama’s Military Is Spying on U.S. Peace Groups (2009)6 maart 2014
Anti-war activists in Olympia, Wash., have exposed U.S. Army spying and infiltration of their groups, as well as intelligence gathering by the U.S. Air Force, the federal Capitol Police and the Coast Guard.
The infiltration appears to be in direct violation of the Posse Comitatus Act preventing U.S. military deployment for domestic law enforcement, and may strengthen congressional demands for a full-scale investigation of U.S. intelligence activities, like the Church Committee hearings of the 1970s.
Brendan Maslauskas Dunn asked the City of Olympia for documents or e-mails about communications between the Olympia police and the military relating to anarchists, Students for a Democratic Society (SDS) or the Industrial Workers of the World (Dunn’s union). Dunn received hundreds of documents. One e-mail contained reference to a “John J. Towery II,” who activists discovered was the same person as their fellow activist “John Jacob.”
Dunn told me: “John Jacob was actually a close friend of mine, so this week has been pretty difficult for me. He said he was an anarchist. He was really interested in SDS. He got involved with Port Militarization Resistance (PMR), with Iraq Vets Against the War. He was a kind person. He was a generous person. So it was really just a shock for me.”
“Jacob” told the activists he was a civilian employed at Fort Lewis Army Base, and would share information about base activities, which could help PMR organize rallies and protests against public ports being used for troop and Stryker military vehicle deployment to Iraq and Afghanistan. Since 2006, PMR activists have occasionally engaged in civil disobedience, blocking access to the port.
Larry Hildes, an attorney representing Washington activists, says the U.S. attorney prosecuting the cases against them, Brian Kipnis, specifically instructed the Army not to hand over any information about its intelligence-gathering activities, despite a court order to do so.
Which is why Dunn’s request to Olympia and the documents he obtained are so important. The military is supposed to be barred from deploying on U.S. soil, or from spying on citizens.
Christopher Pyle, now a professor of politics at Mount Holyoke College, was a military intelligence officer. He recalled: “In the 1960s, Army intelligence had 1,500 plainclothes agents watching every demonstration of 20 people or more. They had a giant warehouse in Baltimore full of information on the law-abiding activities of American citizens, mainly protest politics.”
Pyle later investigated the spying for two congressional committees: “As a result of those investigations, the entire U.S. Army Intelligence Command was abolished, and all of its files were burned. Then the Senate Intelligence Committee wrote the Foreign Intelligence Surveillance Act of 1978 to stop the warrantless surveillance of electronic communications.”
Reps. Barbara Lee, D-Calif., Rush Holt, D-N.J., and others are pushing for a new, comprehensive investigation of all U.S. intelligence activities, of the scale of the Church Committee hearings, which exposed widespread spying on and disruption of legal domestic groups, attempts at assassination of foreign heads of state, and more.
Demands mount for information and accountability for Vice President Dick Cheney’s alleged secret assassination squad, President George W. Bush’s warrantless wiretapping program, and the CIA’s alleged misleading of Congress. But the spying in Olympia occurred well into the Obama administration (and may continue today). President Barack Obama supports retroactive immunity for telecom companies involved in the wiretapping, and has maintained Bush-era reliance on the state secrets privilege. Lee and Holt should take the information uncovered by Brendan Dunn and the Olympia activists and get the investigations started now.
See/hear/read the full exclusive hour broadcast exposé on Democracy Now!:
Declassified Docs Reveal Military Operative Spied on WA Peace Groups, Activist Friends Stunned
Denis Moynihan contributed research to this column.
Amy Goodman Amy GoodmanHost, executive producer of Democracy Now!, NYT bestselling author, syndicated columnist
Posted: July 28, 2009 08:20 PM
Find this story at 28 July 2008
Copyright © 2014 TheHuffingtonPost.com, Inc.
The Military Spies on Anarchists in Olympia (2009)6 maart 2014
Amy Goodman on Democracy Now just broke a story that is a piece of a larger puzzle: and that puzzle is the spying on dissidents right here in the United States.
This time it was done by someone working for the U.S. military, which may be illegal.
It happened out in Olympia, Washington, where a guy who went by the name of John Jacob infiltrated a group of anarchists working with Students for a Democratic Society and the Port Militarization Resistance. This went on for a couple of years.
When the activists found him out just last week, they were shocked.
“John Jacob was actually a close friend of mine,” Brendan Maslauskas Dunn told Amy Goodman. “We hung out. We gave workshops together on grassroots direct democracy and anarchist struggle.”
But John Jacob was not who he purported to be.
His real name is John Towery, and he’s no anarchist. He’s a member of the Force Protection Service at Fort Lewis.
This is just the latest case of domestic spying on political groups that may be happening all over.
A few months ago, it came out that an undercover FBI agent had infiltrated some peace groups in Iowa City.
The case in Olympia is even more troubling, as it involves the U.S. military, which is supposed to be banned by the Posse Comitatus Act from engaging in law enforcement.
But this isn’t the first time that the military has been caught with its hand in the spying jar.
Back in 2004 at the University of Texas Law School in Austin, two Army lawyers attended, under cover, a conference entitled “Islam and the Law: A Question of Sexism.”
On Mother’s Day, 2005, the National Guard in California was keeping tabs on the Raging Grannies and Code Pink.
And last year at the Republican Convention in St. Paul, the U.S. Northern Command provided support. (See democracynow.org, and “What Is NorthCom Up To?”; in the February 2009 issue of The Progressive.)
The Pentagon also was involved in spying on activists through its notorious Talon database.
Though the Pentagon shut down Talon, the national security state is still involved in gathering intelligence through so-called fusion centers.
The Olympia activists were surprised at the extent of the spying. It turns out that the head of investigations and intelligence at New Jersey’s McGuire Air Force contacted an Olympia police officer about the anarchists, saying he was looking into “leftwing anti-war groups” himself and would appreciate “any Intel.” And the U.S. Capitol Police Intelligence Investigations Section sought information from the Olympia police about an event at Evergreen State College that was planning protests at the Democratic and Republican conventions last year, according to Democracy Now.
“This is just the tip of the iceberg,” Dunn told Amy Goodman. “I have no clue what’s below the water.”
For more information on hundreds of similar incidents, go to McCarthyism Watch at The Progressive’s website.
Published on Tuesday, July 28, 2009 by The Progressive
by Matthew Rothschild
Find this story at 28 July 2009
© 2009 The Progressive
FBI Infiltrates Iowa City Protest Group (2009)6 maart 2014
He was very well dressed. He claimed he’d been in the military. But he said when he was ordered to go to Iraq, he refused and was granted conscientious objector status.
That’s how activists in Iowa City are now recalling a person they believe was working undercover for the FBI.
He went by the name of “Jason,” and later changed his name to “Val,” they say.
And he joined their group as they were planning protests for the Republican National Convention in St. Paul last year.
“He was an active organizer,” says David Goodner, of the University of Iowa Anti-War Committee. “He gave speeches with other Iraq vets against the war and played a very high-profile role in our group.”
He even served as moderator for at least one of their meetings, a web search shows. The meeting was held at the Iowa City Public Library on August 21, 2008, just ten days before the Republican National Convention. He then went to St. Paul with the group, ostensibly as a medic.
“He knew the activist lingo,” Goodner says. “He could speak the slang. And he had instant credibility because he said he was a CO.”
Another Iowa City group, the Wild Rose Rebellion, first publicly aired the accusation that “Jason”/“Val” was informing to the FBI in an Infoshop News posting of December 17. “The purpose of this statement is to warn all radical organizations and people,” read the posting, which was signed WRR.
The Des Moines Register then busted the story wide open on May 17.
Robert Ehl, who goes by the name Ajax, was one of the founders of the Wild Rose Rebellion. The informant “was at the very first meeting at the library,” says Ehl, adding that he didn’t have an inkling that he might be undercover. “We would go and hang out with him—me and him and a couple of people at a bar or somebody’s apartment.”
Ehl was imprecise about how he found out about the informant.
“Through a series of events that I can’t go into, it became apparent that he was,” Ehl says. “I confronted him. He admitted it.”
Three FBI documents obtained by The Progressive show the extent of the monitoring of the Iowa City activists.
Entitled “Confidential Human Source (CHS) Reporting Document,” each one was written by FBI Special Agent Thomas J. Reinwart on the material provided by the informant, who was “in person” at the events.
The first one, with a reporting date of August 6, 2008, began: “CHS is aware of a group of individuals who could be considered an anarchist collective in the Iowa City, Iowa, area.” The group was formed, the document says, “to organize for various protest activities at the Republican National Convention (RNC) and the Democratic National Convention (DNC).” It said the people in the group could be divided into “green,” “yellow,” and “red.” The “green” people would provide medical and legal assistance. The “yellow” ones “were described as peaceful protestors.” The “red” ones are “willing to risk arrest and who will potentially be involved in criminal activities.” The group was meeting at the Iowa City Public Library, the document notes.
The second document, dated August 18, 2008, went into great detail describing some of the activists, “based upon CHS’s knowledge of each person.”
For instance, one is “described as a white female, 5’10”, 140 pounds, blonde hair and glasses.” The informant provided her cell number, and the document says, “She drives a little dark green four door hatchback.” She is characterized as “Absolute Green.”
Another is described as a “26 year old white female, shorter maybe 5’4”, skinny, reddish shoulder length hair and glasses.” The document gave the street that she lived on and said she was “more ‘green’ than ‘yellow.’ ” It added: “She helps put together a lot and organize meetings, travels a lot with [name blotted out] and goes to a lot of anarchist, socialist, communist type conventions.”
A third person was described as an “Anarchist communist” and “Anti-authoritarian.”
The document also identified where several activists worked.
The “criminal acts” that the document said the group might be planning consisted of “blocking a bridge in the vicinity of the convention center” or “block off-ramps on an expressway north of the convention center via bike blockade or tipping a car.”
The document says that “CHS is not aware of any specific threats to any candidates, dignitaries, or delegates.”
The informant noted that on a map of the St. Paul area put out by a national activist group, “there were various company headquarters highlighted on the map, such as Lockheed Martin. There were no specific threats toward the highlighted companies.”
But it appears that the informant raised the possibility with the Iowa City group of going after those companies. “CHS took these highlights to show people what companies are in the area in case they wanted to [blanked out] or do something.”
The last document, dated August 20, 2008, first describes a meeting of activists at a local restaurant. “CHS was suppose to be called about this meeting by [blanked out] but was not.”
It then describes “two males” who “gave a presentation at a [blanked out] conference at the University of Iowa” over the past summer. One was described as “a white male, short, approximately 5’7”, skinny, thick glasses, mullet type hair style and talked with a lisp.” The other: “a white male, 6’0”, 190 pounds, short brown hair, clean shaven.”
The document goes into detail about those who attended an activist meeting on August 16 again at the Iowa City Public Library. One is described as a white female with a southern accent, “heavy-set, 5’5”, 200 pounds, short hair a bad complexion, and wearing a bandana.”
At the end of the document it says: “Based upon a previous tasking, CHS provided a listing of known email addresses for members.” It proceeded to list them, though they are blotted out on the document The Progressive obtained.
Reached by The Progressive, the FBI spokeswoman in Omaha, Sandy Breault, declined to respond to specific questions about this story.
“Our legal counsel would not let me say anything,” she said. “Sorry, I wish I could say more.”
Randall Wilson, legal director of the ACLU of Iowa, said his group is not currently planning on taking legal action, though he has been in contact with some of the activists.
“We’re disappointed but not surprised,” he says. “We’re not surprised because it’s not the first time FBI has been exposed in recent years putting peace groups under surveillance. We’re disappointed because we believe the FBI has better things to do.”
Iowa City Mayor Regenia Bailey had a similar response.
“Yeah, it’s surprising,” she says, “but is it surprising? It’s been happening for years.” She says she’s received some correspondence from constituents about this, and one person made a public comment about it at the May 19 city council meeting.
“I haven’t heard from my colleagues about what we’d like to do,” she says, though she did express displeasure at the spying at the city’s public library. “It is concerning,” she says.
The activists are concerned, too, since the infiltration has corroded morale in their groups, says David Goodner.
“There’s been a lot of effect on group unity and group cohesion,” Goodner says. “This guy was with us for a year. A lot of people thought of him as a friend. Issues of trust have been brought up. We’re trying to work through it. But it’s put a lot of people on edge. How is it going to affect their lives? Could people get fired? Some people are in custody battles for their kids and worry that their exposure could affect the outcome.”
Dr. Susan Goodner is not amused that her son was spied upon, though it did bring back memories.
“I was part of a campus anti-war group in Iowa City that was infiltrated by the FBI in 1970,” she says. Her reaction to the current infiltration: “It’s pretty pathetic.”
By Matthew Rothschild, May 26, 2009
Find this story at 26 May 2009
Copyright 2013, The Progressive Magazine
Confirmed: The CIA Destroyed Its Noam Chomsky File and Thousands More on Other U.S. Citizens6 maart 2014
I can now confirm that the reason why the CIA could not locate its file on Noam Chomsky, despite the fact that the CIA had in fact maintained records on him, is that the CIA destroyed them and, unfortunately in my view, the destruction was authorized by the Archivist of the United States.
As background, in an earlier post “More CIA Records on Noam Chomsky the CIA Could Not Find” I analyzed some additional CIA records (see, e.g., here from 1967, here, here, and here from 1970, and here from 1971) showing that the CIA was documenting the activities of Noam Chomsky as part of the CIA’s CHAOS/MHCHAOS program. Importantly, those documents were located in the “Segregated Collection” of CIA records that were provided to the House Select Committee on Assassinations established in 1976 to investigate the assassinations of JFK and MLK, which are available in full-text search from the Mary Ferrell Foundation.
My post was a follow-up to John Hudson’s earlier piece in Foreign Policy called “Exclusive: After Multiple Denials, CIA Admits to Snooping on Noam Chomsky” that was based on a CIA document obtained via a FOIA request to the FBI by Kel McClanahan at National Security Counselors on behalf of Chomsky biographer Fredric Maxwell after the CIA had repeatedly denied possession any such records.
The new piece of the puzzle, just obtained via FOIA, is this CIA records control schedule, NC1-263-78-1, signed by then Archivist James B. Rhoads in March 1978 approving a “Request for immediate disposal” of thousands of CIA files on U.S. citizens “and the index related to these collections which were established under project CHAOS during the period 1967-1974.” The schedule notes that the “files were opened to maintain information bearing on possible foreign Communist exploitation of dissention in the United States, primarily concerning the Vietnam War. Subject of the folders were U.S. citizens and organizations involved in dissident activities in the United States.”
The schedule actually quantifies these files noting there were “8,328 folders on individual U.S. persons (citizens, resident aliens) and 2,196 volumes consisting of official and ‘soft’ subject files and so-called sensitive files (i.e., organizations/activities).” The CIA only requested immediate destruction of 7,840 of the files and was retaining the other 488, because it had deemed them to be of “continuing foreign intelligence or counter-intelligence interest.” The schedule also excludes records that were, at the time, subject to FOIA or Privacy Act requests.
The schedule explains why the CIA denied having any such records and why the CIA records on Chomsky have been found in collections outside the CIA. Moreover, on its face, this approved records schedule made the destruction of the records consistent with the procedure outlined in the statutes collectively referred to as the Federal Records Act (although it is not conclusive as courts can, and have, found that even records schedules fail to comply with the federal records laws (see, e.g., American Friends Serv. Comm. v. Webster, 720 F.2d 29, 65-67 (D.C. Cir. 1983)).
The bigger issue, as I suggested in my earlier post, is that the incomplete story of the CIA’s creation, maintenance, and then destruction of its Noam Chomsky file highlights yet again a crucial question that needs attention and discussion in the ongoing debate over NSA surveillance files (previously discussed here). Namely, the drive for “purging” surveillance data and “minimization” procedures purportedly designed to “protect privacy” needs to be balanced against the value of retaining government surveillance files (or some portion thereof) for long-term accountability purposes. We now know that the CIA destroyed its file on Noam Chomsky based on a records schedule that cites the Privacy Act as justification, but that destruction also had the effect of creating, for years, the false impression that the CIA had never had such a file in the first place. There has to be a middle path that both protects privacy and also preserves accountability.
Wednesday, February 26, 2014
Find this story at 26 February 2014
copyright docexblog.com
Exclusive: After Multiple Denials, CIA Admits to Snooping on Noam Chomsky6 maart 2014
For years, the Central Intelligence Agency denied it had a secret file on MIT professor and famed dissident Noam Chomsky. But a new government disclosure obtained by The Cable reveals for the first time that the agency did in fact gather records on the anti-war iconoclast during his heyday in the 1970s.
The disclosure also reveals that Chomsky’s entire CIA file was scrubbed from Langley’s archives, raising questions as to when the file was destroyed and under what authority.
The breakthrough in the search for Chomsky’s CIA file comes in the form of a Freedom of Information Act (FOIA) request to the Federal Bureau of Investigation. For years, FOIA requests to the CIA garnered the same denial: “We did not locate any records responsive to your request.” The denials were never entirely credible, given Chomsky’s brazen anti-war activism in the 60s and 70s — and the CIA’s well-documented track record of domestic espionage in the Vietnam era. But the CIA kept denying, and many took the agency at its word.
Now, a public records request by Chomsky biographer Fredric Maxwell reveals a memo between the CIA and the FBI that confirms the existence of a CIA file on Chomsky.
Dated June 8, 1970, the memo discusses Chomsky’s anti-war activities and asks the FBI for more information about an upcoming trip by anti-war activists to North Vietnam. The memo’s author, a CIA official, says the trip has the “ENDORSEMENT OF NOAM CHOMSKY” and requests “ANY INFORMATION” about the people associated with the trip.
After receiving the document, The Cable sent it to Athan Theoharis, a professor emeritus at Marquette University and an expert on FBI-CIA cooperation and information-gathering.
“The June 1970 CIA communication confirms that the CIA created a file on Chomsky,” said Theoharis. “That file, at a minimum, contained a copy of their communication to the FBI and the report on Chomsky that the FBI prepared in response to this request.”
The evidence also substantiates the fact that Chomsky’s file was tampered with, says Theoharis. “The CIA’s response to the FOIA requests that it has no file on Chomsky confirms that its Chomsky file was destroyed at an unknown time,” he said.
It’s worth noting that the destruction of records is a legally treacherous activity. Under the Federal Records Act of 1950, all federal agencies are required to obtain advance approval from the national Archives for any proposed record disposition plans. The Archives is tasked with preserving records with “historical value.”
“Clearly, the CIA’s file, or files, on Chomsky fall within these provisions,” said Theoharis.
It’s unclear if the agency complied with protocols in the deletion of Chomsky’s file. The CIA declined to comment for this story.
What does Chomsky think? When The Cable presented him with evidence of his CIA file, the famous linguist responded with his trademark cynicism.
“Some day it will be realized that systems of power typically try to extend their power in any way they can think of,” he said. When asked if he was more disturbed by intelligence overreach today (given the latest NSA leaks) or intelligence overreach in the 70s, he dismissed the question as an apples-to-oranges comparison.
“What was frightening in the ‘60s into early ‘70s was not so much spying as the domestic terror operations, COINTELPRO,” he said, referring to the FBI’s program to discredit and infiltrate domestic political organizations. “And also the lack of interest when they were exposed.”
Regardless,, the destruction of Chomsky’s CIA file raises an even more disturbing question: Who else’s file has evaporated from Langley’s archives? What other chapters of CIA history will go untold?
“It is important to learn when the CIA decided to destroy the Chomsky file and why they decided that it should be destroyed,'” said Theoharis. “Undeniably, Chomsky’s was not the sole CIA file destroyed. How many other files were destroyed?”
1170848-001 – 2013-04-11 – FBI – CIA response
BY JOHN HUDSON AUGUST 13, 2013 – 05:18 AM
Find this story at 13 August 2013
Copyright thecable.foreignpolicy.com
What Cold War CIA Interrogators Learned from the Nazis22 februari 2014
At a secret black site in the years after the end of WWII, CIA and US intelligence operatives tested LSD and other interrogation techniques on captured Soviet spies—all with the help of former Nazi doctors. An excerpt from Annie Jacobsen’s Operation Paperclip, published this week.
It was 1946 and World War II had ended less than one year before. In Top Secret memos being circulated in the elite ‘E’ ring of the Pentagon, the Joint Chiefs of Staff were preparing for ‘total war’ with the Soviets—to include atomic, chemical, and biological warfare. They even set an estimated start date of 1952. The Joint Chiefs believed that the U.S. could win this future war, but not for reasons that the general public knew about. Since war’s end, across the ruins of the Third Reich, U.S. military officers had been capturing and then hiring Hitler’s weapons makers, in a Top Secret program that would become known as Operation Paperclip. Soon, more than 1,600 of these men and their families would be living the American dream, right here in the United States. From these Nazi scientists, U.S. military and intelligence organizations culled knowledge of Hitler’s most menacing weapons including sarin gas and weaponized bubonic plague.
As the Cold War progressed, the program expanded and got stranger still. In 1948, Operation Paperclip’s Brigadier General Charles E. Loucks, Chief of U.S. Chemical Warfare Plans in Europe, was working with Hitler’s former chemists when one of the scientists, Nobel Prize winner Richard Kuhn, shared with General Loucks information about a drug with military potential being developed by Swiss chemists. This drug, a hallucinogen, had astounding potential properties if successfully weaponized. In documents recently discovered at the U.S. Army Heritage Center in Pennsylvania, Loucks quickly became enamored with the idea that this drug could be used on the battlefield to “incapacitate not kill.” The drug was Lysergic acid diethylamide, or LSD.
It did not take long for the CIA to become interested and involved. Perhaps LSD could also be used for off-the-battlefield purposes, a means through which human behavior could be manipulated and controlled. In an offshoot of Operation Paperclip, the CIA teamed up with Army, Air Force and Naval Intelligence to run one of the most nefarious, classified, enhanced interrogation programs of the Cold War. The work took place inside a clandestine facility in the American zone of occupied Germany, called Camp King. The facility’s chief medical doctor was Operation Paperclip’s Dr. Walter Schreiber, the former Surgeon General of the Third Reich. When Dr. Schreiber was secretly brought to America—to work for the U.S. Air Force in Texas—his position was filled with another Paperclip asset, Dr. Kurt Blome, the former Deputy Surgeon General of the Third Reich and the man in charge of the Nazi’s program to weaponize bubonic plague. The activities that went on at Camp King between 1946 and the late 1950s have never been fully accounted for by either the Department of Defense or the CIA.
Camp King was strategically located in the village of Oberursel, eleven miles northwest of the United States European Command (EUCOM) headquarters in Frankfurt. Officially the facility had three names: the U.S. Military Intelligence Service Center at Oberursel, the 7707th European Command Intelligence Center, and Camp King. In 1945, the place housed captured Nazis but by 1948 most of its prisoners were Soviet bloc spies. For more than a decade Camp King would function as a Cold War black site long before black sites were known as such—an ideal facility to develop enhanced interrogation techniques in part because it was “off-site” but mainly because of its access to Soviet prisoners.
It was an international crisis in June of 1948 that gave Operation Paperclip momentum at Camp King. Early on the morning of June 24, the Soviets cut off all land and rail access to the American zone in Berlin, an action that would become known as the Berlin Blockade. “The Soviet blockade of Berlin in 1948 clearly indicated that the wartime alliance [between the Soviets and the United States] had dissolved,” explained CIA deputy director for operations Jack Downing. “Germany then became a new battlefield between east and west.”“In our conversation of 9 February 1951, I outlined to you the possibilities of augmenting the usual interrogation methods by the use of drugs, hypnosis, shock, etc., and emphasized the defensive aspects as well as the offensive opportunities in this field of applied medical science,” wrote Dulles.
At this time, the CIA believed the Soviets were pursing mind control programs—supposedly a means of getting captured spies to talk—and the Agency wanted to know what it would be up against if the Russians got hold of its American spies. Since the end of the war, the various U.S. military branches had developed advanced air, land and sea rescue programs, based in part by research conducted by Nazi doctors during the war. But the Soviets had also made great advances in rescue programs and this presented a serious, new concern for the Pentagon and the CIA. If a downed U.S. pilot or soldier was rescued and captured by the Russians, that person would almost certainly be subjected to unconventional Soviet interrogation techniques. In an attempt to determine what kinds of Soviet techniques might be used, a research program was set up at Camp King. Documents obtained through the Freedom of Information Act (FOIA) reveal that the U.S. developed its post-war enhanced interrogation techniques here at Camp King, under the CIA code name Operation Bluebird.
Initially, Bluebird was to be a so-called “defensive” program. Officers were instructed “to apply special methods of interrogation for the purpose of evaluation of Russian practices,” only. In other words, to merely mimic Soviet techniques. But it did not take long for the CIA to decide that the best defense is offense, and the Agency began developing enhanced interrogation techniques of its own. FOIA documents reveal that the CIA saw LSD as a potential, “truth serum.” What if its officers could drug captured Soviet spies, interrogate them using LSD, and somehow make them forget that they’d talked? Inside Camp King, the LSD program was expanded and given a new code name.
“Bluebird was rechristened Artichoke,” writes John Marks, a former State Department official and authority on the CIA’s mind control programs. The goal of the Artichoke interrogation program, Marks explains, was “modifying behavior through covert means.” According to the program’s administrator, Richard Helms—the future director of the CIA—using drugs like LSD were a means to that end. “We felt that it was our responsibility not to lag behind the Russians or the Chinese in this field, and the only way to find out what the risks were was to test things such as LSD and other drugs that could be used to control human behavior,” Helms later told journalist David Frost, in an interview, in 1978. Soon, other U.S. intelligence agencies were brought on board to help conduct these controversial interrogation experiments at Camp King. As declassified dossiers reveal, with them they brought Nazi scientists from Operation Paperclip.
‘Operation Paperclip: The Secret Intelligence Program that Brougt Nazi Scientists to America’ By Annie Jacobsen. 592 pages. Little, Brown and Company. $30. ()
Back in the United States, the CIA teamed up with the Army Chemical Corps at Camp Detrick, in Maryland, to conduct further research and development on the chemistry of mind-altering drugs. Scientists and field agents were culled from a pool of senior Army bacteriologists and chemists, then assigned to a unit called the Special Operations Division, a division of the CIA. The men worked inside a classified facility, designated Building No. 439, a one-story concrete-block building set among similar-looking buildings at Camp Detrick so as to blend in. Almost no one outside the Special Operations Division knew about the Top Secret work going on inside. One of these field agents was Dr. Harold Batchelor, the Army scientist in charge of consultations with Nazi doctor and former Deputy Surgeon General of the Third Reich, Dr. Kurt Blome. Another Special Operations Division agent was Dr. Frank Olson, a former army officer and bacteriologist turned agency operative whose sudden demise—by covert LSD poisoning—in 1953 would nearly bring down the CIA. Batchelor and Olson were assigned to the program at Camp King, where Dr. Blome was chief physician. Their assignment, according to documents obtained through the FOIA and interviews with Olson’s former partner, Norman Cournoyer, was to use unconventional interrogation techniques on Soviet prisoners, including dosing them with LSD.
In April 1950, Frank Olson was issued a diplomatic passport. Olson was not a diplomat; the passport allowed him to carry items in a diplomatic pouch that would not be subject to searches by customs officials. Frank Olson began taking trips to Germany, flying to Frankfurt and making the short drive out to Camp King. In one of the rare, surviving official documents from the program, Deputy Director of Central Intelligence Allen Dulles sent a secret memo to Richard Helms and CIA Deputy Director for Plans Frank Wisner regarding the specific kinds of interrogation techniques that would be used. “In our conversation of 9 February 1951, I outlined to you the possibilities of augmenting the usual interrogation methods by the use of drugs, hypnosis, shock, etc., and emphasized the defensive aspects as well as the offensive opportunities in this field of applied medical science,” wrote Dulles. “The enclosed folder, ‘Interrogation Techniques,’ was prepared in my Medical Division to provide you with a suitable background.” Camp King was the perfect location to conduct these radical trials. Overseas locations were preferred for Artichoke interrogations, explained Dulles, since foreign governments “permitted certain activities which were not permitted by the United States government (i.e. anthrax etc.).”
The next trip on record made by Frank Olson occurred on June 12, 1952. Frank Olson arrived at Frankfurt from the Hendon military airport in England and made the short drive west into Oberursel. There, Artichoke interrogation experiments were taking place at a safe house called Haus Waldorf. “Between 4 June 1952 and 18 June 1952, an IS&O [CIA Inspection and Security Office] team… applied Artichoke techniques to two operational cases in a safe house,” explains an Artichoke memorandum, written for CIA Director Dulles, and one of the few action memos on record not destroyed by Richard Helms when he was CIA director. The two individuals being interrogated at the Camp King safe house “could be classed as experienced, professional type agents and suspected of working for Soviet Intelligence.” These were Soviet spies captured by the Nazi spy ring, the Gehlen Organization, now being run by the CIA. “In the first case, light dosages of drugs coupled with hypnosis were used to induce a complete hypnotic trance,” the memo reveals. “This trance was held for approximately one hour and forty minutes of interrogation with a subsequent total amnesia produced.” The plan for the enhanced interrogation program was meant to be straightforward: drug the spies, interrogate the spies, and give them amnesia to make them forget. Instead, the program produced questionable results and evolved into one of the most notorious CIA programs of the Cold War, MKULTRA.
LSD, the drug that induces paranoia and unpredictability and makes people see things that are really not there, would become its own strange allegory for the Cold War. Its potential use as a truth serum would also become a cautionary tale. One CIA report, declassified and shared with Congress decades later, in 1977, expressed Agency fears about Soviets plans to use LSD against Americans during the Cold War: “the Soviets purchased a large quantity of LSD-25 from the Sandoz [Pharmaceutical] Company [the only supplier of LSD at the time]… reputed to be sufficient for 50 million doses,” the report read. The CIA believed the Soviets might drug millions of Americans with LSD, through the U.S. water system, in a covert, psy-ops attack.
Or so the CIA thought. A later analysis of the information revealed that the CIA analyst working on the report made a decimal point error while performing dosage calculations. The Soviets had in fact purchased enough LSD from Sandoz for a few thousand tests—a far cry from 50 million.
It was a bizarre plan, in a foreign place, during a strange time. The Cold War had become a battlefield marked by doublespeak. Disguise, distortion, and deception were accepted as reality. Truth was promised in a serum. And Operation Paperclip, born of the ashes of World War II, was the inciting incident in this hall of mirrors. As it grew, it created monsters of its own.
02.11.14 Annie Jacobsen
Find this story at 11 February 2014
© 2014 The Daily Beast Company LLC
New Book ‘Operation Paperclip’ Shows Nazi Scientists Worked For CIA During Cold War22 februari 2014
The United States recruited Nazi scientists after the end of World War II and put them to work on secret military and intelligence programs during the Cold War — that is the astonishing topic of a new book published this week.
In “Operation Paperclip: The Secret Intelligence Program that Brought Nazi Scientists to America,” journalist Annie Jacobsen documents how the Joint Chiefs of Staff brought more than 1,600 German scientists to work for the U.S. after 1945.
The book describes the roles of 21 Nazi scientists who were part of Operation Paperclip, drawing on declassified intelligence and historical records to detail their startling role in America’s Cold War effort. According to Jacobson, the scientists had helped Adolf Hitler to develop weapons such as sarin gas and weaponized bubonic plague, and several had even stood trial for war crimes.
But the U.S. military was consumed by a new looming menace, the prospect of ’total war’ with the Soviets post WWII. “Operation Paperclip” employed the scientific brainpower of the Third Reich to help develop America’s arsenal of rockets and chemical and biological weapons, as well as aviation and space medicine.
The intelligence community saw another use for the Nazi scientists, Jacobson adds. They were running a secret black site in Germany to test the effects of LSD on captured Soviet spies, part of the Cold War battle to stay ahead in the art of mind-control.
Jacobsen explains in an excerpt of the book published on The Daily Beast:
In an offshoot of Operation Paperclip, the CIA teamed up with Army, Air Force and Naval Intelligence to run one of the most nefarious, classified, enhanced interrogation programs of the Cold War. The work took place inside a clandestine facility in the American zone of occupied Germany, called Camp King. The facility’s chief medical doctor was Operation Paperclip’s Dr. Walter Schreiber, the former Surgeon General of the Third Reich. When Dr. Schreiber was secretly brought to America—to work for the U.S. Air Force in Texas—his position was filled with another Paperclip asset, Dr. Kurt Blome, the former Deputy Surgeon General of the Third Reich and the man in charge of the Nazi’s program to weaponize bubonic plague. The activities that went on at Camp King between 1946 and the late 1950s have never been fully accounted for by either the Department of Defense or the CIA.
“Does accomplishment cancel out past crimes?” Jacobsen asks in her book, noting that several Nazi scientists were celebrated with awards in America, and one had a government building named after him.
She writes: “Some officials believed that by endorsing the Paperclip program they were accepting the lesser of two evils – that if America didn’t recruit these scientists, the Soviet Communists surely would. Other generals and colonels admired and respected these men and said so.”
Posted: 02/13/2014 10:09 am EST Updated: 02/13/2014 1:00 pm EST
Find this story at 13 February 2014
Copyright huffingtonpost.com
Behind the secret plan to bring Nazi scientists to US22 februari 2014
As the Allied troops advanced through France in November 1944, three experts in biological weapons huddled, by candlelight, in a grand apartment in Strasbourg, France, guarded by US soldiers.
The scientists were poring through documents left behind by Dr. Eugen Haagen, a high-ranking Nazi who specialized in weaponizing deadly viruses. They were looking for evidence of the Third Reich’s progress in atomic and biochemical warfare; what they found were chronicles of devastating carnage.
“Of the 100 prisoners you sent me, 18 died in transport,” Haagen wrote in a memo dated Nov. 15, 1943. “Only 12 are in a condition suitable for my experiments. I therefore request that you send me another 100 prisoners, between 20 and 40 years of age, who are healthy and in a physical condition comparable to soldiers. Heil Hitler.”
Modal Trigger
Hermann Oberth (forefront) with officials of the Army Ballistic Missile Agency at Huntsville, Alabama in 1956.
Photo: Corbis
Haagen was once a world-renowned genius who had won a fellowship from the Rockefeller Foundation in New York City, who had been shortlisted for a Nobel Prize, who helped create the first vaccine for yellow fever. Yet here was evidence that he — and could it only have been just one doctor? — had been conducting medical experiments on live humans.
Samuel Goudsmit, leader of this investigative unit, made a list. Haagen was at the top, and he added any names referenced or copied on Haagen’s memos, including Dr. Kurt Blome, the Third Reich’s deputy surgeon general, and Walter Schreiber, the surgeon general. These men were now among America’s most wanted — but not in the way one might assume.
Within the year, hundreds of the Third Reich’s upper echelon would be relocated to the United States, where they would be given excellent jobs, healthy salaries, and all the benefits of living in a free society.
Modal Trigger
The von Braun rocket team is congratulated by Nazi brass in 1942
Photo: Corbis
It was a secret program known as Paperclip, and it remains one of the most complicated and controversial epochs in American history. And, still, one of the most classified.
In her new book “Operation Paperclip: The Secret Intelligence Program to Bring Nazi Scientists to America” (Little, Brown and Company), author Annie Jacobsen uses newly released documents, court transcripts, and family-held archives to give the fullest accounting yet of this endeavor — one shared by the British, the French, and the Russians, all of whom enlisted and embraced top Nazis.
Wernher von Braun, the Nazi scientist crucial to the development of the V-2 rocket — which held a payload of 2,000 pounds and flew five times beyond the speed of sound — saw it coming: In March 1945, he conscripted two friends to stash his most important research out in an abandoned mine; when Germany lost, von Braun said, he’d use these documents to broker a new life in the United States.
He knew that no matter what atrocities were eventually discovered, no major world power would refuse the technological advances made by the Nazis — nor could they afford not to know how to combat them, vaccinate against them, outpace them.
That same year, the Department of Defense created a top-secret, elite task force called the Joint Intelligence Objectives Agency, or JOIA. They were subordinate to the Joint Intelligence Committee, which briefed the Joint Chiefs of Staff on national security threats.
“To understand the mind-set of the Joint Intelligence Committee,” Jacobsen writes, “consider this: Within one year of the atomic bombing of Hiroshima and Nagasaki, the JIC warned the Joint Chiefs of Staff that the United States needed to prepare for ‘total war’ with the Soviets — to include atomic, chemical, and biological warfare — and they even set an estimated start date of 1952.”
As of May 1945, Werner von Braun was No. 1 on America’s list for desired Nazi rocket scientists. When he surrendered to US forces on May 2 — having voluntarily decamped from a luxury ski resort in the Alps — von Braun and his colleagues were treated to a hearty breakfast of eggs, coffee and bread, then given freshly made beds in which to sleep.
Modal Trigger
President Truman ‘was not made aware of the initiative’
Photo: Harry S. Truman Library
“I did not expect to be kicked in the teeth,” von Braun later told an American reporter. “The V-2 was something we had and you didn’t have. Naturally, you wanted to know all about it.”
Also at the top of the list was Dr. Kurt Blome, Hitler’s head of cancer research and a diehard Nazi. He was discovered at a checkpoint on May 17, 1945, and in his initial interrogation, Blome admitted that he had seen experiments “which led to later atrocities e.g. mass sterilization, gassing of Jews.”
Then came the capture of Georg Rickhey, an expert on the Third Reich’s impenetrable underground bunkers. Rickhey was interrogated by Col. Peter Beasley, who told him, “As an American officer, I want my country to have full possession of all your knowledge. To my superiors, I shall recommend that you be taken to the United States.”
Among those tasked with finding and apprehending the most wanted men in the Third Reich — and the number of government agencies that became involved — there was deep discord about the morality of Operation Paperclip.
Jacobsen accessed the transcript of a volatile meeting, secretly recorded, at the War Department. The names were redacted.
“One of the ground rules for bringing them over,” said one general, “is that it will be temporary, and at the return of their exploitation they will be sent back to Germany.”
“I’m opposed,” said another general. “And Pop Powers [nickname of an unknown official] is opposed, the whole War Department is opposed.”
It didn’t matter. Unofficial US policy held that it was imperative to secretly procure those Nazis who could accelerate America’s scientific, technological and economic advancement.
This was an increasingly delicate operation. On May 7, 1945, Life magazine had run a series of photos from the concentration camps, and the official US line held that countries such as Uruguay and Argentina, which were welcoming Nazi refugees, should turn them over to stand trial.
Simultaneously, the US government was learning more and more about just what the Nazis had done: the extermination of millions of Jews; the mass sterilization, the live experiments and operations conducted without anesthesia on humans code-named “adult pigs,” the systematic yanking of gold teeth, the slave labor and starvation, the drowning of men in ice-cold tubs and the many failed attempts to resurrect them, the exploding bodies forced into high-altitude chambers in efforts to master space flight.
“German science presents a grim spectacle,” wrote Dr. Leopold Alexander, a Viennese Jew who immigrated to the US in 1933. When the US entered the war, Alexander enlisted, and at its end was sent to Germany to determine what the Nazis had wrought and learned medically.
Modal Trigger
Wernher von Braun holds a model rocket Aug. 5, 1955, at the Pentagon in Washington.
Photo: AP
“Grim for many reasons,” he continued. “First it became incompetent and then it was drawn into the maelstrom of depravity of which this country reeks — the smell of concentration camps, the smell of violent death, torture and suffering.”
He went on to call the Third Reich’s experimentation “really depraved pseudoscientific criminality . . . It sometimes seems as if the Nazis had taken special pains in making practically every nightmare come true.”
Meanwhile, the Allies held elite Nazis in two luxurious locales: the Palace Hotel in Luxembourg, renamed “Ashcan,” and Crane Mountain Castle in Hesse, Germany, renamed “Dustbin.”
Here, the most warped and wicked Nazis lounged in well-appointed rooms, strolled through apple orchards, played chess, smoked and drank, and gave each other lectures in grand halls. In the mornings, Hitler’s doctor taught a workout class.
In June 1945, officers at Dustbin put out an alert for Dr. Otto Ambros, valuable for his work with toxic gases — specifically tabun, developed by the Nazis and a chemical far more lethal than sarin. Ambros was picked up by an American soldier, who then drove him to a meeting in Heidelberg with members of the US Chemical Warfare Service.
So comfortable were these negotiations that when the US contingent told Ambros to retrieve the documents relating to tabun production, they let him drive off on his own. Ambros never returned; instead, he fled to an area controlled by the French, who let him return to civilian life in Germany.
The War Department moved quickly. In July, they made their top-secret project official, circulating a memo titled “Exploitation of German Specialists in Science and Technology in the United States.”
Jacobsen writes that President Truman “was not made aware of the initiative,” which was initially known as Operation Overcast.
Months later, when the War Department began tagging the files of their most reprehensible Nazi recruits with paper clips as intra-office code — these Nazis were truly to be smuggled in, made known to no other bureaucracies — the program became known as Operation Paperclip.
Meanwhile, Truman ordered the Department of Commerce to propagandize the advances made by the Nazis, ones that were now making Americans’ lives easier, more comfortable: Women could buy stockings that wouldn’t run, butter churned so fast and juice now sterilized so simply that there would be an abundance for all. Electrical equipment that had once been the size of crates was no bigger than your smallest finger.
Modal Trigger
William Picketing, James Van Allen, and Wernher von Braun (L to R) brandish a model of the first American satellite “Explorer 1″, 31 January 1958.
Photo: OFF/AFP/Getty Images
By January 1946, two months after the Nuremberg trials had begun, there were more than 160 Nazis — many with their families — living and working in the United States.
A good number were housed at a facility called Hilltop in Dayton, Ohio, where many complained they were little more than “caged animals.” The US military scientists working alongside them were disgusted by their new colleagues, expressing “emotions . . . ranging from vehemence to frustration.”
The other group — at 115, the largest — was a team of rocket scientists held on Fort Bliss in Texas. Their leader was Wernher von Braun, who, it turned out, really loved America. He was enthralled with the desert and the open-air jeeps driven by Army personnel. He became an evangelical Christian. He was permitted to return to Germany to marry his 18-year-old cousin — von Braun was 46 — and bring her back to the US. If he had one complaint, it was his research budget.
As he later said, while working for the Third Reich “we’d been coddled. Here they were counting pennies.”
In November 1946, shortly after 10 Nazis were executed at Nuremberg by US Master Sgt. John C. Woods (“I hanged those 10 Nazis . . . and I am proud of it”), news broke that the US had smuggled hundreds of Nazis into the country, and that about 1,000 more were coming. (The final count was close to 1,600.) The government attempted damage control, then message control: These men, so mild-mannered with their silver hair and American sport jackets, had never been members of the Nazi party. The Army disseminated pictures of the men and their families engaged in wholesome outdoor activities, and any reporter requesting an interview had to submit their copy, pre-publication, to the army for approval.
Not everyone was fooled. Eleanor Roosevelt publicly decried the program, as did Albert Einstein. By March 1947, Paperclip had generated such lacerating public opinion that General Eisenhower, then the US Army chief of staff, demanded a briefing. It lasted 20 minutes, and upon emerging, Eisenhower said he approved of the project.
The legacy of Paperclip, Jacobsen writes, speaks to the triumph of pragmatism and self-interest above unthinkable atrocity.
Wernher von Braun helped get us to the moon; in the years before the landing, he was photographed with President Kennedy. Heinrich Rose and Konrad Buttner, two hardcore Nazis, conducted experiments for the US on how best to protect soldiers in atomic warfare.
Today, the Space Medicine Association and the National Space Club continue to bestow awards named after Nazis. When Jacobsen asked Steve Griffin, head of the National Space Club, why they memorialize Nazi Kurt Debus in this way, he was dispassionate and logical.
“Simple as it is,” he said, “Kurt Debus is an honored American.”
By Maureen Callahan February 1, 2014 | 12:29pm
Find this story at 1 February 2014
© 2014 NYP Holdings, Inc.
Nazis Were Given ‘Safe Haven’ in U.S., Report Says22 februari 2014
WASHINGTON — A secret history of the United States government’s Nazi-hunting operation concludes that American intelligence officials created a “safe haven” in the United States for Nazis and their collaborators after World War II, and it details decades of clashes, often hidden, with other nations over war criminals here and abroad.
The 600-page report, which the Justice Department has tried to keep secret for four years, provides new evidence about more than two dozen of the most notorious Nazi cases of the last three decades.
It describes the government’s posthumous pursuit of Dr. Josef Mengele, the so-called Angel of Death at Auschwitz, part of whose scalp was kept in a Justice Department official’s drawer; the vigilante killing of a former Waffen SS soldier in New Jersey; and the government’s mistaken identification of the Treblinka concentration camp guard known as Ivan the Terrible.
The report catalogs both the successes and failures of the band of lawyers, historians and investigators at the Justice Department’s Office of Special Investigations, which was created in 1979 to deport Nazis.
Perhaps the report’s most damning disclosures come in assessing the Central Intelligence Agency’s involvement with Nazi émigrés. Scholars and previous government reports had acknowledged the C.I.A.’s use of Nazis for postwar intelligence purposes. But this report goes further in documenting the level of American complicity and deception in such operations.
The Justice Department report, describing what it calls “the government’s collaboration with persecutors,” says that O.S.I investigators learned that some of the Nazis “were indeed knowingly granted entry” to the United States, even though government officials were aware of their pasts. “America, which prided itself on being a safe haven for the persecuted, became — in some small measure — a safe haven for persecutors as well,” it said.
The report also documents divisions within the government over the effort and the legal pitfalls in relying on testimony from Holocaust survivors that was decades old. The report also concluded that the number of Nazis who made it into the United States was almost certainly much smaller than 10,000, the figure widely cited by government officials.
The Justice Department has resisted making the report public since 2006. Under the threat of a lawsuit, it turned over a heavily redacted version last month to a private research group, the National Security Archive, but even then many of the most legally and diplomatically sensitive portions were omitted. A complete version was obtained by The New York Times.
The Justice Department said the report, the product of six years of work, was never formally completed and did not represent its official findings. It cited “numerous factual errors and omissions,” but declined to say what they were.
More than 300 Nazi persecutors have been deported, stripped of citizenship or blocked from entering the United States since the creation of the O.S.I., which was merged with another unit this year.
In chronicling the cases of Nazis who were aided by American intelligence officials, the report cites help that C.I.A. officials provided in 1954 to Otto Von Bolschwing, an associate of Adolph Eichmann who had helped develop the initial plans “to purge Germany of the Jews” and who later worked for the C.I.A. in the United States. In a chain of memos, C.I.A. officials debated what to do if Von Bolschwing were confronted about his past — whether to deny any Nazi affiliation or “explain it away on the basis of extenuating circumstances,” the report said.
The Justice Department, after learning of Von Bolschwing’s Nazi ties, sought to deport him in 1981. He died that year at age 72.
The report also examines the case of Arthur L. Rudolph, a Nazi scientist who ran the Mittelwerk munitions factory. He was brought to the United States in 1945 for his rocket-making expertise under Operation Paperclip, an American program that recruited scientists who had worked in Nazi Germany. (Rudolph has been honored by NASA and is credited as the father of the Saturn V rocket.)
The report cites a 1949 memo from the Justice Department’s No. 2 official urging immigration officers to let Rudolph back in the country after a stay in Mexico, saying that a failure to do so “would be to the detriment of the national interest.”
Justice Department investigators later found evidence that Rudolph was much more actively involved in exploiting slave laborers at Mittelwerk than he or American intelligence officials had acknowledged, the report says.
Some intelligence officials objected when the Justice Department sought to deport him in 1983, but the O.S.I. considered the deportation of someone of Rudolph’s prominence as an affirmation of “the depth of the government’s commitment to the Nazi prosecution program,” according to internal memos.
The Justice Department itself sometimes concealed what American officials knew about Nazis in this country, the report found.
In 1980, prosecutors filed a motion that “misstated the facts” in asserting that checks of C.I.A. and F.B.I. records revealed no information on the Nazi past of Tscherim Soobzokov, a former Waffen SS soldier. In fact, the report said, the Justice Department “knew that Soobzokov had advised the C.I.A. of his SS connection after he arrived in the United States.”
(After the case was dismissed, radical Jewish groups urged violence against Mr. Soobzokov, and he was killed in 1985 by a bomb at his home in Paterson, N.J. )
The secrecy surrounding the Justice Department’s handling of the report could pose a political dilemma for President Obama because of his pledge to run the most transparent administration in history. Mr. Obama chose the Justice Department to coordinate the opening of government records.
The Nazi-hunting report was the brainchild of Mark Richard, a senior Justice Department lawyer. In 1999, he persuaded Attorney General Janet Reno to begin a detailed look at what he saw as a critical piece of history, and he assigned a career prosecutor, Judith Feigin, to the job. After Mr. Richard edited the final version in 2006, he urged senior officials to make it public but was rebuffed, colleagues said.
When Mr. Richard became ill with cancer, he told a gathering of friends and family that the report’s publication was one of three things he hoped to see before he died, the colleagues said. He died in June 2009, and Attorney General Eric H. Holder Jr. spoke at his funeral.
“I spoke to him the week before he died, and he was still trying to get it released,” Ms. Feigin said. “It broke his heart.”
After Mr. Richard’s death, David Sobel, a Washington lawyer, and the National Security Archive sued for the report’s release under the Freedom of Information Act.
The Justice Department initially fought the lawsuit, but finally gave Mr. Sobel a partial copy — with more than 1,000 passages and references deleted based on exemptions for privacy and internal deliberations.
Laura Sweeney, a Justice Department spokeswoman, said the department is committed to transparency, and that redactions are made by experienced lawyers.
The full report disclosed that the Justice Department found “a smoking gun” in 1997 establishing with “definitive proof” that Switzerland had bought gold from the Nazis that had been taken from Jewish victims of the Holocaust. But these references are deleted, as are disputes between the Justice and State Departments over Switzerland’s culpability in the months leading up to a major report on the issue.
Another section describes as “a hideous failure” a series of meetings in 2000 that United States officials held with Latvian officials to pressure them to pursue suspected Nazis. That passage is also deleted.
So too are references to macabre but little-known bits of history, including how a director of the O.S.I. kept a piece of scalp that was thought to belong to Dr. Mengele in his desk in hopes that it would help establish whether he was dead.
The chapter on Dr. Mengele, one of the most notorious Nazis to escape prosecution, details the O.S.I.’s elaborate efforts in the mid-1980s to determine whether he had fled to the United States and might still be alive.
It describes how investigators used letters and diaries apparently written by Dr. Mengele in the 1970s, along with German dental records and Munich phone books, to follow his trail.
After the development of DNA tests, the piece of scalp, which had been turned over by the Brazilian authorities, proved to be a critical piece of evidence in establishing that Dr. Mengele had fled to Brazil and had died there in about 1979 without ever entering the United States, the report said. The edited report deletes references to Dr. Mengele’s scalp on privacy grounds.
Even documents that have long been available to the public are omitted, including court decisions, Congressional testimony and front-page newspaper articles from the 1970s.
A chapter on the O.S.I.’s most publicized failure — the case against John Demjanjuk, a retired American autoworker who was mistakenly identified as Treblinka’s Ivan the Terrible — deletes dozens of details, including part of a 1993 ruling by the United States Court of Appeals for the Sixth Circuit that raised ethics accusations against Justice Department officials.
That section also omits a passage disclosing that Latvian émigrés sympathetic to Mr. Demjanjuk secretly arranged for the O.S.I.’s trash to be delivered to them each day from 1985 to 1987. The émigrés rifled through the garbage to find classified documents that could help Mr. Demjanjuk, who is currently standing trial in Munich on separate war crimes charges.
Ms. Feigin said she was baffled by the Justice Department’s attempt to keep a central part of its history secret for so long. “It’s an amazing story,” she said, “that needs to be told.”
New York Times, November 12, 2010
By Eric Lichtblau
Find this story at 12 November 2010
The report
Copyright New York Times 2010
Snowden Documents Reveal Covert Surveillance and Pressure Tactics Aimed at WikiLeaks and Its Supporters22 februari 2014
Top-secret documents from the National Security Agency and its British counterpart reveal for the first time how the governments of the United States and the United Kingdom targeted WikiLeaks and other activist groups with tactics ranging from covert surveillance to prosecution.
The efforts – detailed in documents provided previously by NSA whistleblower Edward Snowden – included a broad campaign of international pressure aimed not only at WikiLeaks founder Julian Assange, but at what the U.S. government calls “the human network that supports WikiLeaks.” The documents also contain internal discussions about targeting the file-sharing site Pirate Bay and hacktivist collectives such as Anonymous.
One classified document from Government Communications Headquarters, Britain’s top spy agency, shows that GCHQ used its surveillance system to secretly monitor visitors to a WikiLeaks site. By exploiting its ability to tap into the fiber-optic cables that make up the backbone of the Internet, the agency confided to allies in 2012, it was able to collect the IP addresses of visitors in real time, as well as the search terms that visitors used to reach the site from search engines like Google.
Another classified document from the U.S. intelligence community, dated August 2010, recounts how the Obama administration urged foreign allies to file criminal charges against Assange over the group’s publication of the Afghanistan war logs.
A third document, from July 2011, contains a summary of an internal discussion in which officials from two NSA offices – including the agency’s general counsel and an arm of its Threat Operations Center – considered designating WikiLeaks as “a ‘malicious foreign actor’ for the purpose of targeting.” Such a designation would have allowed the group to be targeted with extensive electronic surveillance – without the need to exclude U.S. persons from the surveillance searches.
In 2008, not long after WikiLeaks was formed, the U.S. Army prepared a report that identified the organization as an enemy, and plotted how it could be destroyed. The new documents provide a window into how the U.S. and British governments appear to have shared the view that WikiLeaks represented a serious threat, and reveal the controversial measures they were willing to take to combat it.
In a statement to The Intercept, Assange condemned what he called “the reckless and unlawful behavior of the National Security Agency” and GCHQ’s “extensive hostile monitoring of a popular publisher’s website and its readers.”
“News that the NSA planned these operations at the level of its Office of the General Counsel is especially troubling,” Assange said. “Today, we call on the White House to appoint a special prosecutor to investigate the extent of the NSA’s criminal activity against the media, including WikiLeaks, its staff, its associates and its supporters.”
Illustrating how far afield the NSA deviates from its self-proclaimed focus on terrorism and national security, the documents reveal that the agency considered using its sweeping surveillance system against Pirate Bay, which has been accused of facilitating copyright violations. The agency also approved surveillance of the foreign “branches” of hacktivist groups, mentioning Anonymous by name.
The documents call into question the Obama administration’s repeated insistence that U.S. citizens are not being caught up in the sweeping surveillance dragnet being cast by the NSA. Under the broad rationale considered by the agency, for example, any communication with a group designated as a “malicious foreign actor,” such as WikiLeaks and Anonymous, would be considered fair game for surveillance.
Julian Sanchez, a research fellow at the Cato Institute who specializes in surveillance issues, says the revelations shed a disturbing light on the NSA’s willingness to sweep up American citizens in its surveillance net.
“All the reassurances Americans heard that the broad authorities of the FISA Amendments Act could only be used to ‘target’ foreigners seem a bit more hollow,” Sanchez says, “when you realize that the ‘foreign target’ can be an entire Web site or online forum used by thousands if not millions of Americans.”
GCHQ Spies on WikiLeaks Visitors
The system used by GCHQ to monitor the WikiLeaks website – codenamed ANTICRISIS GIRL – is described in a classified PowerPoint presentation prepared by the British agency and distributed at the 2012 “SIGDEV Conference.” At the annual gathering, each member of the “Five Eyes” alliance – the United States, United Kingdom, Canada, Australia and New Zealand – describes the prior year’s surveillance successes and challenges.
In a top-secret presentation at the conference, two GCHQ spies outlined how ANTICRISIS GIRL was used to enable “targeted website monitoring” of WikiLeaks (See slides 33 and 34). The agency logged data showing hundreds of users from around the world, including the United States, as they were visiting a WikiLeaks site –contradicting claims by American officials that a deal between the U.K. and the U.S. prevents each country from spying on the other’s citizens.
The IP addresses collected by GCHQ are used to identify individual computers that connect to the Internet, and can be traced back to specific people if the IP address has not been masked using an anonymity service. If WikiLeaks or other news organizations were receiving submissions from sources through a public dropbox on their website, a system like ANTICRISIS GIRL could potentially be used to help track them down. (WikiLeaks has not operated a public dropbox since 2010, when it shut down its system in part due to security concerns over surveillance.)
In its PowerPoint presentation, GCHQ identifies its target only as “wikileaks.” One slide, displaying analytics derived from the surveillance, suggests that the site monitored was the official wikileaks.org domain. It shows that users reached the targeted site by searching for “wikileaks.org” and for “maysan uxo,” a term associated with a series of leaked Iraq war logs that are hosted on wikileaks.org.
The ANTICRISIS GIRL initiative was operated by a GCHQ unit called Global Telecoms Exploitation (GTE), which was previously reported by The Guardian to be linked to the large-scale, clandestine Internet surveillance operation run by GCHQ, codenamed TEMPORA.
Operating in the United Kingdom and from secret British eavesdropping bases in Cyprus and other countries, GCHQ conducts what it refers to as “passive” surveillance – indiscriminately intercepting massive amounts of data from Internet cables, phone networks and satellites. The GTE unit focuses on developing “pioneering collection capabilities” to exploit the stream of data gathered from the Internet.
As part of the ANTICRISIS GIRL system, the documents show, GCHQ used publicly available analytics software called Piwik to extract information from its surveillance stream, not only monitoring visits to targeted websites like WikiLeaks, but tracking the country of origin of each visitor.
It is unclear from the PowerPoint presentation whether GCHQ monitored the WikiLeaks site as part of a pilot program designed to demonstrate its capability, using only a small set of covertly collected data, or whether the agency continues to actively deploy its surveillance system to monitor visitors to WikiLeaks. It was previously reported in The Guardian that X-KEYSCORE, a comprehensive surveillance weapon used by both NSA and GCHQ, allows “an analyst to learn the IP addresses of every person who visits any website the analyst specifies.”
GCHQ refused to comment on whether ANTICRISIS GIRL is still operational. In an email citing the agency’s boilerplate response to inquiries, a spokeswoman insisted that “all of GCHQ’s work is carried out in accordance with a strict legal and policy framework which ensures that our activities are authorized, necessary and proportionate, and that there is rigorous oversight.”
But privacy advocates question such assurances. “How could targeting an entire website’s user base be necessary or proportionate?” says Gus Hosein, executive director of the London-based human rights group Privacy International. “These are innocent people who are turned into suspects based on their reading habits. Surely becoming a target of a state’s intelligence and security apparatus should require more than a mere click on a link.”
The agency’s covert targeting of WikiLeaks, Hosein adds, call into question the entire legal rationale underpinning the state’s system of surveillance. “We may be tempted to see GCHQ as a rogue agency, ungoverned in its use of unprecedented powers generated by new technologies,” he says. “But GCHQ’s actions are authorized by [government] ministers. The fact that ministers are ordering the monitoring of political interests of Internet users shows a systemic failure in the rule of law.”
Going After Assange and His Supporters
The U.S. attempt to pressure other nations to prosecute Assange is recounted in a file that the intelligence community calls its “Manhunting Timeline.” The document details, on a country-by-country basis, efforts by the U.S. government and its allies to locate, prosecute, capture or kill alleged terrorists, drug traffickers, Palestinian leaders and others. There is a timeline for each year from 2008 to 2012.
An entry from August 2010 – headlined “United States, Australia, Great Britain, Germany, Iceland” – states: “The United States on August 10 urged other nations with forces in Afghanistan, including Australia, United Kingdom, and Germany, to consider filing criminal charges against Julian Assange.” It describes Assange as the “founder of the rogue Wikileaks Internet website and responsible for the unauthorized publication of over 70,000 classified documents covering the war in Afghanistan.”
In response to questions from The Intercept, the NSA suggested that the entry is “a summary derived from a 2010 article” in the Daily Beast. That article, which cited an anonymous U.S. official, reported that “the Obama administration is pressing Britain, Germany, Australia, and other allied Western governments to consider opening criminal investigations of WikiLeaks founder Julian Assange and to severely limit his nomadic travels across international borders.”
The government entry in the “Manhunting Timeline” adds Iceland to the list of Western nations that were pressured, and suggests that the push to prosecute Assange is part of a broader campaign. The effort, it explains, “exemplifies the start of an international effort to focus the legal element of national power upon non-state actor Assange, and the human network that supports WikiLeaks.” The entry does not specify how broadly the government defines that “human network,” which could potentially include thousands of volunteers, donors and journalists, as well as people who simply spoke out in defense of WikiLeaks.
In a statement, the NSA declined to comment on the documents or its targeting of activist groups, noting only that the agency “provides numerous opportunities and forums for their analysts to explore hypothetical or actual circumstances to gain appropriate advice on the exercise of their authorities within the Constitution and the law, and to share that advice appropriately.”
But the entry aimed at WikiLeaks comes from credentialed officials within the intelligence community. In an interview in Hong Kong last June, Edward Snowden made clear that the only NSA officials empowered to write such entries are those “with top-secret clearance and public key infrastructure certificates” – a kind of digital ID card enabling unique access to certain parts of the agency’s system. What’s more, Snowden added, the entries are “peer reviewed” – and every edit made is recorded by the system.
The U.S. launched its pressure campaign against WikiLeaks less than a week after the group began publishing the Afghanistan war logs on July 25, 2010. At the time, top U.S. national security officials accused WikiLeaks of having “blood” on its hands. But several months later, McClatchy reported that “U.S. officials concede that they have no evidence to date that the documents led to anyone’s death.”
The government targeting of WikiLeaks nonetheless continued. In April 2011, Salon reported that a grand jury in Virginia was actively investigating both the group and Assange on possible criminal charges under espionage statutes relating to the publication of classified documents. And in August of 2012, the Sydney Morning Herald, citing secret Australian diplomatic cables, reported that “Australian diplomats have no doubt the United States is still gunning for Julian Assange” and that “Australia’s diplomatic service takes seriously the likelihood that Assange will eventually be extradited to the US on charges arising from WikiLeaks obtaining leaked US military and diplomatic documents.”
Bringing criminal charges against WikiLeaks or Assange for publishing classified documents would be highly controversial – especially since the group partnered with newspapers like The Guardian and The New York Times to make the war logs public. “The biggest challenge to the press today is the threatened prosecution of WikiLeaks, and it’s absolutely frightening,” James Goodale, who served as chief counsel of the Times during its battle to publish The Pentagon Papers, told the Columbia Journalism Review last March. “If you go after the WikiLeaks criminally, you go after the Times. That’s the criminalization of the whole process.”
In November 2013, The Washington Post, citing anonymous officials, reported that the Justice Department strongly considered prosecuting Assange, but concluded it “could not do so without also prosecuting U.S. news organizations and journalists” who had partnered with WikiLeaks to publish the documents. According to the Post, officials “realized that they have what they described as a ‘New York Times problem’” – namely, that any theory used to bring charges against Assange would also result in criminal liability for the Times, The Guardian, and other papers which also published secret documents provided to WikiLeaks.
NSA proposals to target WikiLeaks
As the new NSA documents make clear, however, the U.S. government did more than attempt to engineer the prosecution of Assange. NSA analysts also considered designating WikiLeaks as a “malicious foreign actor” for surveillance purposes – a move that would have significantly expanded the agency’s ability to subject the group’s officials and supporters to extensive surveillance.
Such a designation would allow WikiLeaks to be targeted with surveillance without the use of “defeats” – an agency term for technical mechanisms to shield the communications of U.S. persons from getting caught in the dragnet.
That top-secret document – which summarizes a discussion between the NSA’s Office of the General Counsel and the Oversight and Compliance Office of the agency’s Threat Operations Center – spells out a rationale for including American citizens in the surveillance:
“If the foreign IP is consistently associated with malicious cyber activity against the U.S., so, tied to a foreign individual or organization known to direct malicious activity our way, then there is no need to defeat any to, from, or about U.S. Persons. This is based on the description that one end of the communication would always be this suspect foreign IP, and so therefore any U.S. Person communicant would be incidental to the foreign intelligence task.”
In short, labeling WikiLeaks a “malicious foreign target” would mean that anyone communicating with the organization for any reason – including American citizens – could have their communications subjected to government surveillance.
When NSA officials are asked in the document if WikiLeaks or Pirate Bay could be designated as “malicious foreign actors,” the reply is inconclusive: “Let us get back to you.” There is no indication of whether either group was ever designated or targeted in such a way.
The NSA’s lawyers did, however, give the green light to subject other activists to heightened surveillance. Asked if it would be permissible to “target the foreign actors of a loosely coupled group of hackers … such as with Anonymous,” the response is unequivocal: “As long as they are foreign individuals outside of the US and do not hold dual citizenship … then you are okay.”
NSA Lawyers: “It’s Nothing to Worry About”
Sanchez, the surveillance expert with the Cato Institute, says the document serves as “a reminder that NSA essentially has carte blanche to spy on non-Americans. In public statements, intelligence officials always talk about spying on ‘terrorists,’ as if those are the only targets — but Section 702 [of the 2008 FISA Amendments Act] doesn’t say anything about ‘terrorists.’ They can authorize collection on any ‘persons reasonably believed to be [located] outside the United States,’ with ‘persons’ including pretty much any kind of group not ‘substantially’ composed of Americans.”
Sanchez notes that while it makes sense to subject some full-scale cyber-attacks to government surveillance, “it would make no sense to lump together foreign cyberattackers with sites voluntarily visited by enormous numbers of Americans, like Pirate Bay or WikiLeaks.”
Indeed, one entry in the NSA document expressly authorizes the targeting of a “malicious” foreign server – offering Pirate Bay as a specific example –“even if there is a possibility that U.S. persons could be using it as well.” NSA officials agree that there is no need to exclude Americans from the surveillance, suggesting only that the agency’s spies “try to minimize” how many U.S. citizens are caught in the dragnet.
Another entry even raises the possibility of using X-KEYSCORE, one of the agency’s most comprehensive surveillance programs, to target communications between two U.S.-based Internet addresses if they are operating through a “proxy” being used for “malicious foreign activity.” In response, the NSA’s Threat Operations Center approves the targeting, but the agency’s general counsel requests “further clarification before signing off.”
If WikiLeaks were improperly targeted, or if a U.S. citizen were swept up in the NSA’s surveillance net without authorization, the agency’s attitude seems to be one of indifference. According to the document – which quotes a response by the NSA’s Office of General Counsel and the oversight and compliance office of its Threat Operations Center – discovering that an American has been selected for surveillance must be mentioned in a quarterly report, “but it’s nothing to worry about.”
The attempt to target WikiLeaks and its broad network of supporters drew sharp criticism from the group and its allies. “These documents demonstrate that the political persecution of WikiLeaks is very much alive,” says Baltasar Garzón, the Spanish former judge who now represents the group. “The paradox is that Julian Assange and the WikiLeaks organization are being treated as a threat instead of what they are: a journalist and a media organization that are exercising their fundamental right to receive and impart information in its original form, free from omission and censorship, free from partisan interests, free from economic or political pressure.”
For his part, Assange remains defiant. “The NSA and its U.K. accomplices show no respect for the rule of law,” he told The Intercept. “But there is a cost to conducting illicit actions against a media organization.” Referring to a criminal complaint that the group filed last year against “interference with our journalistic work in Europe,” Assange warned that “no entity, including the NSA, should be permitted to act against a journalist with impunity.”
Assange indicated that in light of the new documents, the group may take further legal action.
“We have instructed our general counsel, Judge Baltasar Garzón, to prepare the appropriate response,” he said. “The investigations into attempts to interfere with WikiLeaks’ work will go wherever they need to go. Make no mistake: those responsible will be held to account and brought to justice.”
By Glenn Greenwald and Ryan Gallagher
18 Feb 2014, 1:50 AM EST
Find this story at 18 February 2014
© 2014 First Look Productions, Inc.
Leaked NSA documents show debate over tracking WikiLeaks, The Pirate Bay, and others22 februari 2014
Leaked documents posted by Glenn Greenwald and Ryan Gallagher hint at the discussions that took place around online actors like WikiLeaks, The Pirate Bay, and Anonymous, as well as the standards for spying on foreign and domestic internet users. At The Intercept, Greenwald and Gallagher have revealed details about when the NSA and agencies abroad believe it’s acceptable to target a person or site without “defeats” or measures to prevent collecting American information, with an eye towards groups that have proved a thorn in the side of government agencies.
Julian Assange appears in national security ‘Manhunting Timeline’
“Can we treat a foreign server who stores, or potentially disseminates leaked or stolen US data on it’s [sic] server as a ‘malicious foreign actor’ for the purpose of targeting with no defeats? Examples: WikiLeaks, thepiratebay.org, etc.” says one of several frequently asked questions apparently posted to an intelligence wiki for the US and other nations in the Five Eyes surveillance partnership. “Let us get back to you,” said a response from the NSA/CSS [Central Security Service] Threat Operation Center and the NSA’s Office of General Counsel. Another question asks whether it’s legal to target members of Anonymous who operate outside the US. “As long as they are foreign individuals outside of the US and do not hold dual citizenship… then you are okay,” came the answer. Agencies were not, however, apparently allowed to store copies of classified documents leaked by Anonymous or other groups in order to analyze the data.
WikiLeaks in particular came under fire. In addition to these questions, The Intercept leaked parts of a “Manhunting Timeline” that details where and how the US government is attempting to find, capture, or kill terrorists, drug traffickers, and others. This timeline apparently included information on Julian Assange, including attempts to pressure foreign governments into taking legal action against him and “the human network that supports WikiLeaks.” None of this comes as a surprise — the government’s attempts to get governments to put pressure on Assange is well known. Likewise, Anonymous has allegedly compromised government computers, and it’s not strange that the NSA wants to monitor it. The question of treating leaked document repositories as malicious foreign actors is thornier, playing into much larger debates over whether non-traditional journalism should be given the same protection as older outlets like The New York Times.
“If you ‘guess’ foreign and it’s not, then it is a serious violation.”
More generally, the document shows a complicated dance between minimizing US data collection and casting an expansive net over foreign surveillance. According to the FAQ, it’s legal to monitor foreign servers that Americans visit (The Pirate Bay is cited again) so long as agents attempt to filter out US information. The same goes for botnets that are operated from hacked US computers by a foreign source. As before, the document points to a fairly low standard for being certain that a target is foreign: 51 percent. A more complicated question is how agents are allowed to search traffic from US-based web giants like Gmail and Twitter. If an agency knows that a foreign potential threat is using one of these sites, it’s theoretically possible to look for traffic from it. But “if you ‘guess’ foreign and it’s not, then it is a serious violation.” In general, though, accidentally making queries a US person who was believed to be foreign was “nothing to worry about,” although it had to be logged for the Office of General Counsel.
The revelations here are far less conclusive than many of the leaked documents published so far. One slide apparently from an expanded version of this GCHQ document shows an analytics page that seems to monitor visits to WikiLeaks, including which countries visitors came from and how they found the site. But it’s not clear whether this is an ongoing program or a proof of concept test, especially given how few visits appear to be logged. The results are also broadly similar to what someone would get from a basic analytics page, not detailed user information. This slideshow and the FAQ do, however, give us a look into how the NSA and other agencies view online spycraft, both inside and outside the US.
By Adi Robertson on February 18, 2014 10:36 am
Find this story at 18 February 2014
© 2014 Vox Media,
New Snowden docs show NSA, GCHQ spied on WikiLeaks, Pirate Bay users; GCHQ conducts broad surveillance of social media and watched WikiLeaks users.22 februari 2014
Squeaky Dolphin, GCHQ’s broad social media monitoring tool, is part of the agency’s campaign to “understand and shape the Human Terrain”—that is, regional public sentiment.
Documents obtained by former NSA contractor Edward Snowden and published on The Intercept show that NSA analysts monitored content on The Pirate Bay and used the agency’s surveillance systems to track where it came from. The documents also show that the NSA’s British partners at the GCHQ used XKeyscore data as part of a surveillance program on sites that included WikiLeaks. That was part of a broader psychological profiling and targeting program to collect intelligence, influence individuals online, and disrupt groups like Anonymous that were considered threats.
The new documents show that the GCHQ conducted “broad real-time monitoring of social media activities, processing data on activities like watching YouTube videos and Facebook Likes to profile, categorize, and target individuals for psychological operations.” The NSA documents in the latest disclosure refer to monitoring for content that could be considered “malicious foreign activity.” But it’s clear that the NSA also used its XKeyscore surveillance to dig through traffic to the torrent-sharing site, and it could very well have profiled foreign users of sites like WikiLeaks and monitored their access to that and other websites.
However, the documents—one an internal NSA “frequently asked questions” Wiki page and the other a set of GCHQ slides on psychological operations—do not provide a picture of how much information about people accessing WikiLeaks was shared between the GCHQ and the NSA. And while the documents point to NSA monitoring of Pirate Bay, there’s no suggestion of how the information gathered was used or if it was used at all.
A third, unpublished document shows that the Obama administration apparently encouraged foreign governments in 2010 (including the UK) to pursue charges against WikiLeaks for the publication of diplomatic “wires” provided by Chelsea Manning, formerly known as Bradley Manning.
“Squeaky Dolphin,” “Airwolf,” and “AnticrisisGirl”
The GCHQ slide deck, published in 2012, highlights two tools used to conduct social networking, Web monitoring, and profiling. The first, called “Squeaky Dolphin,” pulls online activities within Web traffic caught by the agency’s monitoring systems. The monitoring systems are called “Airwolf” in the slides, which may be a UK codeword for the GCHQ’s equivalent of XKeyscore. That data includes webmail, blogs visited, YouTube views, Facebook “likes” clicked on websites themselves, and other data culled from individual users’ captured activity.
It runs those activities, captured in real-time, through IBM’s InfoSphere Streams processing software to create analytical feeds. Those feeds are then piped into a Splunk database and surfaced through a “dashboard” view that allows analysts to find trends in sentiment. As an example, the slides showed activity related to cricket matches in London and the surge in Facebook likes for Conservative member of Parliament Liam Fox. It can also be used to spot trends in traffic that might indicate upcoming events such as protests or other civil unrest.
While Squeaky Dolphin tends to look at things with a wider view, “AnticrisisGirl” is a bit more targeted. It can be used to passively monitor specific websites—including traffic to WikiLeaks, as the slides demonstrate. The tool can be tuned to a specific set of Internet user signatures or keywords, and it provides analytics of their behavior in real time, capturing search terms or direct Web addresses used to get to the sites in question.
“Nothing to worry about”
The final document in the latest disclosure, from an NSA internal Wiki, is entitled “Discovery SIGINT Targeting Scenarios and Compliance.” Created in 2011, it provides guidance on what is and isn’t allowed in performing XKeyscore queries and using other analytics tools to capture and analyze data. The document explains when it’s allowed to query against US “selectors”—people or systems running within the United States.
One of the entries is entitled “Unknowingly targeting a US person”:
I screwed up…the selector had a strong indication of being foreign, but it turned out to be US…now what?
NOC/OGC RESPONSE: With all querying, if you discover it actually is US, then it must be submitted and go in the [Office of General Counsel] quarterly report…’but it’s nothing to worry about.’ (Source #001)
Several of the entries on the Wiki page relate to monitoring of PirateBay. One question posted asked whether it was OK to back-trace connections to thepiratebay.org “even if it hops through US based proxies.” The NSA’s Office of General Counsel responded that it was allowed only by use of metadata “chaining” in compliance with the Department of Defense’s Supplemental Procedures Governing Communications Metadata Analysis” (SPCMA). That order requires that analysts “enter a foreign intelligence (FI) justification for making a query or starting a chain”—in other words, analysts can’t just start a query of a post on The Pirate Bay without documenting their cause.
Another question posted about The Pirate Bay asked if a password for an account associated with a US person was enough to rule out tracking the source. “If a list of .mil passwords were released to thepiratebay.org…can we go back into [XKeyscore data] (using a custom created fingerprint) to search for traffic containing that password in foreign traffic just before the release?” The official response was that while a password alone would not normally be considered to a “US person,” searching for the password data for military accounts would be allowed due to the NSA’s support role for the Defense Department. Such actions would be “consistent with the SIGINT Consensual Collection package signed by [the commander of] USCYBERCOM and [director of the NSA], appropriate to both of his hats”—referring to Gen. Keith Alexander’s dual role as head of both DOD’s cyber operations and the NSA.
Ironically, the NSA’s privacy regulations do keep it from collecting one type of data—private information published by hackers. In a response to a question on whether it was legal to store data exposed by Anonymous or other groups for forensic purposes, the NSA general counsel said it was only legal to retain “.mil information.” It wasn’t clear whether it was legal to retain data from other government agencies.
by Sean Gallagher – Feb 18 2014, 8:35pm +0100
Find this story at 18 February 2014
© 2014 Condé Nast.
NSA, GCHQ targeted WikiLeaks network; U.K. and U.S. governments used surveillance and political pressure against publishers of government abuses22 februari 2014
The latest report from the Intercept based on Edward Snowden’s NSA leaks reveals how the NSA and its British counterpart GCHQ targeted WikiLeaks and its supporters. The report details how the U.S. and U.K. governments deployed surveillance tools against WikiLeaks networks and supporters, while pressuring international governments to persecute the organization’s founder, Julian Assange, over the publication of the Afghanistan war logs. The documents also show that the NSA considered ways to spy on Anonymous affiliates and hackers as well as users of file-sharing site Pirate Bay.
The documents are some of the most significant to come to light yet in highlighting the government’s engagement in what Snowden’s attorney Jesselyn Raddack has long called a “war on information.” Publishers and activists have been specifically targeted for making public otherwise secrecy-shrouded instances of abuses of power by the government and the military. “This is a very troubling report,” said Jameel Jaffer, American Civil Liberties Union deputy legal director. “Publishers who disclose abuses of government power should not be subjected to invasive surveillance for having done so, and individuals should not be swept up into surveillance dragnets simply because they’ve visited websites that report on those abuses.”
The efforts – detailed in documents provided previously by NSA whistleblower Edward Snowden – included a broad campaign of international pressure aimed not only at WikiLeaks founder Julian Assange, but at what the U.S. government calls “the human network that supports WikiLeaks.” The documents also contain internal discussions about targeting the file-sharing site Pirate Bay and hacktivist collectives such as Anonymous.
One classified
Tuesday, Feb 18, 2014 07:31 PM +0100
Natasha Lennard
Find this story at 18 February 2013
© 2014 The Associated Press
NSA, British spy agency targeted Assange & the WikiLeaks’ ‘human network’22 februari 2014
American and British spy agencies conducted a campaign against the WikiLeaks website and its surrounding “human network,” according to a new report.
The article, appearing Tuesday in the online publication The Intercept, is based on new information found in documents previously released by Edward Snowden. He is the former National Security Agency (NSA) contractor who has made public — through WikiLeaks — a large cache of otherwise secret NSA materials.
One classified document from the British spy agency Government Communications Headquarters (GCHQ) appears to be presenting a primer on passive monitoring of websites. But the Intercept story adds the factor that GCHQ’s monitoring system, called ANTICRISIS GIRL, secretly monitored visitors to WikiLeaks via a tap into Internet backbone cables, capturing in real time the IP addresses of site visitors.
Also included is a 2011 document of an internal NSA wiki with a brief discussion about whether the classification “malicious foreign actor” can be applied to WikiLeaks:
“Can we treat a foreign server who stores or potentially disseminates leaked or stolen data on its server as a ‘malicious foreign actor’ for the purpose of targeting with no defeats? Examples: WikiLeaks, thepiratebay.org, etc.”
The response by an unnamed NSA employee says, “Let me get back to you.” The term “no defeats” is considered to mean “with no protections.” The inclusion of the Pirate Bay site, which has been cited for copyright violations, either indicates that classified material was thought to be part of its inventory, or the national security agency was expanding its scope to include copyright.
There is no indication that WikiLeaks or Pirate Bay was actually classified as a “malicious foreign actor” by the NSA. But a 2008 U.S. Army report did identify WikiLeaks as an enemy.
The “human network” also included, of course, WikiLeaks’ founder and editor-in-chief, Julian Assange. An August, 2010 unclassified document also unearthed by The Intercept indicates that the U.S. urged other countries fighting in Afghanistan to file criminal charges against Assange for the publication of more than 70,000 classified documents relating to the war, which had been provided by Army Private First Class Bradley Manning.
The document said that this “appeal exemplifies the start of an international effort to focus the legal element of national power upon non-state actor Assange and the human network that supports WikiLeaks.”
Last year, James Goodale, then the chief counsel of The New York Times, told the Columbia Journalism Review that “the biggest challenge to the press today is the threatened persecution of WikiLeaks, and it’s absolutely frightening.” The Times worked with WikiLeaks in publishing the content of some of the secret documents.
February 18, 2014 1:00 PM
Barry Levine
Find this story at 18 February 2014
© Copyright 2014 VentureBeat
Visited WikiLeaks? NSA and GCHQ know about it22 februari 2014
Julian Assange in 2011 after losing appeals against extradition to Swedenacidpolly/Flickr/CC BY-NC-SA 2.0
Efforts undertaken by the NSA and GCHQ to target groups including WikiLeaks, Anonymous and Pirate Bay using internet surveillance and prosecution have been detailed in an article published by The Intercept.
The latest documents leaked by NSA contractor Edward Snowden reveal that the NSA went to great lengths to target individuals associated with WikiLeaks, including founder Julian Assange and “the human network that supports it”.
One particular document revealed that GCHQ tapped into fibre-optic cables to monitor visitors to the site in real time by tracking their IP addresses. It also tracked the search terms that visitors were using to reach the site, all as part of an operation codenamed ANTICRISIS GIRL. This suggests that internet users from anywhere in the world who visited WikiLeaks regularly could potentially have become a target for the NSA.
The documents also reveal that the NSA labelled WikiLeaks “a malicious foreign actor”. The US government encouraged foreign regimes to press charges against Assange over WikiLeaks’ publication of Afghanistan war logs.
“WikiLeaks strongly condemns the reckless and unlawful behaviour of the National Security Agency,” said Julian Assange in a statement published on the WikiLeaks site. He called upon the Obama administration to conduct an investigation into the extent of the NSA’s activity regarding the media, including the WikiLeaks network. He also criticised the media-monitoring activities of GCHQ, saying it shows no respect for the rule of law.
“No entity, including the NSA, should be permitted to act against journalists with impunity. We have instructed our General Counsel Judge Baltasar Garzón to prepare the appropriate response. The investigations into attempts to interfere with the work of WikiLeaks will go wherever they need to go. Make no mistake: those responsible will be held to account and brought to justice.”
The Intercept — the new publication launched by ex-Guardian journalist Glenn Greenwald, who has headed up the reporting on the Snowden documents — points out that the WikiLeaks surveillance reveals just how far the NSA’s actions stray from its “self-proclaimed focus on terrorism”.
“The documents call into question the Obama administration’s repeated insistence that US citizens are not being caught up in the sweeping surveillance dragnet being cast by the NSA. Under the broad rationale considered by the agency, for example, any communication with a group designated as a ‘malicious foreign actor,’ such as WikiLeaks and Anonymous, would be considered fair game for surveillance,” the site points out.
The targeting of WikiLeaks, Anonymous and Pirate Bay follows earlier revelations that GCHQ used DDoS attacks to target hacker collectives Anonymous and LulzSec. These latest accusations do not reflect well on GCHQ, which maintains its stance that “all of GCHQ’s work is carried out in accordance with a strict legal and policy framework which ensures that our activities are authorised, necessary and proportionate, and that there is rigorous oversight”. It’s hard to see how this would apply to the monitoring of citizens from the UK and abroad who might be doing nothing more than reading the WikiLeaks site.
Politics / 19 February 14 / by Katie Collins
Find this story at 19 February 2014
© Condé Nast UK 2014
Turning a Wedding Into a Funeral: U.S. Drone Strike in Yemen Killed as Many as 12 Civilians22 februari 2014
Human Rights Watch has revealed as many as 12 civilians were killed in December when a U.S. drone targeted vehicles that were part of a wedding procession going toward the groom’s village outside the central Yemeni city of Rad’a. According to HRW, “some, if not all those killed and wounded were civilians” and not members of the armed group al-Qaeda in the Arabian Peninsula as U.S. and Yemeni government officials initially claimed. The report concluded that the attack killed 12 men, between the ages of 20 and 65, and wounded 15 others. It cites accounts from survivors, relatives of the dead, local officials and news media reports. We speak to Human Rights Watch researcher Letta Tayler, who wrote the report, “A Wedding That Became a Funeral: US Drone Attack on Marriage Procession in Yemen,” and Jeremy Scahill, co-founder of the TheIntercept.org, a new digital magazine published by First Look Media. He is the producer and writer of the documentary film, “Dirty Wars: The World is a Battlefield,” which is nominated for an Academy Award.
Transcript
This is a rush transcript. Copy may not be in its final form.
JUAN GONZÁLEZ: A new report has revealed that a U.S. drone strike that killed at least a dozen people in Yemen in December failed to comply with rules imposed by President Obama last year to protect civilians. The strike was carried out by the U.S. military’s Joint Special Operations Command and targeted vehicles that were part of a wedding procession going towards the groom’s village outside the central Yemeni city of Rad’a. According to the Human Rights Watch investigation, quote, “some, if not all those killed and wounded were civilians” and not members of the armed group al-Qaeda in the Arabian Peninsula as U.S. and Yemeni government officials initially claimed. The report concluded that the attack killed 12 men between the ages of 20 and 65 and wounded 15 others. It cites accounts from survivors, relatives of the dead, local officials and news media reports.
One of the witnesses Human Rights Watch interviewed in Yemen was Abdullah Muhammad al-Tisi of Yakla. He described the scene on the day the wedding procession was attacked on December 12, 2013. His son, Ali Abdullah Muhammad al-Tisi, was killed in that drone strike.
ABDULLAH MUHAMMAD AL-TISI: [translated] We were having a traditional marriage ceremony. According to our traditions, the whole tribe has to go to the bride’s tribe. We were in about 12 to 15 cars with 60 to 70 men on board. He had lunch at the bride’s village at Al Abu Saraimah. Then we left to head back to the groom’s village.
A drone was hovering overhead all morning. There were one or two of them. One of the missiles hit the car. The car was totally burned. Four other cars were also struck. When we stopped, we heard the drone fire. Blood was everywhere, and the people killed and injured were scattered everywhere. The area was full of blood, dead bodies and injured people. I was injured. I saw the missile hit the vehicle behind the car my son was driving.
INTERVIEWER: [translated] Was it your car?
ABDULLAH MUHAMMAD AL-TISI: [translated] It was my own car. I went there to check on my son. I found his body thrown from the car. I turned him over, and he was dead. He was already dead.
I didn’t see any al-Qaeda militants in the procession, and no one from the area is a member of al-Qaeda. The Yemeni government gave us 100 Kalashnikovs and 34 million Yemeni rials, nearly $159,000 U.S., according to tribal tradition. According to tribal tradition, this alone is an admission of guilt, and the money was an admission of guilt. The money was for the burial of the dead and the treatment of the injured. The U.S. government made a big mistake. They killed innocent people. This was a serious crime. They turned many kids into orphans, many wives into widows. Many were killed, and many others were injured, although everyone was innocent.
AMY GOODMAN: That was Abdullah Muhammad al-Tisi talking about the U.S. drone strike in December that killed his son. All of this comes as the White House is reportedly considering using a drone to kill a U.S. citizen living in Pakistan who’s allegedly affiliated with al-Qaeda.
For more, we’re joined right now by Letta Tayler, senior researcher on terrorism and counterterrorism at Human Rights Watch. She wrote the new report titled “A Wedding That Became a Funeral: US Drone Attack on Marriage Procession in Yemen.”
We’re also joined by Democracy Now! video stream by Jeremy Scahill, co-founder of TheIntercept.org, as well as the producer of and the co-writer of the documentary that’s been nominated for an Oscar, Dirty Wars.
We welcome you both to Democracy Now! Letta, you just recently came back from Yemen, came out with this report. Talk about its findings.
LETTA TAYLER: Well, it’s a pleasure to be here.
What we found is that this strike on a wedding convoy in Yemen killed 12 people, injured 15, including the bride, who received a superficial face wound. And we have serious concerns that the strike not only may have violated international law, but also flies in the face of President Obama’s policies on targeted killings. The president has said the U.S. does not strike unless it has near certainty that no civilians were killed, yet the evidence strongly suggests that at least some of those killed in this strike, and possibly all of them, were civilians.
JUAN GONZÁLEZ: Now, could you talk to us about what your research involved in producing the report? And also, you seem to have found contradictions between what national Yemeni officials were saying and what local provincial or officials closer to the ground were saying.
LETTA TAYLER: Yes, indeed, there are a mind-boggling array of on, off and on-the-record comments about this strike, which really underscores the urgent need for the United States to come clean on what exactly happened. I researched this strike in Yemen. This is my seventh or eighth trip to Yemen in recent years, many of those trips to look at this particular issue of targeted killings. I met with relatives and family members there, as well as government officials, academics, journalists and so forth. The most compelling testimony, of course, was from the family members—as you’ve seen in the video, men holding tattered ID cards of their loved ones, in some cases the only remaining item that they had of these people who died, and saying to me, “Explain to me, explain to me why did the U.S. kill my son, why did the U.S. kill my nephew.” Even the—even the son of the groom from a previous marriage was killed in this strike. And these Yemenis deserve answers from the United States as to what happened.
AMY GOODMAN: What has the U.S. said?
LETTA TAYLER: The U.S. has responded to my report in a fashion that I find disappointing and disconcerting. We are getting more of the same obfuscation. We’re getting more off-the-record comments to media that, yes, this strike did hit, that the targets of the strike were militants. But where is the evidence? Show us the proof. Show us the findings of your reports. If indeed militants were killed, let us judge the facts. Let us see if you’re complying with law and with your own policy.
JUAN GONZÁLEZ: Now, the government did claim that there was a particular militant that they were looking to kill, but then his name did not appear in the list of the dead, right?
LETTA TAYLER: Yes, Shawqi al-Badani. He was not among the 12 names that were given to me, the 12 bodies that were identified by relatives as well as other media in Yemen. And indeed, the relatives I spoke to said they never heard of this man.
AMY GOODMAN: Jeremy Scahill, in Dirty Wars, you go to Yemen. You investigate a number of drone strikes. Talk about how this one fits in, the December attack that is now—we’re talking about, of the Human Rights Watch report.
JEREMY SCAHILL: Well, first of all, I mean, what I think is really key here that Letta and the team at Human Rights Watch have really zeroed in on is that when there are—when there’s these strikes and civilians are killed, the Obama administration has stated that they do a review, that they do an investigation. And indeed, these anonymous officials have been saying to major media outlets that they did an internal investigation and that the Department of Defense determined that the individuals that were killed were in fact legitimate combatants. And yet, those reports are never made public.
In the cases that I’ve investigated in Yemen, one of which was the al-Majalah bombing that you referenced, it was the first time that we know of that President Obama authorized a military-style attack inside of Yemen. And that wasn’t a drone attack; it was actually a cruise missile attack. And it killed three dozen—more than three dozen people, the overwhelming majority of whom were women and children. There supposedly was an internal investigation into that, and yet the White House won’t release it. The Pentagon will not release these investigations that they do. In the case of the drone bombings of Anwar Awlaki, an American citizen, and then his 16-year-old son two weeks later in a separate drone strike, again they said that there was an internal investigation into the killing of this boy. The findings of it are not released.
And what we’re seeing right now, and we’ve talked about this a lot on the show, boils down to the Obama administration trying to wage what it perceives—what it believes is, you know, pre-emptive war or preventative strikes, where they’re killing people that they think may one day pose a threat, or they may have picked up chatter that they’ve been discussing some kind of a plot. And there’s no—not even a sort of vague idea that we should have any kind of a law enforcement approach to the crime of terrorism anymore. They’re just zapping people, you know, in acts of precrime. The idea of judicial process or legal process has been replaced by the National Security Agency tracking the metadata of individuals in various countries, building profiles of where—what telephones are in contact with other telephones, where particular SIM cards have been physically or geographically. And then you have a secret process in the White House on these so-called Terror Tuesday meetings where officials essentially condemn the users of these SIM cards or phones to death, and then President Obama signs off, and the drone serves as the executioner. That’s basically the judicial process that the U.S. now offers to people who are actually not even accused of the crime of terrorism, just perceived by the White House to be involved with it.
JUAN GONZÁLEZ: Well, Jeremy, you’ve mentioned President Obama’s direct involvement in—of this. I want to turn to him speaking about drone strikes during the first major counterterrorism address of his second term. His comments came one day after Attorney General Eric Holder confirmed U.S. drone strikes had killed four American citizens in Yemen and Pakistan.
PRESIDENT BARACK OBAMA: And before any strike is taken, there must be near certainty that no civilians will be killed or injured—the highest standard we can set. Yes, the conflict with al-Qaeda, like all armed conflict, invites tragedy. But by narrowly targeting our action against those who want to kill us, and not the people they hide among, we are choosing the course of action least likely to result in the loss of innocent life.
JUAN GONZÁLEZ: That was President Obama. Letta?
LETTA TAYLER: I wanted to point out one thing in this speech. He said, “We’re targeting those who want to get us, not those they hide among.” There is one theory about this December 12th strike on the wedding convoy, that members of AQAP, al-Qaeda in the Arabian Peninsula, the Yemen-based group, may have infiltrated the convoy. If this is true—and I have no idea that it is; we have no evidence one way or the other that AQAP was actually in this convoy, but let’s assume for the moment that this might be correct—that shielding—it’s called human shielding—for AQAP to go into the convoy, would not excuse or exonerate the—excuse the—would not give the United States the right to attack that convoy. The United States as an attacking force always has to distinguish between civilians and combatants. And by combatants, I mean lawful targets. We have a lot of questions as to whether many of the people being killed who the U.S. considers militants are actually lawful targets. So, even if AQAP was hiding among these forces, it wouldn’t necessarily mean that that strike was lawful.
AMY GOODMAN: We’re talking to Letta Tayler, Human Rights Watch senior researcher at Human Rights Watch, who just came out with this report, “A Wedding That Became a Funeral: US Drone Attack on Marriage Procession in Yemen.” What are the implications of this report? And what has the U.S. said to you? Have other countries gotten in touch with you?
LETTA TAYLER: Well, the implications of this report are first that we’re still operating in a vast accountability vacuum. The United States is saying, “Trust us,” yet they’re not giving us any information that would allow us to trust them. And this sets a very—not only does this mean that the U.S. may well be violating international law and President Obama’s own policy, but it sets a very dangerous precedent for countries around the world. I don’t find it surprising that journalists from Russia and China call us, frequently, when we come out with a report like this, because there are many leaders in many countries who are very happy to see the U.S. pave the way for taking out people without any justification, anytime, anywhere, and simply calling them terrorists or threats to national security.
JUAN GONZÁLEZ: And, Jeremy, have we seen any movement at all on the part of the administration, given all of the—all of the publicity that has come out about these strikes now, or even in terms of Congress attempting to rein in the policies of the administration?
JEREMY SCAHILL: Well, I mean, Congress is almost entirely asleep at the wheel when it comes to oversight or raising serious questions about the drone program or the assassination policy in general. I mean, the most vocal critics of this program, who have raised some of the essential questions, are people like Senator Rand Paul of Kentucky, who on many issues really sounds like a raving lunatic, but on this particular issue, when he filibustered the nomination of John Brennan, who really was the drone czar of the Obama administration’s first term, Rand Paul read into the congressional record human rights reports, media reports about civilians killed. It was the first time that there was discussion on the floor of the U.S. Senate of American citizens potentially being targeted for assassination in these drone strikes.
But, you know, polls indicate that a solid percentage of self-identified liberal Democrats support the White House on this, and that’s in part due to the fact that President Obama has projected—and it really boils down to propaganda—that this is somehow a cleaner way of waging war. I think also, politically, many Democrats would be opposing these policies or raising serious questions if their guy wasn’t in the White House. If McCain or Mitt Romney had won those elections, I think we would see a more robust discussion in Congress on this.
But President Obama said in his major address, and then his administration has released papers saying that among the standards is not just that mere certainty that civilians will not be killed, but also that the individuals that they’re targeting represent an imminent threat and that they—and that capture is not feasible. And I think that those two factors in this should also be investigated, because I don’t believe that the majority of the people that are killed in these drone strikes are engaged in an imminent plot that’s going to harm America’s national security or American interests, even as broadly as the Obama administration defines it.
I mean, we really—this should be brought up at an international level, because the U.S., as Letta says, is setting a standard. There are some 80 countries in the world that have weaponized drone technology. It’s just a matter of time before a Russia or a China says, “You know what? America does this. We have the right to do it, too,” and they start doing drone attacks to take out dissidents or people that they perceive to be terrorists.
Every nation around the world now claims that it’s in a war against terrorism. I was just in Egypt, where the U.S.-backed dictatorship of General Sisi is in power, and there are huge posters all over Egypt that talk about how the Egyptian government is in a war against terrorism. It’s really a cooptation of this Bush-Cheney idea, that Obama unfortunately has continued, that if you just label your enemies as terrorists, you can justify doing anything to them and justify denying them of any basic rights. You can’t surrender to a drone, and you can’t turn yourself in when you haven’t been charged with a crime. To what authority do you surrender?
AMY GOODMAN: We want to thank you both for being with us. Jeremy Scahill, co-founder of TheIntercept.org, a new digital magazine published by First Look Media, also the producer and writer of the documentary Dirty Wars , which has been nominated for an Oscar. Congratulations, Jeremy, and good luck on your road to the Oscars, which will be on March 2nd. And Letta Tayler, senior researcher on terrorism and counterterrorism at Human Rights Watch. Her report, “A Wedding That Became a Funeral: US Drone Attack on Marriage Procession in Yemen,” we’ll link to at democracynow.org.
This is the 18th birthday of Democracy Now!, and in our breaks, we are showing folks and encouraging people to go to our website at democracynow.org and submit pictures of yourself holding up signs that say, “I need Democracy Now! because…” and you fill in the rest or send us videos, as well. Stay with us.
[break]
AMY GOODMAN: That’s Patti Smith, “People Have the Power,” and I thank all the people from all over the world who are sending in pictures and videos letting us know what you think. Again, you can go to our website at democracynow.org. And I’m also thinking today about Julie Drizin, who was the first producer of Democracy Now!, and also our colleague Sharif Abdel Kouddous, who is in Cairo, in Egypt, and our colleagues Anjali Kamat and Nicole Salazar and so many others who make—helped make this program great, as well as Kris Abrams out there in Colorado. Well, I’m Amy Goodman, with Juan González. We’ve been with you for 18 years, as we turn to another story.
Friday, February 21, 2014
Find this story at 21 February 2014
The original content of this program is licensed under a Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 United States License. Please attribute legal copies of this work to democracynow.org. Some of the work(s) that this program incorporates, however, may be separately licensed. For further information or additional permissions, contact us.
Karim Khan, Anti-Drone Activist Who Lost Family Members to U.S. Strike, Goes Missing in Pakistan22 februari 2014
An anti-drone activist and journalist has gone missing in Pakistan just days before he was due to travel to Europe to speak with Parliament members about the impact of the U.S. drone wars. The legal charity Reprieve says Karim Khan was seized in the early hours of February 5 by up to 20 men, some wearing police uniforms. He has not been seen since. Khan’s brother and son were both killed in a drone strike. In addition to public activism, Khan was also engaged in legal proceedings against the Pakistani government for their failure to investigate the killings of his loved ones. We are joined by filmmaker Madiha Tahir, who interviewed Khan for her documentary, “Wounds of Waziristan.”
“These are people seeking peaceful, legal routes for restitution for a great harm that been done to them,” Tahir says. Of drone victim’s families’ difficulty gaining legal traction, she says, “It speaks to the secretive nature of the American state.”
Transcript
This is a rush transcript. Copy may not be in its final form.
NERMEEN SHAIKH: We begin today’s show in Pakistan, where an anti-drone activist and journalist has gone missing just days before he was due to travel to Europe to speak with Parliament members about the impact of the U.S. drone wars. The legal charity Reprieve says Karim Khan was seized in the early hours of February 5th by up to 20 men, some wearing police uniforms. He has not been seen since. Karim Khan’s brother and son were both killed in a drone strike. He told his story in the recent documentary Wounds of Waziristan.
KARIM KHAN: [translated] In 2009, my home was attacked by a drone. My brother and son were martyred. My son’s name was Hafiz Zaenullah. My brother’s name was Asif Iqbal. There was a third person who was a stone mason. He was a Pakistani. His name was Khaliq Dad.
Their coffins were lying next to each other in the house. Their bodies were covered with wounds. Later, I found some of their fingers in the rubble.
As you know, my son had memorized the Qur’an. He was a security guard at the girls’ school, and he was studying for grade 10. My brother had a master’s degree in English. He was a government employee. He loved to debate, but he was so short, he didn’t reach the dais, so they wouldn’t give him many chances to make speeches.
AMY GOODMAN: Karim Khan speaking in the film Wounds of Waziristan. Since his son and brother were killed in 2009, Karim became a prominent anti-drone activist. He’s been missing since last week. The executive director of Reprieve, Clare Algar, said in a statement, quote, “We are very worried about Mr Khan’s safety. He is a crucial witness to the dangers of the CIA’s covert drone programme, and has simply sought justice for the death of his son and brother through peaceful, legal routes,” she said.
Well, for more, we’re joined by Madiha Tahir. She made the film Wounds of Waziristan. She is a freelance journalist whose work has appeared in Foreign Affairs, Vice, BBC, PRI’s The World, Global Post and other outlets, co-editor of the anthology Dispatches from Pakistan.
Madiha Tahir, thanks so much for being here. We broadcast Wounds of Waziristan and got tremendous response to it. Now one of the key figures who you interview in it, Karim Khan, is gone, at least for the moment. Explain who he is, his significance.
MADIHA TAHIR: Karim Khan is actually one of the first people to bring a case in the Pakistani courts on—about drone attacks. So he’s the one who started to bring cases forward, and he has been working with a lawyer, Shahzad Akbar, who has been fighting on behalf of drone survivors and families of the dead. And Karim was working with Shahzad to help, you know, not only in his own case, but also to help and assist in other cases that were being brought forward in Pakistani courts to demand restitution and demand transparency for—you know, for these attacks.
NERMEEN SHAIKH: Madiha, can you give us a sense of how many such cases have been filed and whether other anti-drone activists in Pakistan have been targeted in any way or in fact picked up in the way that he was, Karim Khan?
MADIHA TAHIR: So, Karim is the first, that I know of, that has been picked up who is an anti-drone activist, but disappearances in Pakistan are very common. It’s a common state tactic. It has been happening in Balochistan, where there is a separatist movement, for a long time now. And, in fact, three are families protesting. There were mass graves found in Balochistan of missing people quite recently, only a few weeks ago. So this is a very common tactic by the state, and now, clearly, the Pakistani establishment, which is to say the intelligence agencies and the Pakistani army, want to send a message to the anti-drone movement to tell us to—you know, to tell the movement to shut up, basically.
AMY GOODMAN: I want to go back to your film, Wounds of Waziristan. In this clip, Karim speaks to you, Madiha Tahir.
KARIM KHAN: [translated] You asked me a question about terrorism. Can I ask you one? What is the definition of “terrorism” or “terrorist”?
MADIHA TAHIR: [translated] I don’t know. What do you think it is?
KARIM KHAN: [translated] I think there is no bigger terrorist than Obama or Bush, those who have weaponry like drones, who drop bombs on us while we are in our homes. There are no greater terrorists than them.
AMY GOODMAN: There again, Karim Khan, who went missing last week. And the people who took him, how many people saw this go down?
MADIHA TAHIR: His family was at home. His wife and his children were at home when it happened, so they saw it, and there are other eyewitnesses who saw it. He was picked up by 15 to 20 people. It seems to be people who were dressed in plainclothes, as well as police officers, who picked him up and disappeared him. His whereabouts are unknown. His family has not been able to find out where he’s being kept. Shahzad Akbar, the lawyer, did file something on his behalf in the Lahore court, and the court has ordered the intelligence agencies now to produce him by February 20th before the court. So we have to wait for that date and see what happens. But the best scenario would be that he is released before then.
NERMEEN SHAIKH: And Karim Khan moved from Waziristan to Rawalpindi. Can you talk about the significance of the area from which he was picked up and whether it’s significant that—or whether it ’ widely believed that the people who were responsible for picking him up were the ISI, the intelligence services, or the military, or a combination?
MADIHA TAHIR: I mean, I think it is significant. It speaks to the nature of—again, it speaks to the nature of state violence in Pakistan. I think the news media both in the United States and in Pakistan has been—and, you know, rightly so—discussing the attacks by militants that have happened in Pakistan, and those acts, you know, have been reprehensible. Just two days ago, there was a bomb blast in a Peshawar cinema that killed anywhere between 11 to 13 people. But it’s important to realize that that violence happens in a context, and that context is state violence, which has been brutal, in the sense of it’s very quiet, there are disappearances like this. In this case, it’s a high-profile activist, but there are many people who we don’t even know have been picked up and disappeared by the state. So it is—you know, there’s a cyclical pattern between state violence and the non-state violence that is happening in Pakistan.
AMY GOODMAN: Madiha, talk about what he would say if he did get out. Where was he going in Europe? Who was he going to be addressing?
MADIHA TAHIR: Karim Khan was actually slated to speak to several European parliaments next week, and he was going to talk about the drone attack that killed his son and his brother on New Year’s Eve in 2009. And he would have talked about the cost of these attacks on the people in the tribal areas in Pakistan, who are some of the most marginalized communities in Pakistan. For simply for wanting to speak out about what happened to him and what is happening and continues to happen in that area, he has been disappeared by the Pakistani state. And certainly, I think, you know, we shouldn’t forget that the United States has backed and funded the Pakistani military, and this is happening, so, in conjunction with these states working together, both Pakistan and the United States.
NERMEEN SHAIKH: Madiha, you also spoke about the increasing cycle of violence in Pakistan, both state violence and anti-state violence. Could you draw the links between what you think is the correlation, or if there is any, between the increasing number of drone strikes and really the unprecedented number of suicide bombs that occur now in Pakistan, a place which never knew suicide bombs 10 years—you know, 10 years ago?
MADIHA TAHIR: Yes. I mean, I think it’s—we have to be wary of drawing simple causes. So it’s not that, you know, suicide bombings are happening because. You know, it’s not a straightforward cause; however, there is a linkage. And you’re right, there is a correlation. The suicide attacks have increased in the last decade as Pakistan has been attacked by drones and has participated in the war on terror. The violence in Pakistan has gotten so much worse, not just suicide bombings, but all sorts of blasts happening. So, certainly, the war on terror, if it was meant to protect Pakistanis, is not working at all. It has actually had an adverse effect. By some estimates, you know, anywhere—you know, something like 30,000 Pakistanis have been killed in attacks by non-state actors. So, the war on terror is something that is something that the U.S. and the Pakistani government have been sort of working on together, but it’s certainly not had—it’s certainly not been to the—on behalf of Pakistanis.
AMY GOODMAN: Madiha, I want to go back to your film, Wounds of Waziristan, where you speak with Karim Khan’s lawyer, the man you just mentioned, Shahzad Akbar.
MADIHA TAHIR: This is Shahzad Akbar. He’s Karim’s lawyer. They’ve filed a case against drone attacks in Pakistani courts. He told me why it’s difficult to narrate his clients’ lives for the court and the media.
SHAHZAD AKBAR: For example, you know, when I have a client and we want—OK, this was a person who was killed, so we’d like to construct his life on photographs. You know, you have family photos and—of when he was young, when he was in school, when he was in teens and when he grew up—in all those photos. They’re missing. They’re not there, because, you know, you don’t have the culture of taking pictures for that matter.
AMY GOODMAN: In 2012, Democracy Now! spoke to Shahzad Akbar, the co-founder of the Foundation for Fundamental Rights, an organization that represents victims of drone strikes in Pakistani courts. Again, he is Karim Khan’s lawyer. And Akbar explained why he decided to visit the United States at that time.
SHAHZAD AKBAR: I, on behalf of the victims in Pakistan, wanted to reach out to Americans so that they can make an informed judgment on drones. Their opinion matter, and it’s going to matter in next elections, as well. So they need to know what drones are doing to humans in Pakistan, many of them who are civilians. And it has been said by independent groups and journalists, as well, a bigger—higher number of civilian victims. And that has to be reported to the American public so they can make an informed judgment on drones, that if American government should let be killing people overseas in their names.
AMY GOODMAN: Now, this is Shahzad Akbar, who you’ve just watched and listened to. He was in the United States in 2012. But this past year, when some of his clients came to the United States, drone victims—the Rafiq Rehman family, little girl, little boy, both injured when their grandmother was blown up in a drone strike—he was not granted a visa to come to the United States. The significance of this, Madiha Tahir? Of course, it made it much more difficult. They didn’t speak English. He would have been as much their navigator and their comfort. They were in a strange land, in fact a land where the drone came from that killed their grandmother.
MADIHA TAHIR: I mean, these are people that are seeking peaceful, legal routes for restitution for something—for a great harm that has been done to them and for a loss they will suffer for the rest of their lives. And so, to not allow their lawyer is to say that the U.S. doesn’t care about legal—about the rule of law and about the legal process at all, to not allow their representatives to come to the United States and to speak, you know, to stand by his clients and to speak alongside them. I think it’s highly problematic, but I think it speaks to the secretive nature of the American state.
NERMEEN SHAIKH: And, Madiha, can you give us a sense of how many victims or families of victims of drone strikes have attempted to bring their cases to the courts, either in Pakistan or indeed in the U.S.?
MADIHA TAHIR: I’m not sure exactly what the figures are at this point, because the cases are at different levels. Some of them are still—they’re—Shahzad and others are actually still in the process of gathering information in order to, you know, get the cases out there. So the most significant cases right now are—you know, there’s been the Karim Khan’s case and also Noor Khan, who is the son of the tribal—the mullah who was killed on March 17th in a drone attack on a jirga, a gathering, that killed upwards of 40, 50 people.
AMY GOODMAN: The Obama administration is facing criticism over reports it’s debating whether to kill a U.S. citizen living in Pakistan who’s allegedly plotting terror attacks. On Monday, I spoke with journalist Glenn Greenwald, who recently launched TheIntercept.org with Jimmy Scahill and Laura Poitras. I asked Glenn about the initial Associated Press article that broke the story. And folks can go to our website at democracynow.org to hear what Glenn responded. I think, actually, we have it for you right now.
GLENN GREENWALD: The very idea that the U.S. government suspects an American citizen, not of having already engaged in crimes, but of planning to do so, as Jeremy said, it’s like a pre-crime framework, where the U.S. government tries to guess at who will engage in crimes in the future and then treat them as a criminal—but then, not just treat them as a criminal, but declare them guilty in secret proceedings, not involving any court, but by the decree of the president of the United States to literally, A, declare the person guilty, B, impose the death penalty, and then, C, go out and carry out the execution—just like they did with Anwar Awlaki and Samir Khan. And now they are obviously viewing it as a regular practice. I mean, no American, no matter your political affiliation or ideology, should accept the idea that the president of the United States has the power to order American citizens killed, not on a battlefield or anywhere else that is in a war zone, but simply on the suspicion that they intend to engage in future criminal behavior. To describe that power is to describe the most extremist and out-of-control government you can get.
AMY GOODMAN: That is Glenn Greenwald of The Intercept. Mahiha?
MADIHA TAHIR: Yes, I mean, I agree with Glenn Greenwald. It is—you know, it is a kind of pre-crime for which this American citizen is now going to be possibly attacked for by the United States. I think it’s important to remember that most of the people who are being attacked in exactly a similar way are not Americans, they are Pakistanis, Yemenis, Somali, etc. In Pakistan, as you know, there has been the tactic of what are called signature strikes, which are strikes that aren’t actually targeting a specific, named, high-value target or anything of that nature, but rather people whose behavioral patterns, for one reason or another, appear to trigger a suspicion in the U.S. intelligence apparatus that they may or may not be militants. We don’t actually know. But simply on that basis, on very faulty intelligence, much of which is happening through cellphone—unreliable cellphone data, you know, a lot of these attacks are carried out, and why we have the figures that we have of the numbers of people killed.
Wednesday, February 12, 2014
Find this story at 12 February 2014
The original content of this program is licensed under a Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 United States License. Please attribute legal copies of this work to democracynow.org. Some of the work(s) that this program incorporates, however, may be separately licensed. For further information or additional permissions, contact us.
Israelis tried to send arms to Iran via Greece, probe finds22 februari 2014
Israeli arms dealers tried to send spare parts for F-4 Phantom aircraft via Greece to Iran in violation of an arms embargo, according to a secret probe by the US government agency Homeland Security Investigations (HSI) carried out in cooperation with the drugs and weapons unit of Greece’s Financial Crimes Squad (SDOE).
According to the probe, which Kathimerini has had access to, the operation was carried out in two phases – one in December 2012 and the second in April 2013. In both cases, officials traced containers packed with the F-4 parts on Greek territory. The cargo had been sent by courier from the Israeli town of Binyamina-Giv’at Ada and had been destined for Iran, which has a large fleet of F-4 aircraft, via a Greek company registered under the name Tassos Karras SA in Votanikos, near central Athens. SDOE officials established that the firm was a ghost company, while the company’s contact number was found to belong to a British national residing in Thessaloniki who could not be located.
According to HSI memos, the cargo appears to have been sent by arms dealers based in Israel, seeking to supply Iran in contravention of an arms embargo, and using Greece as a transit nation.
Last November, an Athens court ruled against the confiscation of the consignments and ordered that they be delivered to US authorities.
The US imposed sanctions against Iran in 1979, after a revolution which overthrew the Shah, extending them in 1995 to include firms dealing with the Iranian government. Several governments and multinationals have since followed suit.
ekathimerini.com , Sunday February 16, 2014 (15:23)
Find this story at 16 February 2014
© 2014, H KAΘHMEPINH
WikiLeaks Volunteer Was a Paid Informant for the FBI22 februari 2014
On an August workday in 2011, a cherubic 18-year-old Icelandic man named Sigurdur “Siggi” Thordarson walked through the stately doors of the U.S. embassy in Reykjavík, his jacket pocket concealing his calling card: a crumpled photocopy of an Australian passport. The passport photo showed a man with a unruly shock of platinum blonde hair and the name Julian Paul Assange.
Thordarson was long time volunteer for WikiLeaks with direct access to Assange and a key position as an organizer in the group. With his cold war-style embassy walk-in, he became something else: the first known FBI informant inside WikiLeaks. For the next three months, Thordarson served two masters, working for the secret-spilling website and simultaneously spilling its secrets to the U.S. government in exchange, he says, for a total of about $5,000. The FBI flew him internationally four times for debriefings, including one trip to Washington D.C., and on the last meeting obtained from Thordarson eight hard drives packed with chat logs, video and other data from WikiLeaks.
The relationship provides a rare window into the U.S. law enforcement investigation into WikiLeaks, the transparency group newly thrust back into international prominence with its assistance to NSA whistleblower Edward Snowden. Thordarson’s double-life illustrates the lengths to which the government was willing to go in its pursuit of Julian Assange, approaching WikiLeaks with the tactics honed during the FBI’s work against organized crime and computer hacking — or, more darkly, the bureau’s Hoover-era infiltration of civil rights groups.
“It’s a sign that the FBI views WikiLeaks as a suspected criminal organization rather than a news organization,” says Stephen Aftergood of the Federation of American Scientists’ Project on Government Secrecy. “WikiLeaks was something new, so I think the FBI had to make a choice at some point as to how to evaluate it: Is this The New York Times, or is this something else? And they clearly decided it was something else.”
The FBI declined comment.
Thordarson was 17 years old and still in high school when he joined WikiLeaks in February 2010. He was one of a large contingent of Icelandic volunteers that flocked to Assange’s cause after WikiLeaks published internal bank documents pertaining to that country’s financial crisis.
When a staff revolt in September 2010 left the organization short-handed, Assange put Thordarson in charge of the WikiLeaks chat room, making Thordarson the first point of contact for new volunteers, journalists, potential sources, and outside groups clamoring to get in with WikiLeaks at the peak of its notoriety.
In that role, Thordarson was a middle man in the negotiations with the Bradley Manning Defense Fund that led to WikiLeaks donating $15,000 to the defense of its prime source. He greeted and handled a new volunteer who had begun downloading and organizing a vast trove of 1970s-era diplomatic cables from the National Archives and Record Administration, for what became WikiLeaks’ “Kissinger cables” collection last April. And he wrangled scores of volunteers and supporters who did everything from redesign WikiLeaks’ websites to shooting video homages to Assange.
He accumulated thousands of pages of chat logs from his time in WikiLeaks, which, he says, are now in the hands of the FBI.
Thordarson’s betrayal of WikiLeaks also was a personal betrayal of its founder, Julian Assange, who, former colleagues say, took Thordarson under his wing, and kept him around in the face of criticism and legal controversy.
“When Julian met him for the first or second time, I was there,” says Birgitta Jonsdottir, a member of Icelandic Parliament who worked with WikiLeaks on Collateral Murder, the Wikileaks release of footage of a US helicopter attack in Iraq. “And I warned Julian from day one, there’s something not right about this guy… I asked not to have him as part of the Collateral Murder team.”
In January 2011, Thordarson was implicated in a bizarre political scandal in which a mysterious “spy computer” laptop was found running unattended in an empty office in the parliament building. “If you did [it], don’t tell me,” Assange told Thordarson, according to unauthenticated chat logs provided by Thordarson.
“I will defend you against all accusations, ring [sic] and wrong, and stick by you, as I have done,” Assange told him in another chat the next month. “But I expect total loyalty in return.”
Instead, Thordarson used his proximity to Assange for his own purposes. The most consequential act came in June 2011, on his third visit to Ellingham Hall — the English mansion where Assange was then under house arrest while fighting extradition to Sweden.
For reasons that remain murky, Thordarson decided to approach members of the Lulzsec hacking gang and solicit them to hack Islandic government systems as a service to WikiLeaks. To establish his bona fides as a WikiLeaks representative, he shot and uploaded a 40-second cell phone video that opens on the IRC screen with the chat in progress, and then floats across the room to capture Asssange at work with an associate. (This exchange was first reported by Parmy Olson in her book on Anonymous).
Unfortunately for Thordarson, the FBI had busted Lulzsec’s leader, Hector Xavier Monsegur, AKA Sabu, a week earlier, and secured his cooperation as an informant. On June 20, the FBI warned the Icelandic government. “A huge team of FBI came to Iceland and asked the Icelandic authorities to help them,” says Jonsdottir. “They thought there was an imminent Lulzsec attack on Iceland.”
The FBI may not have known at this point who Thordarson was beyond his screen names. The bureau and law enforcement agencies in the UK and Australia went on to round up alleged Lulzsec members on unrelated charges.
Having dodged that bullet, it’s not clear what prompted Thordarson to approach the FBI two months later. When I asked him directly last week, he answered, “I guess I cooperated because I didn’t want to participate in having Anonymous and Lulzsec hack for Wikileaks, since then you’re definitely breaking quite a lot of laws.”
That answer doesn’t make a lot of sense, since it was Thordarson, not Assange, who asked Lulzsec to hack Iceland. There’s no evidence of any other WikiLeaks staffer being involved. He offered a second reason that he admits is more truthful: “The second reason was the adventure.”
Thordarson’s equivocation highlights a hurdle in reporting on him: He is prone to lying. Jonsdottir calls him “pathological.” He admits he has lied to me in the past. For this story, Thordarson backed his account by providing emails that appear to be between him and his FBI handlers, flight records for some of his travels, and an FBI receipt indicating that he gave them eight hard drives. The Icelandic Ministry of the Interior has previously confirmed that the FBI flew to Iceland to interview Thordarson. Thordarson also testified to much of this account in a session of the Icelandic Parliament, with Jonsdottir in attendance.
Finally, he has given me a substantial subset of the chat logs he says he passed to the FBI, amounting to about 2,000 pages, which, at the very least, proves that he kept logs and is willing to turn them over to a reporter disliked by Julian Assange.
Thordarson’s “adventure” began on August 23, 2011, when he sent an email to the general delivery box for the U.S. embassy in Reykjavík “Regarding an Ongoing Criminal investigation in the United States.”
“The nature of the intel that can be brought to light in that investigation will not be spoken over email conversation,” he wrote cryptically.
An embassy security officer called him the same day. “He said, ‘What investigation?’ I said the Wikileaks,” says Thordarson. “He denied there was such an investigation, so I just said we both know there is.”
Thordarson was invited to the embassy, where he presented a copy of Assange’s passport, the passport for Assange’s number two, Kristinn Hrafnsson, and a snippet of a private chat between Thordarson and Assange. The embassy official was noncommittal. He told Thordarson they might be in touch, but it would take at least a week.
It happened much faster.
Photo: Courtesy Sigurdur Thordarson
FBI agents and two federal prosecutors landed in a private Gulfstream on the next day, on August 24, and Thordarson was summoned back to the embassy.
He was met by the same embassy official who took his keys and his cell phone, then walked with him on a circuitous route through the streets of downtown Reykjavík, ending up at the Hotel Reykjavik Centrum, Thordarson says. There, Thordarson spent two hours in a hotel conference room talking to two FBI agents. Then they accompanied back to the embassy so he could put money in his parking meter, and back to the hotel for more debriefing.
The agents asked him about his Lulzsec interactions, but were primarily interested in what he could give them on WikiLeaks. One of them asked him if he could wear a recording device on his next visit to London and get Assange to say something incriminating, or talk about Bradley Manning.
“They asked what I use daily, have always on,” he says. “I said, my watch. So they said they could change that out for some recording watch.”
Thordarson says he declined. “I like Assange, even considered him a friend,” he says. “I just didn’t want to go that way.”
In all, Thordarson spent 20 hours with the agents over about five days. Then the Icelandic government ordered the FBI to pack up and go home.
It turns out the FBI had misled the local authorities about its purpose in the country. According to a timeline (.pdf) later released by the National Commissioner of the Icelandic Police, the FBI contacted Icelandic law enforcement to report Thordarson’s embassy walk-in, and ask for permission to fly into the country to follow up. But the bureau had presented the request as an extension of its earlier investigation into Lulzsec, and failed to mention that its real target was WikiLeaks.
WikiLeaks is well regarded in Iceland, and the incident errupted into a hot political topic when it surfaced there this year, with conservatives arguing that Iceland should have cooperated with the FBI, and liberals complaining about the agents being allowed into the country to begin with. “It became a massive controversy,” says Jonsdottir. “And then none of them knew what sort of person Siggi is.”
Politics aside, the FBI was not done with Thordarson.
The agents persuaded Thordarson to fly to Copenhagen with them, he says, for another day of interviews. In October, he made a second trip to Denmark for another debriefing. Between meetings, Thordarson kept in touch with his handlers through disposable email accounts.
In November 2011, Thordarson was fired from WikiLeaks. The organization had discovered he had set up an online WikiLeaks tee shirt store and arranged for the proceeds to go into his own bank account. WikiLeaks has said the embezzlement amounted to about $50,000.
Thordarson told the FBI about it in a terse email on November 8. “No longer with WikiLeaks — so not sure how I can help you more.”
“We’d still like to talk with you in person,” one of his handlers replied. “I can think of a couple of easy ways for you to help.”
“Can you guys help me with cash?” Thordarson shot back.
Image: Courtesy Sigurdur Thordarson
For the next few months, Thordarson begged the FBI for money, while the FBI alternately ignored him and courted him for more assistance. In the end, Thordarson says, the FBI agreed to compensate him for the work he missed while meeting with agents (he says he worked at a bodyguard-training school), totaling about $5,000.
With the money settled, the FBI began preparing him for a trip to the U.S. “I wanted to talk to you about future things we can do,” his handler wrote in February. The FBI wanted him to reestablish contact with some of his former WikiLeaks associates. “We’ll talk about specific goals of the chats, but you can get a head start before our meet by just getting in touch and catching up with them. If you need to know who specifically, we can discuss on the phone.”
The three-day D.C. trip took place in February of last year. Thordarson says he flew on Iceland Air flight 631 to Logan International Airport on February 22, and transferred in Boston to JetBlue flight 686 to Dulles International Aiport, where he was greeted by a U.S. Customs official “and then escorted out the Dulles terminal into the arms of the FBI.”
He stayed at a hotel in Arlington, Virginia, where the Justice Department’s investigation into WikiLeaks is centered, and met there with his two usual FBI contacts, and three or four other men in suits who did not identify themselves.
“At the last day we went to a steak house and ate, all of us,” he says. “Where they served Coca Cola in glass bottles from Mexico.”
On March 18, 2012, he had one more meeting with the FBI in Denmark. On this trip, he brought along eight of his personal hard drives, containing the information he’d compiled while at WikiLeaks, including his chat logs, photos and videos he shot at Ellingham Hall. The FBI gave him a signed receipt for the hardware.
Then they cut him off.
Today, Thordarson, now 20, has new problems. He’s facing criminal charges in Iceland for unrelated financial and tax crimes. In addition, WikiLeaks filed a police report for the tee-shirt shop embezzlement.
The legacy of his cooperation with the FBI is unclear. A court filing revealed last week shows that in the months following Thordarson ’s last debriefing, Justice Department officials in Arlington, Virginia, began obtaining court orders targeting two of Thordarson ’s former WikiLeaks colleagues in Iceland: Smari McCarthy and Herbert Snorrason.
Snorrason, who ran the WikiLeaks chat room in 2010, before Thordarson took it over, had the entire contents of his Gmail account handed over to the government, under a secret search warrant issued in October 2011.
The evidence used to obtain the warrant remains under seal. “I do wonder,” says Thordarson, “whether I’m somewhere in there.”
By Kevin Poulsen06.27.136:30 AM
Find this story at 27 June 2013
WIRED.com © 2014 Condé Nast.
The WikiLeaks Mole; How a teenage misfit became the keeper of Julian Assange’s deepest secrets – only to betray him22 februari 2014
On a recent frigid night near Reykjavik, Iceland, Sigurdur “Siggi” Thordarson slips into a bubbling geothermal pool at a suburban swim club. The cherubic, blond 21-year-old, who has been called everything in the press from “attention seeker” to “traitor” to “psychopath,” ends many of his days here, where, like most places around the city, he’s notorious. But even at a spa, he can find only the briefest moment of relaxation. Soon, the local prosecutor who is trying him for leaking financial records joins him in the tub, and Siggi quickly has to flee to another pool. “How does it feel to be the most dangerous man in Iceland?” a bather shouts across the steam.
Julian Assange: The Rolling Stone Interview
In person, Siggi’s doughy shape and boyish smile make him seem less than menacing – unless you’re another one of the world’s most dangerous men, Julian Assange. Four years ago, just as WikiLeaks was winning international notoriety, the then-17-year-old hacking prodigy became Assange’s youngest and most trusted sidekick. “It was like Batman and Robin,” says Birgitta Jónsdóttir, a former WikiLeaks volunteer and member of the Icelandic parliament. But as Assange became more embattled and besieged, the protégé turned on his mentor in the most shocking of ways: becoming the first FBI informant inside the group.
Siggi’s story of international espionage and teenage high-roller antics plays like James Bond meets Superbad, starring a confounding mash-up of awkward man-child and balls-out tech savant. And his tale reveals not only the paranoia and strife within WikiLeaks, but just how far the feds were willing to go to get Assange.
Siggi still lives with his parents in a nondescript high-rise, sitting at his computer in a bedroom lined with stuffed animals, including an orangutan-size Garfield he bought for $2,000. But his jet-black Mercedes ML350 is parked outside, which, along with his recent conviction for sexual misconduct against a 17-year-old boy (he says the relationship was consensual), speaks to his bizarre double life.
The Trials of Bradley Manning
The revelation of Siggi’s role as an FBI snitch has polarized WikiLeaks insiders. When I met with WikiLeaks spokesman Kristinn Hrafnsson (Assange declined to talk for this story), he grew red in the face, dismissing Siggi as “a pathological liar,” a party line echoed by the WikiLeaks faithful. “It all sounds rather absurd,” Hrafnsson says, “to go and to spend all this time analyzing the absolute bullshit that is flowing out of this young man, who is so troubled that he should be hospitalized.”
While other WikiLeaks insiders also question Siggi’s credibility, they insist that his story can’t be discounted, and there’s more to it than the organization is letting on. Tangerine Bolen, founder of the whistle-blowing advocacy organization RevolutionTruth, which used to work closely with WikiLeaks, is among those who say the group’s efforts to discredit Siggi are “patently false. They’re scared. The fact is Siggi played a key role in the organization and was very close to Julian.”
The truth, it seems, may be held in the leaks. Siggi has provided Rolling Stone with more than a terabyte of secret files he claims to have taken from WikiLeaks before he left in November 2011 and gave to the FBI: thousands of pages of chat logs, videos, tapped phone calls, government documents and more than a few bombshells from the organization’s most heated years. They’re either the real thing, or the most elaborate lie of the digital age.
Jacob Applebaum: The American WikiLeaks Hacker
Assange himself validated the importance of Siggi’s documents when he filed an affidavit late this past summer asserting that “the FBI illegally acquired stolen organisational and personal data belonging to WikiLeaks, me and other third parties in Denmark in March 2012” and that the FBI “was attempting to entrap me through Sigurdur Thordarson.”
Whatever their origins, the SiggiLeaks are a deep and revealing portal into one of the most guarded and influential organizations of the 21st century – and the extreme measures its embattled leader is willing to take. Of all Assange’s allies who’ve come and gone, few served him as faithfully as Siggi, or betrayed him so utterly. “One thing is sure,” Siggi tells me in his thick Icelandic accent, as the vapors from the thermal pool rise around him. “I have not lived a life like a teenager.”
L
ike Assange and so many gifted hackers, Siggi had an isolated childhood. The son of a hairdresser and a paint-company sales manager, he grew up with his little sister in a middleclass suburb of Reykjavik. Though puckish and bright, he was bored by school, alienated from his classmates and dreamed of a life beyond bourgeois Nordic comfort. “When I was, like, 12 years old, I wished for a couple of things,” he tells me as we drive one afternoon past some lava fields outside the capital. “I wished to be rich; I wished to be a famous guy; I wished to live an adventureful life.”
He found the excitement he craved in computers, and at age 12 he says he hacked into his first website, a local union’s home page, which he replaced with a picture of “a big fluffy monkey.” The experience empowered him. “When you do something like that, you feel invincible,” he says, “and if you can do that, what else can you do?”
He found out two years later, when, on a plane back from a family vacation, he fixed a laptop for a businessman sitting next to him. The executive was so impressed by his skills that he offered him a job at the Icelandic financial firm Milestone: scrubbing computers of sensitive documents. Siggi figures the company trusted him with such data because he was only 14 and must have thought, as he says, “I wouldn’t understand what I was supposed to delete.” Plus, the pay dwarfed that of his paper route.
WikiLeaks’ Greatest Hits
Curious about the files he was erasing, he’d copy them and study them at night. What he eventually discovered astonished him: Employees of Milestone seemed guilty of large-scale corruption in collusion with local politicians. At this time, in 2009, Iceland was reeling from the worldwide financial crisis, and Siggi believed the people deserved to know the role of Milestone and their dirty politicians – even if that meant leaking the files. “Someone has to do it,” he thought, “and why not me?”
In the fall, Siggi says he brought more than 600 gigabytes of Milestone data to the Icelandic newspaper Dagbladid Vísir, making front-page news and leading to investigations against the politicians and businessmen he exposed. Siggi believed in the importance of exposing the corruption he describes as “illegal as it gets.” With his identity still secret, he kept on leaking to other media outlets until, for reasons he never learned, his childhood friend outed him, a betrayal that changed him. “I literally just stopped believing in humanity,” he says. “Since then, I just basically stopped having feelings.”
But after being arrested and splashed across the news, he found a powerful connection in Kristinn Hrafnsson. A well-known TV reporter in Reykjavik at the time, Hrafnsson considered Siggi’s leaks to be “quite significant” and worthy of an introduction to another up-and-coming whistle-blower, Julian Assange, who was speaking at the University of Iceland. Though WikiLeaks had already exposed death squads in Kenya and financial malfeasance in the Swiss bank Julius Baer, the group was still largely unknown. But at the panel, Siggi found, to his surprise, that Assange was well aware of his work – he even chastised the reporter who revealed Siggi’s name in the Milestone leak. “He was basically just condemning the guy, sayingouting whistleblowers is wrong,” recalls Siggi, who reveled in the support.
The bond between the two was immediate. Assange too had been arrested for hacking when he was a young man in Australia. He also had a son, Daniel, who was roughly Siggi’s age, whom he had little contact. “I think Julian saw himself in Siggi,” says Jónsdóttir. “Julian felt an immediate sympathy toward the kid.”
After the panel, Siggi says he took Assange to Sea Bar, a small, rustic restaurant on the water. Over lobster soup and whale steak, they spoke about politics, hacking and their shared sense of purpose in exposing the secrets of the elite. Assange struck Siggi as someone with the courage to take on anyone. “He’s the kind of activist that does the thing that has to be done,” Siggi tells me. After talking for a few hours, Assange took out a small metal box. “Have you ever seen this before?” he said.
Assange cracked open the container and revealed three phones inside. “These are encrypted cellphones,” he said. “I’m going to give you one. Just keep it on at all times so I can communicate with you, day and night.”
W
ithin just a few weeks, Siggi was inside Assange’s small inner circle, a complex place where decisions centered on the mercurial leader. “There’s a video I want to show you,” Siggi recalls Assange telling him as they sat inside Jónsdóttir’s small house in Reykjavik one wintry night soon after they met in February 2010.
“Are you sure you want to show this to him?” said Jónsdóttir. She was concerned about Siggi’s involvement in the project and didn’t entirely trust him, but nevertheless felt protective of the boy. “He was just a lonely kid that had been bullied,” she recalls, “and I felt sort of motherly towards him in the beginning.” Before Assange cued up the clip, she warned Siggi, “This is a disgusting video.”
The grainy footage showed an Apache helicopter firing upon men in the streets of Baghdad. “This can cause a World War III,” Assange said. Though Siggi was new, he didn’t hesitate to express his concerns. “We have to be careful about what we publish,” he said. When Assange wanted to call the video “Collateral Murder,” Siggi told him he thought that was too dramatic. Assange seemed to value the bluntness of his new recruit. “I considered him a friend, and I believe he considered me a friend as well,” Siggi recalls. “If I was against something he said, I told him so, and that was something he liked.”
That spring, when the group was riding an international wave of attention after the video’s release, Siggi, whom Assange gave the handle PenguinX (he was later known as Q), became his dependable errand boy and confidant: talking regularly, looking for equipment, making encrypted calls to contacts on Assange’s behalf. After Bradley Manning was arrested for the “Collateral Murder” leak in May 2010, Assange wrote Siggi that it “might help if people think he’s gay. . . . [The] gay lobby in U.S. is very big, and the whole ‘gays in the military’ thing is very contentious.” When Assange eclipsed pop stars in Time’s person-of-the-year poll, he giddily messaged Siggi, “We beat Gaga!” But the pressure was getting to Assange. In a chat on July 7th, 2010, Siggi asked Assange how he was doing amid all the controversy. Assange replied, “Stressed.”
“Anything i can do to loose some stress?” Siggi typed.
“Find me a pretty girl with lots of warm olive oil;)” Assange replied. But women, too, soon became part of Assange’s worries. One night in August, Siggi’s cryptophone rang with a call from Assange. “Can I trust you?” he said.
“Definitely,” Siggi replied.
“Interpol is most likely going to issue an arrest warrant for me.”
Two women in Sweden alleged he had committed rape and sexual harassment, which Assange denied, saying sex with each was consensual. “The best solution to all this mess might just be going to Sweden and finishing the interrogation,” Siggi told him. But Assange pushed back, saying the U.S. would try to extradite him. “If you get arrested, I’ll just have a backup plan of stealing you from the police,” Siggi said in all seriousness.
But by fall, Assange had other problems: the defection of his closest supporters. His controlling nature had grown overbearing. Hacktivist Daniel DomscheitBerg, Jónsdóttir, journalist Herbert Snorrason and others in the small group of insiders battled with Assange over his reluctance to redact the Afghan war logs, which, they feared, would put lives at risk. Jónsdóttir spoke out to the media, calling for Assange to step aside and “let other people carry the torch.”
And Assange’s confounding closeness with Siggi, which bordered on a paternal relationship, was also an issue. “The perception was that Siggi basically got to a level where Julian trusted him in a matter of days,” says Snorrason. The core volunteers considered Siggi a dangerous liability, prone to youthful indiscretions and lies. But, as Domscheit-Berg recalls, the rumors were being stoked by Assange himself. “Julian told us we shouldn’t speak to Siggi because he couldn’t be trusted,” he says. “He told me Siggi was a notorious liar, but then again Julian told people I was a notorious liar probably because he’s a notorious liar. I think it’s psychological. We knew Julian was dealing with Siggi all the time – it all implied Julian was using him. These are all kinds of games children get into.”
Jónsdóttir was among those caught in Assange and Siggi’s web. “I told Julian, ‘There’s something weird, I can’t explain it, but I have this feeling,'” Jónsdóttir recalls. “‘You just be very careful with this guy.’ But he didn’t believe me.” Though she continuously tried to get Siggi removed from projects, Assange stood by the boy. “He might have trusted him with something that he didn’t want him to expose,” she says.
For Siggi, there was a simple reason he rose in Assange’s eyes: the old guard’s weakness. “To be blunt, they were just cowards,” he says. “I stayed with Julian through this entire shit. I didn’t leave, so that’s probably why he started to trust me more – I showed him loyalty.”
According to the chat logs, Assange commanded Siggi to insinuate himself with Jónsdóttir, in light of her calls for his resignation, and report back. “But be careful,” Assange warned Siggi. “She is good at smelling lies that are intellectual, though not so good at smelling emotional lies.” Days later, after Siggi returned with updates on Jónsdóttir, Assange wrote to him, “Good work on B.” Siggi suggested Assange confront her in person, to which Assange replied, “I will, but I need to let my anger cool, or it would be with a gun.”
Worried that logs of him discussing the rape allegations could be released by Snorrason, Assange told Siggi to hack into the journalist’s computer and remove them. “The log, get rid of it,” Assange wrote. “His pc must be taken over, and that deleted.”
“How can we delete it from his computer?” Siggi replied. “We would need physical access to his computer.” Assange said he could be fooled into downloading a trojan, a kind of computer virus. Though they never hacked Snorrason, the schism within WikiLeaks was tearing the group apart. That fall, Domscheit-Berg, Jónsdóttir, Snorrason and others left. But Siggi remained, and he wanted to make sure that Assange understood his dedication. “What about me?” Siggi wrote him late one night in a chat. “Any trust issues at all?”
“No. I know your difficulties and I accept them,” Assange replied. “Good intent and loyalty is more important to me.”
B
y October 2010, Assange had appointed Siggi to Snorrason’s old post of running the WikiLeaks chat room. It was an important position, vetting the faceless flood of potential allies and leakers, and passing along the cream to Assange. “Keep your eye open for people trying to befriend you or others in an attempt to infiltrate WikiLeaks,” Assange instructed him in a chat. “Lives depend on your diligence.”
Assange was on the lookout for FBI agents, informants and betrayers. And there was one unlikely group of people whom he feared might be rallying against him: the Bradley Manning Support Network. In July, Assange had pledged to pay for a substantial amount of Manning’s defense, which was expected to cost more than $100,000, and the group was increasingly angry that, months later, no money had come through. According to Siggi, Assange had simply moved on.
Throughout the fall, Siggi was getting word from BMSN co-founder David House that David Coombs, Manning’s attorney, was threatening to go public. “Coombs will go to the media very soon,” House warned Siggi in one chat. “I need someone in WL to do their job and actually start giving a shit about Manning’s defense.”
But WikiLeaks went on the offensive instead. “Julian wanted to know everything they were doing,” says Siggi. On October 7th, Siggi hacked into a Skype conference call of the BMSN and sent the recording to Assange. In the wee hours of November 11th, with word of another Skype call that evening, he asked Assange if he should do it again. “Do you want me to record the BMSN conference?” Siggi wrote.
“YES,” Assange replied.
“Oki dok:)”
The next night, Siggi reported back: Mission accomplished. “Yey the Recording was successful,” he typed in chat. “Want me to upload and send to you?”
“Yes. But going to bed now,” Assange wrote. “Good work on the record.”
“Ok:) Did you remember to brush your teeths:)”
With still no funds by December, the BMSN did go public, resulting in unflattering headlines, like The Washington Post’s “WikiLeaks hasn’t fulfilled financial-aid pledge for suspect in leaks.” (Eventually, the group gave $15,000.)
But by the end of 2010, Assange had sought refuge from the Swedish case by retreating to Ellingham Hall, a country mansion in England owned by dilettante investigative journalist Vaughan Smith. Assange deployed the now-18-year-old Siggi as one of his few trusted couriers for WikiLeaks’ most prized and explosive leaks of all – the quarter-million diplomatic cables from Manning – which they were delivering to news outlets around the world. “Do you have an EU passport?” Assange messaged Siggi one night.
“Yes Why:)?”
“Just thinking about various meetings.”
W
hen I met with WikiLeaks spokesman Hrafnsson, he insisted that apart from a trip to Ellingham Hall Siggi “was never traveling on behalf of WikiLeaks anywhere.” But several European journalists I spoke with confirmed their meetings with Siggi, and some insisted that both Assange and Hrafnsson were well aware. “Kristinn told me Siggi was the one to deal with,” says Leonie van Nierop, a reporter for a Netherlands daily paper, NRC Handelsblad, who met with Siggi in Amsterdam. “Siggi was constantly on the phone with Assange,” says Dan Sommer, the former head of security for the U.S. Embassy in Reykjavik and a local pastor, who traveled as Siggi’s bodyguard. “It was clear that Assange knew what Siggi was doing.”
Assange had potential publishers vetted in person before giving them the files, and Siggi was among those tasked with the job, arriving in each city with an encrypted thumb drive containing excerpts from the cables. The twisted humor of the transactions – that the biggest leak in U.S. history was being delivered by a baby-faced 18-year-old – wasn’t lost on the reporters and editors with whom Siggi met. Dutch journalist Eelco Bosch van Rosenthal found him to be “an insecure guy who wanted to be something in the world.”
After spending several days with Siggi, van Nierop took a liking to the boy. She had acted as a tour guide for a day, leading Siggi through the famed red-light district in Amsterdam, where she noticed that he didn’t seem very intrigued by the women offering themselves in windows. “He was more interested in the trains in the station than the hookers,” she recalls. She could tell, while listening to her colleague speak with Assange about Siggi after the trip, that the two were geeky pals. She says Assange teasingly said that since she “took Siggi to the red-light district, couldn’t you have bought a girl for him?” Van Nierop thought Siggi’s relationship with Assange also explained why the boy seemed isolated. “If Julian Assange is your best friend,” she says, “you must be a little lonely.”
With media outlets often paying his way, Siggi says he was “having the time of my life.” When he told his parents he was traveling on missions for WikiLeaks, they balked; but as his father told me, “He was 18. There was nothing we could do.” In January 2011, he arrived in Honduras to meet with editors from the newspaper El Heraldo and was greeted by a team of armed bodyguards. When Siggi asked why he needed such heavy security, one of the goons told him, “because you’re white, and you could get stabbed or kidnapped.”
But Sommer, his personal bodyguard on many of the trips, couldn’t get the boy to leave behind his childhood. At every city, Siggi insisted on taking time out to visit the local waterpark and eating McDonald’s. In Budapest, Siggi had Sommer take him to his first strip club. In New York, Siggi wanted to try out a pepper-spray pen his bodyguard bought at a local spy shop. Back at the hotel, a half hour before a meeting, he persuaded his bodyguard to shoot him with it to see how it felt – but vastly underestimated the burn. “It was horrible,” says Siggi, who had to douse himself with milk to relieve the pain. He showed up at his next meeting with bloodshot eyes and a rash. “We had to explain that I wasn’t stoned,” Siggi says.
While in Washington, D.C., he had one mishap that was too close for comfort. His bodyguard was driving a Jeep the wrong way down a street by the Pentagon, when he saw a police car pull out nearby. With the diplomatic cables in the back seat, Siggi freaked. “Fuck me!” he said. “Oh, my God, we could get pulled over. We’re gonna go to Guantánamo Bay!” But as luck would have it, the police car passed him – missing the chance for the bust of a lifetime.
D
uring the half dozen times Siggi arrived at Ellingham Hall to visit Assange, he says he knew what to bring with him: a suitcase full of Malt Extrakt, Assange’s favorite Icelandic soda. “I saw it in his face,” Siggi says, “somebody actually thought about him. He was happy that I remembered.”
Despite his circumstances, Assange was enjoying the comforts of mansion life and the companionship of his close-knit circle of supporters, including Siggi. They went swimming in the nearby lake, had long dinners in the regal dining hall. At Assange’s blowout 40th-birthday party, Siggi got drunk for the first time, on licorice schnapps, and drove his car into a ditch during a midnight junk-food run. “It was hilarious!” Siggi recalls.
But in private moments, Assange told Siggi that the political and personal battles were wearing on him. “He said that he was really tired,” Siggi says. “I’d just like to give up,” Assange told him.
As the increasingly besieged WikiLeaks leader’s profile grew, so did his paranoia. Assange asked his protégé to write up psychological profiles of WikiLeaks core members. Siggi, however, initiated more recon on his own. Late one night, he clandestinely cloned their hard drives, including the laptops of Hrafnsson and longtime associate Sarah Harrison, and he provided Assange with a report of their contents.
Though Assange hadn’t asked him to do this, Siggi claims he read the findings and Assange allowed him to continue snooping during visits to Ellingham Hall. At one point, Siggi says, Assange asked him to search through the computers of Vaughan Smith, the journalist who owned the home, because he thought Smith was secretly videotaping him. Siggi sneaked into Smith’s office, rifling through his things until he found computer-memory cards and drives, which he promptly began wiping clean. I ask Siggi if he felt that spying on the volunteers and their host was wrong. “Privacy is just a myth, you know,” he replies. “It doesn’t really exist.”
But Assange’s spy games grew worse. BMSN co-founder House told Wired that Assange asked him in January 2011 to swipe a copy of former insider Domscheit-Berg’s WikiLeaks exposé prior to publication. Around the same time, Siggi claims Assange asked him to set up hidden cameras to spy on guests inside Ellingham Hall. “Julian just had this idea that everybody was after him,” he says. “He wanted this to be done. It made him feel more secure.” Siggi bought coat-hook spy cams and affixed them on the back of doors throughout the house, including bedrooms. He says he also installed a spy cam in a room used for meetings with visitors like Eric Schmidt of Google and Steve Kroft of 60 Minutes.
When I call Smith to ask him if he had ever seen any of these items in his house, he said he recalled finding a coat hook in a box and wondering why it was there. “I remember thinking, ‘That’s weird,'” he says. “‘Why would someone bring a coat hanger into my house?'”
S
iggi’s infiltrations soon spiraled well beyond Ellingham Hall. While WikiLeaks has always maintained that they are, as Hrafnsson puts it, “passive recipients” of leaks, Siggi spent much of 2011 conspiring with the most renowned hackers on the Net. The operation fulfilled what was now a common pattern: Siggi going rogue but with what he said was his boss’s tacit approval. “I understood what Julian wanted,” Siggi says.
In the wake of the Manning cables, Assange wanted more newsmaking leaks, but the material coming in wasn’t meeting his insatiable appetite or ambitions. So Siggi reached out to Gnosis, a hacker group that made its name in December 2010 for compromising more than a million registered accounts on Gawker websites.
Gnosis tipped Siggi off to a notorious 16-year-old female from Anonymous named Kayla who had just helped hack HBGary, an IT security firm that worked for the U.S. government. Gnosis claimed to have an unpublished copy of HBGary’s database, including its clients’ names and e-mails. “Don’t release it,” Siggi messaged back. “Allow us.”
Anonymous, however, ended up leaking the files themselves, and Siggi told Gnosis that his boss was pissed. “You can’t really control Anonymous,” Gnosis replied. “You can kinda herd them in the right direction but other than that lol good luck.”
But that didn’t stop Siggi from trying. In January 2011, Siggi got word that DataCell, the hosting service behind WikiLeaks, had valuable contracts pulled by an Icelandic power company called Landsnet, and he wanted revenge. “I have a funny request for you,” Siggi wrote Kayla in one chat. “www.landsnet.is is something ‘Anonymous’ should take down if it’s possible.” Two minutes later, Kayla replied that she’d just unleashed a botnet against the website, a form of a cyberattack that swamps the site with requests. Siggi tried logging on to the Landsnet site. “Haha request timed out,” he wrote.
The attack didn’t stop there. When Siggi explained that the Icelandic government had made a deal to assume DataCell’s contracts, Kayla asked if he wanted her to take down one of its sites too. “Definitely,” Siggi replied. Minutes later, a ministry site was down. But as the sites fell, Siggi joked that Kayla might inadvertently knock Iceland’s power offline too. “If you see a button that says turn off electricity don’t press it please,” he wrote.
With his connections to the Anonymous cell more secure, Siggi suggested that the group could be of even greater help – getting them more secret documents that WikiLeaks could release. “I don’t care where the information comes from,” Assange had told him, which Siggi took as carte blanche to solicit stolen material. So Siggi had Gnosis introduce him to one of the most infamous hackers of all: Sabu, leader of the Anonymous offshoot LulzSec. In the spring of 2011, LulzSec had taken down the sites of high-profile targets including Fox, the CIA and PBS, whose Web page they replaced with the title “FREE BRADLEY MANNING. FUCK FRONTLINE!” But Sabu wanted proof that Siggi was who he said he was by speaking with Assange directly. Siggi claims to have complied and arranged the Skype call.
With Sabu convinced, Siggi put him on a job: to dig further into the Icelandic government’s computers to see if it had intel on the DataCell deal. Soon, Sabu delivered. Siggi says Assange told him to have LulzSec upload the files to a WikiLeaks FTP server, which they did. And Sabu soon had more secrets to offer. He told Siggi his crew had recently hacked Stratfor, a “global intelligence” agency and government contractor, and found more than 5 million confidential e-mails between Stratfor and companies such as Dow Chemical, Lockheed Martin and Northrop Grumman, as well as government agencies including the Department of Homeland Security and the U.S. Defense Intelligence Agency.
But as the e-mails poured in, Siggi began to grow anxious and questioned the scale of the operation. Even though he was the one who initiated the relationship with the hackers, he worried that they were going too far. “Crossing this line by accepting stolen information and publishing this is literally just breaking the law,” he says he told Assange. “You’re going away from being a journalist organization and threatening national security.” But, once again, Assange told him he didn’t care how the information was obtained.
Back at home in his bedroom, Siggi couldn’t sleep. He lay in bed imagining the FBI breaking down his door, storming into his house, past his giant Garfield doll, his sleeping parents and his little sister, and hauling him off to Gitmo for good. For months, he’d had insomnia, but now his mind and heart were racing like never before. When he did manage to fall asleep, he woke up screaming.
J
ust after 3 a.m. on August 23rd, 2011, the pressure Siggi felt finally broke him. Crawling from bed, he e-mailed the U.S. Embassy in Reykjavik and asked for a meeting. It wasn’t just the LulzSec association that concerned him. Assange seemed to have changed from the man he met the year before. While he was unwilling to donate the amount he’d promised to Manning’s defense, he was ready to blow large sums rehabilitating his ailing image. “I don’t care,” Assange told him. “We have a million bucks, and we can spend it on buying publicity.” For Siggi, it was a turning point. “I realized that this wasn’t the same ideology as before,” he says. But truth is, Siggi was also trying to save his own ass. Going to the FBI, he hoped, would inoculate him against prosecution. And, he admits, he thought being a spy for the feds would be a thrill. There was just one price to pay: “I would be betraying WikiLeaks, Julian, my friends,” he says.
The next day, Siggi got called to the U.S. Embassy and was soon taken to a nearby hotel, where he was met by the FBI. They wanted to know WikiLeaks’ physical security, their technical security, locations of computer servers, how Assange lived, his daily routine, “literally, everything,” Siggi says. And he had plenty of data to share: several hard drives of WikiLeaks private files that he had amassed during his time with the organization – just in case he ever needed them.
Signing a nondisclosure agreement, he spoke daily with the FBI, passing along the chats he was handling, the leaks that were in negotiation. And, as he told the FBI, there were big ones to be had, courtesy of Sabu. As they were getting the Stratfor files from LulzSec, Siggi had heard that Assange was trying to get Sabu to join the WikiLeaks team. “Did J say anything about recruiting you permanently?” Siggi asked Sabu in one chat.
“Well he emailed me once but we didn’t get to talk,” Sabu replied. “Guess he’s been busy/careful or whatever but let him know we have intercepted 92GB of mails from .gov.sy so this can be one of the biggest leaks in history.” In November 2011, Sabu began passing excerpts of this data, later published by WikiLeaks as the “Syria Files,” to Siggi – 2 million internal e-mails, going back to 2006, from companies, politicians and ministries in Syria. According to Siggi, when he told Assange about the new information, “He said, ‘OK, cool,'” Siggi recalls. “‘They can upload it.'”
But Siggi’s spy work was jeopardized that same month when he got an angry call from WikiLeaks’ spokesman Hrafnsson, accusing him of embezzling $50,000 in proceeds from selling WikiLeaks merchandise online. Siggi insists that he had run the money through his account with Assange’s permission, and that any extra cash went to cover his own expenses. With both sides warring, it isn’t clear whom to believe. But even if Siggi was guilty, the accusations raised more questions about why the boy, whom the group says had no role in the organization, had access to such funds in the first place. Hrafnsson threatened to report him to the police. Siggi e-mailed the FBI telling them the news. “No longer with WikiLeaks – so not sure how I can help you more. Sorry I couldn’t do more :(”
To his surprise, the FBI still had more work for him. Shortly after WikiLeaks published the Stratfor files in February 2012, Siggi was flown to Washington, D.C., where he met with members of the CIA, the DOD and the FBI at a Marriott hotel. The questions became dizzying: They wanted to know about others besides Assange – Jónsdóttir, Hrafnsson and more.
It didn’t take long for the hammer to fall. On March 5th, LulzSec hacker Jeremy Hammond was arrested for hacking the Stratfor files leaked to WikiLeaks (he’d later be sentenced to 10 years in prison). The next day, Kayla, the LulzSec hacker Siggi had conspired with, was indicted on conspiracy charges – and revealed to be a man, 25-year-old Ryan Ackroyd, from England. But the biggest shock came when Siggi read in the news that Sabu was an FBI informant, and had been since June 2011. It suddenly all made perfect sense. For months, he had been informing the FBI of his conversations with Sabu, and they hadn’t seemed to care. And since Sabu had been an informant during the time of the Stratfor and Syria files, that meant something incredible: The FBI had been well aware of the Stratfor and Syria hacks all along, and done nothing to intervene. Their target had always been Assange. The biggest and most famous hack in recent years was a carefully built plot by the FBI to snare a man it considered as an enemy of the state.
“Ultimately, the FBI’s mission is to apprehend criminals and prevent the commission of serious crimes,” says Glenn Greenwald, the journalist whom Edward Snowden leaked NSA files to last year. “In this particular case, they purposely allowed the commission of serious crimes they could have easily stopped. To treat an American firm like Stratfor and the privacy of Syria as sacrificial lambs in a campaign to entrap Julian Assange into criminality is unbelievably radical – you can even say corrupt.”
During a meeting in Denmark in March, the FBI had Siggi sign over eight hard drives containing his WikiLeaks files. When Siggi asked them about Sabu, the agents just smiled and gave him $5,000 to cover his cost of living, then sent him on his way. He never heard from them again.
I
n January 2013, Siggi watched TV in horror as Hrafnsson told a reporter how he had learned the previous summer that the FBI had come to Iceland to secretly interview someone about WikiLeaks – he just didn’t know who it was. But after meeting with Ögmundur Jónasson, who had just left the position of Iceland’s Minister of the Interior, he pieced together that Siggi was the one who had gone to the FBI.
I met with Jónasson, who told me how, in June 2011, Iceland received a warning from U.S. authorities of “an imminent attack on Icelandic computer systems.” Two months later, Jónasson found out that a plane full of FBI agents had arrived in Iceland for another purpose: to investigate WikiLeaks. Because they didn’t have authorization for this, he turned them away – only to find out later that they had taken Siggi to Copenhagen. “I still have suspicion,” he says, “that this was part of an attempt to put a case against Julian Assange.”
Hrafnsson remains just as outraged, though he tells me he and Assange weren’t shocked. “We have stopped being surprised about anything,” he says. When I ask if Assange feels betrayed by Siggi, Hrafnsson arches his brow. “Inherently in your question is the assumption that there was a very close relationship, which I never saw.”
While Assange remains holed up in the Ecuadorian Embassy in London, Siggi faces the repercussions of coming clean. Among other things, for the first time in this story, he’s admitting to the Milestone leak. “It’s probably going to lead to my conviction,” he says. “But I just have to face that.” In the meantime, in addition to unrelated fraud charges, he’s appealing his sentence of eight months for sexual misconduct. Siggi claims the victim’s father pressed the charges after learning of Siggi’s relationship with his son; Siggi calls his homosexual tryst a “phase.”
As for WikiLeaks, should he ever get asked one day to testify against Assange, Siggi isn’t sure whether he will comply. He knows that he betrayed his former mentor and friend. But he says he did it all for the very same reasons he believed in WikiLeaks and Assange: “The truth needs to come out.”
This story is from the January 16th, 2014 issue of Rolling Stone.
by David Kushner
JANUARY 06, 2014
Find this story at 6 January 2014
©2014 Rolling Stone
WikiLeaks’ Teenage Benedict Arnold; How the FBI used a baby-faced WikiLeaks volunteer to spy on Julian Assange.22 februari 2014
When he met Julian Assange for the first time, Sigurdur Thordarson admired the WikiLeaks founder’s attitude and quickly signed up to the cause. But little more than a year later, Thordarson was working as an informant spying on WikiLeaks for the U.S. government—embroiling himself as a teenager in one of the most complicated international events in recent history.
In a series of interviews with Slate, Thordarson has detailed the full story behind how, in an extraordinary sequence of events, he went from accompanying Assange to court hearings in London to secretly passing troves of data on WikiLeaks staff and affiliated activists to the FBI. The 20-year-old Icelandic citizen’s account is partly corroborated by authorities in Iceland, who have confirmed that he was at the center of a diplomatic row in 2011 when a handful of FBI agents flew in to the country to meet with him—but were subsequently asked to leave after a government minister suspected they were trying to “frame” Assange.
Thordarson, who first outed himself as an informant in a Wired story in June, provided me with access to a pseudonymous email account that he says was created for him by the FBI. He also produced documents and travel records for trips to Denmark and the United States that he says were organized and paid for by the bureau.
The FBI declined to comment on Thordarson’s role as an informant or the content of the emails its agents are alleged to have sent him. In a statement, it said that it was “not able to discuss investigative tools and techniques, nor comment on ongoing investigations.” But emails sent by alleged FBI agents to Thordarson, which left a digital trail leading back to computers located within the United States, appear to shine a light on the extent of the bureau’s efforts to aggressively investigate WikiLeaks following the whistle-blower website’s publication of classified U.S. military and State Department files in 2010.
Late last month, Army intelligence analyst Bradley Manning was convicted on counts of espionage, theft, and computer fraud for passing the group the secrets. During the Manning trial, military prosecutors portrayed Assange as an “information anarchist,” and now it seems increasingly possible that the U.S. government may next go after the 42-year-old Australian for his role in obtaining and publishing the documents. For the past 14 months, Assange has been living in Ecuador’s London Embassy after being granted political asylum by the country over fears that, if he is sent to Sweden to face sexual offense allegations, he will be detained and subsequently extradited to the United States.
Meanwhile, for more than two years, prosecutors have been quietly conducting a sweeping investigation into WikiLeaks that remains active today. The FBI’s files in the Manning case number more than 42,000 pages, according to statements made during the soldier’s pretrial hearings, and that stack of proverbial paper likely continues to grow. Thordarson’s story offers a unique insight into the politically-charged probe: Information he has provided appears to show that there was internal tension within the FBI over a controversial attempt to infiltrate and gather intelligence on the whistle-blower group. Thordarson gave the FBI a large amount of data on WikiLeaks, including private chat message logs, photographs, and contact details of volunteers, activists, and journalists affiliated with the organization. Thordarson alleges that the bureau even asked him to covertly record conversations with Assange in a bid to tie him to a criminal hacking conspiracy. The feds pulled back only after becoming concerned that the Australian was close to discovering the spy effort.
—
It was 2010 when the saga began in Reykjavik, Iceland. Thordarson, then just 17, says that before his first encounter with Assange, he knew little about the man beyond a few YouTube videos he’d watched about WikiLeaks. But he went to hear Assange speak at a conference hosted by an Icelandic university, and the teenager was impressed. After the event, a journalist Thordarson knew introduced him to Assange, and the pair struck up a relationship that led to Thordarson doing some volunteer work for the organization. Before long, he was on the edges of WikiLeaks’ small, tight-knit inner circle.
At that time, the group was sitting on the explosive files it had received from Manning that included a video showing a U.S. helicopter attack that resulted in the deaths of 12 civilians, among them two employees of the Reuters news agency.
Thordarson, a blond-haired stocky figure with a baby face, was present while WikiLeaks staff and volunteers in Reykjavik were preparing the video for publication. When it was published by WikiLeaks in April 2010, under the name Collateral Murder, it catapulted the organization into the international spotlight and provoked an angry response from government officials in Washington.
The then-teenager, known as “Siggi” to his friends, was around at the height of that backlash. He was given administrative privileges to moderate an Internet chat room run by WikiLeaks. And when Assange relocated from Iceland to England, Thordarson came to visit. He even accompanied the WikiLeaks founder to court appearances in London as he fought extradition to Sweden over allegations of sexual assault.
Siggi and Assange in England in 2011. You can see that Assange is wearing his ankle monitor.
Photo courtesy of Sigurdur “Siggi” Thordarson
Thordarson looked up to Assange, viewing him as a friend. The WikiLeaks chief, he says, treated him well—helping him find a lawyer in 2010, not long after the pair had met, when he says he was wrongly accused by Icelandic police of breaking into a business premises. But signs that Thordarson had a proclivity for brushes with the law did not appear to trigger alarm bells early on at WikiLeaks—though perhaps they should have, because he was certainly not any ordinary volunteer. Unlike many drawn to WikiLeaks, Thordarson does not seem to have been principally motivated by a passion for the cause of transparency or by the desire to expose government wrongdoing. Instead, he was on the hunt for excitement and got a thrill out of being close to people publishing secret government documents.
As a child, Thordarson led a fairly normal middle-class life in Reykjavik, enjoying social studies and chemistry at school. His father worked as a sales manager at a painting firm, and his mother ran a hair salon. But as he entered his teenage years, he says, he began to feel that he could not connect with others in his peer group. He went to college to study computer science and psychology—but claims he was suspended after hacking into a college computer system.
By mid-2011, Thordarson’s thirst for adventure, combined with his interest in hacking, would irreversibly complicate his relationship with WikiLeaks. In June of that year, the Anonymous-linked hacker group LulzSec brought down the website of the CIA. Thordarson says that he and other WikiLeaks staff were amused by the incident, and he decided to reach out to the hackers to establish contact. Thordarson claims that, using the aliases “Q” and “Penguin X,” he set up a line of communication between WikiLeaks and LulzSec. During the series of exchanges that followed, Thordarson says he “suggested” that his group wanted assistance to find evidence of anti-WikiLeaks sentiment within the Icelandic government’s Ministry of Finance, which had thwarted an attempt by DataCell, a company that processes WikiLeaks donations, to purchase a large new data center in Reykjavik. (In early 2011, DataCell’s founder questioned whether the Icelandic government had deliberately prevented the deal because it was “afraid of letting WikiLeaks here into the country.”)
“That was basically the first assignment WikiLeaks gave to LulzSec,” Thordarson alleges, “to breach the Icelandic government infrastructure.”
Thordarson admits that he initiated the contact with the hackers, though he claims it was approved by Assange. It is unclear, however, whether WikiLeaks staff were fully aware of his correspondence with LulzSec and the “assignment” that he says he handed to them. WikiLeaks spokesman Kristinn Hrafnsson told me he believed that if Thordarson had any contact with LulzSec, it was as a rogue operative and that it was “highly unlikely” any other WikiLeaks staff, including Assange, knew what he was engaged in. Thordarson is a dishonest character, Hrafnsson said, who is trying to inflate the role he played as a volunteer.
Either way, in this case, the exchange Thordarson describes does appear to have taken place. It has since been independently corroborated in part by authorities in Iceland and was first reported—from the perspective of the hackers—in a 2012 book by Parmy Olsen, We Are Anonymous. I have also seen chat logs and emails from 2011 that appear to back up Thordarson’s assertion that he was communicating with the hackers, which has significant ramifications. By claiming that he effectively solicited LulzSec to break into government computers, Thordarson has implicated himself in a potential international criminal conspiracy, leaving WikiLeaks open to the allegation that it, too, was somehow involved.
But the full facts about the incident remain murky—not least because there is another dramatic twist to the tale.
What Thordarson did not know at the time was that Sabu, the loudmouth figurehead of LulzSec and one of the hackers he was communicating with, was in fact working as an FBI informant—and the online chat about hacking Icelandic government infrastructure was apparently being monitored by the feds. About four days later, the FBI contacted Icelandic authorities to warn them about an “imminent” hacking attack, according to Iceland’s state prosecutor, and this prompted Icelandic police to travel to the United States to discuss the matter. (Sabu, it later turned out, was a then-28-year-old hacker from New York named Hector Monsegur. The FBI reportedly tracked him to his Lower East Side apartment in early June 2011 and managed to “flip” him, because he was the guardian of two young children and desperate to stay out of jail.)
Thordarson says LulzSec never gave WikiLeaks any information about Icelandic government corruption, but hackers close to the group did hand over a confidential Icelandic state police document related to the security of the U.S. Embassy in Reykjavik. He also claims that hackers affiliated with LulzSec and Anonymous turned over documents from a bank in Mexico, files from BP, and emails hacked from the Syrian government and the security think tank Stratfor, among others. Between February 2012 and July 2012, a large cache of Syrian government and Stratfor emails were published by WikiLeaks under the names the “Syria Files” and the “Global Intelligence Files.” (As a matter of policy, WikiLeaks does not comment on how its releases are sourced.)
Being at the center of the action had given Thordarson the adrenaline rush he was looking for. But the contact with LulzSec, which he had initiated, made him feel like he had gone too far. He was worried that in maintaining contact with the hackers, he was “breaking quite a lot of laws.” Meanwhile, news reports were saying that the U.S. government was already investigating WikiLeaks for its publication of classified documents, including the Collateral Murder video, diplomatic cables, and military war logs from Afghanistan and Iraq. And just as Thordarson was getting anxious about the high-stakes international affairs he had become entangled with, he also seems to have become bored with WikiLeaks—and he now admits he wanted to embark on a new adventure.
It was then that, at about 3:30 a.m. on Aug. 23, 2011, Thordarson sat down at his computer at home in Kópavogur and typed out a message to the U.S. Embassy in Reykjavik. He decided he wanted to become an informant—and, unlike Sabu, he was ready to do so without any threats hanging over his head.
From: [redacted]@live.com
To: reykjavikdatt@state.gov
Subject: Regarding an Ongoing Criminal investigation in the United States.
Date: Tue, 23 Aug 2011 03:33:39 +0000
After a quick search on the internet i have yet not been able to find a reliable contact form to establish a meeting with a person regarding an on going criminal investigation.
The nature of the investigation is not something that i desire to speak over an email conversation.
The nature of the intel that can be brought to light in that investigation will not be spoken over email conversation.
I here by request a meeting at the U.S Embassy in Iceland, or any other place.
I am an Icelandic citizen.
I can be contacted via this email address
Or Via Phone
00xxx-xxxxxxx
I request also that this email will be considered confidential.
Later that day, Thordarson received a phone call. On the other end, he says, was the security chief at the U.S. Embassy in Reykjavik. The man asked what exactly the email was concerning, and Thordarson told him it was about the U.S. government’s ongoing investigation into WikiLeaks. He says the security chief denied the existence of any such investigation, but nevertheless asked Thordarson to come to the embassy to meet him. Thordarson agreed. And that afternoon, he turned up at the door of the Reykjavik embassy, explaining briefly that he wanted to share information about WikiLeaks. To prove he wasn’t bluffing, he showed staff a photocopy of Julian Assange’s passport that he had obtained.
He says he was told not to expect any further contact for at least a week, if at all. But less than 24 hours later, Thordarson’s phone rang again. He was asked if he could come back to the embassy for another meeting. This time, it was serious. Unlike the more casual first meeting, he was told to hand over any electronic devices and take off his watch. He was then escorted by the embassy security chief on a walk around Reykjavik, circling the city center a number of times to ensure they were not being followed. Then he was ushered into a conference room in the four-star Hotel Reykjavik Centrum, where, he says, two men were waiting for him. They spoke with American accents and displayed FBI credentials. Iceland’s state prosecutor has acknowledged that this meeting took place, confirming in a document published earlier this year that a handful of FBI agents and federal prosecutors were authorized to jet into the country after an Icelandic citizen contacted the U.S. Embassy in Reykjavik. The U.S. Embassy did not respond to a request for comment.
For a brief moment, Thordarson became nervous. “The only thing that went through my mind was: ‘What the fuck am I doing?’ ” he recalls. But the feeling of doubt didn’t last long, and soon he was embracing the whole experience—almost as if he believed he was starring in his own personal spy thriller.
The FBI, he says, asked him a range of questions to “verify that I wasn’t full of bullshit.” At one point, he was asked what he knew about LulzSec, and he described the online conversations he had been having with Sabu. Thordarson did not know it at the time, but the FBI had presumably been monitoring those chats—as an informant, Sabu had been issued a government laptop, and his online activity was reportedly under surveillance 24/7. Indeed, the bureau had met with Icelandic authorities two months earlier to warn about a potential hacking attack on Icelandic infrastructure—just days after Thordarson says he gave LulzSec the “assignment” to hack Icelandic government computers.
Thordarson’s detailed knowledge of the Sabu chats—and his participation in them—apparently convinced the agents. For about the next four consecutive days, they met with him, Thordarson says, each time at a different hotel in Reykjavik. They asked about people connected to WikiLeaks and quizzed him about what Assange was doing at Ellingham Hall, the remote residence in England’s countryside where the WikiLeaks founder was living at the time while on bail and fighting extradition to Sweden. Thordarson says the agents also wanted information about WikiLeaks’ technical and physical security and the locations of WikiLeaks’ servers; they asked him, too, for names of individuals linked to WikiLeaks who might be open to becoming informants if approached by the FBI.
However, by Aug. 30, 2011, several days after the FBI entered Iceland, the Icelandic government had become unsettled about the presence of U.S. authorities. Then–Interior Minister Ögmundur Jónasson told me that Icelandic authorities initially believed the FBI agents had come to the country to continue their investigation into the impending LulzSec hacking attack on Icelandic government computers. But once it became clear that the FBI agents were in fact engaged in a broader swoop to gather intelligence on WikiLeaks, according to Jónasson, the agents were asked to immediately remove themselves from the country.
“I think it was a question of trying to frame Julian Assange,” Jónasson says, recalling the debacle. “And they wanted Icelandic authorities to help them with that.”
WikiLeaks ally DataCell had just months earlier accused the Icelandic government of working against the whistle-blower group, but by booting the FBI out of the country, the Interior Ministry had radically undermined that theory. Its decision, in fact, was a stark illustration of how WikiLeaks has continued to maintain a strong support base in Iceland since 2009, when it exposed controversial loan payments made by Kaupthing, the bank at the heart of the Icelandic financial crisis. As a result, the FBI could not meet with Thordarson in Iceland again. Instead, he says, the FBI held further meetings with him in Denmark (three times) and brought him to the United States (once) to continue discussions about WikiLeaks. Through this period, Thordarson says the bureau paid him about $5,000 in total to cover his expenses and to make up for loss of earnings.
Thordarson maintained contact with WikiLeaks, but he was secretly sending information back to the FBI. Once, he says, he told the agents that he was planning a visit to see Assange at Ellingham Hall. Eager to take advantage of the trip, they asked him to wear a recording device and make copies of data stored on laptops used by WikiLeaks staff. He alleges that the FBI wanted him to get Assange to “say something incriminating about LulzSec.” But he declined to wear a recording device and told his handlers that covertly copying data from computers wouldn’t be feasible because “people literally sleep with their laptops at Ellingham.”
Assange and Siggi in Paddington, London, in 2011.
Photo courtesy of Sigurdur “Siggi” Thordarson
Thordarson felt that wearing a wire in an attempt to secretly implicate Assange in LulzSec’s illegal hacking activities was a step too far, but he was happy to engage in equally dubious intelligence-gathering activities. He maintained contact with LulzSec and passed transcripts of his conversations with the hacker Sabu back to the FBI, his emails show. What Thordarson did not know at the time was that the FBI already knew about the chats—because, of course, it had recruited Sabu as an informant, too.
In one notable online exchange in November 2011, Sabu told Thordarson that LulzSec had breached Syrian government computers. He showed off snippets of hacked emails to Thordarson, saying he wanted to pass a trove of data to WikiLeaks. Later in the same conversation, Thordarson quizzed Sabu about a plan to “recruit” him for WikiLeaks. Neither of the two men appear to have realized that they were both independently acting as informants for the FBI.
“We ended up [inside] a certain government’s central mail server and got some fucking massive leaks coming out,” Sabu says in the chat. “You gents sure you’re not wanting to do anymore leaks?”
“Did J say anything about recruiting you permanently?” Thordarson fires back a few minutes later, in reference to Assange.
“Well he emailed me once but we didn’t get to talk,” Sabu says. “Guess he’s been busy/careful or whatever. But let him know we have intercepted 92GB of mails from .gov.sy [the Syrian government] so this can be one of the biggest leaks in history.”
When Sabu was outed as an informant in an explosive Fox News story in March 2012, it made sense to Thordarson. He says he found it strange that the FBI never seemed interested in the information he told them he had about the hacker, who was a hugely prominent figure at the helm of a group that had claimed responsibility for attacking U.S. government websites and multinational corporations, including Sony and News International. What the FBI agents wanted from Thordarson, it seems clear, was information that they could not get from any other source—information about the inner workings of WikiLeaks.
Before his penultimate meeting with U.S. authorities, in early February 2012, Thordarson says he was instructed to build relationships with people close to WikiLeaks in order to gather information for the feds. He received an email from his alleged handler—who used the alias “Roger Bossard”—in an account set up for him under the fake name “Ibrahim Mohammad.” The message encouraged Thordarson to “chat with those people we discussed on the phone” in order to “get a head start before our meet.” A few weeks later, he was flown out to Washington, D.C., and says he was put up in a Marriott hotel in Arlington, Va., near the location of a grand jury that has been collecting evidence about WikiLeaks since at least early 2011 as part of a criminal investigation into the whistle-blower organization. At meetings in a conference room of the hotel, he was asked about a host of individuals who had at one time volunteered or worked for WikiLeaks in some capacity, including Icelandic parliamentarian Birgitta Jónsdóttir; eminent computer security expert Jacob Appelbaum; and Guardian reporter James Ball, a former WikiLeaks staffer. “They wanted to know literally everything there was to know about these people,” Thordarson alleges.
He says he “mostly gave them information that was general knowledge.” But he admits that he turned over some email addresses, details about instant messenger accounts, and phone numbers. This information is useful to the authorities because they can use it to order surveillance of targeted suspects’ phone or email accounts. Since 2010, several individuals connected to WikiLeaks have had emails and other communications monitored as part of the FBI’s investigation.
By the end of the meeting in Washington, the U.S. government had already gleaned a large amount of information about WikiLeaks from Thordarson. Its biggest haul of intelligence, however, was yet to come.
On March 18, 2012, Thordarson says he met with the FBI for what would be the final time, in Aarhus, Denmark. Prior to the meeting, he exchanged emails with his alleged handler, agreeing that he would come equipped with hard drives packed with chat logs, photographs, and other data related to WikiLeaks. According to a Justice Department receipt Thordarson says he was provided by the FBI, he turned over eight hard drives in total containing of about 1 terabyte of data, which is the equivalent of about 1,000 copies of the Encyclopedia Britannica. (The Ministry of Justice in Denmark refused to comment on whether it authorized FBI agents to enter the country to meet with Thordarson, saying that it could not discuss “specific cases.”)
The Department of Justice receipt Thordarson says he was given for the delivery of eight hard drives to U.S. authorities.
Courtesy of Sigurdur “Siggi” Thordarson
Once the agents obtained the hard drives and received the passwords to access them, Thordarson’s emails suggest, they stopped responding regularly to his messages and rebuffed his attempts to set up another meeting. (Apparently, Thordarson’s thirst for adventure hadn’t yet been quenched.) They continued to encourage him to send data on WikiLeaks to a P.O. box at a UPS Store in Arlington, a short drive from Justice Department and FBI headquarters, but they pulled back, apparently concerned that their cover could soon be blown.
The UPS Store in Arlington, Va., where Siggi was asked to send mail for the FBI.
Photo by Torie Bosch
“Understand J has your laptop,” an alleged agent wrote to Thordarson shortly after the final Denmark meeting, referencing Assange. “Is there anything on it about our relationship?”
There were also signs that internal conflict was developing within the FBI over the infiltration of WikiLeaks, a controversial tactic not least because WikiLeaks is a publisher and press freedom groups have condemned from the outset the government’s investigation into Assange and his colleagues. In early 2012, after a period of not responding to Thordarson’s emails, his alleged FBI handler wrote that there had been “bureaucratic issues beyond my control that prevented me from maintaining contact,” adding that “our relationship has been problematic for some others. This is not an ordinary case. But those were not my issues and I have been diligently trying to work out those issues so we can continue our relationship.”
Thordarson, too, was having problems. He had become embroiled in a serious dispute with WikiLeaks about money in late 2011, which created friction between him, Assange, and WikiLeaks, ultimately resulting in him being dismissed from his volunteer role and perhaps even fueling his desire to continue informing on the group. Thordarson was accused of embezzling about $50,000 from a merchandise store that he had helped set up to raise funds. He admits that he took some of the money but denies stealing it, saying he used the funds to cover expenses he was owed by WikiLeaks. The matter is currently being investigated by police in Iceland.
In February, Iceland’s state prosecutor published a detailed timeline about the FBI’s visit to the country in 2011. The information shed light on the circumstances surrounding how U.S. authorities were asked to leave because of their attempt to gather intelligence on WikiLeaks. The same month, Thordarson was called to appear at a closed-door meeting with Icelandic parliamentarians to discuss the extent of his dealings with the FBI, which led to him being named in the Icelandic press as the person who had prompted the FBI to fly to the country in August 2011.
It was at this point, Thordarson says, that he was forced to come clean to WikiLeaks. He says he told Assange about everything he had turned over to the FBI and forwarded to WikiLeaks all of his emails with the alleged FBI agents. Unsurprisingly, Assange “wasn’t happy,” he says. Hrafnsson, the WikiLeaks spokesman, told me he believed Thordarson was guilty of “pathological” behavior, adding that the FBI’s apparent recruitment of Thordarson had revealed the U.S. government’s “relentless persecution” of WikiLeaks.
Thordarson, however, does not seem fazed by the controversy he has created. He now spends much of his time working for companies that offer security and bodyguard training in Iceland and Denmark, though does not believe his relationship with the FBI has “formally ended.” He claims that his handlers at the bureau told him that he might yet be asked to testify in court about WikiLeaks. The Justice Department declined to comment about Thordarson but confirmed that its investigation into WikiLeaks is ongoing.
Eventually, the U.S. government may attempt to prosecute Assange, and there can be little doubt that he remains fixed firmly in the feds’ crosshairs. The WikiLeaks founder’s attorneys believe that a grand jury probe may already have produced an indictment against him that remains under seal—and so he remains sheltered in Ecuador’s London Embassy, fearing that if he sets foot outside the door he will subsequently be extradited to the United States and thrown in jail. But the prospect of this does not appear to be weighing heavily on Thordarson’s mind. Only once, when recounting the time he spent passing information on Assange to the FBI, does his voice tremble with a quiver of guilt.
“If you come into Julian’s inner circle,” Thordarson says, “he really takes care of his friends.”
This article arises from Future Tense, a collaboration among Arizona State University, the New America Foundation, and Slate. Future Tense explores the ways emerging technologies affect society, policy, and culture. To read more, visit the Future Tense blog and the Future Tense home page. You can also follow us on Twitter.
Ryan Gallagher Aug. 9 2013 5:37 AM
Ryan Gallagher is a journalist who reports from the intersection of surveillance, national security, and privacy for Slate’s Future Tense blog. He is also a Future Tense fellow at the New America Foundation.
Find this story at 9 August 2013
© 2014 The Slate Group LLC.
Here’s What It Looks Like When Two Hacker FBI Informants Try To Inform On Each Other22 februari 2014
WikiLeaks informant Sigurdur Thordarson, left, and LulzSec informant Hector Xavier Monsegur.
The FBI has so many moles in the hacktivist community, it seems, that at times they’ve even ended up unwittingly doing their best to get each other arrested.
For much of 2011, Icelandic then-teenager and self-described hacker Sigurdur Thordarson worked as both a WikiLeaks volunteer and an FBI informant. As Thordarson first told Wired, he claims to have given the FBI eight hard drives full of information potentially useful to the U.S. government’s ongoing investigation into WikiLeaks, which has come back into the spotlight due to the secret-spilling group’s role in helping NSA whistleblower Edward Snowden seek asylum.
In an instant message conversation with Thordarson Thursday, I asked him what he might have given to the FBI that could be relevant to its investigation, and he responded immediately with a log of an instant message conversation between himself and the member of the LulzSec hacker group known as Sabu, which he says he gave to the FBI and which he claims shows “that information was passed on from LulzSec that later got published by WikiLeaks.” Thordarson told me he believes the log supports a “conspiracy” charge against Julian Assange or others in WikiLeaks.
The log is likely less useful to the FBI than Thordarson thinks: It’s no surprise that WikiLeaks has published hacked files, or even that it publishes files hacked specifically by LulzSec, such as the millions of emails stolen from the private intelligence firm Stratfor by activist Jeremy Hammond, who pleaded guilty to computer fraud and abuse last month.
More interesting, or at least more humorous, is the fact that the chat log represents a conversation between two FBI informants, both of whom seem to be trying to lure the other into providing evidence they can turn over to their law enforcement handlers–or even into a meeting that could lead to the other’s arrest. Sabu, also known as Hector Xavier Monsegur, had agreed to work as an FBI mole within LulzSec months before his conversation with Thordarson. Thordarson, for his part, tells me he thought he was helping to deliver a “notorious hacker” to the FBI, and didn’t know he was speaking to a fellow stool pigeon. Monsegur doesn’t show any signs of knowing either.
Thordarson, it should be noted, is not a reliable source, and WikiLeaks has claimed that “at no time did he have access to sourcing or publishing systems.” But while he may have tampered with the chat logs he provided me, they would be nearly impossible to wholly fabricate, and include English colloqualisms from Monsegur that would be tough for a native Icelander like Thordarson to invent.
At the beginning of this November 2011 conversation, in which Thordarson goes by the name “Dumbo12,” Monsegur offers WikiLeaks a a trove of hacked Syrian government emails, which sound like a portion of collection WikiLeaks would publish in 2012.
“
Sabu: how you doing my brother?
Dumbo12: all good on my and my friend
Dumbo12: on my end my friend *
Dumbo12: how’s life
Sabu: everythings good over here
Sabu: been busy
Sabu: we ended up a certain governments central mail server
Sabu: and got some fucking massive leaks coming out
Sabu: you gents sure you’re not wanting to do anymore leaks?
Dumbo12: Oh we will make more leaks
Dumbo12: we are gathering material now’a days and getting more funds to keep hosting our data servers
Dumbo12: anything else you can tell me about the comming out leaks?
Sabu: well between us. we ended up owning syrian government central mail server. my teams working on translating from arabic to english. but we are seeing crazy shit
Monsegur sends Thordarson some examples, and Thordarson responds with interest, and then asks Monsegur how WikiLeaks can help him. He responds asking for money:
“
Sabu: this is real shit
Dumb012: is this something WL could get there hands on and get real and good publicitiy?
Sabu : my brother. I’ll give you url of email attachments right now as a sample
Sabu : one minute
Dumbo12: another question i was asked to ask you, Are you being monitered? are you safe? do you need any assistance from us?
…
Sabu: nein but thanks for asking
…
Sabu: the only assistance I need is money so I can stop living in poverty and being the brokest hacker on earth
Sabu: hahaha
Then Thordarson mentions recruiting Monsegur to become a member of WikiLeaks, but insists on meeting him in person.
“
Dumbo12: Did J say anything about recruiting you permanately?
Sabu: well he emailed me once but we didnt get to talk
Sabu: guess hes been busy/careful or whatever
Sabu: but let him know we have intercepted 92GB of mails from .gov.sy so this can be one of the biggest leaks in history
Dumbo12: Just to point out one thing – If we are to recruit you – a meeting will have to take place we can’t be talking to a username forever
Sabu: I don’t care about that. but if you meet me you better make sure you guys are secure
Sabu: I refuse to go to jail for meeting anyone
Dumbo12: we will be secure im more worried about you
Sabu: especially me. they’re trying to get me really hard man
Sabu: I think they’re builing a real ugly case against me
Sabu: I believe in this cause and J inspired me to do what I’m doing
Sabu: but it feels like they’re trying to turn me to a martyr
Dumbo12: Believe me when i say, i personally and this organization will do everything we can to protect you from our end
Sabu: thanks brother.
Later Thordarson asks Monsegur to meet in Iceland, and Monsegur instead asks Thordarson to come to New York.
“
Dumbo12: Do you feel comfortable traveling to Iceland?
Dumbo12: or do you wan’t us to travel somwhere?
Sabu: unfortunately I’m a grown ass man with kids, so I don’t have the luxory of traveling the world
Sabu: but if you sneak yourself out to new york we’ll meet up at a bar on some random shit
Dumbo12: haha new york?
Sabu: haha yeah
Dumbo12: you don’t ask for little my friend
Sabu: take your time brother
Sabu: but its easy to hide in this city
Dumbo12: well worst case scenario i get stopped in NY customs – but i do not think that will happen
Sabu: I can be in NY tomorrow but i won’t go there unless your 100%
Sabu: I’m 100% but again my nigga I can’t risk going to jail now. I’ve been hiding for so long
Sabu: so be private about every fucking thing
Dumbo12: give me a date that suits you and i will try my outmost to be ther
Dumbo12: e
Dumbo12: if i get stopped in the US and they realize who i am then im going to jail so i ask you the same be not private but be very private about everything
Dumbo12: and you need to know that if i travel there i will be traveling with a close protection unit
Sabu: thats fine. im from the ghetto so I got people too 🙂
Four months later, Monsegur was revealed as an FBI informant. His meeting with Thordarson at a New York bar seems to have never taken place. Which is a shame: The two had more in common than they realized.
6/28/2013 @ 3:51PM |Andy Greenberg
Find this story at 28 June 2013
Copyright 2014 Forbes.com LLC™
WikiLeaks volunteer was paid FBI informant22 februari 2014
A “cherubic” looking 18-year-old was part of an international investigation
Wired reports that an Icelandic 18-year-old named Sigurdur “Siggi” Thordarson, who volunteered for WikiLeaks, was also informing for the FBI on the secretive group:
Thordarson was long time volunteer for WikiLeaks with direct access to Assange and a key position as an organizer in the group. With his cold war-style embassy walk-in, he became something else: the first known FBI informant inside WikiLeaks. For the next three months, Thordarson served two masters, working for the secret-spilling website and simultaneously spilling its secrets to the U.S. government in exchange, he says, for a total of about $5,000. The FBI flew him internationally four times for debriefings, including one trip to Washington D.C., and on the last meeting obtained from Thordarson eight hard drives packed with chat logs, video and other data from WikiLeaks.
The relationship provides a rare window into the U.S. law enforcement investigation into WikiLeaks, the transparency group newly thrust back into international prominence with its assistance to NSA whistleblower Edward Snowden. Thordarson’s double-life illustrates the lengths to which the government was willing to go in its pursuit of Julian Assange, approaching WikiLeaks with the tactics honed during the FBI’s work against organized crime and computer hacking — or, more darkly, the bureau’s Hoover-era infiltration of civil rights groups.
Thursday, Jun 27, 2013 04:50 PM +0200
Alex Halperin
Find this story at 27 June 2013
© 2014 Salon Media Group, Inc.
WikiLeaks q: Sigurdur Thordarson22 februari 2014
Thordarson appears to be on Twitter: @singi201 and @singi201/wikileaks
A sends in response to a Cryptome query about allegations against WikiLeaks member “q” cited in We Are Anonymous, by Parmy Olson:
A friend has just alerted me to your liar-q-wl.pdf doc, and haven’t had the time to look through what else has been posted. If you want more information on Q, the psychopathic right-hand man of Julian Assange, I can give you more information, including his name and some of his other alleged criminal activity.
Cryptome: Thanks for the offer. Parmy Olson notes that lower-case “q” is not the same as upper-case “Q.”
_________
I seem to recall q also going as Q in the WL chatrooms.
q is Sigurdur Thordarson, who was 18 years old in 2010 and probably 17 when he joined WL. When Daniel Domscheit-Berg was still in WL, he knew Thordarson was trouble and made sure to keep him as far away from Julian Assange as possible. I believe Birgitta Jonsdottir may have done likewise; I do know that they knew each other, that she was extremely wary of him and did not like him. When Domscheit-Berg and Jonsdottir left, that barrier was removed and he quickly became Assange’s flunkie. In a better run organisation, an unintelligent, unskilled, and shady person like Thordarson would have never gotten anywhere near Assange, but because WL is run more like a textbook dictatorship, with its leader deriving his authority from a cult of personality based on an exaggerated and sometimes falsified life story, inefficiency and unintended irony abounded while meritocracy floundered. I have no doubt the current state of affairs within WL differs much from what I saw and experienced.
Why was he considered trouble? In part, before joining WL, it was said he had an extensive and dishonourable criminal record. While I was with WL, it became clear that something was rotten in Iceland Denmark when a fellow volunteer notified me that Thordarson had bragged to him that he intended to fly to the USA on WL’s dime to sleep with a uni student who was desperate to work for WL but was clearly little more than an Assange fangirl, then email her once he’d returned home to say there was no place for her in the organisation.
Thordarson disappeared in late 2010 from WL, with no one knowing where he’d gone. He resurfaced almost a week later, saying he’d been stopped by a police officer in his country while on the road, that his name had popped up on the police database, and as a result his laptop was taken. He never clarified why he’d been stopped and why he was on the database, but vaguely worded it in a way to make it out to be WL-related persecution, which is hard to believe.
A contact of mine who professed to be investigating WL financial malfeasance as of 2011 looked into this incident and said there was no record of it; another Icelander clarified Thordarson could only have been stopped for driving while under the influence. I have no way to validate or invalidate either q’s story or this investigator’s alleged research. I have considered the possibility this so-called investigator was actually Thordarson or someone else in WL playing mind games with volunteers who had left WL to keep tabs on them. It is the sort of thing Assange and company would do. I lost contact with the investigator after s/he claimed that his contact within WL who was giving him information had stopped singing. The investigator was said to have been working alongside a French journalist to break this story. I was hoping to help break the story to the NYT.
I am one of about a dozen who left in late 2010 because of WL’s abysmal lack of organisation and order, Julian Assange’s manipulative and exploitative personality, and Thordarson’s – for lack of a better term – psychopathy. Some of the volunteers in 2010 included some of the best and brightest computer programmers you can find, and Assange left Thordarson to dole out mostly meaningless tasks which we would never hear anything more of. The primary consequence of the WL chatroom was to cull people who genuinely wanted to volunteer for WL but who were of no use to WL under its modus operandi, and dupe them into thinking they were volunteers when they were really pissing into the wind. Many of us left for these ethical reasons, as well as common sense. The last I heard, almost everyone I worked with left WL and now dick-slap one another in public over one issue or another. No one knows most of us worked for WL, which is for the best, especially for those of us who want to vacation in the USA at some point in our lives.
Though I cannot backup with hard evidence the claims that Thordarson stole $60,000 of WL money, I can believe it because the investigator, despite his/her reliability being uncertain, told a similar story, and the chat transcripts that exist of Thordarson talking of using WL money to travel internationally just to get laid. I can confirm that near the end of my time there, he tried to get one volunteer to do something illegal with the WL shop and its corresponding bank account. The volunteer realized what he was asking could land the person in prison, and Thordarson moved onto another volunteer to get them to do the same.
Around the time we quit, it was made known that Thordarson was being prosecuted for bugging computers in the Icelandic parliament. That case actually exists and from what I was informed by a trusted source this week, it is still pending. Thordarson is said to have quit WL because the organisation stopped supporting him.
He has the expected traits of the hacktivist equivalent to Baghdad Bob: he’s obese, he can’t pick up, he’s a post-pubescent male yet listens to Justin Bieber, and he eats at KFC a lot. I’d call him a useful idiot, but he wasn’t even useful. The most meaningful thing Thordarson ever did at WL, as far as I’m aware, was he once filmed Julian Assange walking down a street.
I could tell you a lot more, including the US intelligence agency Assange once worked for and the malevolent little tricks he plays on hardworking WL volunteers.
A WikiLeaks Whistleblower
12 June 2012
Find this story 12 June 2014
FBI told to leave Iceland – Took a boy with them22 februari 2014
Mr. Kristinn Hrafnsson, Wikileaks spokesperson, said last week that representatives from the FBI came to Iceland in August 2011. The Icelandic Minister of the Interior confirmed this the same day and said that when he became aware of the FBI in Iceland he cancelled all cooperation with the FBI and told the representatives to leave.
Mr. Hrafnsson said that the FBI came to Iceland to investigate Wikileaks. In an announcement from the Icelandic police it was stated that the FBI agents were here because of an imminent attack on the Ministry Offices in Iceland. The FBI agents interrogated one person regarding Wikileaks and the computer attacks. That person was interrogated at the US embassy in Iceland and then taken to Washington where he was interrogated for four more days. It was also mentioned in the announcement from the police that the person who was interrogated came willingly forward to the embassy.
The FBI agents interrogated the man, who is twenty years old, for five days after the Ministry of the Interior declined to cooperate with the FBI.
The interrogations took place in hotels around Reykjavik but never at the US embassy.
On August 30th the FBI agents told the Chief of police in Iceland that the Ministry of the Interior had said that they did not want the boy interrogated any further in Iceland and that their stay here was unwanted. The agents then left the country.
They however took the boy with them to Washington where he was interrogated for four more days. It is said that the boy went willingly. After the interrogations the boy was flown back to Iceland.
Mr. Ossur Skarphedinsson, the Minister of Foreign Affairs, said to a local newspaper today that the FBI’s stay in Iceland was illegal. He said that the objective of the ministries had been to protect the boy, they thought that the boy did not realize the consequences of his actions. Mr. Skarphedinsson added:
“Therefore, we at the Ministry of Foreign Affairs thought that these conversations should be prevented, to protect this Icelandic citizen, because the conversations took place at very unusual places and without authorization. We did not receive any request regarding authorization to interrogate this man.”
An announcement from Mr. Ogmundur Jonasson, the Minister of the Interior, is expected soon.
Tuesday, 05 February 2013 16:10 font size Print Email
Find this story at 5 February 2014
Copyright News of Iceland.
Bahraini Human Rights Activist Zainab Alkhawaja Freed from Prison, Father Still Behind Bars22 februari 2014
On Monday, Democracy Now! spoke to human rights activist Zainab Alkhawaja upon her release from prison by the Bahraini government after nearly a year behind bars. At that time she faced a return to prison pending her appearance in court today on charges of damaging police property, defacing a picture of the king and insulting a police officer. But her sister, Maryam Alkhawaja tweeted today that Zainab’s case had been postponed until March 3. Alkhawaja’s father, longtime activist Abdulhadi Alkhawaja, remains behind bars, serving a life sentence.
The U.S.-backed monarchy is home to the U.S. Navy’s Fifth Fleet, which is responsible for all naval forces in the Gulf. Alkhawaja’s release came on the heels of rallies marking the third anniversary of the pro-democracy protests that began on February 14, 2011. Protests against the Sunni regime have been crushed by martial law and a U.S.-backed Saudi Arabian forces. Scores of people were arrested ahead of protests on Friday, when police fired bird shot and tear gas at demonstrators. Tens of thousands of people defied the crackdown to march on Saturday.
Watch all of Democracy Now!’s coverage of Bahrain.
AMY GOODMAN: This is Democracy Now!, democracynow.org, The War and Peace Report. I’m Amy Goodman, with Nermeen Shaikh.
NERMEEN SHAIKH: In Bahrain, human rights activist Zainab Alkhawaja has been released after nearly a year behind bars. Her release came on the heels of rallies marking the third anniversary of the pro-democracy protests that began on February 14th, 2011. Protests against the Sunni regime have been crushed by martial law and a U.S.-backed Saudi Arabian forces. Scores of people were arrested ahead of protests on Friday, when police fired bird shot and tear gas at demonstrators. Tens of thousands of people defied the crackdown to march on Saturday.
AMY GOODMAN: For more, we go to Bahrain, where we’re joined by Zainab Alkhawaja. She’s joining us by Democracy Now! video stream. Her father, longtime activist, Abdulhadi Alkhawaja, remains behind bars, serving a life sentence. Zainab has a large following on Twitter. Her account was silenced since her arrest until her release Sunday, still featuring a hashtag that calls for the release of her father.
Zainab, it’s great to have you back. First of all, how does it—
ZAINAB ALKHAWAJA: It’s great to be back.
AMY GOODMAN: How does it—how does it feel to be free?
ZAINAB ALKHAWAJA: Wow! It feels like a dream. I keep expecting to wake up and see myself inside my cell.
AMY GOODMAN: Talk about your time in prison. You’ve been in prison for almost a year.
ZAINAB ALKHAWAJA: Mm-hmm. Well, what I feel about prison is that it’s a place where they try to break a person. It’s a place where you feel like you can be humiliated at any minute and on any given day. So, it can be a very stressful situation if you don’t look at the bigger picture and the cause that you’re sacrificing for.
My time in prison was a little bit difficult. The prison in Bahrain is a very, very dirty, filthy place. Seeing cockroaches and bed bugs and all kinds of insects is a daily thing. The number of prisoners inside the prison is way too many. We have people sleeping on the ground. There’s not enough beds. The rooms are very small. We cannot move in and out of our cells a lot. And also, we had a very difficult time convincing them to let us go out and get some air and get some sunlight. So, actually, for the first six months in prison, I was not let out of the prison. So sometimes it does feel like a grave.
But when I came out, the first thing I did say was, one year in prison is nothing. And I say that because it’s nothing compared to what we’re willing to sacrifice for our goals, for democracy in our country.
NERMEEN SHAIKH: And, Zainab Alkhawaja, you’ve described the conditions in the prison. Now, the prison you were in only housed political prisoners, is that correct?
ZAINAB ALKHAWAJA: Oh, no, there are a lot of prisoners. We’re a minority. And I’m separated, actually, from the other political prisoners. So, the prisoners that share a cell with me and share the same ward with me are actually not political prisoners.
NERMEEN SHAIKH: And, Zainab, what do you expect will happen on Wednesday? There’s some concern that you might return to prison? And could you outline what precisely you’ve been charged with?
ZAINAB ALKHAWAJA: Well, what happened since I was imprisoned is because they have very small cases against me. I keep getting new cases, two- to three-month sentence, two to three months. And I think this time I got out basically just on a technicality, on a glitch. And they’re just preparing the new cases against me. Tomorrow, I do have court, and my lawyer has told me that I might get arrested from court and taken back to prison. And that’s why, actually, I’ve left all my things in my cell in prison, and I’m expecting that I might have to go back tomorrow.
AMY GOODMAN: And what are your feelings about that?
ZAINAB ALKHAWAJA: Well, my feelings are—I mean, even coming out, I have very mixed feelings, coming out from prison. I miss my daughter a lot. This year has been very difficult being away from her. I always dream about just the smallest things—reading her a bedtime story, taking her to kindergarten, giving her a hug. You know, it’s not the same when you have to meet her once a week with police sitting next to you, watching you, hearing every word you say. But at the same time, when I came out from prison, I realized that I left a lot of people back in prison. I left half my family back in prison—my brothers, my uncles, my father, all the revolutionaries who are sacrificing for all of us before they’re sacrificing for themselves. So, we’re willing to make these sacrifices, and I’m willing to go back. And I want the government in Bahrain to realize that their prisons don’t scare us. I’m going to go to court tomorrow, and if they arrest me, that’s fine. I’ll go back to my prison cell. And we’re going to continue on this path. We started on a path, and we’re determined to continue on it until we reach our goal.
AMY GOODMAN: What is your goal? What are you calling for?
ZAINAB ALKHAWAJA: We’re calling for a country where every Bahraini is respected, every Bahraini is treated equally. We’re calling for a country where we feel we have rights, where we feel we have dignity, where people can’t step all over us, can’t torture and kill and get away with these things. We’re living in a country, basically, where the criminals are the most powerful people in the country, and where a lot of us actually feel proud when we’re in jail, because we know that in Bahrain, when you go to jail, it means you did something right and not wrong. It should be the other way around. It should be that people who are activists, people who are calling for rights, they should be the ones who are on the outside and working, and criminals, people who are killing, people who are torturing, they’re the ones who should be in jail. But it’s all the other way around. But at the same time, I say that in Bahrain I do not feel pity for all those people who are in prison, all the injured protesters. I feel proud when I see them. I feel pity for our oppressors, because what they do is breaking them inside. We’re not broken. We sacrifice, but we feel proud, and we hold our heads up high.
NERMEEN SHAIKH: Zainab, how do you respond to criticism of the anti-government movement that claims that it’s being funded exclusively by Iran in an attempt to make the region more Shia-sympathetic? Just today in The New York Times there’s an op-ed by someone called Sarah Bin Ashoor titled “Bahrain’s Hijacked Reform Efforts,” which makes exactly that claim. Do you see this struggle as a sectarian one?
ZAINAB ALKHAWAJA: Definitely, definitely not. I mean, in Bahrain, Sunnis and Shias have lived side by side for generations. There’s intermarriage. We have—like, all friends are Sunnis and Shia, and we usually can’t even tell each other apart. The people who are trying to make it into a sectarian thing is the government. They’re the ones who are really trying, putting all their effort into making it a sectarian thing. Another thing is that Bahrainis are very proud Arabs. We have nothing to do with Iran. We started this revolution calling for our rights. I mean, we’ve lived under the same monarchy for more than 200 years. It’s actually—it’s really strange that nothing has happened before. This revolution is long overdue. People are supposed to stand up and call for their rights. It’s the 21st century. Everywhere we go, we see democracy, we see freedom, in other countries. We see civil liberties. And over here, we’re supposed to keep quiet just so that nobody accuses us of doing something just because we’re Shia. I think it makes a whole lot of sense what’s happening in Bahrain. We’re inspired by—we were inspired by what happened in Egypt, and we consider our Egyptian brothers our brothers. And they started this, and the Tunisians, and we’re doing the exact same thing. We’re calling for our rights. We’re calling for a country where we can live freely and with our dignity. This has nothing to do with Shia and Sunni. We want these rights for all Bahrainis, whether they are Shia or Sunni.
AMY GOODMAN: Zainab, I want to ask you about Bahrain practice of jailing some of the children who have been at protests. Last month, Bahrain’s juvenile court ordered the release of 10-year-old Jehad Nabeel AlSameea and 13-year-old Abdulla Yusuf AlBahrani, who were arrested for throwing stones at police during a demonstration outside the capital. Zainab, your sister, Maryam Alkhawaja, tweeted a photo of two more young boys, Hussain Jameel and Mohammed Alshofa, who were arrested Saturday in Salmabad.
ZAINAB ALKHAWAJA: The government in Bahrain is actually trying to punish everybody for this revolution that has happened, this uprising that has happened in Bahrain. They do not differentiate between children and grown-ups, men and women, activists and otherwise. To them, everyone just needs to be controlled and to be put in a state of fear. Throughout these three years, we’ve seen a lot of this. We’ve seen a lot of children being beaten, being tortured, being imprisoned. We’ve seen children in courts who did not even understand what their crime was, who did not even understand what the judge was saying. This is one of the things that actually really hurts us when we see that. We don’t want the children to suffer. We, as human rights activists, want there to be some kind of protection. But as you know, in countries like ours, in dictatorships, sometimes there’s no differentiation at all. I mean, if even doctors get punished for treating people, children get punished for going on the street. And, I mean, it’s only—a lot of these children who are going on the streets are children of detainees, are children of martyrs, people who were killed during clashes. And you can understand why they would be angry. But I could never understand why the government would target children in their—in trying to just achieve this crackdown on the people of Bahrain.
NERMEEN SHAIKH: Zainab, what do you see is the role of Saudi Arabia in this conflict? And what do you think the U.S. should be doing?
ZAINAB ALKHAWAJA: Well, one of our biggest problems here in Bahrain is Saudi Arabia, because sometimes it feels like we’re not just trying to rise up against the al-Khalifa regime here, but the small population of Bahrain is trying to rise up against the Gulf states with all their dictators. And this is what makes it very difficult. Even though the Bahraini people are united, even though they’re rising in very big numbers, but the Saudis are standing very strong behind the al-Khalifa regime, supporting them in all they do. And, actually, the Americans are doing the same thing. The American government is doing the same thing and supporting the Bahraini regime, despite all what’s happening, despite all the evidence that’s going out on a daily basis from Bahrain about the mistreatment, about the human rights conditions, about the, I think, now almost 3,000 political prisoners in Bahraini prisons. And still, the American administration are standing beside the Bahraini government and supporting them and considering them allies.
AMY GOODMAN: Zainab, talk about your father, Abdulhadi Alkhawaja, who is in prison. He has a life sentence now?
ZAINAB ALKHAWAJA: Yes. My father is sentenced to life in prison. He has now been in prison for almost three years. My father is my rock. He’s one of the strongest persons I have ever known. I have never seen him weak. After three years in prison, he’s as strong as ever. And my father has always been my role model. He’s been a human rights activist for almost all his life. He has been trying to do something not only for our country, but for the region, as well. He had been, before the revolution, been going from country to country throughout the Arab world training people on human rights, on how to write reports about human rights abuses. My father tries to put seeds in the ground, so that some day those seeds would grow into something that would benefit our region and our world. And I really believe in his work. He has been working very hard for the past maybe—more than 20 years. It’s not something that he started doing today and yesterday.
And this is why he’s one of the people that the government has been targeting for a long time and has used this situation now to just give him a life sentence, put him behind bars, so they could silence him. My father is one of the most outspoken people in the country talking about what’s happening here, about conditions here. So, putting him behind bars, I think the only reason for that is to silence him, like they’ve done with other activists, like Nabeel Rajab, for example. They’re behind bars so that there’s no one to represent the people of Bahrain.
But I think what makes us proud is, even though almost all human rights activists are either out of the country or in jail, even though a lot of the civil society leaders are in prison, a lot of the activists are in prison, still the Bahraini people go out, and they protest, and they demand their rights, which is very difficult. When you’re standing there with activists, you know that there’s someone covering what you’re doing, someone there who might try to protect you. But even without this protection, on this past February 14, we saw very, very big numbers of people go into the streets, still making the same demands, showing that they’re not backing down.
NERMEEN SHAIKH: And what are the prospects, Zainab, for any kind of change in Bahrain? What is the state of negotiations between opposition groups and the government? And what prospects do these political prisoners—3,000, you said, including many of your family members—have of being released or having their jail sentences diminished?
ZAINAB ALKHAWAJA: Well, here’s the thing. Prison can be difficult. Actually, it is very difficult. And a lot of people, they want to get out of prison. They want to go to their families. But this is not the end goal. We don’t just want to get out of the small prison into the bigger prison we call Bahrain. Bahrain is a big prison for us. A lot of Bahrainis don’t feel safe until they’re on a plane heading outside of their country, because here in this country you might be arrested on any day. You might get beaten up on any day. So, as a Bahraini, you do not feel safe. So, our end goal—a lot of prisoners say this. They say, “We don’t want to just get out of prison. After three years of suffering, of giving, of doing as much as we can, we want real results. We want democracy. We want to be represented. We want rights.”
And I think that’s why if the government tries to solve the situation just by releasing some political prisoners, that’s not going to be the real solution. The government must give up some of the power and control that they have. And, I mean, the people of Bahrain, they want ultimately to have a full democracy. They want a country where they can vote for a president. The al-Khalifa regime is a regime that has been forced on the people of Bahrain. The al-Khalifa regime is just—is a hereditary regime, and we have no choice in who’s ruling this country. And I think this is one of the biggest problems. This is not something that the people here accept.
AMY GOODMAN: Zainab, we’ve talked about Iran, about Saudi Arabia, about, you know, Bahrain itself. What about the United States, a major force? It has the Fifth Fleet there. What is the role of the United States with the Bahraini monarchy?
ZAINAB ALKHAWAJA: I mean, my sister Maryam has been going to the States, meeting with officials, trying to speak to them about the situation here, about what the people of Bahrain are going through. And I think the conclusion she reached is she’s lost a lot of hope in them. She says, “I haven’t lost hope in humanity, but I have lost hope in the foreign governments, who tend to speak a lot about human rights and about democracy, but when you come on the ground, you see them taking the side of the dictators, especially in Bahrain.” And they do that for self-interest. They have to make a choice. I’ve been saying that since the beginning of the revolution. You either stand with the people who want democracy, who want freedom, and you try to protect them, or at least you stop supporting the dictators and the oppressors who are torturing them, who are killing them, just so that they can remain in power.
America, unfortunately, in Bahrain has a very, very bad name. They have a very bad reputation. They stand by the regime. They sell them weapons. They stand aside and watch what’s happening to the people of Bahrain. And I think maybe a lot of people here did have hope in the beginning that the Americans would stand with freedom and justice and human rights and all those things that they talk about a lot, that the American presidents always talk about, but unfortunately now I think that no one has that hope anymore. They see that America only acts upon their—what they think is their interest in Bahrain.
NERMEEN SHAIKH: But what interests of the U.S. are served by supporting the al-Khalifa regime in Bahrain?
ZAINAB ALKHAWAJA: Of course, as you said, the Fifth Fleet is a big part of this. And the relationship between the U.S. and the al-Saud regime, they want to be on their good side, I guess. So, a lot of things together just, they—I guess they don’t see how supporting human rights in Bahrain is going to do them any good. And that’s not how the government of America should be thinking. If they feel like they represent freedom and democracy, they should be thinking first about the people and about the freedom that they’re demanding, about the democracy that they’re demanding, not thinking first about how their interest in the region is served by supporting dictators.
AMY GOODMAN: Zainab, if you are not sent back to prison, will you stay in Bahrain or leave?
ZAINAB ALKHAWAJA: I will stay in Bahrain. I was born in exile. I lived in exile most of my life. The first time I saw my country, I was a 17-year-old. And I love my country so dearly. I prefer prison to exile. I prefer, you know, living with a daily risk of injury, of getting arrested, all those things, rather than leaving my country. I’m staying here alongside my people, and I’m going to fight with them for as long as it takes. And I’m going to risk—I’m going to take the risk just as they do. I don’t think that I can leave my country. It’s very difficult.
NERMEEN SHAIKH: And, Zainab, very quickly, before we conclude, could you talk about the significance of the terrorism law in Bahrain, when it was introduced and how it’s been used to prosecute protesters and those involved in the demonstrations?
ZAINAB ALKHAWAJA: Well, in a lot of countries in the region, not just Bahrain, the terrorism law and the terrorism, just the word itself, has been used so much to punish people who are justly calling for their rights. And a lot of times—and there’s obviously no proof. And as you know, the justice system here in Bahrain—I mean, there’s no real courts. They just keep using the courts and the justice system to just punish activists. So this word “terrorism” is being thrown all over the place, even though the revolution in Bahrain is one of the most peaceful revolutions. People go out on a daily basis with nothing in their hands. All they do is shout slogans. And yet, they are being sent to prison. One of those people is my father and the rest of the leaders who are with him in prison right now. They call for human rights. They teach people how to go out and demand those rights. And then suddenly they’re in prison for charges that have to do with terrorism or trying to overthrow the regime, which they consider as terrorism. In this day and age, everybody should know that trying to change a regime is a people’s right. It’s not considered terrorism. But I guess they’re using what’s happening in the world—fear, the fear that people have of terrorism—they’re using that word to—as an excuse to punish people who are calling for their just demands.
AMY GOODMAN: Zainab, how many members of your family are in prison?
ZAINAB ALKHAWAJA: Right now, my father and my uncle are in prison.
GUEST
Zainab Alkhawaja, a pro-democracy activist in Bahrain who was just released from jail after nearly a year behind bars. Her father, prominent human rights activist Abdulhadi Alkhawaja, remains imprisoned, serving a life sentence.
February 19, 2014
Find this story at 19 February 2014
Did an undercover cop help organise a major riot?7 februari 2014
The wrongly convicted activist John Jordan claims the Met helped plan serious civil disorder. An independent public inquiry is now vital
From the Stephen Lawrence inquiry we learned that the police were institutionally racist. Can it be long before we learn that they are also institutionally corrupt? Almost every month the undercover policing scandal becomes wider and deeper. Today I can reveal a new twist, which in some respects could be the gravest episode yet. It surely makes the case for an independent public inquiry – which is already overwhelming – unarguable.
Before I explain it, here’s a summary of what we know already. Thanks to the remarkable investigations pursued first by the victims of police spies and then by the Guardian journalists Rob Evans and Paul Lewis (whose book Undercover is as gripping as any thriller), we know that British police have been inserting undercover officers into protest movements since 1968. Their purpose was to counter what they called subversion or domestic extremism, which they define as seeking to “prevent something from happening or to change legislation or domestic policy … outside the normal democratic process”. Which is a good description of how almost all progressive change happens.
Most of the groups whose infiltration has now been exposed were non-violent. Among them were the British campaign against apartheid in South Africa, the protest movements against climate change, people seeking to expose police corruption and the campaign for justice for the murdered black teenager Stephen Lawrence. Undercover officers, often using the stolen identities of dead children, worked their way into key positions and helped to organise demonstrations. Several started long-term relationships with the people they spied on. At least two fathered children with them.
Some officers illegally used their false identities in court. Some acted as agents provocateurs. Seldom did they appear to be operating in the wider interests of society. They collected intelligence on trade unionists that was passed to an agency which compiled unlawful blacklists for construction companies, ensuring that those people could not find work. The policeman who infiltrated the Stephen Lawrence campaign was instructed by his superiors to “hunt for disinformation” about the family and their supporters that could be used to undermine them. When their tour of duty was over, the police abandoned their partners and their assumed identities and disappeared, leaving a trail of broken lives. As the unofficial motto of the original undercover squad stated, it would operate By Any Means Necessary.
The revelations so far have led to 56 people having their cases or convictions overturned, after police and prosecutors failed to disclose that officers had helped to plan and execute the protests for which people were being prosecuted. But we know the names of only 11 spies, out of 100-150, working for 46 years. Thousands of people might have been falsely prosecuted.
So far there have been 15 official inquiries and investigations. They seem to have served only to delay and distract. The report by Sir Christopher Rose into the false convictions of a group of climate change protesters concluded that failures by police and prosecutors to disclose essential information to the defence “were individual, not systemic” and that “nothing that I have seen or heard suggests that … there was any deliberate, still less dishonest, withholding of information”. Now, after an almost identical case involving another group of climate activists, during which the judge remarked that there had been “a complete and total failure” to disclose evidence, Rose’s findings look incredible.
The biggest inquiry still running, Operation Herne, is investigating alleged misconduct by the Metropolitan police. Of its 44 staff, 75% work for, er, the Metropolitan police. Its only decisive action so far has been to seek evidence for a prosecution under the Official Secrets Act of Peter Francis, the police whistleblower who has revealed key elements of this story. This looks like an attempt to discourage him from testifying, and to prevent other officers from coming forward.
Bad enough? You haven’t heard the half of it. Last week, the activist John Jordan was told his conviction (for occupying the offices of London Transport) would be overturned. The Crown Prosecution Service refuses to reveal why, but it doubtless has something to do with the fact that one of Jordan’s co-defendants turns out to have been Jim Boyling, a secret policeman working for the Met, who allegedly used his false identity in court.
Jordan has now made a further claim. He alleges that the same man helped organise a street party that went wrong and turned into the worst riot in London since the poll tax demonstrations. The J18 Carnival Against Global Capitalism on 18 June 1999 went well beyond non-violent protest. According to the police, 42 people were injured and over £1m of damage was done. One building was singled out: the London International Financial Futures Exchange (Liffe), where derivatives were traded. Though protesters entered the building at 1.40pm, the police did not arrive until 4.15pm.
After furious recriminations from the Lord Mayor and the people who ran the Liffe building, the City of London police conducted an inquiry. It admitted that their criticisms were justified, and that the police’s performance was “highly unsatisfactory”. The problem, it claimed, was that the police had no information about what the targets and plans of the protesters would be, and had no idea that Liffe was in the frame. The riot was “unforeseen”.
Jordan was a member of “the logistics group that organised the tactics for J18. There were about 10 of us in the group and we met weekly for over six months.” Among the other members, he says, was Boyling. “The 10 of us … were the only people who knew the whole plan before the day itself and who had decided that the main target would be Liffe.” Boyling, he alleges, drove one of the two cars that were used to block the road to the building.
It is hard to think of a more serious allegation. For six months an undercover officer working for the Metropolitan police was instrumental in planning a major demonstration, which ended up causing injuries and serious damage to property. Yet the police appear to have failed to pass this intelligence to the City of London force, leaving the target of the protest unprotected.
Still no need for an independent public inquiry? Really?
A fully referenced version of this article can be found at Monbiot.com
George Monbiot
The Guardian, Monday 3 February 2014 20.30 GMT
Find this story at 3 February 2014
The most shared comment, analysis and editorial articles delivered every weekday lunchtime.
Sign up for the Comment is free email
© 2014 Guardian News and Media Limited or its affiliated companies. All rights reserved.
Did undercover cop organise one of Londons largest riots?7 februari 2014
On June 18th 1999 a car skidded across a road in the financial heart of London. As traffic was blocked thousands of anti capitalist protesters including Reclaim the Streets barged their way into various corporate buildings.
The J18 Carnival Against Global Capitalism according to George Monbiot ‘went well beyond non-violent protest. According to the police, 42 people were injured and over £1m of damage was done. One building was singled out: the London International Financial Futures Exchange (Liffe), where derivatives were traded. Though protesters entered the building at 1.40pm, the police did not arrive until 4.15pm.’
Jim Boyling’s car blockading the road
A man who was in that car was Detective Constable Andrew James ‘Jim’ Boyling – an undercover cop. In Monbiot’s Guardian article ‘He alleges that the same man helped organise a street party that went wrong and turned into the worst riot in London since the poll tax demonstrations.’
I filmed his car being pulled furiously away by cops (video still above) once they manage to break the steering lock.
Monbiot continues
‘After furious recriminations from the Lord Mayor and the people who ran the Liffe building, the City of London police conducted an inquiry. It admitted that their criticisms were justified, and that the police’s performance was “highly unsatisfactory”. The problem, it claimed, was that the police had no information about what the targets and plans of the protesters would be, and had no idea that Liffe was in the frame. The riot was “unforeseen”.
undercover cop Jim Boyling
Was it really unseen? The Met Police had a cop working undercover on organising the carnival and which buildings would be occupied.
Jordan was a member of “the logistics group that organised the tactics for J18. There were about 10 of us in the group and we met weekly for over six months.” Among the other members, he says, was Boyling. “The 10 of us … were the only people who knew the whole plan before the day itself and who had decided that the main target would be Liffe.”
A Reclaim the Streets activist John Jordan said Boyling who went undercover with the name of Jim Sutton ‘drove one of the two cars that were used to block the road to the building.’
Activists were furious when Sutton/Boyling ‘accidentally’ left the window open allowing six of his fellow cops to break the steering lock and push it out of the way.
Undercover cop Jim ‘Sutton’ Boyling
Monbiot lays it out
‘It is hard to think of a more serious allegation. For six months an undercover officer working for the Metropolitan police was instrumental in planning a major demonstration, which ended up causing injuries and serious damage to property. Yet the police appear to have failed to pass this intelligence to the City of London force, leaving the target of the protest unprotected.’
Find this story at 4 February 2014
BBC Newsnight broadcast a report on Boyling, Watch it here at 4 February 2014
or watch the story at 4 February 2014 here
Former spymaster gets 2-year jail term for graft7 februari 2014
SEOUL, Jan. 22 (Yonhap) — A Seoul court on Wednesday sentenced a former intelligence chief to two years behind bars for accepting kickbacks from a businessman while in office.
Won Sei-hoon, who headed the National Intelligence Service (NIS) under former President Lee Myung-bak, was found guilty of taking some 160 million won (US$150,000) in bribes from the former head of now-bankrupt Hwangbo Construction in exchange for influence peddling between 2009 and 2010.
The Seoul Central District Court also ordered the disgraced former NIS chief to pay a fine of some 160 million won.
The court said that Hwang Bo-yeon, the former Hwangbo chief, allegedly asked Won to help the company clinch major construction deals from public institutions and large corporations.
“Heavy punishment is inevitable because the nature of the crime is severe,” judge Lee Bum-kyun said in his ruling, adding that the former NIS chief has not shown sincere remorse for his crime.
In a separate case, the 63-year-old Won is standing trial on charges of meddling in 2012 presidential election.
Won was charged with ordering some of his agents to use the Internet to sway public opinion in favor of President Park Geun-hye, the then ruling party candidate, ahead of the presidential vote in December 2012.
The court is scheduled to deliver a verdict for the second charge in February, court officials said.
Won served as first vice mayor of Seoul when former President Lee was mayor. He was also minister of public administration and security under the Lee administration.
Yonhap News Agency January 22, 2014 8:50am
Find this story at 22 January 2014
Copyright Yonhap News Agency, 2014
Ruling party boycotts hearing on spy agency scandal7 februari 2014
SEOUL, July 26 (Yonhap) — The ruling Saenuri Party on Friday boycotted a hearing on the state spy agency’s alleged meddling in last year’s presidential election as it wrangled with opposition parties over whether the meeting should be open to the public.
The ruling party has argued that the hearing should be held behind closed doors because it is likely to touch on sensitive intelligence issues as lawmakers question National Intelligence Service (NIS) chief Nam Jae-joon and other officials of the spy agency in connection with the scandal.
Opposition parties have insisted that the hearing be open to the public so as to ensure its transparency.
The scandal centers on allegations that former NIS chief Won Sei-hoon ordered an online smear campaign to sway public opinion in favor of the ruling party ahead of last December’s presidential election.
A parliamentary probe has been under way since early this month to determine the truth behind those allegations.
Friday’s hearing was supposed to be the first time for the parliamentary investigative committee to question NIS officials in connection with the case.
Earlier this week, the committee held hearings with the Ministry of Justice and the National Police Agency over the scandal.
The hearing opened with only the opposition parties’ investigative committee members in attendance. NIS officials were also absent from the meeting.
The opposition members immediately held a press conference condemning the boycott, saying they will charge Nam for boycotting the hearing without permission and take steps to impeach him.
Yonhap News Agency July 26, 2013 5:35am
Find this story at 26 July 2013
Copyright Yonhap News Agency, 2013.
Rival parties clash over probe into spy agency scandal7 februari 2014
YSEOUL, July 25 (Yonhap) — Rival parties clashed Thursday over whether the police tried to cover up the state spy agency’s alleged meddling in last year’s presidential election, leading to a brief suspension of a parliamentary probe into the scandal.
The probe, which began early this month, aims to uncover the truth behind allegations that former National Intelligence Service (NIS) chief Won Sei-hoon ordered an online smear campaign to sway public opinion in favor of the ruling Saenuri Party ahead of last December’s presidential election.
Kim Yong-pan, the then Seoul metropolitan police chief, has been accused of downsizing a police investigation into the scandal and covering up its results.
Both Won and Kim were indicted last month on charges of meddling in the election.
On Thursday, the parliamentary probe committee questioned National Police Agency (NPA) chief Lee Sung-han and other senior police officials in connection with the case.
Rep. Jung Chung-rai of the main opposition Democratic Party, who serves on the investigative committee, showed CCTV footage of what he claimed was a meeting at the NPA headquarters on Dec. 15.
That footage backed allegations that the police had tried to cover up and destroy evidence of the spy agency’s alleged smear campaign against the opposition party’s then-presidential contender, Moon Jae-in, he claimed.
Ruling party members on the committee walked out of the room in protest of Jung’s claims. The meeting was suspended for about 20 minutes before the rival parties agreed to resume the probe.
Yonhap News Agency July 25, 2013 9:33am
Find this story at 25 July 2013
Copyright Yonhap News Agency, 2013.
Parliamentary probe into spy agency scandal kicks off7 februari 2014
SEOUL, July 24 (Yonhap) — A parliamentary probe into the state spy agency’s alleged meddling in last year’s presidential election began Wednesday with a hearing attended by justice ministry officials as rival parties questioned the legitimacy of a now-complete prosecution investigation into the scandal.
The parliamentary probe aims to uncover the truth behind allegations that former National Intelligence Service (NIS) chief Won Sei-hoon ordered an online smear campaign to sway public opinion in favor of the ruling Saenuri Party ahead of last December’s presidential election.
Last month, prosecutors indicted Won and former Seoul metropolitan police chief Kim Yong-pan on charges of meddling in the election.
Kim has been accused of downscaling a police investigation into the scandal in its early stages.
The ruling party claims that the alleged smear campaign was in fact an attempt by the NIS to eliminate pro-North Korea opinions on the Internet ahead of the election.
“Was the NIS’ psychological warfare staff using their status as public officials when posting anonymous comments on websites and clicking on ‘recommend’ or ‘disapprove?'” Rep. Kim Do-eup of the ruling party said during the hearing at the National Assembly.
Justice Minister Hwang Kyo-ahn said not all of the NIS’ psychological warfare activities are classified as illegal, but the charges against Won were related to certain illegal elements that were found in the spy agency’s activities.
Rep. Jung Chung-rai of the main opposition Democratic Party defended the prosecution’s decision, claiming Won illegally intervened in the election and influenced the vote.
hague@yna.co.kr
2013/07/24 15:19
Find this story at 24 July 2013
Copyrights Yonhap News Agency
NIS: The Beginning and the End of “NLL Controversy”7 februari 2014
The National Intelligence Service (NIS) is now taking the center stage in the controversy over the Northern Limit Line (NLL) in the West Sea of Korea, as the real the origin of all disputes. As the search for 2007 North-South Summit Minutes at the Presidential Archives finally ended in vain, the full text kept by the NIS has practically become the ‘only copy’ at present.
It means that the sources of current and recent debates must have been exposed by the NIS.
Suspicion seems to be turning into certainty: it seems now almost certain that the NIS leaked the ‘minutes’ material, which has been allegedly used by then-candidate Park Geun-hye’s campaign in the 2012 presidential election. The current situation tells us that the NIS is the one and only source of the information on NLL, which has been shared among and used by the ruling party in its political attacks last year.
Right before the 2012 presidential election, the ruling Saenuri Party strengthened its attacks regarding former President Roh Moo-hyun’s alleged ‘remarks on abandoning the NLL.’ On October 8, 2012, at National Assembly inspection on the Foreign Affairs and Unification Committee, Rep. Chung Moon-hun disclosed that there existed confidential minutes. According to him, “Former President Roh said, ‘The NLL is a trouble for us. It is a line arbitrarily drawn by the United States in its efforts to win more territories뻞ence the South will not claim the NLL in the future.'”
A voice-recording file containing the words by Kwon Young-se, ambassador to China and former chief of campaign operations for Park Geun-hye, was unburied. In this voice-recording on December 10 last year, Kwon said, “It is no problem to get the material [minutes]. The source [of the material] will be either Cheong Wa Dae or the NIS. And we will open [go public with] it once we come to power.”
Rep. Kim Moo-sung, former director of Park’s campaign, made a comment in this regard while canvassing in Busan on December 14: “Former President Roh said, ‘Regarding the NLL issue, there is no evidence in terms of international law; nor is there any logical ground. This is not a constitutional matter, either.'” Rep. Kim’s expressions exactly correspond to the full text revealed by the NIS, to almost every letter and punctuation.
All these circumstances demonstrate the possibility that the minutes leaked before the presidential election last year, to be used by Park’s campaign.
A high level official of the ruling party also gave a statement on what happened prior to 2012: “Cheong Wa Dae under Lee Myung-bak government was reported of the full text of the minutes in 2009 and the excerpts in 2010, by the NIS.”
At the National Assembly inspection on the Office of President conducted on October 25 last year, Chun Young-woo, then-presidential secretary of foreign affairs and national security gave a testimony, which can be summed up as the following: “Two years ago, not long after I was appointed to be the presidential secretary [in October 2010], I have seen [the minutes maintained by the NIS].”
Suspicion gets stronger here: no matter what channel they went through, the minutes managed by the NIS must have been disclosed and then transferred to the presidential election campaign organized by the Saenuri Party.
This is why the opposition parties are looking at the NIS from a new angle, for being behind the leakage of the minutes at the time of 2012 election and behind the ruling party’s consequent political assails.
Rep. Park Ji-won of the opposition Democratic Party had an interview on the SBS radio on July 23 and said, “In the first place, the real problem is that the record in the custody of the NIS has leaked during the presidential election, to be taken advantage of by the Saenuri Party in the campaign.”
Rep. Jung Chung-rae, the opposition secretary in the Special Committee of the National Assembly Inspection, remarked, “We can determine later whether [the minutes kept by the Presidential Archives] is really absent or just evaded our search this time. What became clear now is the fact that the one and only source of leakage is none other than the NIS.” He added, “Nam Jae-joon, director of the NIS also said that the NIS version is the original and authentic copy. What [Reps.] Chung Moon-hun and Kim Moo-sung read must have been revealed to them by the NIS. This issue will be closely examined at the special committee of the national assembly.”
By Kim Jin-woo, Shim Hye-ri
Posted on : 2013-07-24 10:24
Find this story at 24 July 2013
Copyright (C)1996-2014 Kyunghyang Shinmun
Korean spy agency accused of meddling in politics7 februari 2014
During last year’s presidential election, a team of South Korean intelligence agents allegedly flooded the Internet with several thousand political comments, including some describing left-leaning candidates as North Korea sympathizers.
Then, while that scandal has continued to play out, another drama has unfolded, as the spy agency last month declassified a 2007 transcript that showed then-president Roh Moo-hyun, a liberal, pressing to create a peace zone along a maritime border disputed with the North.
Conservative lawmakers say the transcript proves Roh preferred to cooperate with Pyongyang than protect security. Liberal lawmakers say the spy agency, instead, was manufacturing one controversy to distract from the other.
The two events are convoluted, but both have dominated headlines for weeks in the South. They also have a common thread: South Korea’s National Intelligence Service (NIS), which some analysts here say has turned into a political provocateur, using its power to champion conservative causes and widen a partisan divide.
Because of its Stalinist neighbor, the South has long defined itself along Cold War lines, with political ideology here linked in part to one’s sentiment about the North. But in the 2012 election, that had appeared to be changing. On the campaign trail, conservative Park Geun-hye and liberal Moon Jae-in shared similar visions for social spending and tentative engagement with the North. When Park won by 3 percentage points, she vowed to unify the nation.
Silence on spy agency
In the six months since her victory, that hasn’t happened, and Park’s opponents criticise her for staying quiet about the spy agency’s actions, rather than condemning them.
Only in late June did she first discuss the alleged election-meddling – the first parts of which came to light last December – saying she had was neither connected to nor a beneficiary of the agency’s potential misdeeds.
“I don’t think this allegation puts her legitimacy in question,” said Kang Won-Taek, a right-leaning professor of political science at Seoul National University. “How many people’s opinions could have been affected by some Internet postings? But it’s true that it’s not a pretty scene for Park” to deal with.
Her approval rating remains high – above 60 percent, according to most polls. But opposition lawmakers have seized on the election-tampering charges to raise questions about Park’s victory, and small groups of protesters have gathered in recent days in cities across South Korea to demand an investigation and a greater response from Park.
The NIS, South Korea’s version of the CIA, is supposed to remain politically neutral. But prosecutors say its former leader, Won Sei-hoon, indicted last month on charges of election meddling, believed that “leftist followers of North Korea” were trying to regain power in the South.
He ordered his agents to post comments not only criticising Park’s opponents, but also lauding Park, prosecutors say. Won resigned earlier this year, having served under the previous president, Lee Myung-bak. If found guilty, Won would face as long as five years in jail.
“It is grave – a big deal. It’s all about dividing the country into two parts – the patriots, and those who sympathise with North Korea,” said Pyo Chang-won, who hosts a current affairs Internet television show and has spoken at protests. “The NIS is supposed to be politically neutral, but it has used its intelligence force to attack half the nation.”
Left-leaning lawmakers say the problems at the NIS have continued under Won’s successor, Nam Jae-joon, who they say unilaterally released a document that shouldn’t have been made public for decades.
At a closed-door meeting of the National Assembly’s intelligence committee, Nam was grilled about the release, according to South Korean media, and asked whether he had any intention to resign. (He said he didn’t.)
Dubious history
South Korea’s intelligence agency has gone by several names since the Korean War 60 years ago, but it has a dubious history.
Former authoritarian leader Park Chung-hee, who seized power in a 1961 military coup, used the agency as a tool to crack down on student protests. In 1979, Park was assassinated by his own spy chief.
After South Korea’s democratisation in the late-1980s, the agency officially became apolitical. But opponents say the agency is now helping Park Geun-hye in much the way it helped Park Chung-hee, her father. Monday, the Hankyoreh, South Korea’s major liberal newspaper, printed a cartoon showing Park, in a military outfit, surrounded by cronies holding computer keyboards and mouses.
The image was modeled after a photo of Park Chung-hee, flanked by top military officials, after his coup.
Analysts say the alleged election tampering is far more serious than the debate about the 2007 transcript. But that controversy, too, has provided weeks of fodder for South Koreans.
Touchy issue
The transcript showed the conversation between Roh and then-North Korean supreme leader Kim Jong Il during a summit meeting in Pyongyang. Interest in the specifics of what Roh told Kim dated back to last year, when some conservative lawmakers suggested that Roh had offered to surrender parts of South Korean maritime territory in an undisciplined effort to make peace with the North. The charge was potent, because the liberal running for president last year, Moon, had once served as Roh’s chief of staff.
According to the transcript, while discussing the maritime border, Roh said that it “should change.” But he also said, presciently, that the issue was touchy. “The problem is that whenever the [maritime border] is mentioned, everyone rises and make noises like a swarm bees,” Roh said.
In the closest she’s come to taking a side on the issue, Park, one day after the transcript’s release, told her cabinet that the South should never forget the “blood and deaths” that occurred in defense of that border.
Published: July 8, 2013 – 11:43AM
Find this story at 8 July 2013
Copyright © 2014 Fairfax Media
Environmental Groups “Shocked” by Reports of NSA Spying of U.N. Climate Talks7 februari 2014
In one of the latest revelations based on the leaks of Edward Snowden, the National Security Agency spied on foreign governments before and during the 2009 U.N. climate summit in Copenhagen. An internal NSA document says its analysts and foreign partners briefed U.S. negotiators on other countries’ “preparations and goals,” saying, “signals intelligence will undoubtedly play a significant role in keeping our negotiators as well informed as possible throughout the two-week event.” We speak to Erich Pica, president of Friends of the Earth.
Transcript
This is a rush transcript. Copy may not be in its final form.
AMY GOODMAN: This is Democracy Now!, democracynow.org, The War and Peace Report. I’m Amy Goodman. We’re still joined by Erich Pica of Friends of the Earth USA. Erich, I wanted to ask you about the recent reports that the National Security Agency spied on foreign governments before and during the 2009 U.N. climate summit in Copenhagen. An internal NSA document says its analysts and foreign partners briefed U.S. negotiators on other countries’ preparations and goals, saying, quote, “signals intelligence will undoubtedly play a significant role in keeping our negotiators as well informed as possible throughout the two-week event.” Your response?
ERICH PICA: Shocking, but not surprised, as we hear more and more about what the National Security Agency has been doing. You know, the 2009 climate talks in Copenhagen was supposed to be this convening of the world leaders to take us into the future of climate negotiations and carbon pollution reductions. And, you know, the United States, throughout those negotiations, had a smug reality to their negotiating stance and was—can be blamed for the collapse of those talks. And kind of hearing through the Snowden documents that NSA was spying on the countries and the negotiators kind of explains many things about why those talks collapsed, because it seems that the United States wasn’t really interested in negotiating just like other countries should be. They were just interested in listening to what was going on.
AMY GOODMAN: Explain the significance of those talks. I remember very well in Copenhagen when Friends of the Earth was kicked out.
ERICH PICA: Yeah, no, we were—we were kicked out for protesting within the U.N. confines. And so, those talks, you know, those 2009 talks, were really about how does the world come together to solve this great issue, which is how to reduce our carbon pollution and save the planet and our society from global warming. And, you know, a lot of countries from around the world, and heads of state, more importantly, came to Copenhagen to try to hammer out an agreement that would have taken us into the future over the next 20 years. And unfortunately, the United States led the—you know, several countries, including Canada, who we were just talking about, in basically destroying the goodwill that these talks had created, to the point where we’ve been now in these negotiations over the last four years, which have really gone nowhere.
AMY GOODMAN: What do you expect from the coming talks? We’ve just come out of Warsaw. Then they’re moving on to Lima, and the binding discussion is supposed to take place in Paris, France, in 2015.
ERICH PICA: Yeah, in Paris. Yeah, well, it’s not a good sign when you’re trying to build trust with other negotiators, other countries, and it comes out that, you know, the United States was spying on those negotiations. There’s already been a level of mistrust and distrust between the United States and countries around the world, particularly those developing countries. And so, you know, where we’re going in Paris, who knows? The United States has not been forthcoming with their negotiating stances. They have not been—we have not been aggressive in reducing our climate change emissions and putting out an offer that the rest of the world can accept. And we haven’t been terribly generous with funding to help these less-developed, these poorer countries in adjusting to both adapting and mitigating the climate impacts that are already happening to them.
AMY GOODMAN: Erich Pica—
ERICH PICA: And so the United States has very little trust in these talks.
AMY GOODMAN: I want to thank you for being with us, president of Friends of the Earth USA, as we turn right now to Michigan.
ERICH PICA: Thank you.
AMY GOODMAN: Thank you.
Monday, February 3, 2014
Find this story at 3 February 2014
The original content of this program is licensed under a Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 United States License. Please attribute legal copies of this work to democracynow.org. Some of the work(s) that this program incorporates, however, may be separately licensed. For further information or additional permissions, contact us.
New from Snowden: The NSA was spying on U.N. climate talks Leaked documents reveal that the U.S. government monitored communications to gain an advantage in negotiations7 februari 2014
The National Security Agency was spying on foreign governments’ communications before and during the 2009 United Nations conference on climate change in Copenhagen, Denmark, a new document released by whistle-blower Edward Snowden reveals.
The Huffington Post, partnering with Danish newspaper Information, has the exclusive:
The document, with portions marked “top secret,” indicates that the NSA was monitoring the communications of other countries ahead of the conference, and intended to continue doing so throughout the meeting. Posted on an internal NSA website on Dec. 7, 2009, the first day of the Copenhagen summit, it states that “analysts here at NSA, as well as our Second Party partners [the United Kingdom, Canada, Australia, and New Zealand, with which the U.S. has an intelligence-sharing relationship] will continue to provide policymakers with unique, timely, and valuable insights into key countries’ preparations and goals for the conference, as well as the deliberations within countries on climate change policies and negotiation strategies.”
“[L]eaders and negotiating teams from around the world will undoubtedly be engaging in intense last-minute policy formulating; at the same time, they will be holding sidebar discussions with their counterparts — details of which are of great interest to our policymakers,” the document reads. The NSA’s plan, Information adds, was to get the scoop on those private discussions in order to brief U.S. officials and give them an advantage in negotiations of CO2 reductions, which had the potential to harm U.S. (and other nations’) economic interests:
The general theme of the document is a set of risk assessments on various effects of climate change that the entire intelligence community was working on. However, the document suggests that the NSA’s actual focus in relation to climate change was spying on other countries to collect intelligence that would support American interests, rather than preventing future climate catastrophes. It describes the U.S. as being under pressure because of its role as the historically largest carbon emitter. A pressure to which the NSA spies were already responding:
“SIGINT (Signals Intelligence, ed.) has already alerted policymakers to anticipate specific foreign pressure on the United States and has provided insights into planned actions on this issue by key nations and leaders.”
advertisement
A National Security Council spokeswoman declined to comment directly on the document, but said in an email that “the U.S. Government has made clear that the United States gathers foreign intelligence of the type gathered by all nations.”
The ultimate outcome of the Copenhagen talks is mostly seen as a disappointment: an agreement to keep warming below 2 degrees C, but one that was non-binding and that allowed each nation to develop its own plans for doing so. While a number of factors undoubtedly contributed to this, these new revelations signal a bad turn for future efforts to reach an international accord on fighting climate change. As HuffPo puts it, in a bit of an understatement, “The revelation that the NSA was surveilling the communications of leaders during the Copenhagen talks is unlikely to help build the trust of negotiators from other nations in the future.”
Lindsay Abrams is an assistant editor at Salon, focusing on all things sustainable. Follow her on Twitter @readingirl, email labrams@salon.com
Thursday, Jan 30, 2014 03:38 PM +0100
Find this story at 30 January 2014
Copyright © 2014 Salon Media Group, Inc.
Snowden Docs: U.S. Spied On Negotiators At 2009 Climate Summit7 februari 2014
WASHINGTON — The National Security Agency monitored the communications of other governments ahead of and during the 2009 United Nations climate negotiations in Copenhagen, Denmark, according to the latest document from whistleblower Edward Snowden.
The document, with portions marked “top secret,” indicates that the NSA was monitoring the communications of other countries ahead of the conference, and intended to continue doing so throughout the meeting. Posted on an internal NSA website on Dec. 7, 2009, the first day of the Copenhagen summit, it states that “analysts here at NSA, as well as our Second Party partners, will continue to provide policymakers with unique, timely, and valuable insights into key countries’ preparations and goals for the conference, as well as the deliberations within countries on climate change policies and negotiation strategies.”
“Second Party partners” refers to the intelligence agencies of the United Kingdom, Canada, Australia, and New Zealand, with which the U.S. has an intelligence-sharing relationship. “While the outcome of the Copenhagen Climate Change Conference remains uncertain, signals intelligence will undoubtedly play a significant role in keeping our negotiators as well informed as possible throughout the 2-week event,” the document says.
The Huffington Post published the documents Wednesday night in coordination with the Danish daily newspaper Information, which worked with American journalist Laura Poitras.
The December 2009 meeting in Copenhagen was the 15th Conference of the Parties to the United Nations Framework Convention on Climate Change, which brings together 195 countries to negotiate measures to address rising greenhouse gas emissions and their impact. The Copenhagen summit was the first big climate meeting after the election of President Barack Obama, and was widely expected to yield a significant breakthrough. Other major developed nations were already part of the 1997 Kyoto Protocol, which set emissions limits, while the United States — the world’s biggest emitter of greenhouse gases when the protocol went into effect in 2004 — had famously declined to join. The two-week meeting was supposed to produce a successor agreement that would include the U.S., as well as China, India and other countries with rapidly increasing emissions.
The document indicates that the NSA planned to gather information as the leaders and negotiating teams of other countries held private discussions throughout the Copenhagen meeting. “[L]eaders and negotiating teams from around the world will undoubtedly be engaging in intense last-minute policy formulating; at the same time, they will be holding sidebar discussions with their counterparts — details of which are of great interest to our policymakers,” the document states. The information likely would be used to brief U.S. officials, such as Secretary of State Hillary Clinton and Obama, among others, according to the document.
The document does not detail how the agency planned to continue gathering information during the summit, other than noting that it would be capturing signals intelligence such as calls and emails. Previous disclosures have indicated that the NSA has the ability to monitor the mobile phones of heads of state. Other documents that Snowden has released indicate that the U.K.’s intelligence service tapped into delegates’ email and telephone communications at the 2009 G-20 meetings in London. Other previous Snowden disclosures documented the surveillance of the G-8 and G-20 summits in Canada in 2010, and the U.N. climate change conference in Bali in 2007.
The document also refers to some intelligence gathered ahead of the meeting, including a report that “detailed China’s efforts to coordinate its position with India and ensure that the two leaders of the developing world are working towards the same outcome.” It refers to another report that “provided advance details of the Danish proposal and their efforts to launch a ‘rescue plan’ to save COP-15.”
The Danish proposal was a draft agreement that the country’s negotiators had drawn up in the months ahead of the summit in consultation with a small number key of countries. The text was leaked to The Guardian early in the conference, causing some disarray as countries that were not consulted balked that it promoted the interests of developed nations and undermined principles laid out in previous climate negotiations. As Information reports, Danish officials wanted to keep U.S. negotiators from seeing the text in the weeks ahead of the conference, worried that it may dim their ambitions in the negotiations for proposed cuts to greenhouse gas emissions.
The Danes did share the text with the U.S. and other key nations ahead of the meeting. But the NSA document noting this as “advance details” indicates that the U.S. may have already intercepted it. The paragraph referring to the Danish text is marked “SI” in the Snowden document — which most likely means “signals intelligence,” indicating that it came from electronic information intercepted by the NSA, rather than being provided to the U.S. negotiators.
That could be why U.S. negotiators took the positions they did going into the conference, a Danish official told Information. “They simply sat back, just as we had feared they would if they knew about our document,” the official said. “They made no constructive statements. Obviously, if they had known about our plans since the fall of 2009, it was in their interest to simply wait for our draft proposal to be brought to the table at the summit.”
Members of the Danish delegation indicated in interviews with Information that they thought the American and Chinese negotiators seemed “peculiarly well-informed” about discussions that had taken place behind closed doors. “Particularly the Americans,” said one official. “I was often completely taken aback by what they knew.”
Despite high hopes for an agreement at Copenhagen, the negotiations started slowly and there were few signs of progress. Obama and heads of state from more than 100 nations arrived late in the second week in hopes of achieving a breakthrough, but the final day wore on without an outcome. There were few promising signals until late Friday night, when Obama made a surprise announcement that he — along with leaders from China, India, Brazil and South Africa — had come up with the “Copenhagen Accord.”
The three-page document set a goal of keeping the average rise in global temperature to less than 2 degrees Celsius, but allowed countries to write their own plans for cutting emissions — leaving out any legally binding targets or even a path to a formal treaty. Obama called the accord “an unprecedented breakthrough” in a press conference, then took off for home on Air Force One. But other countries balked, pointing out that the accord was merely a political agreement, drafted outside the U.N. process and of uncertain influence for future negotiations.
The climate summits since then have advanced at a glacial pace; a legally binding treaty isn’t currently expected until 2015. And the U.S. Congress, despite assurances made in Copenhagen, never passed new laws cutting planet-warming emissions. (The Environmental Protection Agency is, however, moving forward with regulations on emissions from power plants, but a new law to addressing the issue had been widely considered as preferable.)
The revelation that the NSA was surveilling the communications of leaders during the Copenhagen talks is unlikely to help build the trust of negotiators from other nations in the future.
“It can’t help in the sense that if people think you’re trying to get an unfair advantage or manipulate the process, they’re not going to have much trust in you,” said Alden Meyer, director of strategy and policy for the Union of Concerned Scientists and a seasoned veteran of the U.N. climate negotiations. Meyer said he worried that the disclosure might cause the parties to “start becoming more cautious, more secretive, and less forthcoming” in the negotiations. “That’s not a good dynamic in a process where you’re trying to encourage collaboration, compromise, and working together, as opposed to trying to get a comparative advantage,” he said.
Obama has defended the NSA’s work as important in fighting terrorism at home and abroad. But the latest Snowden document indicates that the agency plays a broader role in protecting U.S. interests internationally.
National Security Council spokeswoman Caitlin Hayden declined to comment directly on the Snowden document in an email to The Huffington Post, but did say that “the U.S. Government has made clear that the United States gathers foreign intelligence of the type gathered by all nations.” She noted that Obama’s Jan. 17 speech on the NSA “laid out a series of concrete and substantial reforms the Administration will adopt or seek to codify with Congress” regarding surveillance.
“In particular, he issued a new Presidential Directive that lays out new principles that govern how we conduct signals intelligence collection, and strengthen how we provide executive branch oversight of our signals intelligence activities,” Hayden said. “It will ensure that we take into account our security requirements, but also our alliances; our trade and investment relationships, including the concerns of our companies; and our commitment to privacy and basic liberties. And we will review decisions about intelligence priorities and sensitive targets on an annual basis, so that our actions are regularly scrutinized by the President’s senior national security team.”
Posted: 01/29/2014 9:17 pm EST Updated: 01/30/2014 12:59 pm EST
Find this story at 29 January 2014
Read the document here
Copyright © 2014 TheHuffingtonPost.com, Inc.
<< oudere artikelen nieuwere artikelen >>