Rechterhand Filip Dewinter was spion staatsveiligheid15 februari 2013
De Belgische Staatsveiligheid heeft jarenlang een ‘mol’ gehad binnen de top van het Vlaams Belang. Dat zegt Bart Debie, ex-politiecommissaris en gewezen veiligheidsadviseur van partijkopstuk Filip Dewinter. ‘De Staatsveiligheid deed onderzoek naar de financiering van de partij en naar de contacten van Filip Dewinter’, zegt Debie. ‘En ik was drie jaar lang hun informant.’
‘Wat ze met andere politici doen, weet ik niet. Maar de Staatsveiligheid heeft het Vlaams Belang jarenlang met héél véél aandacht gevolgd. En ik kan het weten, want ik was er zelf bij betrokken.’
Bart Debie (38) was eigenlijk van plan zijn werk als informant voor de Staatsveiligheid voor altijd geheim te houden. Maar na de uitspraken van minister van Justitie Annemie Turtelboom (Open VLD) vorige week dat de Staatsveiligheid ‘zich niet bezighoudt met het bespioneren van parlementsleden’ doorbreekt hij het stilzwijgen. Turtelboom deed haar uitspraken nadat twee rapporten van de Staatsveiligheid waren uitgelekt. Daarin werd een hele resem politici genoemd die gecontacteerd waren door sekten zoals Scientology. Turtelboom zei dat de Staatsveiligheid geen dossiers bijhoudt van parlementsleden.
‘Van Vlaams Belang alleszins wel’, zegt Debie. ‘In 2007 hebben ze me ingelijfd als informant. Tot mijn ontslag bij de partij in 2010 heb ik bijna elke maand op zijn minst één ontmoeting gehad met mijn vaste begeleider bij de inlichtingendienst.’
’Ik zocht zelf contact’
Debie is jarenlang een sleutelfiguur geweest bij Vlaams Belang. Hij is een voormalig commissaris van de Antwerpse politie die bekend werd met zijn harde aanpak van de criminaliteit op het Falconplein. Maar in 2003 kwam hij in opspraak na een gewelddadig verhoor van vijf Turkse arrestanten. Hij werd geschorst, nam later ontslag en werd in 2007 veroordeeld voor buitensporig geweld en vervalsing van pv’s. Filip Dewinter bood een vangnet: in 2004 lijfde hij Debie in bij Vlaams Belang als veiligheidsadviseur.
‘Voor alle duidelijkheid: het contact met de Staatsveiligheid is er op mijn initiatief gekomen’, zegt Debie. ‘Waarom ik contact zocht? Ik had het al langer moeilijk met bepaalde praktijken binnen de partij. De directe aanleiding was een stunt die Filip Dewinter wilde opvoeren. Ten tijde van de rellen in Brussel, waar met een kalasjnikov-geweer op de politie was geschoten, riep Dewinter me bij zich. Bart, kun jij via je contacten een aantal kalasjnikovs kopen? Hij wilde die op een persconferentie presenteren. Ik heb hem duidelijk gemaakt dat ik dat niet zag zitten, omdat het om strafbare feiten ging. En ik had al een strafblad, door die affaire in Antwerpen. Toen heb ik contact gezocht met de Staatsveiligheid. Deels om mezelf wat in te dekken, deels omdat ik dat soort praktijken binnen de partij kotsbeu was.’
Een paar dagen nadat hij zelf contact had gezocht, kreeg Debie telefoon van iemand die zich voorstelde als commissaris bij de Staatsveiligheid.
…
Lees de rest van het artikel in Het Nieuwsblad van maandag 11 februari.
Joris van der Aa en Tom Le Bacq
Find this story at 11 February 2013
© Nieuwsblad.be werkt samen met De Standaard en L’Avenir
Woman’s 18-year search for truth about police spy who used dead child’s name4 februari 2013
When the man known to his activist girlfriend as John Barker disappeared, she embarked on a journey that led her to the former home of a child whose name he used as an alias
John Dines taking part in a race in the early 1990s when he was serving as an undercover sergeant in the Metropolitan police’s special branch
John Barker was an eight-year-old boy who died of leukaemia in 1968. Nineteen years later his identity was quietly resurrected by the police. The man who adopted the boy’s identity, claiming it as his own, was John Dines, an undercover sergeant in the Metropolitan police’s special branch.
In 1987 Dines was tasked with posing as an anti-capitalist protester, feeding intelligence to his handlers in a secret unit called the special demonstration squad (SDS). It was a controversial and morally dubious deployment that lasted five years and will now return to haunt him.
Like many SDS officers, Dines had a long-term girlfriend who was a political activist. She does not want to be identified and has asked to be referred to as Clare.
Her story lays bare the emotional trauma experienced by women whom police have described as “collateral” victims of their spy operations, as well as the risks police were taking by adopting the identities of dead children.
In 1990 the man Clare knew as John Barker asked to borrow money so he could fly to New Zealand for his mother’s funeral. “The night before he got the flight to go there, he stayed at my place and kind of poured his heart out. We became emotionally close. When he got back, we got together.”
There was no funeral in New Zealand and Dines had no need to borrow money. But Clare had known Dines as a fellow protester for three years and had no reason to suspect him. The couple would end up in an intimate relationship for two years.
“He said he wanted to spend the rest of his life with me and I was madly in love with him,” she said. “He said he wanted us to have kids. He used to say he had once seen an elderly Greek couple sitting on a veranda gazing into the sunset, and that he pictured us growing old like that.”
By the summer of 1991, as part of an exit strategy, Dines began exhibiting symptoms of a mental breakdown.
“He kept talking about how he had nobody left apart from me,” Clare said. “His parents had both died. He had no brothers and sisters. The only woman that he had ever loved before me, a woman called Debbie, had left him. He said he was convinced I was going to do the same to him.”
Dines gave the impression he wanted to run away to escape inner demons. “I saw him crying loads,” Clare said. “He told me that he had thrown all of his mother’s jewellery into a river because he thought she never loved him. He told me his parents had abused him.”
In March 1992 an emotional-sounding Dines called from Heathrow airport saying he was about to fly to South Africa. After that, Clare received two letters with South African postmarks. Then her boyfriend vanished altogether.
Clare was left distraught and confused. “I was very worried about his mental state,” she said. “I was also sick with worry that he might kill himself.”
Clare contacted the British consulate in South Africa and frantically phoned hostels she thought he may have stayed in Johannesburg. She later hired a private investigator who could find no trace of Dines.
It was the start of a journey for the truth that would last almost two decades and eventually take her to New Zealand. It was not until 2010 that she found out for sure that the man she had loved was a police spy.
For some of the time that Clare thought her boyfriend was missing abroad, he was actually working just a few miles away. When his undercover work finished, Dines changed his mullet-style haircut and returned to a desk job at the Met headquarters in Scotland Yard where, according to a colleague, he appeared “very miserable”.
In her search for clues, one of the first things Clare did was locate a copy of what she assumed was her boyfriend’s birth certificate. The document confirmed the details he had always given her: it named a city in the Midlands where he was born in January 1960. She had no idea that the identity was a forgery, or that the real John Barker had died as a boy.
In April 1993, desperate after a year of searching, Clare decided to visit Barker’s family home in the hope of finding any surviving relatives, but when she knocked on the door of the terrace house there was no answer. She went back later but the occupants said the family no longer lived there.
Looking back, she wonders what would have occurred if the dead child’s parents had opened the door. “It would have been horrendous,” she said. “It would have completely freaked them out to have someone asking after a child who died 24 years earlier.”
It was another 18 months before Clare decided to inspect the national death records. “I just suddenly got this instinct. It was a whim: I thought, I’m going to go in there and look through the death records.”
She recalls her horror when she discovered the real John Barker was dead. “It sent a chill down my spine,” she said. “When I got the certificate itself, it was so clear. The same person. The same parents. The same address. But he had died as an eight-year-old boy.”
The Guardian has been unable to find surviving relatives of the child.
The discovery turned Clare’s world upside down. “It was like a bereavement but it was not something I could talk to people about. Now suddenly he didn’t exist. This was a man I had known for five years, who I had lived with for two years. How could I trust anybody again?”
Clare now knew her boyfriend had lied about his identity, but still had no idea who he was. The idea that he might have been a police spy crossed her mind, but he might also have worked in corporate espionage or had a hidden criminal past. It was another 10 years of searching before she got closer to the truth.
Clare had two clues to go on. One was the name of a woman in New Zealand who Dines had told her was an aunt. The other was a letter in which he had made a curious reference to his biological father being a man he had never met, called Jim Dines.
The woman in New Zealand was not his aunt but, bizarrely, the mother of Dines’s real wife. Stranger still, Jim Dines was, in fact, the police officer’s real father and had brought him up in London.
Clare has no idea why the undercover police officer chose to compromise his deployment by giving Clare cryptic references to people in his real life. Perhaps he was psychologically traumatised by his dual identities and wanted to leave a trail that would allow Clare to find him.
Whatever his reason, the clues led Clare to a public archive in New Zealand. It was there, in 2003, that she made a crucial connection: a document that linked Dines with the woman he married, Debbie.
Clare instantly realised they must have been a married couple. Back in London, she ordered the couple’s wedding certificate. “What hit me like a ton of bricks is that he listed his occupation as a police officer,” she said. “When I read that, I felt utterly sick and really violated. It ripped me apart basically, just reading that.”
Clare was now agonisingly close to the truth. She knew that Dines was a police officer when he married his wife in 1977. But there was still a possibility that he gave up his job before becoming a political activist.
She shared the evidence with friends and family. Some cautioned her against concluding Dines had been a police spy. “I remember my dad and others said: ‘You’re being paranoid – that would never happen in this country.'”
…
Paul Lewis and Rob Evans
The Guardian, Sunday 3 February 2013 19.21 GMT
Find this story at 3 February 2013
© 2013 Guardian News and Media Limited or its affiliated companies. All rights reserved.
Met chief summoned to explain why police stole identities of dead children4 februari 2013
Deputy assistant commissioner Pat Gallan summoned before MPs to respond to revelations officers used IDs of children
John Dines, an undercover police sergeant, as he appeared in the early 1980s when he posed as John Barker, a protester against capitalism. Dines’s alternative identity used that of a child who had died. Photograph: Guardian
A senior police chief has been summoned to parliament to explain why police secretly authorised undercover officers to steal the identities of around 80 dead children.
Pat Gallan, the Metropolitan Police deputy assistant commissioner in charge of the complaints department, will respond to the revelations at a parliamentary committee hearing on Tuesday.
An investigation by the Guardian has revealed that police infiltrating protest groups have for three decades adopted the identities of dead children, without informing or consulting their parents.
Two undercover officers have provided a detailed account of how they and others used the identities of dead children.
Keith Vaz, chair of the home affairs select committee has said he is “shocked” at the “gruesome” practice.
“The committee will hear from those who have been involved in undercover operations as well as their victims,” he said. “I have asked the deputy assistant commissioner Pat Gallan to deal with the issues that have arisen.”
Gallan is head of the Met’s department for professional standards.
The Guardian has established how police officers were equipped with fabricated identity records, such as driving licences and national insurance numbers, in the name of their chosen dead child. They also visited the family home of the dead child to familiarise themselves with the surroundings and conducted research into other family members.
Scotland Yard has already announced an investigation into the controversy. It said it had received one complaint – believed to be a reference to a suspected police officer who was undercover in 2003 – and said it could “appreciate the concerns that have been raised”. The force said that the practice of using the identities of dead children is not currently authorised.
The operation is known to have been orchestrated by the Special Demonstration Squad, a secretive Met unit disbanded in 2008. Dozens of SDS officers are believed to have searched through birth and death certificates to find a child who had died young and would be a suitable match for their alias.
The officers then adopted the entire identity of the child as if the child had never died. One police officer has said the process was like “resurrecting” a dead person’s identity.
The disclosure comes after two years of revelations concerning undercover police officers having sexual relationships with women they are spying on. Eleven women are currently bringing legal action against the Met for damages.
Vaz said: “The activities of undercover police officers caused disbelief when they were revealed in 2011. These revelations [about the use of dead children’s identities] are shocking. I congratulate the Guardian on their investigation. To have used the identities of dead children without the knowledge or consent of their parents astonishes me. It sounds gruesome. ”
…
Rob Evans and Paul Lewis
guardian.co.uk, Monday 4 February 2013 12.36 GMT
Find this story at 4 February 2013
© 2013 Guardian News and Media Limited or its affiliated companies. All rights reserved.
Police ‘stole identities of dead children’ to give undercover officers new identities4 februari 2013
The Metropolitan Police covertly stole the identities of about 80 dead children for use in operations by undercover police officers, according to a new investigation.
The practice, condemned as “gruesome” by Keith Vaz, the chairman of the Home Affairs Select Committee, carried on for three decades as a means for police to infiltrate anti-racist, anti-capitalist and far-right protest groups. Officers obtained passports, driving licences and national insurance numbers under their new identities.
…
Tim Hume
Monday, 4 February 2013
Find this story at 4 February 2013
© independent.co.uk
Police spies stole identities of dead children4 februari 2013
Exclusive: Undercover officers created aliases based on details found in birth and death records, Guardian investigation reveals
John Dines, an undercover police sergeant, as he appeared in the early 1990s when he posed as John Barker, a protester against capitalism
Britain’s largest police force stole the identities of an estimated 80 dead children and issued fake passports in their names for use by undercover police officers.
The Metropolitan police secretly authorised the practice for covert officers infiltrating protest groups without consulting or informing the children’s parents.
The details are revealed in an investigation by the Guardian, which has established how over three decades generations of police officers trawled through national birth and death records in search of suitable matches.
Undercover officers created aliases based on the details of the dead children and were issued with accompanying identity records such as driving licences and national insurance numbers. Some of the police officers spent up to 10 years pretending to be people who had died.
The Met said the practice was not “currently” authorised, but announced an investigation into “past arrangements for undercover identities used by SDS [Special Demonstration Squad] officers”.
Keith Vaz, the chairman of parliament’s home affairs select committee, said he was shocked at the “gruesome” practice. “It will only cause enormous distress to families who will discover what has happened concerning the identities of their dead children,” he said. “This is absolutely shocking.”
The technique of using dead children as aliases has remained classified intelligence for several decades, although it was fictionalised in Frederick Forsyth’s novel The Day of the Jackal. As a result, police have internally nicknamed the process of searching for suitable identities as the “jackal run”. One former undercover agent compared an operation on which he was deployed to the methods used by the Stasi.
Two undercover officers have provided a detailed account of how they and others used the identities of dead children. One, who adopted the fake persona of Pete Black while undercover in anti-racist groups, said he felt he was “stomping on the grave” of the four-year-old boy whose identity he used.
“A part of me was thinking about how I would feel if someone was taking the names and details of my dead son for something like this,” he said. The Guardian has chosen not to identify Black by his real name.
The other officer, who adopted the identity of a child who died in a car crash, said he was conscious the parents would “still be grief-stricken”. He spoke on the condition of anonymity and argued his actions could be justified because they were for the “greater good”.
Both officers worked for a secretive unit called the Special Demonstration Squad (SDS), which was disbanded in 2008.
A third undercover police officer in the SDS who adopted the identity of a dead child can be named as John Dines, a sergeant. He adopted the identity of an eight-year-old boy named John Barker, who died in 1968 from leukaemia. The Met said in a statement: “We are not prepared to confirm nor deny the deployment of individuals on specific operations.”
The force added: “A formal complaint has been received which is being investigated by the DPS [Directorate for Professional Standards] and we appreciate the concerns that have been raised. The DPS inquiry is taking place in conjunction with Operation Herne’s investigation into the wider issue of past arrangements for undercover identities used by SDS officers. We can confirm that the practice referred to in the complaint is not something that would currently be authorised in the [Met police].”
There is a suggestion that the practice of using dead infant identities may have been stopped in the mid-1990s, when death records were digitised. However, the case being investigated by the Met relates to a suspected undercover police officer who may have used a dead child’s identity in 2003.
The practice was introduced 40 years ago by police to lend credibility to the backstory of covert operatives spying on protesters, and to guard against the possibility that campaigners would discover their true identities.
Since then dozens of SDS officers, including those who posed as anti-capitalists, animal rights activists and violent far-right campaigners, have used the identities of dead children.
One document seen by the Guardian indicates that around 80 police officers used such identities between 1968 and 1994. The total number could be higher.
Black said he always felt guilty when celebrating the birthday of the four-year-old whose identity he took. He was particularly aware that somewhere the parents of the boy would be “thinking about their son and missing him”. “I used to get this really odd feeling,” he said.
To fully immerse himself in the adopted identity and appear convincing when speaking about his upbringing, Black visited the child’s home town to familiarise himself with the surroundings.
Black, who was undercover in the 1990s, said his operation was “almost Stasi-like”. He said SDS officers visited the house they were supposed to have been born in so they would have a memory of the building.
“It’s those little details that really matter – the weird smell coming out of the drain that’s been broken for years, the location of the corner Post Office, the number of the bus you get to go from one place to another,” he said.
The second SDS officer said he believed the use of the harvested identities was for the “greater good”. But he was also aware that the parents had not been consulted. “There were dilemmas that went through my head,” he said.
The case of the third officer, John Dines, reveals the risks posed to families who were unaware that their children’s identities were being used by undercover police.
During his covert deployment, Dines had a two-year relationship with a female activist before disappearing from her life. In an attempt to track down her disappeared boyfriend, the woman discovered the birth certificate of John Barker and tried to track down his family, unaware that she was actually searching for a dead child.
She said she was relieved that she never managed to find the parents of the dead boy. “It would have been horrendous,” she said. “It would have completely freaked them out to have someone asking after a child who died 24 years earlier.”
The disclosure about the use of the identities of dead children is likely to reignite the controversy over undercover police infiltration of protest groups. Fifteen separate inquiries have already been launched since 2011, when Mark Kennedy was unmasked as a police spy who had slept with several women, including one who was his girlfriend for six years.
…
Paul Lewis and Rob Evans
The Guardian, Sunday 3 February 2013 19.13 GMT
Find this story at 3 February 2013
© 2013 Guardian News and Media Limited or its affiliated companies. All rights reserved.
Nestlégate: success in civil lawsuit against NESTLÉ and SECURITAS4 februari 2013
ATTAC Switzerland has taken notice with great satisfaction of the civil court’s president Jean-Luc Genillard’s decision of 25 January 2013 in the case «Nestlegate». The Court has convicted NESTLE and SECURITAS AG of spying activities directed at ATTAC. It has recognized that these parties conducted illegal infiltrations. The claimants have been entitled to a financial compensation, since their personal rights have been violated. NESTLE and SECURITAS AG have been ordered to pay a financial compensation of 3.000 Swiss francs (3.238 US dollars) per claimant (a total of 27.000 Swiss francs – 29.145 US dollars).
ATTAC Switzerland has taken notice with great satisfaction of the civil court’s president Jean-Luc Genillard’s decision of 25 January 2013 in the case «Nestlegate». The Court has convicted NESTLE and SECURITAS AG of spying activities directed at ATTAC. It has recognized that these parties conducted illegal infiltrations. The claimants have been entitled to a financial compensation, since their personal rights have been violated. NESTLE and SECURITAS AG have been ordered to pay a financial compensation of 3.000 Swiss francs (3.238 US dollars) per claimant (a total of 27.000 Swiss francs – 29.145 US dollars).
Both a criminal and a civil case were filed after Swiss television revealed on 12 June 2008 that an ATTAC workgroup in Canton Vaud, which was preparing a book on NESTLE’s policies («Attac contre l’empire NESTLE», 2004), had been infiltrated and spied on by a SECURITAS employee on behalf of NESTLE. The woman had joined the ATTAC workgroup in 2003 under the false name of “Sara Meylan”, had attended private meetings (sometimes at the members’ homes), gathered confidential information and prepared detailed reports on the authors as well as on third parties for NESTLE. On September 26th, 2008, ATTAC discovered and denounced to the examining magistrate another SECURITAS spy, who was still active in ATTAC in 2008 under her real name.
The criminal proceedings were dropped on July 29th, 2009. The investigating judge mainly relied on the statements made by NESTLE and SECURITAS AG and found that the only infringement that may constitute an offense – a violation of the federal law of data protection – falls under the three-year statute of limitation. We regret the superficial investigation conducted during this criminal investigation, which Alec Feuz has well documented in his book « Affaire classée».
We are very satisfied that the civil court has now condemned NESTLE’s and SECURITAS AG’s spying activities. Nevertheless we’d like to point out that we are continuing to critically observe the worldwide activities of multinational corporations like NESTLE, especially concerning its hostile trade union policies and the excessive pumping of groundwater in different parts of the world.
Through a general increase of espionage and spying activities, basic democratic rights like the freedom of opinion, the freedom of speech and the freedom of assembly are called into question. The activities of NGOs, trade unions and critical political organizations are limited by private corporations, which perceive non-violent campaigns and action from civil society as a threat to their commercial interests. These transnational corporations thus try to reduce basic democratic rights and often profit from the fact that the State turns a blind eye to these infringements.
It is important to be able to fight for a just and egalitarian society, to oppose injustice around the world by means of free and independent research into the dealings of transnational corporations, without being surveyed or spied on.
Find this story at 28 January 2013
Chocolade spionnen4 februari 2013
De Zwitserse afdeling van Attac heeft op 20 juni 2008 de autoriteiten van het Kanton Vaud, Zwitserland, gevraagd om de infiltratie van Attac door de multinational Nestlé te onderzoeken. Nestlé is het bedrijf van onder andere KitKat, After Eight, Bros en Nespresso. Acteur en regisseur George Clooney is de belichaming van het hippe kopje koffie. Attac heeft een aanklacht ingediend tegen een onbekende persoon wegens schending van de persoonlijke levenssfeer van de auteurs van het kritische boek over Nestlé: ‘Nestlé – Anatomie eines Weltkonzerns’ (Nestlé – Anatomie van een multinational) en van de overtreding van wetgeving ter bescherming van persoonsgegevens. Volgens Attac, een wereldwijde organisatie die het economische systeem wil veranderen met onder andere de slogan ‘de wereld is niet te koop’, vond de infiltratie plaats van september 2003 tot en met juni 2004. Nestlé lijkt met de infiltratie geprobeerd te hebben op de hoogte te blijven van het onderzoek van Attac naar de betrokkenheid van Nestlé bij genetisch gemanipuleerde gewassen, de privatisering van water en de behandeling van de vakbonden door het bedrijf.
Het zal geen verbazing wekken dat in de aanloop naar en tijdens de G8 in Evian, Zwitserland, in de zomer van 2003, infiltraties in organisaties van anti globalisten door politie en bedrijfsleven plaatsvonden. Zo geeft de politie van Waadtland in een uitzending van het televisieprogramma Temps Présent toe dat zij op de hoogte waren van infiltratiepogingen door het private recherchebureau Securitas AG (Zwitserland) in allerlei solidariteitsgroepen. Of Nestlé ook daadwerkelijk de opdracht heeft gegeven blijft een misterie. Securitas AG zou ook de infiltratie in Attac hebben uitgevoerd. Deze begon echter pas na de G8 top in Evian. Securitas AG is overigens niet onderdeel van het internationale bedrijf Sercuritas waartoe het Nederlandse bedrijf met dezelfde naam behoort.
Securitas AG zou een vrouw, met de schuilnaam ‘Sara Meylan’, hebben ingehuurd om deel te nemen aan de redactievergaderingen voor het boek ‘Nestlé – Anatomie eines Weltkonzerns’ (Nestlé – Anatomie van een multinational). Het boek is uiteindelijk in 2005 verschenen. ‘Sara Meylan’ meldde zich in de lente van 2003 en deed mee aan de protesten tegen de G8 voordat ze in het schrijversteam infiltreerde. In de uitzending van Temps Présent van 12 juni 2008 willen beide bedrijven niet op de concrete beschuldigingen van het televisieprogramma ingaan. Nestlé gaf wel in een verklaring aan dat zij Securitas AG had ingehuurd voor de beveiliging van haar staf en faciliteiten tijdens de G8. Het bedrijf verwachtte een confrontatie met de demonstranten. Securitas AG baas, Reto Casutt, gaf toe dat medewerkers van het bedrijf onder valse naam aan bijeenkomsten van verschillende solidariteitsorganisaties hebben deelgenomen. Hij noemt het zelf ‘niet sympathiek’, maar ook ‘niet verboden.’ Een maand later beweerde Casutt dat de omstandigheden van de G8 top in Evian te vergelijken waren met militaire omstandigheden en dat de inzet van de agent voor hun cliënt Nestlé slechts noodweer was. Securitas AG moest een informatievoorsprong hebben in verband met toekomstige acties. Casutt voelde zich gedwongen om te reageren op de negatieve berichten in de media.
‘Sara Meylan’ had maandenlang aan het boek van Attac meegewerkt en was na de publicatie spoorloos verdwenen. In e-mails aan de schrijvers meldde de agente dat ze het ‘super vond wat ze deden.’ Of ze veel aan het onderzoek en het boek heeft bijgedragen valt te betwijfelen. Zij deed niet mee aan discussies en kwam op de vergaderingen vaak laat en ging eerder weg. Wel kwam ze te weten met wie Attac contact onderhield in bijvoorbeeld Colombia waar Nestlé de vakbonden niet in haar fabrieken toelaat. Toen de publicatiedatum naderde begon ze afstand te nemen en wilde niet op de foto. Plotseling was ze toen verdwenen en onbereikbaar.
De agente van Nestlé werkte een jaar mee aan het boek. Ze kwam bij de zeven onderzoekers over de vloer, las de verschillende proefdrukken en hoorde de namen van de mensen die Attac van munitie voorzagen tegen het Zwitserse bedrijf. Volgens Jean-Philipp Ceppi van het televisieprogramma Temps Présent dat het nieuws in juni 2008 bracht, vond er een ontmoeting plaats tussen de agente ‘Sara Meylan’ en haar ‘runner’ (coach/begeleider) van Securitas AG en het hoofd beveiliging en het hoofd van de communicatie afdeling van Nestlé in maart 2004. Volgens Ceppi duidt dit erop dat het voor Nestlé een zaak was van veiligheid en van beeldvorming. Volgens hem zou dit verklaren waarom de infiltratie van Attac pas na de G8 top in Evian begon, want enige relatie tussen de redactievergaderingen van Attac voor het boek en de protesten tegen de G8 in Evian was er niet.
Nestlé heeft al een imago van een brute Zwitserse chocoladebeer, maar het bespioneren van een onderzoeksgroep die een boek over het concern schreef, lijkt iedereen te ver gaan. Naar aanleiding van de televisie uitzending schreef de privacy waakhond van Zwitserland Schweizer Datenschutz Securitas AG aan over de activiteiten van het beveiligingsbedrijf voor en tijdens de G8. “Nestlé geeft aan maatregelen te hebben getroffen voor de veiligheid van personen en faciliteiten met het oog op een eventuele terroristische aanslag tijdens de G8. De strijd tegen het terrorisme is echter een staatsaangelegenheid en niet een zaak van een privéonderneming,” vertelde woordvoerder Kosmas Tsiraktsopulos de SDA nieuwsdienst. Over de spionage van de schrijversgroep van Attac merkt hij op dat het om een “problematisch geval” gaat.
Niet alleen de privacy waakhond is verbolgen over het optreden van Securitas AG en Nestlé. Ook de VSPB, de vakbond van Zwitsers politiepersoneel, haalde hard uit naar Securitas AG. De vakbond vraagt zich in een schrijven af of Securitas AG wel een acceptabele partner voor de politie kan zijn. De politie heeft echter zelf ook geen schone handen. Terwijl in de uitzending van Temps Présent de politie aangeeft op de hoogte te zijn geweest van de activiteiten van Securitas AG in de aanloop en tijdens de G8 top, verklaarde een week later de veiligheidscoördinator van het kanton Waadt, Jacqueline de Quattro, dat de politie op de hoogte was van de infiltratie van een vrouwelijke medewerker van Securitas AG in Attac. Enkele maanden later wordt duidelijk dat de Dienst für Analyse und Prävention (DAP), de dienst voor analyse en preventie, in 2003 rond de G8 top bij toeval op de infiltratiepoging was gestoten. De baas van de DAP heeft toen aan de directie van Securitas AG gemeld dat de infiltratie problematisch was.
Op 23 juli 2008 zag Nestlé zich genoodzaakt na een hoorzitting een verklaring af te leggen over haar samenwerking met Securitas AG rond de G8 en Attac. Hans Peter Frick stelde dat Nestlé in de toekomst zulke maatregelen niet uitsluit. Aanleiding voor het opereren van Nestlé en Securitas AG rond de G8 top was een manifestatie op 28 maart 2003 bij het hoofdkantoor van Nestlé. Bij die manifestatie was ook José Bové aanwezig, de Franse boer die tegen de globalisering ten strijde trekt. Attac nam ook deel aan de manifestatie. Tussen de honder en vier honderd boeren uit verschillende landen wilden het hoofdkantoor van Nestlé binnendringen. Het liep enigszins uit de hand volgens Nestlé. Er sneuvelde een ruit van een voordeur en er werden leuzen op de ramen geschilderd. De politie verhinderde dat de demonstranten het hoofdkantoor betraden en de actie duurde niet lang. Frick vond dat deze manifestatie genoeg reden was om hardere maatregelen rond de G8 top te nemen. Blijkbaar was het bedrijf bang dat de media de verkeerde conclusie zou trekken uit de opmerking dat het bedrijf ook in de toekomst zulke maatregelen zou treffen. Het concern liet enkele uren later een woordvoerder duidelijk maken dat Frick niet de infiltraties voor ogen had bij zijn opmerking. Volgens hem behoort infiltratie niet tot de standaardoperaties van het bedrijf, maar het bedrijf sluit infiltratiepogingen echter ook niet uit.
In dezelfde verklaring legde Frick de verantwoordelijkheid voor het optreden van ‘Sara Meylan’ bij Securitas AG. Het beveiligingsbedrijf was met het idee gekomen en Frick had slechts zijn fiat gegeven. Tijdens de hoorzitting van 23 juli 2008 speelden beide partijen een slim spel. Nestlé bezat een dossier van 77 pagina’s over de opdracht aan Securitas AG. Securitas AG zelf had geen enkele documentatie met betrekking tot de zaak aangezien zij alle stukken aan het levensmiddelenbedrijf hadden overlegd. De advocaat van Nestlé stelde dat het dossier bestond uit alle stukken die de beveiligingsafdeling van het bedrijf van Securitas AG medewerkster ‘Sara Meylan’ heeft gekregen van september 2003 tot en met mei 2004. Attac liet het daarbij niet zitten en vorderde alle documenten. Volgens de organisatie zaten in het dossier van Nestlé niet de belangrijke stukken. Vooral het eindrapport van ‘Sara Meylan’ ontbreekt volgens Attac. Dit rapport moet volgens Attac aantonen dat de persoonlijke levenssfeer van de schrijvers van ‘Nestlé – Anatomie eines Weltkonzerns’ is geschonden. Op 15 augustus 2008 wees de rechtbank van Lausanne deze vordering af, daarmee ook een schadevergoeding. De rechtbank oordeelde dat de documenten die beide bedrijven op tafel hadden gelegd voldoende waren.
Op de dag van de uitspraak van de rechtbank in Lausanne zag Peter Brabeck, voorzitter van de raad van commissarissen van Nestlé, zich genoodzaakt te reageren op alle beschuldigingen aan zijn bedrijf. Hij onderstreepte nogmaals dat het initiatief voor de infiltratie niet van Nestlé was gekomen, maar van Securitas AG. ‘Als iemand mij vertelt dat wij een infiltratiepoging gaan uitvoeren, dan zal ik de nodige maatregelen nemen, want dit is niet in overeenstemming met ons beleid,’ vertelde Brabeck Radio RSR. Wat het beleid van Nestlé precies is wordt door de afgewezen vordering niet duidelijk, maar dat Nestlé de laatste jaren flink onder vuur ligt is wel duidelijk.
Vooral de activiteiten van het bedrijf in Colombia zijn een punt van kritiek. En in 2003 startte de Verein Multiwatch de voorbereidingen voor een hoorzitting van de Colombiaanse vakbonden over Nestlé. De hoorzitting vond op 29 oktober 2005 plaats, maar voordien vond er een inbraak in het kantoor van Multiwatch plaats waarbij geen waardevolle artikelen werden ontvreemd. Ook werd een van de vakbondsmensen vlak voor vertrek naar Zwitserland om deel te nemen aan de hoorzitting, vermoord. Beide gebeurtenissen kunnen toeval zijn en niets met Nestlé te maken hebben. Een inbraak kan altijd plaatsvinden en in Colombia zijn moordaanslagen eerder regel dan uitzondering.
De hypothese van Jean-Philipp Ceppi van Temps Présent dat Nestlé aan contra spionage doet om imagoschade af te wenden, is echter niet geheel onlogisch. Bij de voorbereidingen voor de hoorzitting over Nestlé in Colombia door Multiwatch zag het bedrijf zich genoodzaakt geregeld te reageren op de mogelijke beschuldigingen. Nestlé vond de beschuldigingen of uit de duim gezogen of getuigen van een gebrek aan kennis over de Colombiaanse situatie.
De kou lijkt echter niet uit de lucht voor Nestlé. Mensenrechtenactiviste Marianne Aeberhard nam deel aan twee conferentie in Freiburg en Vevey waar ook Colombiaanse vakbondsleden spraken. Aeberhard was niet een van de auteurs van het boek van Attac. Op grond van de Zwitserse wet op de bescherming van persoonsgegevens eiste zij van Nestlé de documenten die op haar betrekking hebben. De agente ‘Sara Meylan’ had namelijk over beide bijeenkomsten gerapporteerd. Nestlé weigerde Aeberhard de informatie zonder opgaaf van reden, wat er op zou kunnen duiden dat Attac toch gelijk heeft dat het dossier dat bij Nestlé ligt dikker is dan 77 pagina’s. Ook van Franklin Frederick, een activist in Brazilië, zijn e-mails door ‘Sara Meylan’ onderschept ten behoeve van het snuffelen voor Securitas AG. Frederick is vooral interessant gezien zijn rol in de strijd tegen de privatisering van water in Brazilië. Hij is erg succesvol en onderhoudt contacten met zowel kerkelijke als niet kerkelijke organisaties in Zwitserland en Brazilië in de strijd tegen de privatisering.
De rol die Securitas AG speelt is er een van informatiemakelaar. Het bedrijf zegt de volledige verantwoordelijkheid voor de infiltratiepoging te dragen. De agente was echter niet alleen geïnteresseerd in de schrijversgroep, maar bezocht ook bijeenkomsten van andere Attacleden en fora van andere organisaties over de activiteiten van Nestlé in Latijns Amerika.
En niet alleen Attac had last van een agente, ook de Gruppe Anti-Repression (GAR) uit Lausanne maakte gewag van een informante. GAR komt op voor het demonstratierecht en is een politieklachtenbureau. Op 8 september 2008 rapporteerde het programma ‘Mise au Point’ over de infiltratie van GAR. Ook GAR diende een klacht in tegen een onbekende persoon in verband met schending van de persoonlijke levenssfeer. Het zou gaan om de agente met de schuilnaam ‘Shanti Muller’. Zij was werkzaam voor Securitas AG en zij was tussen 2003 en 2005 actief binnen de anti-repressiegroep en andere alternatieve groepen zoals organisaties die zich verzetten tegen het Wereld Economisch Forum in Davos. Ook de dierenrechtenorganisatie LausAnimaliste stond op het lijstje van Muller. Ze zou tot in 2008 betrokken zijn geweest bij de organisatie. Het bedrijf zou informatie aan de politie hebben doorgespeeld. In wiens opdracht ‘Shanti Muller’ infiltreerde is nog niet bekend. ‘Muller’ had haar identiteit wel verder uitgebouwd. Ze zou de dochter van een Franse ontwikkelingswerker in Djibouti zijn en zelf 20 jaar in India met straatkinderen en Lepra slachtoffers hebben gewerkt. In de zomer van 2005 verdween ze plotseling, net als ‘Sara Maylan’ Attac plotseling Attac de rug toekeerde. ‘Muller’ gaf wel een reden aan voor haar vertrek. Ze zou haar ernstig zieke moeder in Frankrijk moeten verzorgen.
Om aan alle speculaties over de betrokkenheid van de politie bij de infiltratie pogingen te ontzenuwen was een oud rechter, François Jomini, aangesteld om de rol van de politie te onderzoeken. Zijn conclusie was simpel. De politie heeft geen privébedrijf ingehuurd om te spioneren en de informatie is ook niet bij de politie terechtgekomen. Het onderzoek van Jomini maakte in ieder geval duidelijk dat de politie wel degelijk op de hoogte was van de infiltratie. Tijdens de G8 top was er een speciale politie-eenheid die de informatiestromen coördineerde. Tijdens een bijeenkomst met het hoofd beveiliging van Nestlé is de politie ingelicht over de infiltratie van groepen die zich tegen de globalisering te weer stellen door Securitas AG. Volgens Jomini is de politie niet verteld over welke organisaties het precies gaat en over de infiltratie na de G8 wist de politie in het geheel niets. Of toch wel, want de DAP, dienst voor analyse en preventie van de politie, was op ‘Shanti’ gestoten en had Securitas AG op de vingers getikt. Of niet? Jomini schrijft in zijn rapport dat de politie de informatie over de infiltraties via de media moest vernemen. Dan blijft het wel vreemd dat Securitas AG na 2003 informatie over organisaties die kritisch staan tegenover globalisering aan de politie probeerde te verkopen. De politie ontkent dit weer niet. Volgens Securitas AG heeft zij in de herfst van 2005 de eenheid die verantwoordelijk is voor de infiltraties opgeheven. Deze beëindiging zou samenhangen met opmerkingen van de politie dat deze activiteiten niet behoren tot de taken van particuliere beveiligingsbedrijven.
En dan duikt plotseling in november 2008 de naam van een derde agente van Securitas AG op. ‘Le Matin Blue’, zoals haar schuilnaam luidt, zou ook in opdracht van Nestlé in Attac zijn geïnfiltreerd. Zij schreef rond de tien rapporten voor Securitas AG en Nestlé over Attac. Securitas AG weerspreekt het verhaal niet, maar verweert zich door te stellen dat de vrouw onder haar eigen naam aan openbare bijeenkomsten van de organisatie heeft deelgenomen. De derde infiltrant lijkt de publieke verontwaardiging te hebben aangewakkerd. Op 28 november 2008 ondertekenden 76 prominenten een manifest dat Nestlé en Securitas AG oproepen op te houden met het besnuffelen van mensen die gebruik maken van het recht op vrijheid van meningsuiting. De autoriteiten worden opgeroepen het Nestlé Securitas AG schandaal grondig te onderzoeken.
Find this story at 20 January 2009
Nestlé Found Guilty of Spying on Swiss Activists4 februari 2013
Nestlé, the world’s largest food company, has been found guilty of spying on Swiss activists in 2003 with the help of Securitas, a private security company. Jean-Luc Genillard, president of the Lausanne civil court, told the two companies to pay 3,000 Swiss Francs ($3,267.55) to each of nine victims.
Vevey, Switzerland, based Nestlé sells $91 billion worth of products a year such as Nescafé coffee, KitKat chocolates and Maggi noodles. The company has frequently been criticized for marketing baby food in poor countries in violation of a 1981 World Health Organization code that regulates the advertising of breast milk substitutes. It has also come under fire from Greenpeace for using palm oil grown on deforested land in Borneo and buying cocoa beans from plantations that used child labor in Cote d’Ivoire in a film entitled “The Dark Side of Chocolate.”
In 2003, a group of activists with the Association pour la Taxation des Transactions pour l’Aide aux Citoyens (ATTAC) in Vaud, Switzerland, started working on a book on the global policies of Nestlé. A Securitas employee infiltrated the group under a false name (Sara Meyland) in order to attend the ATTAC meetings about the planned book.
In June 2008, Temps Présent, a Swiss TV program, revealed that the Securitas agent had briefed Nestlé security personnel as well as corporate communications staff about the meetings that she attended including ones held in private homes. Securitas also provided this information to the local police.
ATTAC members sued Nestlé after the news report was aired. “We are revolted by this practice, which overturns the principles of freedom of expression and basic democratic rights,” a press release from the group stated. “We condemn the role played by Securitas. This private security company, whose activities traditionally consist of guarding buildings and car parks, accepted a contract to spy on a group of people who in no way represented a threat or a danger, except for the fact that the results of their research activities could not be controlled by the transnational Nestlé.”
In recent years Nestlé has started to respond directly to some complaints of activist groups like Greenpeace, according to the Financial Times. “For a company like ours to prosper over the long term we have to create value for the communities in which we operate,” Janet Voûte, Nestlé’s global head of public affairs, told the newspaper. “And we fundamentally believe we cannot create shared value – not just for shareholders but for society – alone.”
Despite the new public relations strategy to contain activists, the company has been unable to quash the Vaud group. Although ATTAC dropped a criminal case against the two companies in 2009, it continued to press a civil claim in Lausanne courts which it dubbed “Nestlégate.”
“We are very satisfied that the civil court has now condemned NESTLE’s and SECURITAS AG’s spying activities,” ATTAC said in a press release issued after the judge ruled against the companies last week. “Nevertheless we’d like to point out that we are continuing to critically observe the worldwide activities of multinational corporations like NESTLE, especially concerning its hostile trade union policies and the excessive pumping of groundwater in different parts of the world.”
Nestlé reacted to the court ruling “with disappointment” although it added that “incitement to infiltration is against Nestlé’s corporate business principles.”
by Pratap Chatterjee, CorpWatch Blog
January 30th, 2013
Find this story at 30 January 2013
Nestlegate: Successful civil lawsuit against NESTLE and SECURITAS4 februari 2013
Press release issued by ATTAC Switzerland, 26 January 2013
(English translation provided by ATTAC Switzerland – click here for German version)
ATTAC Switzerland has taken notice with great satisfaction of the civil court’s president Jean-Luc Genillard’s decision of 25 January 2013 in the case «Nestlegate». The Court has convicted NESTLE and SECURITAS AG of spying activities directed at ATTAC. It has recognized that these parties conducted illegal infiltrations. The claimants have been entitled to a financial compensation, since their personal rights have been violated. NESTLE and SECURITAS AG have been ordered to pay a financial compensation of 3,000 Swiss francs (3,238 US dollars) per claimant (a total of 27,000 Swiss francs = 29,145 US dollars = 18,570 pounds sterling).
Both a criminal and a civil case were filed after Swiss television revealed on 12 June 2008 that an Attac workgroup in Canton Vaud, which was preparing a book on Nestle’s policies («Attac contre l’empire Nestle», 2004), had been infiltrated and spied on by a Securitas employee on behalf of Nestle. The woman had joined the Attac workgroup in 2003 under the false name of “Sara Meylan”, had attended private meetings (sometimes at the members’ homes), gathered confidential information and prepared detailed reports on the authors as well as on third parties for Nestle. On September 26th, 2008, Attac discovered and denounced to the examining magistrate another Securitas spy, who was still active in Attac in 2008 under her real name.
The criminal proceedings were dropped on July 29th, 2009. The investigating judge mainly relied on the statements made by Nestle and Securitas AG and found that the only infringement that may constitute an offense – a violation of the federal law of data protection – falls under the three-year statute of limitation. We regret the superficial investigation conducted during this criminal investigation, which Alec Feuz has well documented in his book « Affaire classée».
We are very satisfied that the civil court has now condemned NESTLE’s and SECURITAS AG’s spying activities. Nevertheless we’d like to point out that we are continuing to critically observe the worldwide activities of multinational corporations like NESTLE, especially concerning its hostile trade union policies and the excessive pumping of groundwater in different parts of the world.
Through a general increase of espionage and spying activities, basic democratic rights like the freedom of opinion, the freedom of speech and the freedom of assembly are called into question. The activities of NGOs, trade unions and critical political organizations are limited by private corporations, which perceive non-violent campaigns and action from civil society as a threat to their commercial interests. These transnational corporations thus try to reduce basic democratic rights and often profit from the fact that the State turns a blind eye to these infringements.
It is important to be able to fight for a just and egalitarian society, to oppose injustice around the world by means of free and independent research into the dealings of transnational corporations, without being surveyed or spied on.
Find this story at 26 January 2013
Nestlégate; Nestlé in court for surveillance of ATTAC4 februari 2013
On 24 and 25 January 2012, the multinational food-industry corporation Nestlé and the Swiss private security firm Securitas were in court in Lausanne, Switzerland, defending themselves against a civil suit for spying on the “anti-globalization” movement ATTAC. This trial, which has been delayed for a long time, has finally lift the veil of secrecy that has been draped over this spying scandal.
Nestlé and Securitas are accused of illegal surveillance and violations of privacy of ATTAC and its members. The charges were filed after Télévision Suisse Romande revealed on 12 June 2008 that a group of ATTAC members in Canton Vaud, who were working on a book on Nestlé’s policies, had been infiltrated and spied on by a Securitas employee on behalf of Nestlé. The woman joined the ATTAC group in 2003 under the false name “Sara Meylan”, attended working meetings (sometimes in the homes of members), and prepared detailed reports on them for Nestlé. As a member of the group, she had access to internal information, and to all the research by the authors, and to their sources and contacts, both in Switzerland and abroad.
On 26 September 2008, the plaintiffs denounced to the examining magistrate another Securitas spy, who was still active in ATTAC in 2008 under her real name. Nestlé and Securitas had claimed initially that the spying had been ended with the departure of “Sara Meylan” in June 2004. When this second secret agent was discovered, the companies said that this agent had not written any more confidential reports for Securitas and Nestlé since 2005.
The criminal proceedings were dropped on 29 July 2009 after a faulty investigation. The Canton examining magistrate at the time accepted the statements by Nestlé and Securitas and gave as one reason for dismissing the case the three-year statute of limitation of the Data Privacy Act – although the second Nestlé-Securitas agent had still been active in ATTAC in 2008!
Find this story at 24 January 2013
Agentenprozess in Stuttgart; Das geheime Leben von “Pit” und “Tina”4 februari 2013
Mehr als 20 Jahre lang sollen zwei russische Agenten in Deutschland gelebt haben: Sie nannten sich Andreas und Heidrun Anschlag, studierten, arbeiteten, heirateten, bekamen eine Tochter und spitzelten wohl durchweg für Moskau. Wie geht das?
Kann es richtiges Leben geben in einem falschen? Welche Regungen sind echt, welche Entscheidungen aufrichtig, welche Handlungen gehören einem selbst? In dem Moment, als in Saal 18 des Stuttgarter Oberlandesgericht die Geburtsurkunde ihrer Tochter verlesen wird, bricht die Frau, die sich Heidrun Anschlag nennt, in Tränen aus. Sie presst ein Taschentuch vor das Gesicht und schluchzt hinein. Der Mann, den sie vor 22 Jahren im österreichischen Altaussee geheiratet hat und der sich Andreas Anschlag rufen lässt, schaut ausdruckslos ins Leere.
Die Eheleute heißen in Wirklichkeit anders, kolportiert werden die Namen Sascha und Olga, doch bestätigt sind auch die nicht. Festzustehen scheint jedoch, dass die beiden russische Staatsangehörige sind und vor mehr als zwei Jahrzehnten als Spitzel des KGB in die Bundesrepublik entsandt wurden. Später spionierten sie dann wohl für dessen Nachfolgeorganisation SWR, im Herbst 2011 flogen sie auf. Die Bundesanwaltschaft hat die Anschlags daher unter anderem wegen geheimdienstlicher Agententätigkeit angeklagt, ihnen drohen im Falle einer Verurteilung bis zu zehn Jahre Gefängnis.
Mit Handschellen gefesselt wird Andreas Anschlag in den Raum geführt. Die Haare des mutmaßlichen Agenten sind kurz und grau, sein Gesicht ist fahl. Den offenkundig falschen österreichischen Personalpapieren zufolge ist der Mann 1,80 Meter groß, 53 Jahre alt und wurde im argentinischen Valentin Alsina geboren. Anschlag trägt einen schwarzen Pullunder, ein schwarzes Hemd und Jeans.
Auch seine Frau ist eine unauffällige Person, 1,60 Meter groß, blonde Haare, orangefarbener Pullover zu hellblauer Jeans. Ihre Legende besagt, sie sei im peruanischen Lima geboren und inzwischen 47 Jahre alt. Während ihr Mann in Aachen Maschinenbau studierte und später als Diplomingenieur bei verschiedenen Automobilzulieferern arbeitete, war Heidrun Anschlag nach außen vor allem Hausfrau. Sie kümmerte sich um die gemeinsame Tochter.
Im Unterschied zu Spionen, die als Diplomaten in ihre Einsatzgebiete reisen, arbeiten mutmaßliche Agenten wie Heidrun und Andreas Anschlag nicht im Schutz der Botschaften. Diplomaten droht im schlimmsten Fall die Ausweisung – allen anderen eine langjährige Haftstrafe. Aufgrund des hohen Risikos werden sie in russischen Geheimdienstkreisen als “Wunderkinder” verehrt. Einem Staatsschützer zufolge ist mit weiteren Spähern in Deutschland zu rechnen.
Die Bundesanwälte werfen den Eheleuten vor, sie seien “hauptamtliche Mitarbeiter des russischen Auslandsnachrichtendienstes SWR”. Demnach stehe Andreas Anschlag im Rang eines Abteilungsleiters und beziehe monatlich 4300 Euro, seine Gattin sei stellvertretende Abteilungsleiterin und erhalte 4000 Euro – die Ersparnisse der Eheleute sollen sich auf etwa 600.000 Euro belaufen. Das “Ausforschungsinteresse” der Agenten mit den Decknamen “Pit” und “Tina” habe sich auf “politische, militärische und militärpolitische Aufklärungsziele” konzentriert, heißt es in der Anklageschrift. Vor allem sei es den beiden um Informationen aus Nato- und EU-Kreisen gegangen.
Botschaften in “toten Briefkästen”
Zu diesem Zweck führten die Anschlags laut Bundesanwaltschaft von Oktober 2008 bis kurz vor ihrer Festnahme im Herbst 2011 den niederländischen Diplomaten Raymond P. als Quelle. Der Beamte des Den Haager Außenministeriums, Deckname “BR”, soll in dieser Zeit mehrere hundert vertrauliche Dokumente geliefert haben und dafür mit mindestens 72.200 Euro entlohnt worden sein. Die Übergabe der Papiere erfolgte zumeist in den Niederlanden, danach deponierte Andreas Anschlag die Akten in “toten Briefkästen” im Raum Bonn, wo sie anschließend von Mitarbeitern der russischen Botschaft abgeholt wurden.
Laut Anklage handelte es sich dabei unter anderem um
einen Sitzungsbericht des Nordatlantikrates zur Zusammenarbeit der Nato mit Russland im Bereich der Raketenabwehr,
Dokumente zur Strukturreform der Nato,
Papiere zur Nato-Strategie während der Revolution in Libyen,
Berichte über den Isaf-Einsatz in Afghanistan.
Darüber hinaus besuchte Andreas Anschlag der Bundesanwaltschaft zufolge über Jahre Tagungen der Deutschen Atlantischen Gesellschaft, der Clausewitz-Gesellschaft, der Gesellschaft für Wehr- und Sicherheitspolitik sowie der Friedrich-Naumann-Stiftung, über die er Moskau fortlaufend Bericht erstattete. Zudem wies er seine Geheimdienstkollegen auf mögliche Informanten hin, die er bei den Veranstaltungen kennenlernte. Auch seine Arbeitgeber spähte er laut Anklage nach “wissenschaftlich-technischen Informationen” aus.
Für die Kommunikation mit der Zentrale soll vor allem Heidrun Anschlag zuständig gewesen sein, so die Bundesanwälte: Sie war es, die in ihrem angemieteten, 200 Quadratmeter großen Haus im hessischen Marburg geheime Direktiven aus Moskau erhielt. Dazu nutzte sie einen Kurzwellenempfänger, der mit einem Decoder und einem Computer verbunden war. Die Rückmeldungen erfolgten über Textnachrichten, die per Satellit verschickt wurden. Auch mittels YouTube tauschte sich Heidrun Anschlag als “Alpenkuh1” mit ihren russischen Kollegen aus. Dazu nutzten die Geheimdienstler offenbar codierte Kommentare.
…
15. Januar 2013, 15:44 Uhr
Von Jörg Diehl, Stuttgart
Find this story at 15 January 2013
© SPIEGEL ONLINE 2013
Alleged Russian spy couple in ‘Cold War’ trial4 februari 2013
A married couple accused of spying for the Russian secret services for more than 20 years went on trial in Germany on Tuesday, in one of the biggest espionage court cases since the Cold War.
Germany charges two alleged Russian spies – National (28 Sep 12)
Russian spies suspected of stealing car secrets – National (25 Oct 11)
Suspected Russian spy pair arrested – National (22 Oct 11)
The pair, identified only by codenames Andreas and Heidrun Anschlag (which means attack in German), are said to have been planted in West Germany from 1988 by the Soviet Union’s KGB and later used by its SVR successor secret service.
The defendants declined to confirm any details about their real identities or the charges against them as the trial got underway in the higher regional court in the southwestern city of Stuttgart.
Defence lawyer Horst-Dieter Pötschke said they had Russian citizenship.
Prosecutors say one of them arrived in still divided Germany in 1988 — a year before the Berlin Wall fell — and the other in 1990, posing as Austrian citizens who had been born and grew up in South America.
According to the Federal Prosecutor’s Office, light could only be shed on the final three years of their alleged activities as agents.
They had “the mission from SVR headquarters to obtain NATO and EU political and military secrets”, federal public prosecutor Wolfgang Siegmund said, adding: “Particularly also geo-strategic findings on the relationship of NATO and the EU with the countries of Eastern Europe and Central Asia.”
Prosecutors say the couple set up a “middle-class existence” to cover up their activity for the secret services.
Andreas Anschlag studied engineering and worked in the auto industry while Heidrun was a housewife. According to the Frankfurter Allgemeine Sonntagszeitung weekly, even their own daughter had no idea about their double lives.
The couple allegedly passed on documents they obtained from a Dutch official in the foreign ministry between 2008 and 2011.
The court heard that the official, Raymond Valentino Poeteray, obtained several hundred pages of classified, partly secret documents from different Dutch embassies and received more than €72,000 for his efforts.
The accused left the documents in “dead-letter boxes”, for example under certain trees, from where they were picked up by employees of the Russian consulate general in the western city of Bonn, according to the federal prosecutor.
Heidrun Anschlag was responsible for communicating with the SVR via short-wave radio, the court heard.
The pair, who were allegedly jointly paid around €100,000 a year, communicated with their Moscow masters using text messages, satellite phones and hidden messages in comments in YouTube videos under agreed names, it heard.
In mid-2011, Siegmund said the pair had received orders to withdraw from Germany because of the risk of being exposed and were preparing to do so when they were arrested in October of that year.
They face up to 10 years in prison if found guilty.
On the sidelines of the trial, defence lawyer Pötschke said the documents in question were “of average quality” and “so, no so-called grave damage occurred” to Germany.
…
Published: 15 Jan 13 11:25 CET | Print version
Updated: 15 Jan 13 15:58 CET
Find this story at 15 January 2013
© The Local Europe GmbHc
Court tries couple in suburban spy thriller4 februari 2013
A spectacular trial has begun at a Stuttgart court involving a German-based couple accused of spying on NATO and the EU for decades on Russia’s behalf. Neighbors say they knew something was fishy.
It reads like a John le Carre novel: “dead mail boxes,” secret radio signals, encrypted messages hidden in plain sight on the Internet.
According to accusations, a married couple has been spying in Germany for more than 20 years – first at the behest of the Soviet Union and thereafter for its post-Soviet incarnation, the Russian Foreign Intelligence Service.
On Tuesday (15.01.2013) the trial against 54-year-old Andreas Anschlag and his 48-year-old wife, Heidrun, opened up in Stuttgart. Federal prosecutors accused them of “secret agent activity” and of “forgery of documents.”
The former KGB building is today’s Foreign Intelligence headquarters
As to whether those are the real names of the accused, however, there is reason to doubt. In an interview with DW, the couples’ defense lawyer, Horst-Dieter Pötschke, did not deny that “Anschlag” might not be the true surname of the suspected agent pair. He also responded evasively to questions about the accusations themselves. What the Munich lawyer did say, however, is that the potential ten-year sentence is nothing short of excessive.
In cases of espionage, Pötschke is on familiar ground. In the 70s and 80s he defended former agents who had fled the Soviet KGB or the East German state security apparatus, the Stasi. One of his most well-known cases involved Günter Guillaume, a speaker for former German Chancellor Willy Brandt who also turned out to be an East German spy. When Guillaume’s true identity was revealed in 1974, Chancellor Brandt resigned.
A discrete life
The history of the purported agent couple begins at a time when the Soviet Union still existed and the Cold War was still cold. According to accusations, Andreas Anschlag traveled to West Germany in 1988 with the help of a forged Austrian passport. His wife did the same in 1990. Both were supposed to have been born in South America. The two settled in Aachen, close to the western border with Belgium, where Mr. Anschlag studied mechanical engineering.
With the birth of a daughter their German disguise was complete. The couple moved to a popular neighborhood of Meckenheim, a small town of 24,000 inhabitants close to the former West German capital of Bonn. There they lived discreetly. Neighbors describe them as friendly, if a bit distant.
The house in Michelbach in which the accused “Anschlag” couple lived
“They didn’t have much contact with others,” a neighbor said. “I never saw the husband, even though we lived close to each other.”
NATO documents for Moscow
For their informant, the couple managed to recruit a Dutch diplomat, says the German Attorney General. The diplomat, in turn, is supposed to have provided dozens of secret documents from NATO and the EU. Among the topics covered within those documents were issues relating to Russia.
The files were delivered via “dead mail boxes,” according to official charges, to the Russian Foreign Intelligence Service in Moscow. The couple apparently received further commands through an agent radio network and sent their own messages via satellite and through an internet video platform.
When they were arrested in October 2011, the German news magazine Der Spiegel reported that the woman was sitting in front of a shortwave receiver, writing down secret messages. At that point the pair was living in a house in Michelbach, a small community in the German state of Hesse.
“Suddenly we had this spy thriller taking place right outside our window – it was better than the movies,” one of the neighbors told DW.
The husband was arrested on the same day 200 kilometers (120 miles) away in the town of Balingen. For days thereafter, German criminal officers – with the help of special electronic devices – searched the house and the foundation of the supposed “agent couple.”
A post-judgment exchange?
How can it be that the Russian agents could work in Germany for so many years without their cover being blown? A neighbor in Michelbach claims to have recognized the pair’s eastern European accent. The story about the “Austrian” couple’s Latin American origins appeared suspicious, some now say, as did a few of the pair’s habits. “The wife usually went into the backyard to make telephone calls, even in winter,” a woman said.
The entrance to the Upper Regional Court in Stuttgart, where the trial is taking place
…
Date 14.01.2013
Author Mikhail Bushuev / rg, cd
Editor Gabriel Borrud
Find this story at 14 January 2013
© 2012 Deutsche Welle
Germany Tries Couple on Spy Charges4 februari 2013
The two accused spies, their faces not shown due to a court order, appearing in a German courtroom Tuesday.
Germany put a married couple thought to be in their mid-40s on trial this week on suspicion that they spied for Russia for more than two decades under the cover of being an ordinary middle-class family.
The case of Andreas and Heidrun Anschlag, names believed to be aliases, is likely to add pressure to Berlin’s troubled relations with Moscow until June.
The court in the southwestern city of Stuttgart is planning to hold 31 hearings over five months, according to a schedule on the court’s website.
Prosecutors say the pair collected sensitive information from NATO and the European Union for Russia’s Foreign Intelligence Service while posing as Austrian nationals with Latin American heritage.
Their names and passports are thought to be fake, but the judge said at the initial hearing Tuesday that she would continue to address them as Herr and Frau Anschlag “to make communication easier,” local media outlets reported.
The couple, who face up to a decade in prison if convicted, denied guilt but declined to make any further statements. The hearing continued Thursday with the questioning of a federal police investigator, court spokesman Stefan SchЯler said by e-mail.
The case has been linked to the “deep cover” sleeper agents uncovered in the U.S. in 2010. According to a report by German weekly Der Spiegel, the Anschlags’ October 2011 arrest was made possible when the FBI passed on information from Alexander Poteyev, a Foreign Intelligence Service colonel who reportedly acted as a U.S. mole.
Poteyev, who ostensibly betrayed the spy ring even as he ran it, fled Moscow just days before the FBI rolled up the operation on June 27, 2010. In 2011, a Moscow military court sentenced him in absentia to 25 years in prison on charges of treason and desertion.
Analysts have speculated about why the Anschlags’ case went to court while the U.S. spy ring was whisked off to Russia within weeks in a Cold War-style spy swap.
German media reported last year that Berlin had decided to press charges after the Kremlin failed to react to a German offer for a spy swap.
…
18 January 2013 | Issue 5049
By Nikolaus von Twickel
Find this story at 18 January 2013
© Copyright 1992-2013. The Moscow Times
Whistleblower John Kiriakou: For Embracing Torture, John Brennan a “Terrible Choice to Lead the CIA”4 februari 2013
Days after he was sentenced to 30 months in prison, John Kiriakou — the first CIA official to be jailed for any reason relating to the torture program — denounces President Obama’s appointment of John Brennan to head the CIA. “I’ve known John Brennan since 1990,” Kiriakou says. “I worked directly for John Brennan twice. I think that he is a terrible choice to lead the CIA. I think that it’s time for the CIA to move beyond the ugliness of the post-September 11th regime, and we need someone who is going to respect the Constitution and to not be bogged down by a legacy of torture.”
Find this story at 30 January 2013
AMY GOODMAN: We’re going to talk about John Brennan right now, President Obama’s nominee to become the next chief of the CIA. The news agency Reuters is reporting that Brennan had detailed information on the agency’s torture program while serving there under President George W. Bush. Official records apparently show Brennan received regular internal CIA updates about the progress of torture techniques, including waterboarding. It’s unclear if Brennan raised any objections at the time he was made aware. Brennan’s confirmation hearing will be February 7th. In 2006, he gave an interview with Frontline on PBS where he said it was right for the Bush administration to, quote, “take off the gloves” after the 9/11 attacks.
JOHN BRENNAN: The war, or the campaign against terrorism, is going to be a long one, and that the opposition, whether it be al-Qaeda or whether it be Iraq, doesn’t play by the Marquess of Queensbury rules, and therefore, you know, the U.S., in some areas, has to take off the gloves. And I think that’s entirely appropriate. I think we do have to take off the gloves in some areas, but within bounds, and at the right time, in the right way, and for the right reason, and with full understanding of what the consequences of that might be.
AMY GOODMAN: That was John Brennan in 2006. When President Obama was first elected in his first term, he wanted to—John Brennan to be his director of Central Intelligence. There was such an outcry in the human rights community that John Brennan pulled his name out. Now, four years later, President Obama has officially nominated John Brennan once again to head the CIA. Our guest, John Kiriakou, is about to go to jail, was sentenced to 30 months in prison, worked for the CIA, there while John Brennan was there. Can you respond to what John Brennan knew, when he knew it, and the fact that President Obama wants him to be head of the CIA?
JOHN KIRIAKOU: Sure. Obviously I can’t read John Brennan’s mind, but I can tell you that at the time that the torture techniques were being implemented, John Brennan was President Bush’s director of the National Counterterrorist Center. He was also, a little earlier than that, the deputy executive director and then, I believe, executive director of the CIA. That’s the number three ranking position in the CIA. So, he would have had to have been intimately involved in—not necessarily in carrying out the torture techniques, but in the policy, the torture policy—either that or he had to be brain dead, because you can’t be in positions like that, director of the National Counterterrorist Center and executive director of the CIA, without knowing what the CIA’s torture policies are.
Now, I’m surprised, frankly, also, at the fact that there’s no outrage in the human rights community now that Mr. Brennan’s nomination has been made official. There was a great hue and cry in 2009 when he was initially floated for the position of CIA director. And I’m not sure why there’s a difference between four years ago and now. John Brennan certainly hasn’t changed.
NERMEEN SHAIKH: John Kiriakou, I want to read a comment made by the judge at your sentencing hearing. Judge Leonie Brinkema sentenced you to 30 months in prison last Friday, saying, quote, “This case is not a case about a whistleblower. It’s a case about a man who betrayed a very solemn trust, and that is a trust to keep the integrity of his agency intact and specifically to protect the identity of co-workers. … I think 30 months is, frankly, way too light, because the message has to be sent to every covert agent that when you leave the agency you can’t just start all of a sudden revealing the names of the people with whom you worked,” the judge said. John Kiriakou, can you comment on that statement?
JOHN KIRIAKOU: Sure. When Judge Brinkema accepted the plea deal in October, she called 30 months fair and appropriate. I can only think that with a courtroom packed full of journalists last Friday, she decided to seize the moment and make a statement that would be carried in the papers. I don’t know what changed between October and January, other than the fact that she and the prosecution had had several ex parte communications. What that means is the prosecutors were able to meet with the judge, related to my case, without the defense, my attorneys, being present. So we have no idea what it was that the prosecution told the judge. We were not allowed to defend ourselves. Indeed, Judge Brinkema denied 75 motions that we made asking for declassification of information so that I could present a defense. In August of 2012, after our motions had been denied, my attorneys and I walked out of the courtroom, and my attorney said, “We have no defense. She won’t let us say anything. She won’t let us defend you.” And so, we were forced into plea negotiations. But again, I’m not sure why the judge changed her position between October and January; it was inexplicable to me.
AMY GOODMAN: Explain what that’s like in the courtroom, when they invoke national security, that the prosecutor can come forward and speak privately with the judge without your defense attorneys being there.
JOHN KIRIAKOU: Yeah, I had never heard of such a thing before. But in August, when we made our 75 motions, we thought that the judge would block off two days to hear the 75. In fact, there had been a conversation with the prosecution, and so she blocked off an hour to hear the 75 motions. So we knew we were in trouble. And then, at the very start of the hearing, the prosecutor got up and said that he was requesting a Rule 4 conversation. I didn’t know what this was. My attorneys objected and said, “If you don’t want the defendant to hear, at least allow us to hear so that we can represent his interests.” And the judge said, “No, this is a national security case. I’m allowed an ex parte communication with the prosecutors.” So the prosecutors went up to the bench. We could hear them whispering. They came back to their table, and the judge said, “All 75 motions are denied.” And that was the end of it. We got up, and we walked out of court. And my attorneys said, “We have to negotiate a plea.”
NERMEEN SHAIKH: Jesselyn—
JOHN KIRIAKOU: It was extremely disheartening.
NERMEEN SHAIKH: Jesselyn Radack, I wanted to ask about the legal implications of this case and how it fits into the treatment of government whistleblowers under the Obama administration.
JESSELYN RADACK: Absolutely. To get to the point you just raised with John, I think the reason Judge Brinkema changed her opinion between October and last week is because the government submitted a secret statement that John was not allowed to see that played a large role in the sentencing hearing, but neither the public nor the defendant were allowed to see the statement, which is very Kafkaesque.
But in the grander scheme, the prosecution of John Kiriakou and the war on whistleblowers, using the heavy handed Espionage Act, by charging people who dare to tell the truth as being enemies of the state, sends a very chilling message. And Judge Brinkema herself acknowledged that a strong message had to be sent, that secrets must be kept. But apparently, that only applies to people who are trying to reveal government abuses and illegality, because all of the people in the White House and the CIA who revealed classified information and—of undercover identities to the makers of a Hollywood film, Zero Dark Thirty, have done so with impunity and with lavish praise. So—
AMY GOODMAN: Wait, can you say—can you say specifically what you’re talking about, Jesselyn Radack?
JESSELYN RADACK: Yes. Specifically, the White House and the CIA were very involved in the making of Zero Dark Thirty, which pretends to be some kind of neutral film that implies torture led to the capture of Osama bin Laden, which it absolutely did not. In that process, a high-level Defense Department official, Michael Vickers, revealed the identity of an undercover Special Operations Command officer, but was not held to account for that. And the CIA revealed numerous classified pieces of information, including sources and methods. So when—yeah?
AMY GOODMAN: Keep going.
JESSELYN RADACK: So when the United States talks about the sanctity of keeping secrets, and both the judge and multiple statements by United States officials discussed that, they are the biggest leakers of all. And they do so with impunity.
AMY GOODMAN: I wanted to talk about another whistleblower targeted by the Obama administration who has been former National Security Agency analyst. He’s Thomas Drake. He worked for the NSA for nearly seven years before blowing the whistle. Thomas Drake appeared on Democracy Now! last March.
THOMAS DRAKE: The critical thing that I discovered was not just the massive fraud, waste and abuse, but also the fact that NSA had chosen to ignore a 23-year legal regime, which had been established in 1978, called the Foreign Intelligence Surveillance Act, with a Foreign Intelligence Surveillance Court, and which, at NSA, during the time that I was not only at NSA but also in the military flying on RC-135s overseas during the latter part of the Cold War, it was a contract, the one thing you did not do. It was the prime directive of NSA. It was the—the—First Amendment at NSA, which is, you do not spy on Americans—
AMY GOODMAN: And what did you find?
THOMAS DRAKE: —without a warrant. I found, much to my horror, that they had tossed out that legal regime, that it was the excuse of 9/11, which I was told was: Exigent conditions now prevailed, we essentially can do anything. We opened up Pandora’s box. We’re going to turn the United States of America into the equivalent of a foreign nation for the purpose of a—of dragnet, blanket electronic surveillance.
AMY GOODMAN: That’s former National Security Agency analyst Thomas Drake. Jesselyn Radack, he is one of your clients. What happened to him?
JESSELYN RADACK: Yes, I represented both Tom Drake and John Kiriakou. The government dropped all 10 felony counts against Tom Drake, and he pled guilty to a minor misdemeanor, the equivalent of a parking ticket. I find it appalling that the two men who revealed the biggest scandals of the Bush administration—namely warrantless wiretapping and torture—are the only two who have been criminally prosecuted for it, and not the people who secretly surveiled the communications of Americans, and not the people who were involved in the torture program, all of whom have been conferred immunity by either the president or by acts of Congress.
AMY GOODMAN: John Kiriakou, you’re now—we are now—the president is President Obama. Did you see a change between President Obama and his predecessor, President Bush? And also, when you were talking about John Brennan, do you think he should head the CIA? What message do think that sends? And what has changed in the last four years, when he withdrew his name for consideration?
JOHN KIRIAKOU: In 2010, when my book came out, I was giving a speech in Los Angeles, and a woman asked me a question about the difference between President Obama and President Bush. And I’ll never forget the question, because it was just so crazy. She said, “Can you explain the CIA’s position on the jihadization of American foreign policy under President Obama?” And I laughed, and I said, “Ma’am, with all due respect, President Obama’s foreign policy is an extension of President Bush’s foreign policy. If there’s any difference at all, President Obama is killing more people overseas than President Bush ever did.” So, no, I don’t think there’s any difference at all between the Bush foreign policy and the Obama foreign policy, which I think really is a shame for us, because there was a wonderful opportunity to take a different path and to reclaim our position as a moral leader in the world. So I’m disappointed in that.
With regard to John Brennan, I’ve known John Brennan since 1990. I worked directly for John Brennan twice. I think that he is a terrible choice to lead the CIA. I think that it’s time for the CIA to move beyond the ugliness of the post-September 11th regime, and we need someone who is going to respect the Constitution and to not be bogged down by a legacy of torture. I think that President Obama’s appointment of John Brennan sends the wrong message to all Americans.
AMY GOODMAN: You worked with him, directly for him. Did Brennan receive regular internal CIA updates about the progress of torture techniques, including waterboarding, as Reuters is reporting?
JOHN KIRIAKOU: I worked for him when he was a—an analytic manager. It was before he really hit the big time under George Tenet. But again, I think that it’s impossible for him to not have gotten these briefings, for him to not have been intimately involved in the policy, by virtue of his senior positions, some of the senior-most positions in the CIA. It’s just impossible that he didn’t know what was going on.
NERMEEN SHAIKH: John Kiriakou, you’ll shortly be going to prison. Do you know exactly when your prison sentence will begin? And how are you preparing for this? You’re the father of five children.
JOHN KIRIAKOU: I’m the father of five. I don’t know exactly when this will be. It will be sometime in the next four to six weeks. I’ll have to report to a prison somewhere. I don’t know where. It’s, frankly, very hard to prepare. You have to do things like arrange a power of attorney, arrange child care. I mean, there are so many things to do, it’s just overwhelming. My wife, thank God, is very strong and very tough and very supportive. And we are treating this like temporary duty overseas. It was not unusual for me to go overseas for many months at a time, sometimes as long as two years at a time, two-and-a-half years. So we’re treating this like an overseas deployment. I can call my children virtually every day. If I’m close enough, they can come and visit me. And I’m just hoping for the best.
AMY GOODMAN: How old are your kids, John?
JOHN KIRIAKOU: I have two sons from a first marriage who are 19 and 16, and then my wife and I have three children: an eight-year-old boy, a six-year-old girl and one-year-old boy.
AMY GOODMAN: And what do they understand?
JOHN KIRIAKOU: Well, they know that I’ve been involved in a fight with the FBI for the last year. And I told them, “You know I’ve been fighting the FBI. And unfortunately, I lost. And so, because I lost, my punishment is I’m going to have to go away for a couple of years, and I’m going to try to teach bad guys how to get their high school diplomas. And when I’m all done with that, I’ll come home, and we’ll live as a family, and everything’s going to be OK again.”
NERMEEN SHAIKH: John Kiriakou, quickly, before we conclude, what advice would you give to whistleblowers now, given what’s happened in your case?
JOHN KIRIAKOU: I made mistakes in my case. I would say, first, go through the chain of command, which I didn’t do, I should have done. I would say, if you get no satisfaction through your chain of command, go to the congressional oversight committees. But do not remain silent. If you see waste, fraud, abuse or illegality, shout it from the rooftops, whether it’s internally or to Congress.
AMY GOODMAN: John, we’re going to have to leave it there. Thank you so much for being with us. John Kiriakou spent 14 years at the CIA as an analyst and case officer. He’s going to jail for two-and-a-half years.
Ex-CIA Agent, Whistleblower John Kiriakou Sentenced to Prison While Torturers He Exposed Walk Free4 februari 2013
Former CIA agent John Kiriakou speaks out just days after he was sentenced to 30 months in prison, becoming the first CIA official to face jail time for any reason relating to the U.S. torture program. Under a plea deal, Kiriakou admitted to a single count of violating the Intelligence Identities Protection Act by revealing the identity of a covert officer to a freelance reporter, who did not publish it. Supporters say Kiriakou is being unfairly targeted for having been the first CIA official to publicly confirm and detail the Bush administration’s use of waterboarding. Kiriakou joins us to discuss his story from Washington, D.C., along with his attorney, Jesselyn Radack, director of National Security & Human Rights at the Government Accountability Project. “This … was not a case about leaking; this was a case about torture. And I believe I’m going to prison because I blew the whistle on torture,” Kiriakou says. “My oath was to the Constitution. … And to me, torture is unconstitutional.” [inlcudes rush transcriptNERMEEN SHAIKH: A retired CIA agent who blew the whistle on the agency’s Bush-era torture program has been sentenced to two-and-a-half years in prison. John Kiriakou becomes the first CIA official to be jailed for any reason relating to the torture program. Under a plea deal, Kiriakou admitted to a single count of violating the Intelligence Identities Protection Act by revealing the identity of a covert officer to a freelance reporter, who did not publish it. Under the plea deal, prosecutors dropped charges brought under the Espionage Act.
Find this story at 30 January 2013
In 2007, Kiriakou became the first CIA official to publicly confirm and detail the Bush administration’s use of waterboarding when he spoke to ABC’s Brian Ross.
JOHN KIRIAKOU: At the time, I felt that waterboarding was something that we needed to do. And as time has passed and as September 11th has—you know, has moved farther and farther back into history, I think I’ve changed my mind, and I think that waterboarding is probably something that we shouldn’t be in the business of doing.
BRIAN ROSS: Why do you say that now?
JOHN KIRIAKOU: Because we’re Americans, and we’re better than that.
NERMEEN SHAIKH: John Kiriakou’s supporters say he has been unfairly targeted in the Obama administration’s crackdown on government whistleblowers. In a statement urging President Obama to commute Kiriakou’s sentence, a group of signatories including attorneys and former CIA officers said, quote, “[Kiriakou] is an anti-torture whistleblower who spoke out against torture because he believed it violated his oath to the Constitution. … Please, Mr. President, do not allow your legacy to be one where only the whistleblower goes to prison.”
Prosecutor Neil MacBride, the U.S. attorney for the Eastern District of Virginia, defended the government’s handling of the case.
NEIL MacBRIDE: As the judge just said in court, today’s sentence should be a reminder to every individual who works for the government, who comes into the possession of closely held sensitive information regarding the national defense or the identity of a covert agent, that it is critical that that information remain secure and not spill out into the public domain or be shared with others who don’t have authorized access to it.
AMY GOODMAN: John Kiriakou joins us now from Washington, D.C. He spent 14 years at the CIA as an analyst and a case officer. In 2002, he led the team that found Abu Zubaydah, a high-ranking member of al-Qaeda. He’s father of five. In 2010, he published a memoir entitled The Reluctant Spy: My Secret Life in the CIA’s War on Terror.
And we’re joined by one of John Kirakou’s attorneys, Jesselyn Radack. She’s the director of National Security & Human Rights at the Government Accountability Project, a former ethics adviser to the United States Department of Justice.
We reached out to the U.S. attorney’s office for the Eastern District of Virginia, but they declined our request for an interview.
John Kiriakou, why are you going to jail? Explain the plea deal you made with the government.
JOHN KIRIAKOU: Well, thanks, first of all, for having me and giving me the opportunity to explain.
I’m going to prison, ostensibly, for violating the Intelligence Identities Protection Act of 1982. I believe, and my supporters believe, that this, however, was not a case about leaking; this was a case about torture. And I believe I’m going to prison because I blew the whistle on torture. I’ve been a thorn in the CIA’s side since that interview in 2007, in which I said that waterboarding was torture and that it was official U.S. government policy. And I think, finally, the Justice Department caught up with me.
NERMEEN SHAIKH: Jesselyn Radack, let me just bring you into the conversation to explain what the Intelligence Identities Protection Act is. Your client, John Kiriakou—it’s been invoked in his case for the first time in 27 years?
JESSELYN RADACK: That’s correct. In fact, there have only been two convictions under the Intelligence Identities Protection Act, which was enacted to prevent cases like Philip Agee, not things like John Kiriakou. It was to prevent the revealing of covert identities for profit or to aid the enemy. In this case, John confirmed the name of a torturer to a journalist, which makes Neil MacBride’s statement all the more hypocritical, because the biggest leaker of classified information, including sources and methods and undercover identities, has been the U.S. government.
AMY GOODMAN: John Kiriakou, explain what it is that you were trying to expose. Explain what you were involved with. Talk about Abu Zubaydah, your involvement in the finding of him, and then the course you took, where your conscience took you.
JOHN KIRIAKOU: Sure. In 2002, I was the chief of counterterrorism operations for the CIA in Pakistan, and my job was to try to locate al-Qaeda fighters or al-Qaeda leaders and capture them, to turn them over to the Justice Department and have them face trial. That was the original—the original idea, not to have them sit in Cuba for the next decade.
But we caught Abu Zubaydah. He was shot three times by Pakistani police as he was trying to escape from his safe house. And I was the first person to have custody of him, to sit with him. We spoke to each other extensively, I mean, talked about everything from September 11th to poetry that he had been writing, to his family. And then he was moved on to a secret prison after that. Once I got back to headquarters, I heard that he had been subject to harsh techniques, then euphemistically called “enhanced interrogation techniques,” and I was asked by one of the leaders in the CIA’s Counterterrorist Center if I wanted to be trained in the use of these techniques. I told him that I had a moral problem with them, and I did not want to be involved.
So, fast-forward to 2007. By then, Human Rights Watch and Amnesty International had reported that al-Qaeda prisoners had been tortured, and ABC News called and said that they had information that I had tortured Abu Zubaydah. I said that was absolutely untrue. I was the only person who was kind to Abu Zubaydah, and I had never tortured anybody. So, they asked me to go on their show and defend myself. I did that. And in the course of the interview, I said that not only was the CIA torturing prisoners, but that it was official U.S. government policy. This was not the result of some rogue CIA officer just beating up a prisoner every once in a while; this was official policy that went all the way up to the president of the United States.
NERMEEN SHAIKH: And so, what happened after that, in 2007, once you gave this interview? Can you explain what happened to you and to your family?
JOHN KIRIAKOU: Sure. Within 24 hours, the CIA filed what’s called a crimes report against me with the Justice Department, saying that I had revealed classified information, which was the torture program, and asking for an investigation with an eye toward prosecuting me. The Justice Department decided at the time that I had not revealed classified information, that the information was already in the public domain. But immediately, within weeks, I was audited by the IRS. I’ve been audited by the IRS every single year since giving that interview in 2007.
But a more important bit of fallout from that interview was that every time I would write an op-ed, every time I would give a television interview or give a speech at a university, the CIA would file a crimes report against me, accusing me of leaking additional classified information. Each time, the Justice Department determined that I did not leak any classified information. In fact, I would get those op-eds and those speeches cleared by the CIA’s Publications Review Board in advance.
Then the CIA started harassing my wife, who at the time was a senior CIA officer, particularly over an op-ed I had written. They accused her of leaking classified information to me for the purpose of writing the op-ed. Well, I said I had gotten the information in the op-ed from two UPI reports and from a South American Ministry of Foreign Affairs website. And they would back off.
But this sort of became our life. We would be under FBI surveillance. She would be called into the CIA’s Office of Security. I would have trouble getting a security clearance when I went to Capitol Hill. It just became this pattern of harassment.
AMY GOODMAN: So, John, why didn’t you stop?
JOHN KIRIAKOU: Because I think that—that torture is something that needs to be discussed. I said this in 2007. This is something that we should—about which we should be having a national debate. And frankly, I have a First Amendment right to free speech. And, you know, writing an op-ed is not against the law. Giving a speech about the Arab Spring or about torture is not against the law. And I felt that—that I didn’t want to be cowed. I didn’t want to be frightened into silence by the CIA.
NERMEEN SHAIKH: And, John Kiriakou, you said that in these instances that you’ve named, you were actually charged with espionage, is that right? Can you talk about the significance—
JOHN KIRIAKOU: Yes.
NERMEEN SHAIKH: —of the Espionage Act?
JOHN KIRIAKOU: Yes, the government initially charged me with three counts of espionage. I’m—it sounds silly maybe, but I’m still personally offended by these espionage charges, which were dropped, of course. The espionage charge is used as a hammer by the administration to force people into silence. My espionage charge is related to a conversation that I had with a New York Times reporter. A New York Times reporter approached me and said that he was writing a story about a colleague of mine, and would I grant him an interview. I gave him the interview. I said this colleague was a great guy, the unsung hero of the Abu Zubaydah operation, terrific officer. And the reporter said, “Do you know how I can get in touch with him?” And I said, “No, I’ve been out of touch with him for a while, but I think I might have his business card.” So I gave the reporter the business card. Now, mind you, this is a CIA officer who had never, ever been undercover. His business card showed that he was involved as a CIA contractor, and it had his personal email on it and his cellphone number. I gave the reporter the business card and was charged with two counts of espionage. I later gave the same business card to another journalist who was doing an article and was charged with a third count of espionage.
AMY GOODMAN: What is it that you allege the CIA was doing for all of these years? Explain the torture program that you were trying to expose.
JOHN KIRIAKOU: Sure. There were—there were something like 10 different techniques that were used in the CIA’s torture program. They went from the benign, you know, where an officer would grab a prisoner by the lapels and give him a shake, all the way up to the really rough things that we’ve heard about, like waterboarding or, what I think is worse, sleep deprivation or the cold cell, where they’ll put a prisoner naked in a cell chilled to 50 or 55 degrees, and then every hour or two throw ice water on him. I actually think those last two are worse than waterboarding.
But, again, these are techniques that we have condemned other countries for throughout history. The Japanese did this during the Second World War. The Belgians did it in Africa earlier in the century. The Chinese and the Vietnamese did it. This is—these are techniques that we have always said were crimes against humanity. And then it was the—it was though after September 11th everything changed, and we somehow had license to do the same things we had been condemning. I thought that was wrong. You know, Director Petraeus—former Director Petraeus made a statement in October when I agreed to take a plea to make these other charges go away, and he said that my conviction shows that we have to take our oaths seriously. Well, I took my oath seriously. My oath was to the Constitution. On my first day in the CIA, I put my right hand up, and I swore to uphold the Constitution. And to me, torture is unconstitutional, and it’s something that we should not be in the business of doing.
NERMEEN SHAIKH: John Kiriakou, I want to play for you comments President Obama made four years ago, shortly before he took office, about whether CIA officials involved in torture should be prosecuted. He appeared on the ABC News’ This Week.
PRESIDENT-ELECT BARACK OBAMA: I don’t believe that anybody is above the law. On the other hand, I also have a belief that we need to look forward as opposed to looking backwards. And part of my job is to make sure that—for example, at the CIA, you’ve got extraordinarily talented people who are working very hard to keep Americans safe. I don’t want them to suddenly feel like they’ve got to spend all their time looking over their shoulders and lawyering.
GEORGE STEPHANOPOULOS: So no 9/11 Commission with independent subpoena power?
PRESIDENT-ELECT BARACK OBAMA: You know, we have not made final decisions, but my instinct is for us to focus on how do we make sure that, moving forward, we are doing the right thing.
NERMEEN SHAIKH: That was President Obama speaking four years ago to ABC. John Kiriakou, your response to what the presient said?
JOHN KIRIAKOU: I supported the president’s response. I remember that interview, and I thought, “OK, he’s right. There are wonderful, talented, hard-working men and women at the CIA who need to be protected.” But at the same time, it’s one thing to look forward; it’s another thing to look forward just for the torturers. It’s just not fair. It’s not fair to the American people. If we’re going to—if we’re going to make prosecutions or initiate prosecutions, those prosecutions can’t just be against the people who blew the whistle on the torture or who opposed the torture. You know, we haven’t—we haven’t even investigated the torturers, as Jesselyn said. We haven’t initiated any actions against the people who conceived of the torture and implemented the policy, or against the man who destroyed evidence of the torture, or against the attorneys who used specious legal arguments to justify the torture. If we’re going to move forward, let’s move forward, but you can’t target one person or two people who blew the whistle.
NERMEEN SHAIKH: John Kiriakou, you’ve also spoken about witnessing new Foreign Service officers being confirmed, Foreign Service officers who were previously with the CIA and participated in acts of torture. Could you explain what happened and explain its significance?
JOHN KIRIAKOU: Yes. When I was a senior investigator on the Senate Foreign Relations Committee, I was approached by a journalist who said that he had evidence that the CIA was misusing its cover agreement with the State Department to place people involved in the torture program under State Department cover so that their names could not be exposed in the press. And if those names were exposed in the press, the people giving the names would be subject to the Intelligence Identities Protection Act. So, again, this was a violation of the CIA-State Department cover agreement. I sent a letter under Senator John Kerry—then-Senator John Kerry’s signature, asking the CIA for clarification. I got a response about six weeks later that was classified top-secret, so I was not permitted to see the response. I did not have a top-secret clearance at the time. And a colleague of mine told me that the letter essentially said, in very strongly worded language, to mind my own business.
AMY GOODMAN: We’re going to go to break. When we come back, we want to ask you about President Obama’s nominee to become the next head of the CIA, John Brennan, because as you talk about the administration, we’re talking actually about administrations, from the Bush administration to the Obama administration. Our guest is about to go to jail. His name is John Kiriakou. He’s about to serve two-and-a-half years in jail. This will be one of his last interviews before he goes to prison. We’re joined also by Jesselyn Radack, who is one of his attorneys. Stay with us.]
CIA whistleblower John Kiriakou given more than two years in prison4 februari 2013
Judge says former intelligence officer who exposed aspects of use of torture should have been jailed for longer
Former CIA officer John Kiriakou leaves a federal court in Alexandria, Virginia. Photograph: Jacquelyn Martin/AP
The former CIA officer John Kiriakou was sentenced Friday to more than two years in prison, by a federal judge who rejected arguments that he was acting as a whistleblower when he leaked a covert officer’s name to a reporter. A plea deal required the judge to impose a sentence of two and a half years. US district judge Leonie Brinkema said she would have given Kiriakou much more time if she could.
Kiriakou’s supporters describe him as a whistleblower who exposed aspects of the CIA’s use of torture against detained terrorists. Prosecutors said Kiriakou was merely seeking to increase his fame and public stature by trading on his insider knowledge. The 48-year-old Arlington resident pleaded guilty last year to violating the Intelligence Identities Protection Act. No one had been convicted under the law in 27 years.
Kiriakou was an intelligence officer with the CIA from 1990 until 2004. He served overseas and at headquarters in Langley. In 2002, Kiriakou played a key role in the agency’s capture of the al-Qaida terrorist Abu Zubaydah in Pakistan. Abu Zubaydah, who was waterboarded by government interrogators, revealed information that led to the arrest of “dirty bomb” plotter Jose Padilla and exposed Khalid Sheikh Mohamed as the mastermind of the 11 September 2001 terror attacks.
Accounts conflict, however, over whether the waterboarding was helpful in gleaning intelligence from Zubaydah, who was also interrogated conventionally.
Kiriakou, who did not participate in the waterboarding, expressed ambivalence in news media interviews about waterboarding, but ultimately declared it was torture. His 2007 interviews about the interrogations of Abu Zubaydah were among the first by a CIA insider confirming reports that several detainees, including Abu Zubaydah, had been waterboarded.
…
Associated Press in Alexandria, Virginia
guardian.co.uk, Friday 25 January 2013 16.00 GMT
Find this story at 25 January 2013
© 2013 Guardian News and Media Limited or its affiliated companies. All rights reserved.
John Kiriakou and the Real Story Behind Obama’s Latest Leak Crackdown4 februari 2013
How a discovery in a Gitmo detainee’s cell led to charges against ex-CIA officer John Kiriakou.
On Monday, the Justice Department charged former CIA officer and author John Kiriakou [1] with repeatedly “disclosing classified information to journalists, including the name of a covert CIA officer and information revealing the role of another CIA employee in classified activities.” (Read the criminal complaint.)
Kiriakou began making the media rounds in late 2007, when he went on the record [2] about waterboarding techniques used in the War on Terror, particularly in connection to the torture of Abu Zubaydah in a secret prison in Thailand. (It was later revealed [3] that Kiriakou was not actually present for that interrogation, as he had previously implied.)
If you’ve been reading Mother Jones, a lot of the content in the criminal complaint against Kiriakou [4] will seem familiar. The main charges stem from a bizarre episode we reported on a [5] couple years ago: In 2008 or early 2009, attorneys for alleged 9/11 conspirators held at Guantanamo Bay obtained—and showed to their clients—photo lineups that included pictures of CIA officers and contractors. The source of the photos was John Sifton [5], a private investigator working for the American Civil Liberties Union’s John Adams Project, an outfit set up to provide civilian defense lawyers to the Gitmo defendants. In some cases, Sifton clandestinely photographed CIA officers who were thought to have been involved in the brutal interrogations of the 9/11 defendants.
The purpose of presenting the photo lineups to the detainees was to identify the alleged torturers in order to make the case that the detainees’ statements were coerced. As multiple sources told Mother Jones in 2010, the defense lawyers didn’t know which of the individuals in the photo lineups were believed to be CIA officers. The detainees, meanwhile, would have no way of knowing which of the people were CIA employees unless they recognized them from interrogations. The lineups were “double blind,” a fact confirmed in the criminal complaint.
But there was still the issue of how Sifton identified the people he thought were involved in the interrogations. That’s where Kiriakou comes in: He’s accused of providing the identities of several CIA officers to journalists, one of whom passed information on to a “defense investigator” whose activities match Sifton’s. (The complaint specifically mentions investigators “interviewing” the “defense investigator” and uses the phrase “learned from the defense investigator.”) Here’s the key paragraph of the criminal complaint:
No law or military commission order expressly prohibited defense counsel from providing their clients with the photographic spreads in question under these circumstances. However, the fact that a defense investigator had learned the classified information, including the information necessary to take and/or assemble these photographs, suggested that the information may have been either deliberately or inadvertently disclosed, without authorization, in a manner that ultimately resulted in the defense team’s possession of the classified information.
The CIA didn’t take long to find out about Sifton’s work. In the spring of 2009, some of the photos were discovered in the cell of Mustafa Ahmad al Hawsawi, an accused Al Qaeda financier and one of 9/11 mastermind Khalid Sheikh Mohammed’s four co-defendants. The criminal complaint against Kiriakou also indicates that a defense filing in early 2009 contained classified information that the government hadn’t provided to the defense.
When the CIA found out about the photos, top intelligence officials were furious, believing the defense lawyers had potentially placed the lives of covert officers at risk. The CIA’s then-general counsel John Rizzo demanded an investigation [6]. He later described the incident [6] as “far more serious than Valerie Plame,” referring to the Bush-era leak of an operative’s covert status. Rizzo wasn’t alone in his concerns. “This is an agency that has reasons to be concerned as to whether or not somebody’s got their back,” another high-ranking former intelligence official told Mother Jones [7]. “It’s always operating out there on the edge, not unlawfully, but generally at the farthest reaches of executive prerogative.”
In response to the CIA’s complaints, the Justice Department launched a probe, but the agency and congressional Republicans were unhappy with the results of the first investigation, which looked likely to clear the Gitmo defense lawyers of wrongdoing. Then the Obama administration called in famed US Attorney Patrick Fitzgerald, who handled the Plame investigation and prosecuted former Illinois governor Rod Blagojevich, to take over the probe.
Sifton and his lawyer did not respond to requests for comment.
The charges are just the latest crackdown by the Obama administration on alleged leakers. This is the sixth time during the Obama administration that prosecutors have filed charges pertaining to the unauthorized disclosure of classified national security information to media outlets. (In the previous four decades, the US government has pursued such cases on only three occasions [8].) Under the Espionage Act, the Obama administration has gone after media sources including Stephen Kim [9], an arms expert accused of passing along classified information to a Fox News reporter; NSA whistleblower Thomas Drake (who was profiled in an exhaustive New Yorker story by Jane Mayer [10]), and alleged Wikileaks source Bradley Manning [11], among others.
…
By Nick Baumann and Asawin Suebsaeng | Mon Jan. 23, 2012 2:23 PM PST
Find this story at 23 January 2013
Copyright ©2013 Mother Jones and the Foundation for National Progress. All Rights Reserved.
Ex-Officer Is First From C.I.A. to Face Prison for a Leak4 februari 2013
WASHINGTON — Looking back, John C. Kiriakou admits he should have known better. But when the F.B.I. called him a year ago and invited him to stop by and “help us with a case,” he did not hesitate.
In his years as a C.I.A. operative, after all, Mr. Kiriakou had worked closely with F.B.I. agents overseas. Just months earlier, he had reported to the bureau a recruiting attempt by someone he believed to be an Asian spy.
“Anything for the F.B.I.,” Mr. Kiriakou replied.
Only an hour into what began as a relaxed chat with the two agents — the younger one who traded Pittsburgh Steelers talk with him and the senior investigator with the droopy eye — did he begin to realize just who was the target of their investigation.
Finally, the older agent leaned in close and said, by Mr. Kiriakou’s recollection, “In the interest of full disclosure, I should tell you that right now we’re executing a search warrant at your house and seizing your electronic devices.”
On Jan. 25, Mr. Kiriakou is scheduled to be sentenced to 30 months in prison as part of a plea deal in which he admitted violating the Intelligence Identities Protection Act by e-mailing the name of a covert C.I.A. officer to a freelance reporter, who did not publish it. The law was passed in 1982, aimed at radical publications that deliberately sought to out undercover agents, exposing their secret work and endangering their lives.
In more than six decades of fraught interaction between the agency and the news media, John Kiriakou is the first current or former C.I.A. officer to be convicted of disclosing classified information to a reporter.
Mr. Kiriakou, 48, earned numerous commendations in nearly 15 years at the C.I.A., some of which were spent undercover overseas chasing Al Qaeda and other terrorist groups. He led the team in 2002 that found Abu Zubaydah, a terrorist logistics specialist for Al Qaeda, and other militants whose capture in Pakistan was hailed as a notable victory after the Sept. 11 attacks.
He got mixed reviews at the agency, which he left in 2004 for a consulting job. Some praised his skills, first as an analyst and then as an overseas operative; others considered him a loose cannon.
Mr. Kiriakou first stumbled into the public limelight by speaking out about waterboarding on television in 2007, quickly becoming a source for national security journalists, including this reporter, who turned up in Mr. Kiriakou’s indictment last year as Journalist B. When he gave the covert officer’s name to the freelancer, he said, he was simply trying to help a writer find a potential source and had no intention or expectation that the name would ever become public. In fact, it did not surface publicly until long after Mr. Kiriakou was charged.
He is remorseful, up to a point. “I should never have provided the name,” he said on Friday in the latest of a series of interviews. “I regret doing it, and I never will do it again.”
At the same time, he argues, with the backing of some former agency colleagues, that the case — one of an unprecedented string of six prosecutions under President Obama for leaking information to the news media — was unfair and ill-advised as public policy.
His supporters are an unlikely collection of old friends, former spies, left-leaning critics of the government and conservative Christian opponents of torture. Oliver Stone sent a message of encouragement, as did several professors at Liberty University, where Mr. Kiriakou has taught. They view the case as an outrage against a man who risked his life to defend the country.
Whatever his loquaciousness with journalists, they say, he neither intended to damage national security nor did so. Some see a particular injustice in the impending imprisonment of Mr. Kiriakou, who in his first 2007 appearance on ABC News defended the agency’s resort to desperate measures but also said that he had come to believe that waterboarding was torture and should no longer be used in American interrogations.
Bruce Riedel, a retired veteran C.I.A. officer who led an Afghan war review for Mr. Obama and turned down an offer to be considered for C.I.A. director in 2009, said Mr. Kiriakou, who worked for him in the 1990s, was “an exceptionally good intelligence officer” who did not deserve to go to prison.
“To me, the irony of this whole thing is, very simply, that he’s going to be the only C.I.A. officer to go to jail over torture,” even though he publicly denounced torture, Mr. Riedel said. “It’s deeply ironic under the Democratic president who ended torture.”
John A. Rizzo, a senior C.I.A. lawyer for three decades, said that he did not believe Mr. Kiriakou set out to harm national security or endanger anyone, but that his violation was serious.
“I think he wanted to be a big shot,” Mr. Rizzo said. “I don’t think he was evil. But it’s not a trivial thing to reveal a name.”
The leak prosecutions have been lauded on Capitol Hill as a long-overdue response to a rash of dangerous disclosures and have been defended by both Mr. Obama and his attorney general, Eric H. Holder Jr. But their aides say neither man ordered the crackdown, and the cases appear to have resulted less from a conscious policy change than from the proliferation of e-mail, which makes it possible to trace the origin of some disclosures without pressuring journalists to identify confidential sources.
When Mr. Kiriakou pleaded guilty on Oct. 23 in federal court in Alexandria, Va., David H. Petraeus, then the C.I.A. director, issued a statement praising the prosecution as “an important victory for our agency, for our intelligence community, and for our country.”
“Oaths do matter,” he went on, “and there are indeed consequences for those who believe they are above the laws that protect our fellow officers and enable American intelligence agencies to operate with the requisite degree of secrecy.”
Less than three weeks later, e-mails tripped up Mr. Petraeus himself. He resigned after F.B.I. agents carrying out an unrelated investigation discovered, upon examining his private e-mail account, that he had had an extramarital affair.
Neil H. MacBride, the United States attorney for the Eastern District of Virginia, hailed Mr. Kiriakou’s conviction in a statement: “The government has a vital interest in protecting the identities of those involved in covert operations. Leaks of highly sensitive, closely held and classified information compromise national security and can put individual lives in danger.”
The leak case is a devastating turn for Mr. Kiriakou, a father of five who considers himself a patriot, a proud Greek-American from Pennsylvania steel country whose grandfather, he recalls, “always talked as if F.D.R. personally admitted him to this country.” Discovering a passion for international affairs, he scrounged scholarships to go to George Washington University, where he was recruited by a professor, a former C.I.A. psychiatrist who spotted talent for the agency.
After he was charged last January, his wife, though accused of no wrongdoing, resigned under pressure from her C.I.A. job as a top Iran specialist. The family had to go on food stamps for several months before she got a new job outside the government. To make ends meet, they rented out their spacious house in Arlington, Va., and moved to a rented bungalow a third the size with their three young children (he has two older children from his first marriage).
Their financial woes were complicated by Mr. Kiriakou’s legal fees. He said he had paid his defense lawyers more than $100,000 and still owed them $500,000; the specter of additional, bankrupting legal fees, along with the risk of a far longer prison term that could separate him from his wife and children for a decade or more, prompted him to take the plea offer, he said.
Despite his distress about the charges and the havoc they have wrought for his family, he sometimes still speaks with reverence of the C.I.A. and its mission.
But the same qualities that worked well for him in his time as a risk-taking intelligence officer, trained to form a bond with potential recruits, may have been his undoing in his post-C.I.A. role as an intelligence expert sought out by reporters.
“Your job as a case officer is to recruit spies to steal secrets — plain and simple,” Mr. Kiriakou said. “You have to convince people you are their best friend. That wasn’t hard for me. I’d say half the people I recruited I could be lifelong friends with, even though some were communists, criminals and terrorists. I love people. I love getting to know them. I love hearing their stories and telling them stories.
“That’s all great if you’re a case officer,” he said. “It’s not so great, it turns out, if you’re a former case officer.”
Mixed Feelings
After Mr. Kiriakou first appeared on ABC, talking with Brian Ross in some detail about waterboarding, many Washington reporters sought him out. I was among them. He was the first C.I.A. officer to speak about the procedure, considered a notorious torture method since the Inquisition but declared legal by the Justice Department in secret opinions that were later withdrawn.
While he had spent hours with Abu Zubaydah after the capture, he had not been present when Abu Zubaydah was waterboarded, a fact he made clear to me and some other interviewers. But based on what he had heard and read at the agency, he told ABC and other news organizations that Abu Zubaydah had stopped resisting after just 30 or 35 seconds of the suffocating procedure and told interrogators all he knew.
That was grossly inaccurate — the prisoner was waterboarded some 83 times, it turned out. Mr. Kiriakou believes that he and other C.I.A. officers were deliberately misled by other agency officers who knew the truth.
Mr. Kiriakou, who has given The New York Times permission to describe previously confidential conversations, came across as friendly, courteous, disarmingly candid — and deeply ambivalent about what the C.I.A. called “enhanced interrogation techniques.”
He spoke about his career: starting as an analyst on the Middle East at headquarters in Virginia; later being stationed in Bahrain; making the unusual switch to the “operations” side of the C.I.A.; and serving stints as a counterterrorism officer under cover, first in Greece and later in Pakistan (he speaks fluent Greek and Arabic).
When terrorists blew up the Khobar Towers in Saudi Arabia in 1996, killing 19 American servicemen, the blast blew out his apartment windows in Bahrain 16 miles away across the water. Twice overseas, he had close calls with terrorists who were trying to kill Western officials.
He said he had been offered the chance to be trained in the harsh interrogation methods but turned it down. Even though he had concluded that waterboarding was indeed torture, he felt that the C.I.A.’s critics, inflamed by the new revelation that videotapes of the interrogations had been destroyed, were being unduly harsh in judging actions taken in the hectic months after Sept. 11 when more attacks seemed imminent.
“I think the second-guessing of 2002 decisions is unfair,” he said in our first conversation. “2002 was a different world than 2007. What I think is fair is having a national debate over whether we should be waterboarding.”
His feelings about waterboarding were so mixed that some 2007 news reports cast him as a critic of C.I.A. torture, while others portrayed him as a defender of the agency. Some human rights activists even suspected — wrongly, as it turned out — that the intelligence agency was orchestrating his public comments.
Mr. Kiriakou seemed shellshocked, and perhaps a little intoxicated, by the flood of publicity his remarks on ABC had received and the dozens of interview requests coming his way. We met for lunch a couple of times in Washington and spoke by phone occasionally. He recounted his experiences in Pakistan — the C.I.A. later allowed him to include much of that material in his 2009 memoir, “The Reluctant Spy” — and readily answered questions about agency lore or senior officials with whom he had worked.
But he occasionally demurred when the subject was too sensitive. I could use information he gave me “on background” — that is, without mentioning him. But we would have to agree explicitly on anything I attributed to him by name, standard ground rules for such relationships.
In 2008, when I began working on an article about the interrogation of Khalid Shaikh Mohammed, I asked him about an interrogator whose name I had heard: Deuce Martinez. He said that they had worked together to catch Abu Zubaydah, and that he would be a great source on Mr. Mohammed, the architect of the Sept. 11 attacks.
He was able to dig up the business card Mr. Martinez had given him with contact information at Mitchell Jessen and Associates, the C.I.A. contractor that helped devise the interrogation program and Mr. Martinez’s new employer.
Mr. Martinez, an analyst by training, was retired and had never served under cover; that is, he had never posed as a diplomat or a businessman while overseas. He had placed his home address, his personal e-mail address, his job as an intelligence officer and other personal details on a public Web site for the use of students at his alma mater. Abu Zubaydah had been captured six years earlier, Mr. Mohammed five years earlier; their stories were far from secret.
Mr. Martinez never agreed to talk to me. But a few e-mail exchanges with Mr. Kiriakou as I hunted for his former colleague would eventually turn up in Mr. Kiriakou’s indictment; he was charged with revealing to me that Mr. Martinez had participated in the operation to catch Abu Zubaydah, a fact that the government said was classified.
Tensions Over Secrecy
Nothing about my exchanges with Mr. Kiriakou was unusual for a reporter covering intelligence agencies, though he was certainly on the candid end of the spectrum of former C.I.A. officers. Current officials are almost always less willing to speak than retirees. And former rank-and-file officers are usually more reluctant to speak than their bosses, who are more confident in walking up to — or occasionally crossing over — the borders protecting classified information.
Why do officials talk about ostensibly secret programs? Sometimes the motive is self-aggrandizement, or to promote a personal or political agenda. But many officials talk because they feel Americans have a right to know, within limits, what the government is doing with their money and in their name.
There is wide agreement in the government that too much information is classified, and even senior officials are sometimes uncertain about what is secret.
In Senate testimony last July, for example, Michael V. Hayden, the C.I.A. director from 2006 to 2009, admitted that he was perplexed by the “dilemma” over what he was or was not permitted to say, in this case about the targeted killing of Qaeda operatives using drones — officially classified but reported in the news media every day and occasionally discussed by Mr. Obama.
“So much of that is in the public domain that right now this witness, with my experience, I am unclear what of my personal knowledge of this activity I can or cannot discuss publicly,” Mr. Hayden said. “That’s how muddled this has become.”
The trade-offs and tensions over government secrets in a democracy are nothing new. In 1971, when the Nixon administration went to court to try to stop The New York Times from publishing the Pentagon Papers, a classified history of the Vietnam War, Max Frankel, then the Washington bureau chief for The Times, filed an affidavit on how officials and reporters exchange secrets.
“Without the use of ‘secrets’ that I shall attempt to explain in this affidavit, there could be no adequate diplomatic, military and political reporting of the kind our people take for granted, either abroad or in Washington, and there could be no mature system of communication between the government and the people,” Mr. Frankel wrote 42 years ago.
Before Mr. Obama took office, prosecutions for disclosing classified information to the news media had been rare. That was a comforting fact for national security reporters and their sources, but a lamentable one for intelligence officials who complained that leaks damaged intelligence operations, endangered American operatives and their informants and strained relations with allied spy services.
By most counts, there were only three cases until recently: against Daniel Ellsberg and a colleague for leaking the Pentagon Papers in 1971; against Samuel Loring Morison, a Navy intelligence analyst, for selling classified satellite photographs to Jane’s, the military publisher, in 1985; and against Lawrence Franklin, a Defense Department official, who was charged in 2005 with passing secrets to two officials of a pro-Israel lobbying group, who shared some of them with reporters.
Thus Mr. Obama has presided over twice as many such cases as all his predecessors combined, though at least two of the six prosecutions since 2009 resulted from investigations begun under President George W. Bush. An outcry over a series of revelations last year — about American cyberattacks on Iran, a double agent who infiltrated the Qaeda branch in Yemen and procedures for targeted killings — prompted Mr. Holder to begin new leak investigations that have not yet produced any charges.
The resulting chill on officials’ willingness to talk is deplored by journalists and advocates of open government; without leaks, they note, Americans might never have learned about the C.I.A.’s interrogation methods or the National Security Agency’s warrantless wiretapping. But for supporters of greater secrecy, the chill is precisely the goal.
Revealing a Name
From court documents and interviews, it is possible to piece together how the case against Mr. Kiriakou took shape. When he first spoke on ABC in 2007, the C.I.A. sent the Justice Department a “crimes report” — a routine step to alert law enforcement officials to an apparent unauthorized disclosure of classified information. At least half a dozen more referrals went to Justice as he continued to grant interviews covering similar ground.
Shortly after he became a minor media star, Mr. Kiriakou lost his job in business intelligence at Deloitte, the global consulting firm he joined after leaving the C.I.A. He had also begun working with Hollywood filmmakers — visiting Afghanistan, for instance, before advising the producers of “The Kite Runner” that its young male actors should probably be relocated outside the country for their own safety. He was working with a veteran journalist, Michael Ruby, on his memoir and battling the agency’s Publications Review Board, as many C.I.A. authors have, over what he was permitted to write about and what was off limits.
Mr. Rizzo, then a top C.I.A. lawyer, said he recalled some colleagues being upset that Mr. Kiriakou had begun speaking so openly about the interrogation program. “It was fairly brazen — a former agency officer talking on camera,” Mr. Rizzo said. “He started being quoted all over the place. He was commenting on everything.”
Of course, Mr. Kiriakou had plenty of company. More and more C.I.A. retirees were writing books, speaking to reporters or appearing on television. Mr. Rizzo himself became the subject of a Justice Department referral after he spoke to a Newsweek reporter in 2011 about drone strikes, and his own memoir, “The Company’s Man,” is scheduled for publication next year.
Mr. Rizzo said he did not believe that Mr. Kiriakou’s media appearances spurred a serious criminal investigation. “There really wasn’t a campaign against him,” he said.
Then, in 2009, officials were alarmed to discover that defense lawyers for detainees at Guantánamo Bay, Cuba, had obtained names and photographs of C.I.A. interrogators and other counterterrorism officers, including some who were still under cover. It turned out that the lawyers, working under the name of the John Adams Project, wanted to call the C.I.A. officers as witnesses in future military trials, perhaps to substantiate accounts of torture or harsh treatment.
But initial fears that Al Qaeda might somehow be able to stalk their previous captors drew widespread coverage. This time there was a crimes report, Mr. Rizzo said, that was taken very seriously, both at the C.I.A. and the Justice Department.
F.B.I. agents discovered that a human rights advocate hired by the John Adams Project, John Sifton, had compiled a dossier of photographs and names of the C.I.A. officers; that Mr. Sifton had exchanged e-mails with journalists, including Matthew A. Cole, a freelancer then working on a book about a C.I.A. rendition case in Italy that had gone awry; and that Mr. Cole had exchanged e-mails with Mr. Kiriakou. The F.B.I. used search warrants to obtain access to Mr. Kiriakou’s two personal e-mail accounts.
According to court documents, F.B.I. agents discovered that in August 2008, Mr. Cole — identified as Journalist A in the charging documents — had asked Mr. Kiriakou if he knew the name of a covert officer who had a supervisory role in the rendition program, which involved capturing terrorism suspects and delivering them to prisons in other countries.
Mr. Kiriakou at first said he did not recall the name, but followed up the next day with an e-mail passing on the name and adding, “It came to me last night,” the documents show. (Mr. Sifton, Mr. Cole and federal prosecutors all declined to comment.)
In recent interviews, Mr. Kiriakou said he believed that the covert officer, whom he had last seen in 2002, had retired; in fact, the officer was then working overseas. He had no idea that the name would be passed on to the Guantánamo defense lawyers and end up in a government file, as it did, he said.
When the F.B.I. agents invited Mr. Kiriakou to their Washington office a year ago “to help with a case,” he said, they repeatedly asked him whether he had knowingly disclosed the name of a covert officer. He replied that he had no recollection of having done so; he still insists that was the truth.
“If I’d known the guy was still under cover,” Mr. Kiriakou said, “I would never have mentioned him.”
The officer’s name did not become public in the four years after Mr. Kiriakou sent it to Mr. Cole. It appeared on a whistle-blowing Web site for the first time last October; the source was not clear.
Preparing for Prison
On a chilly recent afternoon, Mr. Kiriakou, in a Steelers jersey, drove his Honda S.U.V. to pick up his son Max, 8, and his daughter Kate, 6, from school, leaving the 14-month-old Charlie at home with a baby sitter.
He and his wife had struggled with how to explain to the children that he is going away, probably in mid-February. They settled on telling the children that “Daddy lost a big fight with the F.B.I.” and would have to live elsewhere for a while. Max cried at the news, Mr. Kiriakou said. He cried again after calculating that his birthday would fall on a weekday, so it would be impossible to make the trip to prison to share the celebration with his father.
The afternoon school pickup has become his routine since he has been out of work. A stint as an investigator for the Senate Foreign Relations Committee ended before he was charged; two hedge funds that had him on retainer to provide advice on international security issues dropped him when the charges were filed.
Only Liberty University, the conservative Christian institution founded by Jerry Falwell Sr. in Lynchburg, Va., where Mr. Kiriakou was hired by former C.I.A. officers on the faculty to teach intelligence courses, actually increased the work it offered him when he got in trouble.
“They say torture is un-Christian,” Mr. Kiriakou said, who notes wryly that his fervent supporters now include both the Liberty Christians and an array of left-wing activists.
Last summer, Mr. Kiriakou was teaching a practical course on surveillance and countersurveillance to a group of Liberty students in Washington and had them trail him on foot on the eastern edge of Georgetown, he said. After several passes, the students excitedly told him that they had detected several cars that were also following him — his usual F.B.I. minders, he figured.
When Mr. Kiriakou pleaded guilty in October to sharing the covert officer’s name, the government dropped several other charges, including the disclosure to The Times and a claim that he had lied to the C.I.A.’s Publications Review Board, though those violations remain in an official statement of facts accompanying the plea.
…
This article has been revised to reflect the following correction:
Correction: January 5, 2013
A summary that appeared with an earlier version of this article misspelled the surname of the former C.I.A. operative. He is John C. Kiriakou, not Kiriako.
January 5, 2013
By SCOTT SHANE
Find this story at 5 January 2013
© 2013 The New York Times Company
Zero Dark Thirty director given ‘roadmap’ behind U.S. stealth mission to kill Osama bin Laden4 februari 2013
Kathryn Bigelow given classified information by high ranking official
She was also briefed by CIA and military officials and Navy Seals
Campaign group said the White House has acted improperly
The director of an Oscar-nominated film about the killing of Osama bin Laden was given classified information about the operation by United States intelligence chiefs.
Zero Dark Thirty director Kathryn Bigelow and her screenwriting partner Mark Boal were provided with a complete ‘roadmap’ of how the raid was planned during a 45 minute meeting with Michael Vickers – the country’s highest ranking civilian intelligence official.
The filmmakers also received briefings from top CIA and military intelligence officers and Navy Seals who carried out Operation Neptune Spear – attacking bin Laden’s compound in Pakistan in May 2011.
Secrecy: Zero Dark Thirty filmmakers Kathryn Bigelow and Mark Boal were given classified information
The transcript of the interview, which took place three months after the terrorist leader’s death, has this week been published by the National Security Archive (NSA) at George Washington University in Washington.
Classified: Intelligence chief Michale Vickers gave information to the filmmakers during an interview
It follows a freedom of information request by campaign group Judicial Watch. Its president Tom Fitton had said the White House acted improperly by giving ‘politically-connected filmmakers extraordinary and secret access to bin Laden raid information’
Following the raid, the White House and Pentagon held a series of contradictory briefings and the NSA argues that an authoritative account of the operation has never been published.
The group accused the Obama administration of sharing the ‘intimate details’ to help the filmmakers release a movie ‘perfectly timed to give a home-stretch boost’ last year’s re-election campaign.
The NSA said much of the operation in Abbottabad is still ‘shrouded in secrecy’, with many details of the raid having never been released.
Chris Farrell, of Judicial Watch, told The Independent: ‘Either you admit you gave special excess to your pet film directors, or you make the information available to everyone.’
A statement on the Judicial Watch website said that the film pushed the Obama narrative, and added: ‘Barack Obama comes off as a hero character.
‘We see him morally preening on a news program and hear him described as ’thoughtful and analytical.’
Oscar nominated: Navy SEALs prepare to breach a locked door in bin Laden’s compound in Dark Zero Thirty
Raid: Pakistani security officials stand guard as workers demolish the compound in Abbottabad
‘Boal and Bigelow seemed to have gone out of their way (short of producing a two-hour campaign commercial) to project the Obama administration as ‘gutsy’ for ordering the raid.’
Hunted: Bin Laden was killed by U.S. forces in May 2011
An investigation into whether Mr Vickers broke any rules by briefing Ms Bigelow and Mr Boal has been launched by the Department of Defense.
Mr Boal and Ms Bigelow, who spent several years working on the film, have insisted that they went through the proper official channels in the intelligence community and did not have access to any classified information.
Zero Dark Thirty opened across the U.S. on January 11 and has been nominated for five Oscars including Best Picture, Best Actress for Jessica Chastain and Best Original Screenplay. It was nominated for four Golden Globes, with Chastain winning Best Actress.
Mr Boal and Ms Bigelow have both won Oscars fro the Hurt Locker. Ms Bigelow has defended her latest film’s torture scene, saying criticism of the practices might be better directed towards government policymakers.
After bin Laden – who was hunted by the US since the 9/11 terrorist attacks – was killed, the Obama administration said his body was buried at sea off the USS Carl Vinson in accordance with Islamic tradition.
The raid was completed shortly after 1am local time when he was shot once in the chest and once in the head by a Navy Seal who announced, ‘For God and country Geronimo, Geronimo, Geronimo’, because Geronimo was the code-name given to the al-Qaeda leader.
…
By Alex Gore
PUBLISHED: 17:53 GMT, 19 January 2013 | UPDATED: 09:00 GMT, 20 January 2013
Find this story at 19 January 2013
© Associated Newspapers Ltd
How did Bigelow access America’s secrets about torture and Bin Laden’s assassination for Zero Dark Thirty?4 februari 2013
Oscar contender is triggering growing criticism from US senators that the movie supports ‘waterboarding’
It has received five Oscar nominations and created a buzz among movie fans around the world.
But Kathryn Bigelow’s Zero Dark Thirty, which recounts the operation that traced and killed Osama bin Laden, is at the centre of growing controversy over the unprecedented access to classified information granted to the director and her screenwriter colleague, while most of these details remain unavailable to the general pubic.
Documents collected, collated and published this week by the National Security Archive of George Washington University in Washington show that only a portion of information about Operation Neptune Spear, the codename for the CIA-led, decade-long hunt for Bin Laden, has so far been declassified.
In contrast, Ms Bigelow and her colleague Mark Boal received briefings from high-ranking CIA and military intelligence officers, Navy SEALs who took part in the operation and other officials. A CIA spokeswoman said at the time, the agency had decided to support the director because “it makes sense to get behind a winning horse. Mark and Kathryn’s movie is going to be the first and the biggest”.
The attacks of 9/11 on New York and Washington traumatised the US and led to various policy decisions whose ramifications are still being felt. The vow of then US President George Bush to capture the al-Qa’ida leader “dead or alive” led to the US and UK invasion of Afghanistan and a hunt for Bin Laden that concluded in May 2011 when US Special Forces raided a walled compound in the Pakistani town of Abbottabad where he had been hiding.
In the hours and days after the raid, White House and Pentagon officials briefed the media about aspects of the raid. Yet there were a number of contradictions contained within those briefings, and more than 18 months later many details remain unknown. Photographs of Bin Laden, for instance, supposedly taken after he was shot dead and when his body was buried at sea from aboard the USS Carl Vinson have not been made public, and the Obama administration has refused media requests under the Freedom of Information Act to release them.
Indeed, the National Security Archive said much of the operation was still “shrouded in secrecy”. It added: “The government’s recalcitrance over releasing information directly to the public about the 21 century’s most important intelligence search and military raid, and its decision instead to grant the film’s producers exclusive and unprecedented access to classified information about the operation, means that for the time being – for bad or good – Hollywood has become the public’s account of record for Operation Neptune Spear.”
Even before its release, Ms Bigelow’s film had already created controversy because of a scenes showing torture that the film suggests were essential to obtaining information that led the CIA to the garrison town of Abbottabad.
Such has been the furore that senior US senators Diane Feinstein and John McCain publicly complained the film was supporting the use of techniques such as “waterboarding”. Ms Bigelow has defended her film, recently telling the BBC: “It’s part of the story. To omit it would have been whitewashing history.”
Yet others say, the issue of the access given to the 61-year-old director is equally controversial. Chris Farrell, of Judicial Watch, a Washington-based non-profit organisation, said it had been involved in extensive litigation with the authorities to obtain withheld documents. He claimed the government was trying to have it both ways. “Either you admit you gave special access to your pet film director, or else you make the information available to everyone,” he said.
What has added to the perception that Ms Bigelow received special treatment are various moves by the authorities to halt other people releasing information about Operation Neptune Spear. The NSA said last November, seven US special forces soldiers involved in the Abbottabad operation were reprimanded for providing classified material to a video game manufacturer.
…
Andrew Buncombe
Friday, 18 January 2013
Find this story at 18 January 2013
© independent.co.uk
Intelligence chiefs and special forces plot Sahara mission4 februari 2013
Action against al-Qa’ida in North Africa could last decades, PM warns
The West faces a decades-long battle to defeat al-Qa’ida in North Africa, David Cameron warned today, as he signalled a dramatic shift in the UK’s fight against terrorism.
The heads of MI5, MI6, GCHQ and the Chief of the Defence Staff will gather on Tuesday to begin planning Britain’s response to the burgeoning terror threat from Saharan Africa.
Britain will offer money, military co-operation and security training to African states to head off the advance of Islamist radicalism.
Special forces are understood to be preparing to hunt down the jihadist leader behind the siege and hostage killings in Algeria, Mokhtar Belmokhtar.
Britain will use its chairmanship of the G8 to focus militarily and diplomatically on the Sahara region, following the hostage crisis which claimed the lives of up to six Britons. One Middle East expert likened the long-term impact of the atrocity in Algeria to the 9/11 attacks.
Following the end of the four-day stand-off at the BP gas plant at In Amenas, Algerian forces discovered 25 more bodies and took five militants alive. The death toll had previously been put at 23 hostages and 32 captors.
Three Britons have been confirmed among the dead and another three are feared to have been killed during the siege, which ended with a shoot-out on Saturday. Tonight 46-year-old Paul Thomas Morgan was the first British victim to be named by the Foreign and Commonwealth Office.
Kenneth Whiteside, an engineer from Glenrothes in Fife, and Garry Barlow, a BP systems supervisor from Merseyside, are also understood to be among the dead. Another UK resident was also believed to have been killed.
Twenty-two other British nationals have arrived home, many with chilling stories of how they evaded capture by jihadists belonging to an al-Qa’ida splinter group styling themselves Those Who Sign In Blood.
Alan Wright, from Aberdeenshire, told of how he hid in an office for 24 hours before joining Algerian workers who cut their way through a perimeter fence and fled.
Mr Cameron will update MPs on the attack today and hold a meeting of Whitehall’s emergency Cobra committee to consider the implications of the attack.
French forces – with support from Britain – are attempting to oust insurgents from northern Mali, amid fears that neighbouring countries including Niger and Mauritania could fall under their influence.
As the French Defence Minister, Jean-Yves Le Drian, described the hostage-taking as an “act of war”, Belmokhtar was reported to be “ready to negotiate” in return for an end to the action in Mali.
Last night Mauritanian news website Sahara Media said Belmokhtar had claimed responsibility in the name of al Qa’ida for the hostage-taking in a video. He had said: “We in al Qa’ida announce this blessed operation. We are ready to negotiate with the West and the Algerian government provided they stop their bombing of Mali’s Muslims. We had around 40 jihadists, most of them from Muslim countries and some even from the West.”
A BP spokesman would not comment on reports in Algeria that Belmokhtar’s men had infiltrated the gas plant as drivers, cooks and guards working on short-term contracts.
Mr Cameron spelt out the scale of the challenge posed by al-Qa’ida-affiliated groups operating in the region. “It will require a response that is about years, even decades, rather than months,” he said. “And it requires a response that is painstaking, that is tough but also intelligent, but above all has an absolutely iron resolve. And that is what we will deliver over these coming years.
“What we face is an extremist, Islamist, al-Qa’ida-linked terrorist group. Just as we had to deal with that in Pakistan and in Afghanistan, so the world needs to come together to deal with this threat in North Africa… We need to work with others to defeat the terrorists and to close down the ungoverned spaces where they thrive with all the means that we have.”
The Government has not ruled out giving extra help to the French-led operation in Mali.
However, Whitehall sources said the terrorist threat in the region would ultimately be best tackled by diplomatic means. Britain is to beef up its presence in nations where the UK historically had a limited presence and to liaise more closely with Paris over the challenges faced by the traditionally Francophone area.
Abdelasiem el-Difraoui, an al-Qa’ida expert with the Berlin Institute for Media and Communications Studies, told a French newspaper that the hostage-taking would for France make as “a huge bang as strong as September 11”.
The French Government distanced itself from suggestions among other nations caught up in the hostage crisis that Algeria’s response was “heavy-handed”.
President François Hollande said: “When so many hostages have been taken and when the terrorists are ready to murder them in cold blood, I think the Algerian approach was the best one.”
Britons in the desert
Garry Barlow: Semtex was strapped to his chest
Garry Barlow, 49, was a systems supervisor for BP Exploration Algeria, Statoil and Sonatrach JV. He lived in the Mossley Hill area of Liverpool with his wife Lorraine, and sons Scott, 17, and Paul, 15.
He had been working in In Amenas since October 2011, and had worked previously for Addax Petroleum and Shell EP on the west coast of Central Africa.
He was captured with some of his colleagues including 29-year-old project services contracts administrator Mark Grant, who is believed to have survived the ordeal.
Initial reports suggested Mr Barlow was safe and well and was being repatriated by the Foreign Office, but he is now thought to have died as Algerian troops tried to regain control of the compound.
The last his wife heard from him was a message in which he said: “I’m sitting here at my desk with Semtex strapped to my chest. The local army have already tried and failed to storm the plant and they’ve said that if that happens again they are going to kill us all.”
Paul Morgan: Former soldier died fighting
The first British victim of the Algerian hostage crisis was described last night as a “true gentleman” who “loved life and lived it to the full”.
Paul Morgan, 46, from Liverpool, a former soldier with the French Foreign Legion, reportedly “went down fighting” when the bus he was travelling in was attacked by the kidnappers last Wednesday.
His mother Marianne and partner Emma Steele, 36, paid tribute to him: “Paul died doing the job he loved. We are so proud of him and so proud of what he achieved in his life. He will be truly missed.”
Kenneth Whiteside: Shot as army stormed compound
Kenneth Whiteside had been living in Johannesburg with his wife and two daughters but was originally from Glenrothes in Fife.
An Algerian colleague at the plant is said to have witnessed the BP project services manager “being shot” by his captors as commandos stormed the compound.
The 59-year-old was educated at Auchmuty High School and studied engineering at Glenrothes Technical College between 1970 and 1974.
Friends posted tribute messages on his Facebook account on Saturday. Steward Goodwin in South Africa wrote: “How will we understand this? My heartfelt condolences go to the family and friends who are trying to come to terms with this senseless murder.”
Billy Hunter wrote: “We’ll always remember him and his bagpipes.” “It’s hard to understand such senseless waste of life,” added Joe McMahon.
…
Nigel Morris, John Lichfield
Monday, 21 January 2013
Find this story at 21 January 2013
© independent.co.uk
U.S. Weighs Base for Spy Drones in North Africa4 februari 2013
WASHINGTON — The United States military is preparing to establish a drone base in northwest Africa so that it can increase surveillance missions on the local affiliate of Al Qaeda and other Islamist extremist groups that American and other Western officials say pose a growing menace to the region.
For now, officials say they envision flying only unarmed surveillance drones from the base, though they have not ruled out conducting missile strikes at some point if the threat worsens.
The move is an indication of the priority Africa has become in American antiterrorism efforts. The United States military has a limited presence in Africa, with only one permanent base, in the country of Djibouti, more than 3,000 miles from Mali, where French and Malian troops are now battling Qaeda-backed fighters who control the northern part of Mali.
A new drone base in northwest Africa would join a constellation of small airstrips in recent years on the continent, including in Ethiopia, for surveillance missions flown by drones or turboprop planes designed to look like civilian aircraft.
If the base is approved, the most likely location for it would be in Niger, a largely desert nation on the eastern border of Mali. The American military’s Africa Command, or Africom, is also discussing options for the base with other countries in the region, including Burkina Faso, officials said.
The immediate impetus for a drone base in the region is to provide surveillance assistance to the French-led operation in Mali. “This is directly related to the Mali mission, but it could also give Africom a more enduring presence for I.S.R.,” one American military official said Sunday, referring to intelligence, surveillance and reconnaissance.
A handful of unarmed Predator drones would carry out surveillance missions in the region and fill a desperate need for more detailed information on a range of regional threats, including militants in Mali and the unabated flow of fighters and weapons from Libya. American military commanders and intelligence analysts complain that such information has been sorely lacking.
The Africa Command’s plan still needs approval from the Pentagon and eventually from the White House, as well as from officials in Niger. American military officials said that they were still working out some details, and that no final decision had been made. But in Niger on Monday, the two countries reached a status-of-forces agreement that clears the way for greater American military involvement in the country and provides legal protection to American troops there, including any who might deploy to a new drone base.
The plan could face resistance from some in the White House who are wary of committing any additional American forces to a fight against a poorly understood web of extremist groups in North Africa.
If approved, the base could ultimately have as many as 300 United States military and contractor personnel, but it would probably begin with far fewer people than that, military officials said.
Some Africa specialists expressed concern that setting up a drone base in Niger or in a neighboring country, even if only to fly surveillance missions, could alienate local people who may associate the distinctive aircraft with deadly attacks in Pakistan, Somalia and Yemen.
Officials from Niger did not respond to e-mails over the weekend about the plan, but its president, Mahamadou Issoufou, has expressed a willingness to establish what he called in a recent interview “a long-term strategic relationship with the U.S.”
“What’s happening in northern Mali is a big concern for us because what’s happening in northern Mali can also happen to us,” Mr. Issoufou said in an interview at the presidential palace in Niamey, Niger’s capital, on Jan. 10, the day before French troops swept into Mali to blunt the militant advance.
Gen. Carter F. Ham, the head of the Africa Command, who visited Niger this month to discuss expanding the country’s security cooperation with the United States, declined to comment on the proposed drone base, saying in an e-mail that the subject was “too operational for me to confirm or deny.”
Discussions about the drone base come at a time when the French operation in Mali and a militant attack on a remote gas field in the Algerian desert that left at least 37 foreign hostages, including 3 Americans, dead have thrown a spotlight on Al Qaeda’s franchise in the region, Al Qaeda in the Islamic Maghreb, and forced Western governments and their allies in the region to accelerate efforts to combat it.
Senator Dianne Feinstein, a California Democrat who is chairwoman of the Intelligence Committee, said on CBS’s “Face the Nation” on Sunday that in the wake of Osama bin Laden’s death and the turmoil of the Arab Spring, there was “an effort to establish a beachhead for terrorism, a joining together of terrorist organizations.”
According to current and former American government officials, as well as classified government cables made public by the group WikiLeaks, the surveillance missions flown by American turboprop planes in northern Mali have had only a limited effect.
Flown mainly from Ouagadougou, the capital of Burkina Faso, the missions have faced stiff challenges as militant leaders have taken greater precautions in using electronic communications and have taken more care not to disclose delicate information that could be monitored, like their precise locations.
General Ham said in an interview on his visit to Niger that it had been difficult for American intelligence agencies to collect consistent, reliable intelligence about what was going on in northern Mali, as well as in other largely ungoverned parts of the sub-Saharan region.
“It’s tough to penetrate,” he said. “It’s tough to get access for platforms that can collect. It’s an extraordinarily tough environment for human intelligence, not just ours but the neighboring countries as well.”
…
January 28, 2013
By ERIC SCHMITT
Find this story at 28 January 2013
© 2013 The New York Times Company
Revealed: who can fly drones in UK airspace4 februari 2013
Missile manufacturer, police forces and golf video company among more than 130 groups licensed to use technology
A surveillance drone used by Merseyside police, one of three forces that have permission to use UAVs. Photograph: John Giles/PA
Defence firms, police forces and fire services are among more than 130 organisations that have permission to fly small drones in UK airspace, the Guardian can reveal.
The Civil Aviation Authority list of companies and groups that have sought approval for the use of the unmanned aerial vehicles, UAVs, has not been published before – and it reflects the way the technology is now being used. The BBC, the National Grid and several universities are now certified to use them – as is Video Golf Marketing, which provides fly-over videos of golf courses.
Including multiple or expired licences, the CAA has granted approval to fly small UAVs more than 160 times.
“People are going to see more and more of these small vehicles operating around the country,” said John Moreland, general secretary of the Unmanned Aerial Vehicle Systems Association (UAVS), a trade body with more than 100 members. “There are any number of uses for them, and the technology is getting easier to use and cheaper all the time. These vehicles can operate anywhere in the UK, within reason.”
However, privacy campaigners have grave concerns about the proliferation of the technology and want an urgent review of regulations. “The increasing use of drones by private companies and government bodies poses a unique set of problems,” said Eric King, head of research at campaign group Privacy International.
“The CAA considers health and safety issues when deciding whether or not to grant licences to operate drone technology, but this is a very low bar. We need new regulation to ensure privacy and other civil liberties are also taken into account during the decision-making process.”
In the last two years the CAA has required anyone who wants to fly a small UAV in British airspace to apply for permission. The aircraft must weigh less than 20kg and operators have to abide by certain rules. These include not flying them higher than 122 metres (400ft), or further away from the operator than 500 metres – this is deemed the pilot’s “line of sight”.
The CAA list shows that three police forces, Merseyside, Staffordshire and Essex, have permission to use UAVs, as do three fire services, Dorset, West Midlands and Hampshire.
Some of Europe’s biggest defence companies can also fly them, including BAE Systems, Qinetiq and missile manufacturer MBDA. A company that supplies UAVs and other equipment to the Ministry of Defence, Marlborough Communications, is also registered, along with crime-scene and counter-terrorism specialist GWR & Associates.
Shane Knight, a spokesman for Marlborough, said: “If you can put these systems up in the sky, and they are safe, then they have many uses. If you are a police force, a fire or ambulance service, and, for instance, you are responding to a large fire, then you have a choice of sending out your people to do reconnaissance of an area, or you could use one of these small UAVs. Why put people in danger when you can use one of these systems? These UAVs are getting much better, and much smaller.”
The National Grid uses them to inspect power lines, while the Scottish Environment Protection Agency wants one to patrol and photograph remote areas, said Susan Stevens, a scientist in the agency’s marine ecology department. “The UAV equipment is currently being trialled,” she said.
“As an operational service it will have many uses, such as capturing aerial imagery of estuaries, wetlands and riverbanks, and to provide a snapshot of the environment before and after development work,” she said.
Moreland said the unmanned systems suffered from the perception that they were all “killer robots” flying in the sky, but he thought this would diminish as the public got used to seeing them.
“We are going to see all sorts of systems coming out over the years,” he said. “The operating bubble is going to expand like mad. Some of these systems will be able to look after themselves, and others will rely on the quality of the operators.
“You don’t have to be a qualified pilot … The person could come from a modelling background, or he may be a video game player. There are plenty of people you could imagine being able to control these systems in a delicate way.”
Gordon Slack, who owns Video Golf Marketing, said he had taught himself to use his UAV. “Once you know how to operate it, it is not too complicated. We’ve done six videos for golf courses, with a few more in the pipeline.”
…
(Owner ID number/Company name)
1 HoverCam
2 Meggitt Defence Systems
3 EagleEye (Aerial Photography) Ltd
4 Remote Services Limited
5 High Spy RC Aerial Photography
6 Magsurvey Limited
7 Pi In The Sky
8 Qinetiq
9 Eye In The Sky
10 AngleCam
11 Helicam Ltd
12 Flying Minicameras Ltd
13 S & C Thermofluids Ltd
14 Remote Airworks (pty) Ltd
15 National Grid
16 Dragonfly Aerial Photography
17 BlueBear Systems Research
18 William Walker
19 European UAV Systems Centre Ltd
20 In-House Films Ltd
21 MBDA UK Ltd
22 European UAV Systems Centre
23 Dorset Fire & Rescue Service
24 Conocophillips Limited
25 Hampshire Fire & Rescue Service
26 West Midlands Fire Service
27 Advanced Ceramics Research
28 UA Systems Ltd (Swisscopter)
29 Hybrid Air Vehicles Ltd
30 Flight Refuelling Limited
31 BAE Systems (Operations) Ltd
32 Lindstrand Technologies Ltd
33 Upper Cut Productions
34 Cranfield University
35 Peregrine Media Ltd
36 Horizon Aerial Photography
37 Rory Game
38 Alan Stevens
39 Helipix LLP
40 Re-use*
41 Mike Garner
42 Cyberhawk Innovations Ltd
43 Staffordshire Police TPU
44 Merseyside Police
45 Health and Safety Laboratory
46 David Hogg
47 MRL Ltd
48 MRL Ltd
49 Re-use*
50 Dominic Blundell
51 Re-use*
52 Re-use*
53 Skylens Aerial Photography
54 Bonningtons Aerial Surveys
55 Small UAV Enterprises
56 British Technical Films
57 CARVEC Systems Ltd
58 Flying-Scots’Cam
59 Pulse Corporation Ltd (t/a Overshoot Photography)
60 Motor Bird Ltd
61 Advanced Aerial Imagery
62 AM-UAS Limited
63 Re-use*
64 Gatewing NV
65 Questuav Ltd
66 Advanced UAV Technology Ltd
67 Air 2 Air
68 MW Power Systems Limited
69 Re-use*
70 Roke Manor Research Ltd
71 Re-use*
72 NPIA
73 Pete Ulrick
74 Re-use*
75 SSE Power Distribution
76 University of Worcester
77 Re-use*
78 Rovision Ltd
79 Callen-Lenz Associates Ltd (Gubua Group)
80 SKM Studio
81 GWR Associates
82 Phoenix Model Aviation
83 Copycat
84 HD Skycam
85 Re-use*
86 Gary White
87 Aerial Target Systems Ltd
88 Aerial Target Systems
89 Re-use*
90 Video Golf Marketing Ltd
91 Re-use*
92 Helivisuals Ltd
93 Essex Police
94 Marlborough Comms Ltd
95 Re-use*
96 Siemans Wind Power A/S
97 Altimeter UK Ltd t/a Visionair
98 T/A Remote Imaging
99 Re-use*
100 Daniel Baker
101 Sky Futures
102 Aerovironment Inc
103 Spherical Images Ltd
104 Flying Camera Systems
105 Highviz Photography
106 ESDM Ltd
107 Flying Camera Systems Limited
108 Edward Martin
109 Digital Mapping and Survey Ltd
110 EDF NNB GenCo Ltd
111 EDF
112 Re-use*
113 AerialVue Ltd
114 Minerva NI Limited
115 Flying Fern Films Ltd
116 Out Filming Ltd
117 Hexcam Ltd
118 McKenzie Geospatial Surveys Ltd
119 Resource UAS
120 Plum Pictures
121 Jonathan Malory
122 Mas-UK Ltd
123 Bailey Balloons Ltd
124 David Bush
125 Southampton University
126 Helipov
127 Costain Ltd
128 Sky-Futures
129 Jonathan Blaxill
130 Roke Manor Research Ltd
131 Colin Bailie
132 British Broadcasting Corp
133 Simon Hailey
134 Re-use*
135 Trimvale Aviation
136 PSH Skypower Ltd
137 Aerosight Ltd
171 Re-use*
173 Colin Bailie
174 Simon Field
175 Re-use*
176 Aerial Graphical Services
177 Think Aerial Photography
178 Hedge Air Limited
179 Scottish Environment Protection Agency
180 Skypower Limited
181 Elevation Images
182 Universal Sky Pictures
183 MBDA UK Ltd
184 Helicammedia
185 Oculus Systems Ltd
186 MASA Ltd
187 Doozee Aerial Systems Ltd
188 Selex Galileo
189 Whisperdrone
190 Z-Axis
191 Rotarama Ltd
192 Re-use*
193 BBC (Natural History Unit)
194 Flying Camera Company
195 Flying Camera Company
* Short-term approval that was granted, but now no longer applies
Source: CAA
Nick Hopkins
The Guardian, Friday 25 January 2013 20.02 GMT
Find this story at 25 January 2013
© 2013 Guardian News and Media Limited or its affiliated companies. All rights reserved.
The incredible U.S. military spy drone that’s so powerful it can see what type of phone you’re carrying from 17,500ft4 februari 2013
The ARGUS-IS can view an area of 15 sq/miles in a single image
Its zoom capability can detect an object as small as 6in on the ground
Developed by BAE as part of a $18million DARPA project
System works by stringing together 368 digital camera chips
A sinister airborne surveillance camera gives the U.S. military the ability to track movements in an entire city like a real-time Google Street View.
The ARGUS-IS array can be mounted on unmanned drones to capture an area of 15 sq/miles in an incredible 1,800MP – that’s 225 times more sensitive than an iPhone camera.
From 17,500ft the remarkable surveillance system can capture objects as small as 6in on the ground and allows commanders to track movements across an entire battlefield in real time.
Scroll down for video
Beat that, Google: An image taken from 17,500ft by the U.S. military’s ARGUS-IS array, which can capture 1,800MP zoomable video feeds of an entire medium-sized city in real time
‘It is important for the public to know that some of these capabilities exist,’ said Yiannis Antoniades, the BAE engineer who designed the system, in a recent PBS broadcast.
The aerospace and weapons company developed the ARGUS-IS array as part of a $18.5million project funded by the Pentagon’s Defense Advanced Research Projects Agency (Darpa).
In Greek mythology, Argus Panoptes, guardian of the heifer-nymph Io and son of Arestor, was a primordial giant whose epithet, ‘Panoptes’, ‘all-seeing’, led to his being described with multiple, often one hundred, eyes.
Like the Titan of myth, the Pentagon’s ARGUS-IS (a backronym standing for Autonomous Real-time Ground Ubiquitous Surveillance-Imaging System) works by stringing together an array of 368 digital camera imaging chips.
An airborne processor combines the video from these chips to create a single ultra-high definition mosaic video image which updates at up to 15 frames a second.
All-seeing: This graphic illustrates how the U.S. military’s ARGUS-IS array links together images streamed from hundreds of digital camera sensors to watch over a huge expanse of terrain in real time
What it looks like: The ARGUS-IS (a backronym standing for Autonomous Real-time Ground Ubiquitous Surveillance-Imaging System) strings together an array of 368 digital camera imaging chips into a single unit
That tremendous level of detail makes it sensitive enough to not only track people moving around on the ground thousands of feet below, but even to see what they are doing or carrying.
The ARGUS array sends its live feed to the ground where it connects to a touch-screen command room interface.
Using this, operators can zoom in to any area within the camera’s field of view, with up to 65 zoom windows open at once.
Each video window is electronically steerable independent of the others, and can either provide continuous imagery of a fixed area on the ground or be designated to automatically keep a specified target in the window.
Sinister: The system tracks all moving objects in its field of view, highlighting them with coloured boxes, allowing operators to track movements across an area as and when they happen
The system automatically tracks any moving object it can see, including both vehicles and individuals on foot, highlighting them with coloured boxes so they can be easily identified.
It also records everything, storing an approximate million terabytes of data a day – the equivalent of 5,000 hours of high-definition video footage.
‘So you can go back and say I’d like to see what happened at this particular location three days, two hours [and] four minutes ago, and it will actually show you what happened as if you were watching it live,’ said Mr Antoniades.
iPad next? The feed from the ARGUS is transmitted to a touch-screen command and control interface
Windows: Operators can open a window to zoom in to any area within the camera’s field of view, with up to 65 open and running at once
Total surveillance: The view of Quantico, Virginia, highlighted in the PBS film
For the PBS programme reporting the technology, Mr Antoniades showed reporters a feed over the city of Quantico, Virginia, that was recorded in 2009.
…
By Damien Gayle
PUBLISHED: 14:56 GMT, 28 January 2013 | UPDATED: 19:56 GMT, 28 January 2013
Find this story at 28 January 2013
© Associated Newspapers Ltd
Major blow to G4S as police multimillion-pound deal to outsource services collapses4 februari 2013
Multimillion-pound plans by three police forces to outsource services to the firm at the centre of the Olympics security debacle have collapsed.
Hertfordshire Police and Crime Commissioner David Lloyd said the Bedfordshire, Cambridgeshire and Hertfordshire Strategic Alliance had discontinued negotiations with G4S.
The three forces were looking in to working with G4S in a bid to save £73 million by outsourcing support functions.
The proposals involved switching 1,100 roles, including human resources, IT and finance to the security contractor.
But doubts were raised after the company was forced to admit severe failings over the Olympics security contract last summer, which led to police officers and 3,500 extra troops being deployed to support the operation.
In a statement, Mr Lloyd said: “I have always said that I would make my decision once the evidence was received and assessed.
“It is now clear that the G4S framework contract through Lincolnshire Police was not suitable for the unique position of the three forces.”
But he added that outsourcing to other companies would still be considered.
Mr Lloyd said: “I am already in discussion with other market providers and will continue to talk with G4S about how they can assist policing support services in Hertfordshire. My clear position is that all elements of support work will be considered for outsourcing or other use of the market.
“I made my decision based on evidence and on the recommendations from the Chief Constables. I still believe that substantial elements of policing support services will be best delivered by the private sector and will ensure that this option is immediately pursued.
“We will now move forward looking at organisational support services, as before.”
Police and Crime Commissioner for Bedfordshire, Olly Martins, said: “The concerns that I had about this proposal are on record but I am pleased that following the evaluation and subsequent discussions, the three Police and Crime Commissioners have ended up in agreement with a shared view that this contract does not deliver what we need.
“However, we do still have to save money. Strengthening the ways in which we collaborate with Hertfordshire and Cambridgeshire is a crucial element of our on-going investment in all our police services.
“I now look forward to working with my fellow commissioners to develop new and innovative ways in which we can progress our collaborative approach.”
The force’s Chief Constable Alf Hitchcock said: “As an Alliance we have been working together to explore a range of options for making savings at a time when all three forces are facing significant financial challenges.
“Along with my Chief Constable colleagues in Cambridgeshire and Hertfordshire and the three commissioners, we are continuing to explore other opportunities, whilst in Bedfordshire we are using the Option 10 and Lean processes to achieve savings in-house and protect front line policing.”
Kim Challis, chief executive of G4S Government and outsourcing solutions, said: “We have put forward a compelling proposition to the police forces of Bedfordshire, Cambridgeshire and Hertfordshire which would have guaranteed them savings of over £100 million over the next ten years, allowing them to meet the financial challenge of the Comprehensive Spending Review without compromising on efficiency or public safety.
“Our proposition was to operate back office services at the volume and scale required to deliver significant savings to forces, enabling them to concentrate their resources on frontline roles: it was never about replacing police officers. This has already proved to be the case in Lincolnshire, where we have a successful partnership which, in less than a year, has seen us deliver savings in running costs of around 16%.
…
Jennifer Cockerell
Wednesday, 30 January 2013
Find this story at 30 January 2013
© independent.co.uk
Drones zijn inbreuk op privacy4 februari 2013
ALMERE / JITSKE BOKHOVEN – D66 Almere vindt het gebruik van de Raven, onbemande vliegtuigjes (drones) die sinds enige tijd worden ingezet om inbrekers te pakken, een vergaande inbreuk op de privacy van Almeerders. Fractievoorzitter Jan Lems heeft dan ook schriftelijke vragen aan het college van burgemeester en wethouders gesteld om erachter te komen wat hier de argumenten voor zijn.
De drones zijn door Defensie beschikbaar gesteld. Met behulp van de vliegtuigjes kunnen agenten live beelden van een hoogte van 300 meter bekijken. ,,Ik vind het op z’n zachts gezegd opmerkelijk dat je hier ineens vliegtuigjes ziet vliegen die je boven Afghanistan verwacht’’, reageert Lems. ,,Ik vraag me af wat hier de argumenten voor zijn.’’
Lems vindt het ook opmerkelijk of Almeerders niet vooraf geïnformeerd hadden moeten worden. ,,Dat moest bij het cameratoezicht wel, vanwege de wet op de privacy. Had dat niet hier ook gemoeten? Ik hoor het graag’’
Gepubliceerd op 01 februari 13, 12:00 Laatst bijgewerkt op 01 februari 13, 20:42
Find this story at 01 February 2013
© 2013 Almere Vandaag
AIVD: we lezen niet elke e-mail4 februari 2013
De Algemene Inlichtingen- en Veiligheidsdienst (AIVD) leest niet elke e-mail die wordt verstuurd, ook al is dit een hardnekkige mythe die blijft bestaan, zo liet de dienst onlangs weten. Toch wordt mogelijk dit jaar de wet aangepast waardoor de AIVD meer bevoegdheden krijgt om internetverkeer te onderscheppen.
Tijdens de NCSC Conferentie in Den Haag sprak Sebastian Reyn van de AIVD over de rol die de inlichtingendiensten op internet spelen en welke risico’s Nederland bedreigen. Dit om meer inzicht in de werking van de diensten te geven en waar die zich mee bezighouden, voor zover het grote publiek dit mag weten.
“Ik kan jullie niets over onze bronnen, werkwijze en huidige informatiepositie vertellen. Dit vereist geen verdere uitleg”, liet Reyn de zaal weten. Hij begon met het ontzenuwen van populaire mythes, zoals de mythe dat de AIVD al het e-mailverkeer zou afluisteren. “Dat is niet het geval.”
Dreigingen
“Het is belangrijk dat burgers begrijpen wat we doen en waarom wat we doen van belang is voor hun veiligheid.” Volgens Reyn zijn cybercrime en cyberspionage in dat licht twee van de grootste dreigingen voor de nationale veiligheid. “Er is geen twijfel dat cyberspionage, samen met cybercrime, de grootste dreiging is waar we in het cyberdomein mee te maken hebben.”
Vanwege de omvang van de dreiging is het belangrijk dat partijen samenwerken. “Deze dreiging is te groot om alleen aan te pakken.” Daarin spelen ook internetgebruikers een rol. Volgens Reyn gedragen veel mensen zich nog altijd op onveilige wijzen en zijn zich niet van de risico’s bewust. Zo wordt software niet gepatcht, worden wachtwoorden nauwelijks gewijzigd en laat men overal persoonlijke informatie op het web slingeren.
Voorbeelden hiervan verschijnen dagelijks in de media. Het probleem met cyberspionage is dat het onzichtbaar is. “Het is een feit dat buitenlandse inlichtingendiensten op geheime wijze toegang tot belangrijke informatiesystemen proberen te krijgen.” Veel van deze aanvallen worden door bestaande beveiligingssystemen nauwelijks gedetecteerd.
E-mail
“We zijn niet geinteresseerd in elke e-mail of verstuurd sms-bericht, of elk cyberincident. Onze focus ligt bij dreigingen voor de nationale veiligheid.” Cyberspionage en cybercrime ziet de AIVD als serieuze dreigingen, dat geldt echter niet voor cyberterrorisme. Cyberterroristen vormen nog geen grote bedreiging voor de nationale veiligheid, aldus Reyn. “De mogelijkheden die cyberterroristen hebben zijn op dit moment beperkt.”
Terroristen zouden dan ook nog niet bij grote cyberaanvallen betrokken of hiervoor verantwoordelijk zijn geweest. Ook voor hacktivisten is Reyn niet bang. Hij vergeleek ze met het digitale equivalent van demonstrerende mensen.
De grootste dreiging komt dan ook van andere staten. Reyn stelt dat in veel landen het de juridische taak van de overheid is om andere landen te bespioneren om hun eigen positie in de wereld te versterken. “Elke dag proberen duizenden mensen die voor legio inlichtingendiensten werken toegang tot de informatie van andere landen te krijgen. En je kunt ervan uitgaan dat een aantal in Nederland is geinteresseerd.”
En Nederland is voor deze landen een interessant doelwit op zowel economisch, technologisch als wetenschappelijk gebied. Volgens Reyn is er nog een te groot vertrouwen in de veiligheid van ICT-systemen.
Spionage
Cyberspionage is voor veel landen aantrekkelijk, ging Reyn verder. “Het is een goedkope manier om in korte tijd een grote hoeveelheid data te verzamelen en is voor een groot aantal doelen te gebruiken. Daarnaast is het risico op detectie klein en is ‘attributie’ lastig.” Het is bijna onmogelijk voor aangevallen landen om te bewijzen wie de dader is. “Landen zoeken bewust naar lekken in software en systemen”, stelt Reyn.
Volgens Reyn worden soms agenten gebruikt die USB-sticks op systemen aansluiten die niet op het internet zijn aangesloten. Daarnaast worden ook bekendere tactieken toegepast. “We zien vaak valse e-mails met verborgen malware.” Om ervoor dat te zorgen dat het slachtoffer deze e-mails ook opent, gebruiken staten klassieke spionagetactieken. “Ze zoeken naar menselijke kwetsbaarheden.”
Aftappen
Aan het eind van de lezing stelde Simone Halink van digitale burgerrechtenbeweging Bits of Freedom nog een vraag over de transparantie en openheid die de AIVD wil uitdragen, terwijl de bevoegdheden waaronder de dienst opereert mogelijk verder worden uitgebreid. Daardoor kan de dienst wel elke e-mail onderscheppen, zowel van Nederlandse als buitenlandse internetgebruikers.
Nederlandse veiligheidsdiensten hebben op dit moment de bevoegdheid om “ongericht” communicatie te onderscheppen. Ze mogen onder bepaalde voorwaarden de recorder aanzetten. Het gaat dan om “ongericht ontvangen en opnemen van niet-kabelgebonden telecommunicatie”.
Op dit moment is er een wijzigingsvoorstel voor de Wet op de Inlichtingen- en Veiligheidsdiensten (Wiv) in de maak, waardoor die bevoegdheid wordt uitgebreid naar het aftappen van communicatie via kabels.
“De wet is in 2002 gemaakt en sindsdien heeft de technologie zich verder ontwikkeld. De meeste communicatie verloopt tegenwoordig via de kabel. Het is belangrijk dat de wet de spelregels beschrijft waar de inlichtingendiensten aan moeten voldoen, maar dat de wet zelf niet afhankelijk van technologie is”, aldus Reyn.
…
Vrijdag,11:38 doorRedactie
Find this story at 01 February 2013
© 2001-2013 Security.nl – The Security Council
Germany Discloses Most of the Spy Tools It’s Using—and Other Countries Should, Too24 januari 2013
Most law enforcement agencies refuse to reveal the surveillance technologies they use, claiming doing so could threaten national security. But authorities in Germany have shown it’s possible to be transparent without the sky falling in—by disclosing how they’ve spent millions on spy tools to help monitor Skype, email, and mobile phones.
Earlier this year, German politician Jan Korte submitted a series of written questions to the country’s federal ministry of home affairs regarding surveillance tools. The request was prompted by a scandal about how police had paid a private company to develop a controversial spy trojan to infiltrate and monitor suspects’ computers—a tactic that in most circumstances violates the German constitution. The answers Korte received were published in German in July, but have only this month been translated into English. (Update, Nov. 14: Thanks to blogger Anne Roth for the translation.)
What the answers revealed is the technology used by some of the country’s federal agencies and the companies contracted to provide it. Between 2005 and 2011, for instance, the Federal Office of Administration, which carries out work for all of Germany’s federal ministries, spent more than €1.9 million ($2.5 million) on telecom and internet surveillance gear provided by the companies TU München and Syborg, plus €158,000 ($204,000) on facial recognition software from the firm Cognitec.
Some police and intelligence agencies declined to provide Korte with the requested information, claiming it was restricted or classified. But others did not show the same concern. Customs authorities, for one, released details about the sophisticated surveillance tools they purchased, including spending more than €100,000 ($130,000) on software to monitor Skype, Gmail, Hotmail, AIM, Yahoo Mail, and Bit Torrent. The customs authorities, tasked with tackling drug crime in Germany, also paid a company called Schönhofer €1.8 million ($2.3 million) for equipment such as “ICT vehicles” designed to help gather data from target areas using “signal interrogator” technology. They additionally splashed out €170,000 ($220,000) on a cellphone-tracking tactic described as “stealthping,” which involves sending a covert signal to a phone in order find out its nearest location tower to discover the whereabouts of a person.
…
By Ryan Gallagher
Posted Wednesday, Oct. 31, 2012, at 5:04 PM ET Slate.com
Find this story at 31 October 2012
The answers Korte received were published in German in July, but have only this month been translated into English.
All contents © 2013 The Slate Group, LLC. All rights reserved.
Main opposition slams Erdoğan over wiretapping24 januari 2013
Main opposition Republican People’s Party (CHP) leader Kemal Kılıçdaroğlu criticizez the government for not addressing the issue of illegal recordings and locating the perpetrators of these crimes
Kemal Kılıçdaroğlu, leader of the main opposition Republican People’s Party (CHP), speaks during a breakfast with Ankara media bureau chiefs.
The leader of the main opposition party likened the wiretapping of Prime Minister Recep Tayyip Erdoğan to the Uludere tragedy, in which 34 civilians mistaken for terrorists were killed, and accused the ruling party of practicing a double standard with regard to unlawful eavesdropping.
“In democratic countries, the political power should decidedly address and resolve these kinds of problems. They have to find the perpetrators and bring them to the justice. Did this happen? No. If the political power does not address the issue – which does not target itself – that is, if it applies a double standard, then it cannot obtain results,” Kemal Kılıçdaroğlu, leader of the Republican People’s Party (CHP), told Ankara media bureau chiefs on Dec. 26. “The incident took place a year ago and if the perpetrators cannot be found yet, then we have to find those responsible for it. Then this is another Uludere incident,” he said, referring to failed attempts since early 2012 to ascertain who gave the order of the attack against the civilians.
“What we have observed with this unlawful eavesdropping is the double standard the government is practicing. It feels disturbed when the prime minister is wiretapped but gloats when others are monitored. This is not right. At the end of the day, Mr. Prime Minister, whatever goes around comes around,” he said.
Stressing that Erdoğan’s political rivals have been frequent victims of wiretapping and many politicians’ privacy have been violated through video recordings in the past, Kılıçdaroğlu criticized the government for not addressing the issue and locating the perpetrators of these crimes. “This is a crime that we should all react against together. The victim can be the prime minister or a citizen. But we should denounce it altogether,” he said.
Yet there is a graver situation with regard to wiretapping in the country, according to Kılıçdaroğlu. “There are some acts that turn illegal wiretapping into a legal one. You will ask how it is possible. If some officials apply to the court to legally wiretap journalists but submit fake names to do so, this is a graver crime. I wonder what the prime minister’s reaction to that was.”
Describing attempts to eavesdrop on Erdoğan as a serious and grave issue, the main opposition leader asked the prime minister to inform the people about the perpetrators of this crime and further explain his claim that he might have been wiretapped by the deep state. “I think the prime minister should first answer the question regarding what the deep state is. Which ‘deep state’ wiretapped Erdoğan? The legal one or the illegal one?”
Transportation Minister Binali Yıldırım is one of the people responsible for the wiretapping of Erdoğan, he maintained, recalling the minister’s advise that people not talk on the phone if they believe they are being eavesdropped on. “If you are disdainful of such an important issue, then it ends up with the wiretapping of the prime minister.”
Support to ODTÜ
Regarding ongoing attempts to isolate Middle East Technical University (ODTÜ), whose students protested Erdoğan last week, Kılıçdaroğlu criticized both the government members and rectors of other universities that issued statements criticizing ODTÜ and its students. “We are, of course, against violence. There should be no violence. But we are equally against an understanding that regards the students’ right to protest, to open placards and to shout slogans, as violence. We also do not approve of other universities’ attempts to see the incident through the eyes and discourse of the prime minister. These are not the real views of these universities but of the rectors appointed by the [ruling] Justice and Development Party (AKP),” he said.
Noting that Erdoğan was escorted by nearly 3,500 policemen at ODTÜ, he asked “Are you going to a university or to an enemy country?”
‘Erdoğan won’t be able to be the president’
Reaffirming his statement that he would vote for President Abdullah Gül if the presidential race of 2014 would be between Gül and Erdoğan, Kılıçdaroğlu said he believed Turkey would elect someone eligible to this post who will not be Erdoğan. “The people will surely not elect Recep Tayyip Erdoğan as president. Can someone polarizing Turkey that much be the president? Can someone who enjoys the tension be the president? I trust in my people,” he said.
…
December/27/2012
ANKARA – Hürriyet Daily News
Find this story at 27 December 2012
© http://www.hurriyetdailynews.com
Who bugged the Turkish prime minister? And other questions24 januari 2013
The rumors started to hit the political corridor as soon as Prime Minister Tayyip Erdoğan’s Security Chief Zeki Bulut was removed from office on Sept. 7, 2012.
He was actually appointed as the police chief of the Western Anatolian town of Denizli. On paper it was a promotion, but in fact it was a clear demotion according to tendencies in the Turkish bureaucratic system; you’d expect a bigger city after protecting the prime minister for years. A few days later it was understood that he was not alone. Most of the 200-strong team of bodyguards including four police commissars and five squad leaders were moved elsewhere; some papers had claimed that the entire police team and some civilian officers in the Prime Ministry building were replaced.
The rumors were about a number of bugs found in Erdoğan’s office by the electronic sweeping teams of the National Intelligence Organization (MİT). It was not possible to make that a proper news story since it was not possible to obtain even a tiny bit of information from any official source, until Erdoğan himself said on Dec. 21 in an NTV interview that he was also eavesdropped on, possibly by the remnants of a “deeper state” in Turkey. “A deeper state exists almost in every country,” he claimed. “We try a lot but unfortunately it is not possible to eradicate the deeper state”; that was in reference to the ongoing court cases of Ergenekon, Balyoz and OdaTV in which many army officers, academics, journalists and writers, lawyers and police chiefs are being tried for conspiring to overthrow the government.
Journalist Ahmet Şık, who was under arrest from one of those cases up until a few months ago claimed in an article in Birgün newspaper on Dec. 26 that the unveiling by Erdoğan exposed a rift within the ranks of the ruling Justice and Development Party (AK Parti) between the core and the followers of the U.S.-resident Islamic theologian Fethullah Gülen. According to this claim, the policemen removed from being the close guard of Erdoğan were sympathizers of the Gülen group, which has been serving the government dearly since the beginning of the Ergenekon, Balyoz and OdaTV probes. Prime Ministry sources deny the claims that the replacement of the bodyguards has anything to do with the bugs in the office.
Or should we say offices? Because according to the stories appearing in Hürriyet, Milliyet and Star newspapers on Dec. 26, the bugs were found in the last weeks of December 2011 in both the Prime Ministry building and the private office of Erdoğan in his apartment home in Ankara. That was when he returned from his more than 20-day stay in Istanbul following an intestinal operation there. The fact brings another factor into the equation. On Feb. 7, 2012 the Istanbul prosecutors who were working on the coup claim cases attempted to interrogate Hakan Fidan, the head of Turkish intelligence, MİT, together with two former officers, which made Erdoğan furious. A number of prosecutors and police officers who had been claimed by Turkish media to be close to the Gülen group were removed from their offices to less relevant positions and Erdoğan forced a law change from Parliament to make the prime minister’s permission obligatory to open an investigation into MİT officers. One has to recall that soon after Fidan had taken his office in May 2011, an illegally recorded tape was leaked to the media about the (failed) secret talks between the government and the outlawed Kurdistan Workers’ Party (PKK) in which Fidan had taken part.
…
December/27/2012
Find this story at 27 December 2012
© http://www.hurriyetdailynews.com
Speculations mount over PM’s wiretapping24 januari 2013
Fingers continue to be pointed as speculation grows in Ankara over who is responsible for wiretapping the prime minister
Speculations have been mounting over perpetrators of the eavesdropping of Prime Minister Recep Tayyip Erdoğan after he made public Dec. 21 that wiretapping devices were found in his home-office.
Erdoğan then suggested it was actors within the deep state behind the wiretapping, but fell short of further elaborating on who the deep-state members were exactly. Days later on Dec. 25 Erdoğan offered to close the “bugs issue,” but noted one more bug had been found at his residence.
Deep state refers to a term extensively used in Turkey to describe clandestine collaboration between high-level state security forces and criminal organizations.
Some critics pointed to the Fethullah Gülen movement for eavesdropping on the premier, recalling conflict between the government and the Gülen movement that surfaced when National Intelligence Organization (MİT) chief Hakan Fidan was called to testify as part of the Kurdistan Communities Union (KCK) probe.
The Gülen movement is an influential moderate-Islamist movement led by Fethullah Gülen, who now resides in the United States. The movement has been accused by critics of manipulating Turkey’s judicial and security apparatus. The Gülen movement has generally lent support to the ruling Justice and Development Party (AKP) since its foundation in 2001.
However, an apparent conflict between the ruling party and the movement surfaced earlier this year when a specially-authorized prosecutor in Istanbul called MİT head Fidan to testify about secret talks with the PKK on Feb. 7.
A special law was hastily adopted to prevent Fidan from testifying. In June, Erdoğan accused the specially-authorized courts of “going too far.” “He was instructed by me. If you want to take someone [to prosecute], then take me,” Erdoğan had said.
In July, specially-authorized courts were abolished despite objection from newspapers close to the Gülen movement.
Journalist Ahmet Şık underlined in daily BirGün Dec. 25 that Erdoğan’s doubts of being wiretapped were not new as he held doubts since February when Fidan was called to testify by prosecutors at a time when he was in the hospital.
Two separate bugging devices were found at Erdoğan’s office in his house. These devices are currently being examined by the MİT, according to reports.
Suspicions that Erdoğan was being wiretapped were voiced by the opposition when Erdoğan’s security chief and all of his bodyguards were changed in September. After Erdoğan’s office at Parliament was renovated from top to bottom in October, main opposition Republican People’s Party (CHP) deputy chair Gürsel Tekin issued a Parliamentary question to Erdoğan on Dec. 3. “The renovation of the prime minister’s office coincides with the replacement of his bodyguards. This move raises suspicion whether the prime minister was eavesdropped on,” Tekin said.
Nationalist Movement Party (MHP) secretary-general İsmet Büyükataman, for his part, asked yesterday if the MİT knew who secretly listened to Erdoğan. “Does the MİT know who eavesdropped on Erdoğan? Have they taken the necessary precautions? Is the Republic of Turkey so helpless that it is unable to find who put those bugs in the prime minister’s office?” Büyükataman said in a statement.
…
December/27/201 ANKARA – Hürriyet Daily News
Find this story at 27 December 2012
© http://www.hurriyetdailynews.com
Mysterious clandestine group behind Turkish wiretap case24 januari 2013
Early last January, two concealed audio surveillance devices were found at the Ankara headquarters of Turkey’s Republican People’s Party (CHP). Officials and supporters of the center-left party, which is currently Turkey’s main opposition political force, were shocked by the discovery, and an investigation was launched to uncover the culprits. In a surprising move, Turkish police raided late last week the home of a prominent union official, and discovered documents that are said to directly link the CHP wiretaps with Ergenekon, a shadowy ultranationalist network with strong links to the Turkish armed forces. The documents were reportedly discovered at the home of Mustafa Özbek, chairperson of the Türk Metal workers’ union, who is already in prison awaiting trial on criminal conspiracy charges. They appear to disclose that the Ergenekon group set up a clandestine network of safe houses in Turkish capital Ankara, as well as in the occupied Turkish Republic of Northern Cyprus, for the sole purpose of wiretapping the communications of targeted individuals and organizations. The safe houses were reportedly equipped with wiretapping systems purchased in Israel, some of which were portable and were thus moved to various cities and towns in Turkey, in accordance with Ergenekon mission directives. Ergenekon is a clandestine ultra-nationalist organization with secularist and anti-Western objectives. Its membership, which is reportedly drawn primarily from Turkey’s military and security establishments, is involved in both criminal and political activities aiming to preserve the political power of Turkey’s armed forces, while subverting the rise of Islamism and keeping Turkey out of the European Union. The existence of this mysterious organization was revealed in 2001 by Tuncay Güney, an operative of Turkey’s National Intelligence Organization (MİT), who was arrested for petty fraud. Rumors about the group resurfaced in 2007, when police in Istanbul’s Ümraniye neighborhood discovered a safe house containing dozens of hand grenades. The discovery sparked a broad juridical investigation into Ergenekon’s activities, which has so far revealed that the shadow network has carried out several targeted assassinations aimed at toppling Turkey’s pro-Islamic government “by creating chaos and mayhem”. Among those individuals listed as targets in Ergenekon’s recent wiretap conspiracy are officials and maintenance staff at CHP’s headquarters, as well as several leftist politicians and union officials.
…
March 10, 2009 by intelNews
Tuncay Güney
By IAN ALLEN | intelNews.org |
Find this story at 10 March 2009
Bradley Manning denied chance to make whistleblower defence24 januari 2013
Judge rules that Manning will not be allowed to present evidence about his motives for the leak – a key plank of his defence
Colonel Denise Lind ruled that general issues of motive were not relevant to the trial stage of the court martial. Photograph: Patrick Semansky/AP
Bradley Manning, the US soldier accused of being behind the largest leak of state secrets in America’s history, has been denied the chance to make a whistleblower defence in his upcoming court martial in which he faces possible life in military custody with no chance of parole.
The judge presiding over Manning’s prosecution by the US government for allegedly transmitting confidential material to WikiLeaks ruled in a pre-trial hearing that Manning will largely be barred from presenting evidence about his motives in leaking the documents and videos. In an earlier hearing, Manning’s lead defence lawyer, David Coombs, had argued that his motive was key to proving that he had no intention to harm US interests or to pass information to the enemy.
The judge, Colonel Denise Lind, ruled that general issues of motive were not relevant to the trial stage of the court martial, and must be held back until Manning either entered a plea or was found guilty, at which point it could be used in mitigation to lessen the sentence. The ruling is a blow to the defence as it will make it harder for the soldier’s legal team to argue he was acting as a whistleblower and not as someone who knowingly damaged US interests at a time of war.
“This is another effort to attack the whistleblower defence,” said Nathan Fuller, a spokesman for the Bradley Manning support network, after the hearing.
The judge also blocked the defence from presenting evidence designed to show that WikiLeaks caused little or no damage to US national security. Coombs has devoted considerable time and energy trying to extract from US government agencies their official assessments of the impact of WikiLeaks around the world, only to find that he is now prevented from using any of the information he has obtained.
The 25-year-old intelligence analyst faces 22 charges relating to the leaking of hundreds of thousands of classified diplomatic cables, war logs from the Afghan and Iraq wars, and videos of US military actions. The most serious charge, “aiding the enemy”, which carries the life sentence, accuses him of arranging for state secrets to be published via WikiLeaks on the internet knowing that al-Qaida would have access to it.
…
Ed Pilkington in New York
guardian.co.uk, Thursday 17 January 2013 18.22 GMT
Find this story at 17 January 2013
© 2013 Guardian News and Media Limited or its affiliated companies. All rights reserved.
UN official calls on British government to investigate undercover police scandal24 januari 2013
Maina Kiai says he is ‘deeply concerned’ about use of officers such as Mark Kennedy to infiltrate non-violent groups
Mark Kennedy, an undercover police officer who infiltrated a group of environmental protesters. Photograph: Philipp Ebeling
A senior United Nations official has called on the British government to launch a judge-led public inquiry into the “shocking” case of Mark Kennedy and other undercover police officers who have been infiltrating protest groups.
Maina Kiai, a UN special rapporteur, said the scandal involving undercover police cultivating intimate sexual relationships with political activists over long periods of time had been as damaging as the phone-hacking controversy that prompted the Leveson inquiry.
He said he was “deeply concerned” about the UK’s use of undercover police officers in non-violent groups exercising their democratic rights to protest.
“The case of Mark Kennedy and other undercover officers is shocking as the groups in question were not engaged in criminal activities,” Kiai told a central London news conference. “The duration of this infiltration, and the resultant trauma and suspicion it has caused, are unacceptable in a democracy.
“It is a clear violation of basic rights protected under the Human Rights Act, and more generally under international law, such as the right to privacy.”
He added: “This is not a James-Bond-type movie issue. I think it is unacceptable that the state can pay somebody who will use women, and be part of their lives and then just devastate them and leave them. That’s unbelievable.”
Kiai is the latest senior figure to call for a full investigation into the controversy since the Guardian began revealing details of the spy operation two years ago. The undercover policing controversy will be raised in parliament next month during a special hearing hosted by the home affairs select committee.
Undercover police have been living double lives for several years among protest groups, sometimes even residing with female activists and spending weeks abroad with them on holiday. At the end of their deployment, the police spies vanish without a trace.
The surveillance operation, which has continued to plant long-term spies in protest groups despite recent controversies, comes under the remit of an initiative to combat what police call domestic extremism. Many of the targets of the operation have turned out to be law-abiding anti-capitalist campaigners or protesters against global warming.
In at least three cases, relationships between police and the women they were spying on have resulted in the birth of children.
The UN rapporteur’s preliminary report follows a 10-day fact-finding mission to London, Belfast and Edinburgh. Kiai met campaigners, senior police, civil servants and the home secretary, Theresa May. He said she told him a full inquiry into undercover policing was “not something on the agenda”.
However, Kiai, who has responsibility in the UN for the rights to freedom of peaceful assembly, said he believed the case of Kennedy and others had left a “trail of victims and survivors in its wake” who deserved answers.
Eleven women and one man are bringing a high court legal action for the emotional trauma suffered as a result of “deeply personal” relationships they formed with men who turned out to be police officers.
A judge ruled last week that some of their claims should be heard by the Investigatory Powers Tribunal, an obscure body that usually deals with complaints against MI5 and MI6.
Mr Justice Tugendhat cited the fictional case of James Bond to argue that when parliament introduced legislation allowing covert police to have personal relationships with targets, they must have assumed they may have sexual encounters.
Rejecting the idea that it could be a “James Bond movie issue”, Kiai said: “I therefore call on the authorities to undertake a judge-led public inquiry into the Mark Kennedy matter, and other related cases, with a view to giving voice to victims, especially women, who were deliberately deceived by their own government, and paving the way for reparations.”
The government has so far resisted calls for a judge-led inquiry, instead choosing to back a host of other separate reviews into the conduct of Kennedy and related issues.
…
Paul Lewis and Rob Evans
The Guardian, Wednesday 23 January 2013 16.49 GMT
Find this story at 23 January 2013
© 2013 Guardian News and Media Limited or its affiliated companies. All rights reserved.
Women who had relationships with police spies win partial legal victory24 januari 2013
Judge rules half of the women’s cases can be heard in open court but half must be first heard by secret tribunal
The judge said that claims against two police officers – Mark Kennedy (pictured above) and a second spy who posed as Mark Jacobs – should first be heard by the Investigatory Powers Tribunal. Photograph: Philipp Ebeling
Ten women who say they were deceived into having sexual relationships with undercover police officers have won only a partial victory in their fight to have their case heard in the high court.
Mr Justice Tugendhat said the lawsuit alleged “the gravest interference” with the fundamental rights of women who had long-term relationships with police officers sent to spy on their political groups. The judge rejected an attempt by the Metropolitan police to have the whole case struck out of the court.
However, in a mixed ruling, the judge said that half the cases in the legal action should first be heard by a secretive tribunal that usually deals with complaints against MI5.
The case relates to a joint lawsuit brought by 10 women and one man who claim they suffered emotional trauma after forming “deeply personal” relationships with the police spies.
In his ruling, Tugendhat acknowledged that the allegations made by the women were “very serious”. He added that the case appeared to be unprecedented. “No action against the police alleging sexual abuse of the kind in question in these actions has been brought before the courts in the past, so far as I have been made aware.”
The judge drew a comparison with James Bond, the fictional member of the intelligence service who “used relationships with women to obtain information, or access to persons or property”.
Although Ian Fleming, the writer of the Bond series, did not dwell on “psychological harm he might have done to the women concerned”, the judge said fictional accounts such as these point to how “intelligence and police services have for many years deployed both men and women officers to form personal relationships of an intimate sexual nature”.
Lawyers for the Met had attempted to have all 11 cases struck out of the court, arguing they constituted an abuse of process and should instead by heard by the Investigatory Powers Tribunal (IPT), a little-known complaints body.
However, they achieved only a partial victory.
In his ruling, the judge said that claims against two police officers – Mark Kennedy and a second spy who posed as Mark Jacobs – should first be heard by the IPT. Both of these officers were deployed after 2000, and some of the claims allege their activities constituted a breach of the Human Rights Act, which came into force in October that year.
However, the judge said that other claims for damages under common law, including torts of misfeasance in public office, deceit, assault and negligence, should be heard by the high court.
He temporarily stayed high court proceedings pending the conclusion of cases at the IPT. The special tribunal was introduced in 2000 to examine complaints from the public about unjustified state surveillance within what it calls “a necessary ring of secrecy”. Complainants do not see the evidence put forward by the state and have no automatic right to an oral hearing. Neither can they appeal its decision.
Lawyers for the some of the women described the decision to send half of the cases to the tribunal as an “outrage”.
Harriet Wistrich, of Birnberg Peirce, said: “We brought this case because we want to see an end to sexual and psychological abuse of campaigners for social justice and others by undercover police officers. We are outraged that the high court has allowed the police to use the IPT to preserve the secrecy of their abusive and manipulative operations in order to prevent public scrutiny and challenge.”
…
Rob Evans and Paul Lewis
guardian.co.uk, Thursday 17 January 2013 14.01 GMT
Find this story at 17 January 2013
© 2013 Guardian News and Media Limited or its affiliated companies. All rights reserved.
Did US spies hack French government computers using Facebook?24 januari 2013
A sophisticated computer virus discovered at the center of the French government’s secure computer network was planted there by the United States, according to unnamed sources inside France’s intelligence community. Paris-based magazine L’Express, France’s version of Time magazine, says in its current issue that the alleged American cyberattack took place shortly before last April’s Presidential elections in France. It resulted in the infection of the entire computer system in the Palais de l’Élysée, which is the official residence of the President of France. The French magazine cites unnamed sources inside the French Network and Information Security Agency (ANSSI), which is responsible for cybersecurity throughout France. The sources claim that the snooping virus allowed its handlers to gain access to the computers of most senior French Presidential aides and advisers during the final weeks of the administration of French President Nicolas Sarkozy, including his Chief of Staff, Xavier Musca. The article claims that the virus used a source code nearly identical to that of Flame, a super-sophisticated version of Stuxnet, the virus unleashed a few years ago against the computer infrastructure of the Iranian nuclear energy program. Many cybersecurity analysts believe that the US and Israel were instrumental in designing both Stuxnet and Flame. IntelNews understands that the alleged virus was initially directed at employees of the Palais de l’Élysée through Facebook. The targets were allegedly befriended by fake Facebook profile accounts handled by the team that operated the virus. The targets were then sent phishing emails that contained links to phony copies of the login page for the Palais de l’Élysée intranet website. Though that bogus website the hackers acquired username and password data of several Palais de l’Élysée staffers, which they subsequently used to gain access to the Presidential Palace’s computer system. Assuming that the virus planted on the Palais de l’Élysée intranet was similar to Flame in method and scope, it can be inferred that its handlers were able to spy on conversations taking place at the Palais using the infected computers’ audiovisual peripherals, as well as log keystrokes and acquire screen shots at regular intervals. The collected data was then routed through a host of different servers on five continents before reaching the hackers.
…
November 22, 2012 by Joseph Fitsanakis 6 Comments
By JOSEPH FITSANAKIS | intelNews.org |
Find this story at 22 November 2012
Cyberguerre: comment les Américains ont piraté l’Élysée24 januari 2013
EXCLUSIF. En mai, l’équipe de Nicolas Sarkozy a été victime d’une opération d’espionnage informatique hypersophistiquée. Les sources de L’Express concordent : le coup vient de… l’ami américain. Révélations sur une attaque qui s’inscrit dans une bataille planétaire.
CYBERGUERRE – Les intrus qui se sont introduits dans les réseaux informatiques de l’Elysée en mai dernier ont subtilisé des notes secrètes et des plans stratégiques à partir des ordinateurs de proches conseillers de Nicolas Sarkozy.
DR
C’est l’un des hold-up les plus audacieux réalisés contre l’Etat français. En mai dernier, quelques jours avant le second tour de l’élection présidentielle, des pirates ont réussi à s’introduire dans les réseaux informatiques de l’Elysée. Révélée par le quotidien régional Le Télégramme, cette intrusion avait alors été soigneusement étouffée par le Château. Une omerta qui, jusqu’à présent, n’avait pas été brisée. Aucune information n’avait filtré sur la nature des agresseurs, ou même sur le préjudice subi. Pourtant, l’affaire est grave, d’autant qu’elle constituerait une cyberattaque sans précédent entre pays alliés.
L’Express peut révéler que les intrus ont non seulement réussi à pénétrer au coeur même du pouvoir politique français, mais qu’ils ont pu fouiller les ordinateurs des proches conseillers de Nicolas Sarkozy. Des notes secrètes ont été récupérées sur des disques durs, mais aussi des plans stratégiques. Du vrai travail de pro, digne du dernier James Bond, Skyfall. Et, comme souvent dans ce type d’attaque, une négligence humaine est à l’origine de la catastrophe.
L’ordinateur du secrétaire général de l’Elysée pillé
Tout a commencé sur Facebook. Les assaillants ont d’abord identifié, sur le réseau social, le profil de personnes travaillant au palais présidentiel. Se faisant passer pour des amis, ils les ont ensuite invitées, par un message électronique, à se connecter sur l’intranet du Château. Sauf que ce lien menait à une fausse page Web – une réplique de celle de l’Elysée. Les victimes n’y ont vu que du feu ; et lorsque est apparu, à l’écran, un message leur demandant leur identifiant et leur mot de passe, elles les ont donnés en toute bonne foi. Une technique bien connue des hackers, qui leur a permis de récupérer les clefs numériques pour s’inviter en toute quiétude dans le saint des saints.
Une fois à l’intérieur, les pirates ont installé un logiciel espion qui s’est propagé d’un ordinateur à l’autre. Très élaboré, ce “ver” n’a infecté que quelques machines. Et pas n’importe lesquelles : celles des conseillers les plus influents du gouvernement… et du secrétaire général, Xavier Musca. Nicolas Sarkozy y a, lui, échappé. Et pour cause, il ne possédait pas de PC. Malheureusement pour les assaillants, le code malveillant a laissé des empreintes. “Telles des marionnettes actionnées par des fils invisibles, les machines infectées communiquent avec leur maître pour prendre leurs ordres, décrypte un expert, Olivier Caleff, responsable sécurité du Cert-Devoteam, une société de sécurité informatique. Lorsque l’on essaie de remonter ces fils sur Internet, on arrive souvent sur des serveurs situés à l’étranger.”
C’est ce travail de fourmi qu’ont mené les enquêteurs français. Le degré de sophistication de l’attaque était tel que les suspects se limitaient, d’emblée, à une poignée de pays. Pour preuve, le cyberpompier de l’Etat, l’Agence nationale de la sécurité des systèmes d’information (Anssi), a mis plusieurs jours pour restaurer le réseau de l’Elysée. Difficile de trouver l’origine de l’offensive. Souvent, les assaillants brouillent les pistes en passant par des pays tiers. Autant de rebonds, sur des serveurs situés sur les cinq continents, qui rendent ce fil d’Ariane très compliqué à suivre, même pour les “cyberdétectives” de l’Etat mobilisés pour l’occasion. Mais, selon les informations recueillies par L’Express auprès de plusieurs sources, leurs conclusions, fondées sur un faisceau de présomptions, convergent vers le plus vieil allié de la France : les Etats-Unis.
Le virus porte la marque de son auteur
Le code malveillant utilisé affiche, en effet, les mêmes fonctionnalités qu’un ver informatique extrêmement puissant, baptisé Flame, identifié à la fin du mois de mai par une grande société russe d’antivirus, Kaspersky. “Très perfectionné, il peut collecter les fichiers présents sur une ma-chine, réaliser des captures d’écran et même activer le microphone d’un PC pour enregistrer les conversations, expli-que Vitaly Kamluk, spécialiste du sujet chez cet éditeur. Sa conception a demandé beaucoup d’argent et des moyens humains que seul un grand pays est en mesure de mobiliser.” Ou même deux : selon la presse anglo-saxonne, le ver aurait été créé par une équipe américano-israélienne, car il devait viser initialement des pays du Moyen-Orient (Iran, Egypte). Autre élément à charge : tel un peintre reconnaissable à son trait, un virus porte les marques du savoir-faire de son auteur. Janet Napolitano, secrétaire d’Etat à la Sécurité intérieure de l’administration Obama, n’a ni confirmé ni démenti nos informations.
Contactés à ce sujet, ni l’Anssi ni l’Elysée n’ont souhaité faire de commentaires. Reste une question. Pourquoi un allié de la France lancerait-il une telle opération ? “Vous pouvez être en très bons termes avec un “pays ami” et vouloir, en même temps, vous assurer de son soutien indéfectible, surtout dans une période de transition politique”, note un proche du dossier, sous le couvert de l’anonymat. Sans compter que l’Elysée joue un rôle clef dans la signature de grands contrats avec des pays étrangers, notamment au Moyen-Orient. “C’était encore plus vrai à l’époque de Nicolas Sarkozy”, rappelle Nicolas Arpagian, directeur scientifique du cycle sécurité numérique à l’Institut national des hautes études de la sécurité et de la justice.
Un instantané des cyberattaques en cours…
HoneyMap réalisé par Honeynet Project
Quitte à être espionné, sans doute vaut-il mieux l’être par un allié… “Nous avons de grands partenaires avec lesquels nous collaborons et entretenons des relations de confiance, et d’autres avec qui nous ne partageons pas les mêmes valeurs”, rappelle le contre-amiral Arnaud Coustillière, responsable du volet militaire de la cyberdéfense française. Il n’empêche, l’attitude de l’administration Obama suscite de nombreuses interrogations.
Vers des attaques “pires que le 11 Septembre” ?
Dans une version du livre blanc sur la défense, actuellement en cours de rédaction, des auteurs ont soulevé les ambiguïtés de Washington. “Face à la difficulté d’utiliser les voies de droit, [les Etats-Unis] ont recours de plus en plus à l’action clandestine, ce qui peut poser une question de contrôle démocratique.”
Ironie du sort, le Congrès américain vient, le 14 novembre, de publier un rapport accablant sur l'”acteur le plus menaçant du cyberespace”, à savoir… la Chine. Leon Panetta, secrétaire d’Etat à la Défense, a même déclaré récemment que, par leur puissance numérique, “certains pays” seraient, d’ores et déjà, capables de provoquer un “cyber-Pearl Harbor” : “Ce serait pire que le 11 Septembre ! Des assaillants pourraient faire dérailler un train de voyageurs ou un convoi de produits chimiques dangereux. Ou, encore, contaminer les systèmes d’eau des grandes villes ou éteindre une grande partie du réseau électrique.” Le tout en se cachant derrière des écrans d’ordinateurs situés à des milliers de kilomètres…
Dans le monde virtuel, tous les coups sont permis
Leon Panetta sait de quoi il parle. L’Oncle Sam a déjà utilisé ces moyens. C’était en 2010, lors de l’opération “Jeux olympiques”, lancée conjointement avec Israël contre l’Iran. Leur logiciel Stuxnet aurait endommagé un grand nombre des centrifugeuses utilisées par Téhéran pour enrichir de l’uranium. Spectaculaire, cette opération ne doit pas faire oublier que d’autres nations oeuvrent dans l’ombre. Dans le plus grand secret, de nombreux pays, démocratiques ou non, fourbissent leurs armes numériques. Des forces secrètes se constituent, des mercenaires vendent leurs services aux plus offrants. Sans foi ni loi. La Toile n’est pas un champ de bataille comme les autres. Oubliez les codes de l’honneur, les conventions internationales ou les alliances. Tous les coups sont permis. Et mieux vaut avoir les moyens de se battre. Dans le cyberespace, personne ne vous entendra crier.
Pour s’en convaincre, il suffit de se rendre au quartier général de l’Otan, à Bruxelles. Tou-tes les nuits, vers 1 heure, c’est le même rituel, explique l’un des responsables européens de la sécurité au sein de l’organisation. “Sur une carte, à l’écran, on voit des dizaines de lumières s’allumer en Chine, explique-t-il. Ce sont les hackers qui, le matin, lancent des attaques lorsqu’ils arrivent au boulot. Et, le soir, elles s’éteignent quand ils rentrent chez eux.” Même constat d’un proche de la NSA, l’agence de renseignement des Etats-Unis : “Parfois, nous enregistrons une baisse sensible des tentatives d’intrusion sur nos sites, témoigne-t-il. Invariablement, cela correspond à des jours fériés en Chine.” Mais l’image d’une “superagence” où des armées de pirates travailleraient en batterie pour ravir les secrets de l’Occident ne reflète pas la réalité. Selon ce même agent, “leur capacité offensive est beaucoup moins centralisée qu’on pourrait l’imaginer. De nombreuses régions ont mis en place leur propre dispositif, qui dépend du bureau politique local. Et il n’est pas rare que ces factions se combattent entre elles.”
Coût d’une attaque : quelques centaines de milliers d’euros
Un hacker, qui souhaite rester anonyme, pense, lui aussi, que l’on surestime un peu le “cyberpéril jaune”. “J’ai eu l’occasion de voir travailler les Chinois, ce ne sont pas les plus affûtés, dit-il. Leurs techniques sont assez rudimentaires par rapport à celles des Américains ou des Israéliens…”
REUTERS/Minoru Iwasaki/Pool
“Les questions de sécurité alimentaire, d’énergie et de cybersécurité deviennent plus aiguës”
Hu Jintao, secrétaire général du Parti communiste chinois, novembre 2012.
A chaque pays sa spécificité. En Russie, le dispositif d’attaque est opaque. De nombreux spécialistes occidentaux du renseignement soupçonnent l’existence d’une relation triangulaire entre l’Etat, la mafia et certaines sociétés de conseil informatique qui seraient le bras armé du Kremlin. “Avez-vous déjà vu, en Russie, un hacker avoir des problèmes avec la police ? questionne Garry Kasparov, ancien champion du monde d’échecs, aujourd’hui l’un des opposants au président Poutine. Non, parce que l’on sait qui se trouve aux manettes, dans l’ombre…”
Contrairement à ce que l’on pourrait croire, les Européens ne sont pas en reste. La France, c’est une surprise, dispose d’une force de frappe numérique. Mais on trouve aussi, sur l’échiquier mondial, des Etats moins avancés sur le plan technique, tels l’Iran et la Corée du Nord. Nul besoin, en effet, d’investir dans des infrastructures coûteuses. Il suffit d’un ordinateur, d’un accès à Internet et de quelques centaines de milliers d’euros pour monter une attaque. Car sur la Toile, comme dans la vraie guerre, on trouve toutes sortes d’armes sur le marché. Il suffit de frapper aux bonnes portes. Au lieu d’une kalachnikov, on repartira avec un logiciel malveillant (malware, dans le jargon) qui permettra de prendre le contrôle d’un système ennemi. La première motivation : “Faire du business !”
“C’est un enjeu de domination. En maîtrisant l’information, on contrôle tout”, résume Jonathan Brossard. Ce hacker français renommé intervient aujourd’hui dans des groupes internationaux.
Son job consiste à s’introduire dans les systèmes informatiques pour en révéler les failles – et trouver des parades. Pour lui, les risques d’un cyberconflit existent, mais ils masquent une autre motivation, bien plus puissante : “Faire du business ! Etre capable de griller un réseau électrique, c’est bien, mais le véritable enjeu, c’est surtout de gagner des parts de marché.” Connaître, dans le détail, la proposition d’un concurrent, lors d’un gros appel d’offres, donne un avantage décisif. Pour l’avoir négligé, certaines sociétés ont péri. Des pirates – chinois semble-t-il – ont pillé les secrets du géant canadien des télécoms Nortel pendant près de dix ans, au point de l’acculer à la faillite. De tels exemples abondent.
Et la France n’est, malheureusement, pas épargnée. Les grandes entreprises du CAC 40 compteraient même parmi les plus vulnérables d’Europe. Sur ce nouveau champ de bataille invisible, on ne compte pas les morts, mais les points de PIB perdus. Et, derrière, sans doute des emplois par milliers.
Batailles de virus
STUXNET
Découverte : juin 2010.
Cible : ce logiciel a détruit des milliers de centrifugeuses nucléaires, en Iran.
Origine supposée : opération “Jeux olympiques”, menée par les Etats-Unis et Israël.
DUQU
Découverte : septembre 2011.
Cible : lié à Stuxnet, ce ver informatique a servi à espionner le programme nucléaire iranien.
Origine supposée : Etats-Unis et Israël.
MAHDI
Découverte : février 2012.
Cible : capable d’enregistrer les frappes sur un clavier et les photos et textes d’un ordinateur, Mahdi a été retrouvé en Iran, en Afghanistan et en Israël.
Origine supposée : inconnue.
WIPER
Découverte : avril 2012.Cible : ce virus fait disparaître les données des disques durs des ordinateurs infectés. Il a touché des compagnies pétrolières iraniennes.
Origine supposée : inconnue.
FLAME
Découverte : mai 2012.
Cible : ce logiciel très sophistiqué aurait espionné depuis 2007 plusieurs pays, dont l’Iran, la Syrie, le Soudan, ou encore l’Arabie saoudite.
Origine supposée : opération des Etats-Unis et d’Israël.
GAUSS
Découverte : juin 2012.
Cible : capable d’espionner les transactions financières et messages électroniques, ce virus s’est répandu au Liban, en Israël et en Palestine.
Origine supposée : inconnue.
SHAMOON
Découverte : août 2012.
Cible : les ordinateurs des compagnies pétrolières saoudiennes Aramco et RasGas au Qatar ont été attaqués par ce virus.
Origine revendiquée : groupe de hackers appelé “Glaive tranchant de la justice”, peut-être d’origine iranienne.
La réaction de l’ambassade des Etats-Unis à Paris
Nous réfutons catégoriquement les allégations de sources non-identifiées, parues dans un article de l’Express, selon lesquelles le gouvernement des Etats-Unis d’Amérique aurait participé à une cyberattaque contre le gouvernement français. La France est l’un de nos meilleurs alliés. Notre coopération est remarquable dans les domaines du renseignement, du maintien de l’ordre et de la cyberdéfense. Elle n’a jamais été aussi bonne et demeure essentielle pour mener à bien notre lutte commune contre la menace extrémiste.
Mitchell Moss, porte-parole de l’ambassade des Etats-Unis à Paris
REUTERS/Larry Downing
“La cybermenace est l’un des plus sérieux défis auxquels nous soyons confrontés en tant que nation”
Barack Obama, président des Etats-Unis, mai 2009.
REUTERS/Neil Hall
“Nous consacrerons un budget de plus d’un demi-milliard de livres [626 millions d’euros] à la cybersécurité”
David Cameron, Premier ministre britannique, octobre 2010.
REUTERS/Thomas Peter
“Les attaques cybernétiques sont aussi dangereuses que la guerre conventionnelle”
Angela Merkel, chancelière allemande, avril 2011.
Par Charles Haquet et Emmanuel Paquette (L’Express) – publié le 20/11/2012 à 15:31
Find this story at 20 November 2012
© Groupe Express-Roularta
Onterechte weigering circus in Almelo. Almelo vreest onterecht demonstraties dierenrechtenactivisten24 januari 2013
Circus Belly-Wien heeft in Almelo bezwaar aangetekend tegen de aan het circus geweigerde speelvergunning voor 2012. In TC/Tubantia lezen we waarom Almelo geen speelvergunning wilde afgeven aan Circus Belly-Wien: De gemeente vreest een verstoring van de openbare orde door vechtpartijen met dierenrechtenactivisten.
De door de gemeente Almelo genoemde demonstraties van dierenrechtenactivisten en vechtpartijen met dierenrechtenactivisten vonden plaats in voornamelijk 2009. Toen heeft een AIVD-infiltrant onder de schuilnaam “Paul Kraaijer” wekelijks demonstraties georganiseerd bij Circus Belly-Wien met slechts een doel: Het in kaart brengen van de in Nederland opererende dierenrechtenactivisten. Tijdens de demonstraties werden activisten door de aanwezige KLPD agenten gefotografeerd en gefilmd. Deze acties van de AIVD en de politie hebben uiteindelijk geleid tot de arrestatie van enkele bekende dierenrechtenactivisten, waaronder de “Vegan Streaker”. Dezelfde AIVD-infiltrant heeft Circus Belly-Wien in diskrediet gebracht. Sinds 2011 is er geen enkele keer meer gedemonstreerd tegen circusdieren. Ook zijn er sinds 2011 geen vechtpartijen meer geweest; ook niet bij Circus Belly-Wien. Door personeelswisselingen is de “grootste vechtersbaas” ook niet meer bij het circus aanwezig.
…
Almelo, 18 januari 2013
Find this story at 18 January 2013
© http://www.klassiekcircus.nl/
Circuscommissie ziet complot van AIVD tegen circus Belly Wien24 januari 2013
ALMELO – De gemeente Almelo heeft circus Belly Wien ten onrechte geweigerd, zegt de Commissie Klassiek Circus. De AIVD en de politie zouden een hetze tegen het circus zijn begonnen.
De commissie legt die complottheorie uit op de eigen website. Almelo weigert Belly Wien omdat de gemeente bang is voor ongeregeldheden. Die angst is gebaseerd op demonstraties van dierenrechtenactivisten en vechtpartijen elders.
…
Geplaatst op:
21 januari 2013
Laatste update:
21 januari, 12:18
Find this story at 21 January 2013
Copyright © 2012 Wegener Media
<< oudere artikelen nieuwere artikelen >>