Erdogans SchattenkriegerSo ungeniert spioniert Erdogan seine Gegner aus – mitten in Deutschland23 oktober 2015
Türkische Spione in Deutschland sollen Erdogan-Gegner ans Messer geliefert haben. Ein Prozess gegen einen Top-Spion zeigt jetzt, wie Ankaras Geheimdienst massiv Spitzel nach Deutschland einschleust.
Richterin Yvonne O. geriet ins Stocken. Die Verlesung des Haftbefehls gegen den mutmaßlichen türkischen Spion Taha Gergerlioglu, 59, hatte um 11.30 Uhr just begonnen, da stolzierte ein elegant gekleideter Herr in den Verhandlungssaal. Der Mann übersah mit diplomatischer Arroganz die einfachen Justizbeamten und erwartete Respekt. Immerhin, sagte er zu der Haftrichterin am Karlsruher Bundesgerichtshof, sei er der türkische Generalkonsul Serhat Aksen, 44. In schwerer Stunde wolle er seinem Landsmann Gergerlioglu beistehen, eingesperrt wegen angeblicher feindlicher Agententätigkeit in Deutschland.
Die sichtlich überraschte Richterin wollte gerade weiter den Haftbefehl vortragen, als das Telefon neben ihr klingelte. Ein Anwalt teilte im Auftrag eines Professors aus Ankara mit, dass der mutmaßliche Agentenführer zum einflussreichen Beraterstab des türkischen Präsidenten Recep Tayyip Erdogan gehöre.
„Damit“, so ein Ermittler zu FOCUS, „war die Katze aus dem Sack. Die Türken haben versucht, massiv auf die deutsche Justiz einzuwirken.“ Die mutmaßliche Botschaft, überbracht von Generalkonsul und Professor: Wenn dem Angeklagten auch nur ein Haar gekrümmt wird, bekommt ihr Erdogans Jähzorn zu spüren.
Den Boss nennen sie “Großbruder”
Die Bundesanwaltschaft stuft die Intervention im Gerichtssaal durchaus als „besonderen Umstand“ ein, lässt sich ansonsten aber nicht irritieren. Auch wenn Erdogans Top-Spion eine hohe Stellung im Staatsgefüge der Türkei bekleide, so sei er nach Staatsschutz-Ermittlungen gleichwohl der Anführer eines Agentenrings in der Bundesrepublik. Zwei seiner besonders aktiven Spitzel, der Arbeitslose Göksel G., 34, aus Bad Dürkheim und Reisekaufmann Duran Y., 59, aus Wuppertal, werden sich mit ihrem Chef Gergerlioglu vor Gericht verantworten müssen.
Die Spionage-Clique hatte ein klares Ziel: Verfolgung und Ausspähung von türkischen und kurdischen Dissidenten, die bei der Rückkehr in ihre Heimat vermutlich verhaftet und gefoltert wurden. Ende April 2014 teilte zum Beispiel Duran Y. seinem Führungsoffizier Gergerlioglu mit, dass einer der „Hetzer“ gegen Erdogan bald in die Türkei fahre. Der Boss, von seinen Spitzeln stets demütig als „Großbruder“ oder „Gouverneur“ angesprochen, versprach, dass man das Lästermaul nach der Einreise in die Türkei „sofort fertigmachen“ werde.
In Deutschland lebende Aktivisten der verbotenen Arbeiterpartei Kurdistans (PKK) sowie rebellische Jesiden waren in den Augen des Erdogan-Vertrauten die größten Staatsfeinde. Überdies galten auch Kommunisten der Partei DHKP-C als Top-Zielpersonen.
Das Stammkapital kommt aus der Operativ-Kasse
Der vierfache Familienvater Gergerlioglu, seit Studentenzeiten ein fleißiger Unterstützer Erdogans islamischkonservativer Partei AKP, begann offenbar 2011 seine erste Geheimmission in Deutschland. In Bad Dürkheim gründete der Textilingenieur mit seinem Komplizen Göksel G. eine Agentur zur Beratung von Firmen im deutsch-türkischen Handel. Eine Tarnadresse?
Das Stammkapital von 25 000 Euro kommt offenbar aus der Operativ-Kasse von Hakan Fidan, 46, Boss des mächtigen und allseits gefürchteten Geheimdienstes MIT. Fidan, Intimus von Erdogan, führt Agentennetze im In- und Ausland. Seine Kundschafter in Deutschland sind ihm besonders wichtig. Umso mehr dürfte es ihn geschmerzt haben, dass seine Spitzenkraft Gergerlioglu im Untersuchungsgefängnis landete.
Fidan, ein intelligenter und bulliger Typ, kennt die deutschen Sicherheitsbehörden sehr gut. Als türkischer Verbindungsoffizier zur Nato war er eine Zeitlang am „Allied Command Europe Rapid Reaction Corps“ in Mönchengladbach-Rheindahlen stationiert. Seit dieser Zeit gilt er als großer Fußballfan von Borussia Mönchengladbach.
Wer ist der größte Prahler? Die absurden Protzbauten von Staatsoberhäuptern
So smart Fidan wirken mag, so knallhart setzt er Erdogans Ideen um. Vor knapp zwei Jahren protokollierte der US-Geheimdienst NSA ein Telefonat von Fidan, in dem er mit einem hohen Offizier den heimtückischen Plan erörterte, in einer verdeckten Operation von syrischer Seite aus das Grabmal eines berühmten türkischen Religionslehrers beschießen und zerstören zu lassen.
Nach Fidans Konzept hätte dies der Anlass sein können, mit türkischen Truppen in Syrien einzumarschieren. Der Plan liegt bis heute in der Schublade. Stattdessen muss Erdogans Adlatus seit Monaten sein Image aufpolieren. Nahezu alle Geheimdienste in Europa werfen ihm vor, gefährliche Islamisten auf dem Weg nach Syrien ungehindert durch die Türkei ziehen zu lassen. Fahndungsersuchen aus Deutschland oder Frankreich wurden nachweislich missachtet.
Seinem Top-Spion Gergerlioglu und dessen Komplizen war offenbar kein Trick zu schmutzig. Ende 2013 nahmen sie sich den Anführer einer oppositionellen Glaubensgruppe vor. Staatsschützer des Hessischen Landeskriminalamts (LKA) konnten in abgehörten Telefonaten verfolgen, wie das Trio ihr Opfer Fetullah Güllen erledigen wollte. Mit Hilfe eines Fälschers sollte ein Dokument erstellt werden, aus dem hervorging, dass sich Güllen im Korankurs sexuell an Jungen vergangen habe. Diese belastende Nachricht, so die Ermittlungen, war eigens für den „Oberchef“ bestimmt – gemeint ist Recep Erdogan.
Er würde seinem Vorbild angeblich bis in den Tod folgen
Der türkische Staatspräsident war zu dieser Zeit ohnehin rachsüchtig. Kurz vor seinem Besuch in Köln erfuhr er im Mai 2014, dass Plakate in der Domstadt ihn als „unerwünschte Person“ dargestellt hatten. Zwei Wochen später nannten Erdogans Spezialagenten einen der angeblichen Aufwiegler: Diesen Mann, so hörten die LKA-Lauscher, müsse man „ficken“.
Der Prozess gegen das Spionage-Trio könnte die deutschtürkischen Beziehungen weiter belasten. Angebliche V-Mann-Operationen des Bundesnachrichtendienstes im Umfeld von Mördern eines Staatsanwalts brachten die Türken kürzlich in Rage.
Umgekehrt agiert man dezenter. Die deutschen Sicherheitsbehörden wissen seit Jahren, wie rücksichtslos die Spione von Hakan Fidan in der Bundesrepublik agieren – dennoch nimmt man auf den Nato-Partner Rücksicht. „Wenn’s nach den Türken ginge, könnten wir jede Woche ein Dutzend PKK-Leute festnehmen“, sagte ein früherer BKA-Staatsschutzchef zu FOCUS.
Hakan Fidan, der seinem Vorbild Erdogan angeblich treu bis in den Tod folgen würde, gilt als cleverer Geheimdienst-Boss. Seine Deutschland-Spione sitzen nicht nur in sogenannten legalen Residenturen wie Botschaft und Konsulate, sondern auch als Undercover-Agenten in türkischen Reisebüros, Redaktionen, Banken und Gebetshäusern.
Seine Trümpfe sind junge Türken
Die staatliche DITIB-Moschee in Köln-Ehrenfeld gilt als wichtiger Stützpunkt von Hakan Fidans Geheimdienst MIT. Die Vorbeter werden angeblich angewiesen, Informationen über Erdogans Kritiker sowie Personenfotos über vermeintliche Landesverräter zu liefern. Falls ein Rollkommando für harte Bestrafungsaktionen benötigt wird, stehen die Schläger der nationalistischen Grauen Wölfe gern bereit.
Fidans Trümpfe sind junge Türken, die in Deutschland geboren und aufgewachsen sind. Für viele von ihnen ist der Wehrdienst verpflichtend. Wenn sie einwilligen, dem Geheimdienst MIT aus patriotischen Gründen zu helfen, verkürzt sich ihre Militärzeit erheblich.
Zurück in Deutschland, arbeiten die zweisprachigen jungen Türken in Stadtverwaltungen, Hotels und Banken. Somit haben sie Zugang zu Daten, die den Agentenboss Fidan interessieren könnten. „Hakans Arm“, so ein LKA-Man, „ist verdammt lang.“
Samstag, 04.07.2015, 21:19 · von FOCUS-Reporter Josef Hufelschulte und FOCUS-Redakteur Axel Spilcker
Find this story at 4 July 2015
Drucken© FOCUS Online 1996-2015
Exclusive: Congress probing U.S. spy agencies’ possible lapses on Russia23 oktober 2015
Senior U.S. lawmakers have begun probing possible intelligence lapses over Moscow’s intervention in Syria, concerned that American spy agencies were slow to grasp the scope and intention of Russia’s dramatic military offensive there, U.S. congressional sources and other officials told Reuters.
A week after Russia plunged directly into Syria’s civil war by launching a campaign of air strikes, the intelligence committees of the U.S. Senate and House of Representatives want to examine the extent to which the spy community overlooked or misjudged critical warning signs, the sources said.
Findings of major blind spots would mark the latest of several U.S. intelligence misses in recent years, including Moscow’s surprise takeover of Ukraine’s Crimea region last year and China’s rapid expansion of island-building activities in the South China Sea.
Though spy agencies have sought to ramp up intelligence gathering on Russia since the crisis over Ukraine, they continue to struggle with inadequate resources because of the emphasis on counter-terrorism in the Middle East and the Afghanistan-Pakistan region, according to current and former U.S. officials.
A senior administration official, who also asked not to be identified, insisted that there were “no surprises” and that policymakers were “comfortable” with the intelligence they received in the lead-up to the Russian offensive.
Spy agencies had carefully tracked Russian President Vladimir Putin’s build-up of military assets and personnel in Syria in recent weeks, prompting White House criticism and demands for Moscow to explain itself.
But intelligence officers – and the U.S. administration they serve – were caught mostly off-guard by the speed and aggressiveness of Putin’s use of air power as well as a Russian target list that included U.S.-backed rebels, according to the officials, who spoke on condition of anonymity.
“They saw some of this going on but didn’t appreciate the magnitude,” one of the sources told Reuters.
Russia’s sudden move to ramp up its military involvement in the Syria crisis has thrown Obama’s Middle East strategy into doubt and laid bare an erosion of U.S. influence in the region.
A shortage of reliable information and analysis could further hamper President Barack Obama’s efforts to craft a response on Syria to regain the initiative from Washington’s former Cold War foe.
BEHIND THE CURVE?
It is unclear how his administration could have reacted differently with better intelligence, though advance word of Putin’s attack plans might have allowed U.S. officials to warn the moderate Syrian opposition that they could end up in Russia’s line of fire.
Obama, who is reluctant to see America drawn deeper into another Middle East conflict, has shown no desire to directly confront Russia over its Syria offensive – something Moscow may have taken as a green light to escalate its operations.
Syrian troops and militia backed by Russian warplanes mounted what appeared to be their first major coordinated assault on Syrian insurgents on Wednesday and Moscow said its warships fired a barrage of missiles at them from the Caspian Sea, a sign of its new military reach.
Russia’s military build-up now includes a growing naval presence, long-range rockets and a battalion of troops backed by Moscow’s most modern tanks, the U.S. ambassador to NATO said.
The U.S. administration believes it now has a better understanding at least of Putin’s main motive – to do whatever it takes to prop up Syrian President Bashar al-Assad. But Washington remains uncertain exactly how much further Putin is willing to go in terms of deployment of advanced military assets, the U.S. officials said.
The lack of clarity stems in part from the limited ability of U.S. intelligence agencies to discern what Putin and a tightly knit circle of advisers are thinking and planning.
In a tense meeting with Putin at the United Nations early last week, Obama was not given any advance notice of Russia’s attack plans, aides said. Russian air strikes began two days later, including the targeting of CIA-trained “moderate” anti-Assad rebels, though Moscow insisted it only hit Islamic State insurgents.
“They did not expect the speed with which Putin ramped things up,” said Michael McFaul, Obama’s former ambassador to Moscow. “He likes the element of surprise.”
U.S. intelligence agencies did closely follow and report to policymakers Russian moves to sharply expand infrastructure at its key air base in Latakia as well as the deployment of heavy equipment, including combat aircraft, to Syria, officials said.
“We’re not mind readers,” the senior administration official said. “We didn’t know when Russia would fly the first sortie, but our analysis of the capabilities that were there was that they were there for a reason.”
However, several other officials said U.S. agencies were behind the curve in assessing how far the Russians intended to go and how quickly they intended to launch operations.
In fact, right up until a White House briefing given shortly after the bombing began, Obama press secretary Josh Earnest declined to draw “firm conclusions” on Russia’s strategy.
CONFUSION OVER RUSSIAN INTENT
One source suggested that U.S. experts initially thought the Russian build-up might have been more for a military “snap exercise” or a temporary show of force than preparations for sustained, large-scale attacks on Assad’s enemies.
Another official said that after initial review, congressional oversight investigators believe that “information on this was not moving quickly enough through channels” to policymakers.
And another source said there had been a “lag of a week” before agencies began voicing full-throated alarm about imminent Russian military operations.
The senior administration official said, however, that “I don’t think anybody here perceived a gap” in intelligence.
In their reviews of how U.S. intelligence handled the Syria build-up, officials said congressional intelligence committees would examine reports issued by the agencies and question officers involved in the process, according to congressional and national security sources. At the moment, no public hearings are planned, the officials said.
Though the senior administration official denied the intelligence community was paying any less attention to Syria, John Herbst, a former U.S. ambassador to Ukraine, said that not enough intelligence assets had been devoted to analyzing Putin’s “aggressive policies”.
McFaul, who took the view that the Obama administration had been largely on top of the situation as Putin prepared his offensive, said that a faster or more precise intelligence assessment would probably have done little to change the outcome.
“What difference would it make if we had known 48 hours ahead of time?” asked McFaul, who now teaches at Stanford University in California. “There still wouldn’t have been any better options for deterring Putin in Syria.”
(Additional reporting by Lesley Wroughton and Roberta Rampton, Writing by Matt Spetalnick; editing by Stuart Grudgings)
Politics | Thu Oct 8, 2015 8:03am EDT Related:
BY MARK HOSENBALL, PHIL STEWART AND MATT SPETALNICK
Find this story at 8 October 2015
Copyright Thomson Reuters
Despite bombing, Islamic State is no weaker than a year ago23 oktober 2015
This image made from gun-camera video taken on July 4, 2015 and released by United States Central… Read more
WASHINGTON (AP) — After billions of dollars spent and more than 10,000 extremist fighters killed, the Islamic State group is fundamentally no weaker than it was when the U.S.-led bombing campaign began a year ago, American intelligence agencies have concluded.
U.S. military commanders on the ground aren’t disputing the assessment, but they point to an upcoming effort to clear the important Sunni city of Ramadi, which fell to the militants in May, as a crucial milestone.
The battle for Ramadi, expected over the next few months, “promises to test the mettle” of Iraq’s security forces, Marine Corps Brig. Gen. Kevin J. Killea, who is helping run the U.S.-led coalition effort in Iraq, told reporters at the Pentagon in a video briefing from the region.
The U.S.-led military campaign has put the Islamic State group on defense, Killea said, adding, “There is progress.” Witnesses on the ground say the airstrikes and Kurdish ground actions are squeezing the militants in northern Syria, particularly in their self-proclaimed capital in Raqqa.
But U.S. intelligence agencies see the overall situation as a strategic stalemate: The Islamic State remains a well-funded extremist army able to replenish its ranks with foreign jihadis as quickly as the U.S. can eliminate them. Meanwhile, the group has expanded to other countries, including Libya, Egypt’s Sinai Peninsula and Afghanistan.
The assessments by the CIA, the Defense Intelligence Agency and others appear to contradict the optimistic line taken by the Obama administration’s special envoy, retired Gen. John Allen, who told a forum in Aspen, Colorado, last week that “ISIS is losing” in Iraq and Syria. The intelligence was described by officials who would not be named because they were not authorized to discuss it publicly.
“We’ve seen no meaningful degradation in their numbers,” a defense official said, citing intelligence estimates that put the group’s total strength at between 20,000 and 30,000, the same estimate as last August, when the airstrikes began.
The Islamic State’s staying power raises questions about the administration’s approach to the threat that the group poses to the U.S. and its allies. Although officials do not believe it is planning complex attacks on the West from its territory, the group’s call to Western Muslims to kill at home has become a serious problem, FBI Director James Comey and other officials say.
Yet under the Obama administration’s campaign of bombing and training, which prohibits American troops from accompanying fighters into combat or directing airstrikes from the ground, it could take a decade or more to drive the Islamic State from its safe havens, analysts say. The administration is adamant that it will commit no U.S. ground troops to the fight despite calls from some in Congress to do so.
The U.S.-led coalition and its Syrian and Kurdish allies have made some inroads. The Islamic State has lost 9.4 percent of its territory in the first six months of 2015, according to an analysis by the conflict monitoring group IHS.
A Delta Force raid in Syria that killed Islamic State financier Abu Sayyaf in May also has resulted in a well of intelligence about the group’s structure and finances, U.S. officials say. His wife, held in Iraq, has been cooperating with interrogators.
Syrian Kurdish fighters and their allies have wrested most of the northern Syria border from the Islamic State group, and the plan announced this week for a U.S.-Turkish “safe zone” is expected to cement those gains.
In Raqqa, U.S. coalition bombs pound the group’s positions and target its leaders with increasing regularity. The militants’ movements have been hampered by strikes against bridges, and some fighters are sending their families away to safer ground.
But American intelligence officials and other experts say the Islamic State is in no danger of being defeated any time soon.
“The pressure on Raqqa is significant … but looking at the overall picture, ISIS is mostly in the same place,” said Harleen Gambhir, a counterterrorism analyst at Institute for the Study of War, a Washington think tank.
Although U.S. officials have said it is crucial that the government in Baghdad win back disaffected Sunnis, there is little sign of that happening. American-led efforts to train Syrian rebels to fight the Islamic State have produced a grand total of 60 vetted fighters.
The militants have adjusted their tactics to thwart a U.S. bombing campaign that tries assiduously to avoid civilian casualties, officials say. Fighters no longer move around in easily targeted armored columns; they embed themselves among women and children, and they communicate through couriers to thwart eavesdropping and geolocation, the defense official said.
Oil continues to be a major revenue source. By one estimate, the Islamic State is clearing $500 million per year from oil sales, said Daniel Glaser, assistant secretary for terrorist financing at the Treasury Department. That’s on top of as much as $1 billion in cash the group seized from banks in its territory.
Although the U.S. has been bombing oil infrastructure, the militants have been adept at rebuilding oil refining, drilling and trading capacity, the defense official said.
The stalemate makes the battle for Ramadi all the more important.
Iraqi security forces, including 500 Sunni fighters, have begun preparing to retake the Sunni city, Killea said, and there have been 100 coalition airstrikes designed to support the effort. But he cautioned it will take time.
“Momentum,” he said, “is a better indicator of success than speed.”
Karam and Mroue reported from Beirut.
By KEN DILANIAN, ZEINA KARAM and BASSEM MROUE
Jul. 31, 2015 1:36 PM EDT
Find this story at 31 July 2015
AP News | © 2015 Associated Press
Iraq Ambassador to US: ‘We Cannot Coexist with ISIS’23 oktober 2015
A recent session at the 2015 Aspen Security Forum session exploring the expansion of ISIS, and the international response, began by moderator and New York Times Senior Correspondent Eric Schmitt mentioning that in a Senate hearing earlier that day, Sen. John McCain said, “ISIS is winning” (a sentiment he would later echo during his own Security Forum session two days later) and that a spokesperson for the US Secretary of Defense said it would be one to 8 weeks before Iraqi forces could begin an offensive against ISIS. Despite this, the panel was optimistic about the future of the region and its ability to take on ISIS.
Ret. Gen. John Allen: “ISIS is losing.”
Special Presidential Envoy for the Global Coalition to Counter ISIS and Former Commander of the US Forces in Afghanistan, retired US Marine Corps Gen. John Allen had just returned from Turkey, which announced that it would not only allow the US to use two of its airbases for operations in Syria, but also send Turkish forces into direct combat along the Syrian border — a “very important turn” for Turkey, as Allen put it.
“A year ago today, we were facing the real possibility that Iraq was going to come apart,” Allen said. But with the appointment of the new Iraqi Prime Minister, Haider al-Abadi, last September, and the formation of a 62-member coalition, “we’ve seen some significant progress,” he continued. And inside Iraq, Allen explained that many tribes are committed to the defeat of Al Qaeda and Daesh (a term he prefers over ISIS), and they are better supported by al-Abadi. Accordingly, Iraqi Security Forces will continue to grow in number and training, whereas Allen believes international efforts will decrease ISIS’s access to foreign fighters.
Allen noted that in the past year, Daesh’s territory and the population under their control has shrunk significantly (and will continue to do so as the Turkish border closes).
“I do believe that Daesh’s momentum has been checked strategically, operationally, and, by in large, tactically. But it isn’t just a military campaign. There’s a counter-finance campaign, there’s a counter-messaging campaign, there’s a counter-foreign-fighters campaign, and then there’s a humanitarian piece… It’s very important that you have that larger strategic perspective when you consider whether we’ve had an effect.”
Tackling ISIS’s finances
“I don’t think we’ve ever seen a terrorist organization that had the ability to draw from its own internal territory these kinds of resources,” US Assistant Secretary of the Treasury for Terrorist Financing Daniel Glaser. For example, ISIS has taken control of “money in the bank vaults that was there when ISIS took control of the territory” — between $500 million and a billion dollars — but this is “non-renewable.” Once it’s been spent, it’s gone. Renewable sources of wealth include “hundreds of millions of dollars per year” from extortion or taxation and almost $500 million per year from the sale of oil. ISIS also receives smaller amounts of money from ransoming and foreign donations.
“It would be great to bankrupt ISIS, but I think the challenge we have is to disrupt their financing and bring their revenue down, to make it harder for them to meet their costs,” Glaser said. He outlined a four-part strategy to tackle ISIS’s finances:
Isolate ISIS-controlled territory from international financial systems (the most important piece of the strategy).
Go after foreign donors and smugglers, applying sanctions in some cases.
Understand their internal financial architecture and target their key financiers.
Identify their external international financial networks.
Iraq Ambassador to the US: “We have no Plan B. We cannot coexist with ISIS.”
Ambassador of Iraq to the US Lukman Faily said that while Iraq faces political challenges both within the country and region, great progress has been made recently. “The new Prime Minister [Haider al-Abadi] has been extremely inclusive,” he said. “He has done outreach to all, whether it’s tribes, political entities within Iraq, and so on.” Additionally, the struggle against ISIS has trumped any sectarian differences. “ISIS can be a good, common project for us, to enhance our social cohesion and to focus on the commonalities of that threat. It’s a threat to our ethnicity, a threat to Iraq’s heritage, and so on.”
Faily said that Iraq will need international support, but as far as Iraqis are concerned, “I don’t think this is an issue of will… We have not asked the US for boots on the ground for a number a reasons. One of them is that we want to go through that painful process [of fighting ISIS] for our own sake, for our own long-term policies, and not have dependencies on others.”
But Faily did praise the work of Iran, noting that they view ISIS as a common threat, so they offered an “open check” to Iraq. Additionally, they provided 200 advisors. Although this is less than one-tenth the number of American advisors, the Iranian advisors are on the front lines, unlike the Americans. Although the US government might not like this, Faily said, “That is a Washington problem, not an Iraqi problem.”
“ISIS is a cancer in our body,” Faily said. “We need to get rid of it through all methods… and we need to be fast. That is the key message.” In order to do so, a myriad of treatments — military, economic, and diplomatic — will be required. But for now, despite the fears of some in DC, the outlook is in fact positive.
Jul 27 2015
By Eric Christensen
Find this story at 27 July 2015
© 2015 Aspen Institute
US-trained Division 30 rebels ‘betray US and hand weapons over to al-Qaeda’s affiliate in Syria’23 oktober 2015
Pentagon-trained rebels are reported to have betrayed US and handed weapons over to Jabhat al-Nusra immediately after entering Syria
Pentagon-trained rebels in Syria are reported to have betrayed their American backers and handed their weapons over to al-Qaeda in Syria immediately after re-entering the country.
Fighters with Division 30, the “moderate” rebel division favoured by the United States, surrendered to the al-Qaeda-affiliated Jabhat al-Nusra, a raft of sources claimed on Monday night.
Division 30 was the first faction whose fighters graduated from a US-led training programme in Turkey which aims to forge a force on the ground in Syria to fight against Islamic State in Iraq and the Levant (Isil).
A statement on Twitter by a man calling himself Abu Fahd al-Tunisi, a member of al-Qaeda’s local affiliate Jabhat al-Nusra, read: “A strong slap for America… the new group from Division 30 that entered yesterday hands over all of its weapons to Jabhat al-Nusra after being granted safe passage.
“They handed over a very large amount of ammunition and medium weaponry and a number of pick-ups.”
Abu Khattab al-Maqdisi, who also purports to be a Jabhat al-Nusra member, added that Division 30’s commander, Anas Ibrahim Obaid,had explained to Jabhat al-Nusra’s leaders that he had tricked the coalition because he needed weapons.
“He promised to issue a statement… repudiating Division 30, the coalition, and those who trained him,” he tweeted. “And he also gave a large amount of weapons to Jabhat al-Nusra.”
The Syrian Observatory for Human Rights (SOHR), a monitoring group, reported that seventy-five Division 30 fighters had crossed into Syria from Turkey early the day before with “12 four-wheel vehicles equipped with machine guns and ammunition”.
US Central Command confirmed about 70 graduates of the Syria “train and equip” programme had re-entered Syria with their weapons and equipment and were operating as New Syrian Forces alongside Syrian Kurds, Sunni Arab and other anti-Isil forces.
The latest disaster, if true, will be the second to befall the programme. Last month, after the first group of fighters re-entered, the militia was attacked and routed by Jabhat al-Nusra, which stormed its headquarters and kidnapped a number of its members.
At the weekend, the group’s chief of staff also resigned, saying the training programme was “not serious”.
In the statement, Lieutenant Colonel Mohammad al-Dhaher complained of insufficient numbers of trainees and fighters, inadequate supplies, and even “a lack of accuracy and method in the selection of Division 30’s cadres”.
The latest developments have only added to the scorn heaped on the much-criticized $500 million (£320m) program, which aimed to forge a 5,400-strong force of “moderate” rebels to combat Isil.
It has been hampered by problems almost from the outset, with rebels complaining of a laborious vetting process. The biggest point of contention is that they are only allowed to fight Isil, not the Assad regime, which is the principal enemy for most opposition groups.
Sept. 16, 2015, photo, U.S. Central Command Commander Gen. Lloyd Austin III, testifies on Capitol Hill in Washington.
General Lloyd Austin told the Senate Armed Services Committee that only “four or five” US-trained rebels were still fighting the Islamic State
Last Wednesday, General Lloyd Austin, head of US Central Command, shocked leaders in the US Senate’s armed services committee when he said there were only handful of programme graduates still fighting inside Syria. “We’re talking four or five,” he said.
By Nabih Bulos, Amman5:22PM BST 22 Sep 2015
Find this story at 22 September 2015
© Copyright of Telegraph Media Group Limited 2015
Why Britain hasn’t Followed the US into Syria23 oktober 2015
It seems like a generation ago now, but it was only in late August 2013 that Britain’s House of Commons narrowly rejected launching airstrikes on Bashar al-Assad’s Syria in response to his military’s use of chemical weapons. While the U.S. and France noted their resolve to continue to push for military action in the wake of the vote, it is undeniable that this event had a significant impact in halting the rush to war. With accusations of a war-weary Parliament and fear for what the UK’s refusal to intervene would do to the Anglo-American “Special Relationship,” the vote has been the most high-profile and public foreign policy blow of David Cameron’s premiership.
There is no straightforward reason behind why MPs rejected the measure. Certainly, a degree of war-weariness was palpable in the context of Iraq and the imminent (and rather ignominious) withdrawal from Afghanistan. Parallels to Iraq were all too clear when the Government was attempting to press for action before a group of UN weapons inspectors reported their findings on the chemical attack; the idea that the British Military would become involved in another Middle East quagmire with no clear exit strategy was a bit too much for many MPs to stomach. In addition, the Syrian rebel groups Western powers supported were a large question mark; it was uncertain as to what they were about and, if supplied with weapons, would they go on to lose them to extremist groups, such as the al-Nusra Front? There was simply too much uncertainty surrounding an intervention – its legality, its exit strategy and its “allies” in Syria.
The Commons defeat two years ago has haunted Cameron’s foreign policy, with there being a distinct unwillingness for his Government’s to stick its neck out unless Parliamentary support is guaranteed. But the situation in Syria has changed dramatically over the past two years, as the self-styled Islamic State has overrun much of Syria and neighbouring Iraq, and inspired and aided in terrorist attacks around the Middle East and wider world.
While in 2013 the justification to intervene was primarily the responsibility to protect Syrian citizens from a dictator – and topple the regime in the process – in 2015 the justification also involves restoring stability to the Middle East and ensuring the wider world’s security from terrorist attacks. Despite this, Cameron’s Government has been constrained by the Commons defeat to only strike ISIS in Iraq (unless RAF pilots are embedded in allied air forces striking Syria). But, in a veritable Gulf of Tonkin moment – the killing of dozens British holidaymakers in Tunisia by a man with connections to ISIS – Cameron has been handed an opportunity to expand the RAF’s mandate to strike ISIS in Syria. It only took a few days before feelers to that effect were put out by the Defence Secretary, Michael Fallon. With the opposition Labour Party in the middle of a leadership election, a repeat Commons vote is likely to be on hold until at least mid-September when a new leader is officially elected. Despite this uncertainty, it is expected that Labour will support the Government (unless the Party lurches to the left and elects Jeremy Corbyn – a prominent member of the Stop the War Coalition – as leader).
Despite the lack of a comprehensive solution to Syria’s problems, bombing when in doubt and having nothing else to do is not a viable solution. It may be enough to win the war, but it definitely will not be enough to win the lasting peace.
From what has been said, it would appear fairly reasonable to pass such a motion and bomb Syria – ISIS pose a more substantial threat to the region and national security than Assad did and Britain’s allies are already doing so. The only reason the RAF is not over Syria already is the legacy of the 2013 vote, before ISIS was even on the scene. But this is working under the assumption that bombing an entity into submission will bring about peace. To take a step back, bombing ISIS in Syria would appear to make no strategic sense; it will not resolve the conflict satisfactorily or the overt justification for the proposed intervention.
The Strategic Deficit
The doubts surrounding bombing Syria in 2013 are actually more acute today (on the whole). The issues surrounding the legality of bombing Syria have now largely been resolved. Coalition aircraft only strike ISIS forces and while Assad may preach Syria’s sovereignty, he is in desperate need of any sort of aid when fighting ISIS, the al-Nusra Front, moderate rebel groups and the Kurds. Despite this, the moderate Syrian opposition is in a much weaker position today than it was in 2013, primarily due to the advance of ISIS. The increasingly assertive Saudis are even said to be more willing to back the al-Nusra Front and other extremists instead of the moderate rebels to ensure the pro-Iranian and Shiite Assad does not regain control of Syria. While Turkey’s commitment to aid the rebels may yield some results, this is yet to be seen. If they were to succeed in taking control of Syria, there are a plethora of groups over as many fault lines to contend for power. The only question is whether the international coalition leaves these various factions to fight for power immediately, as in Libya, or wait nearly a decade, as in Iraq.
In reality, a clear international consensus needs to be reached at the UN and be fully implemented for stability to return to Syria, Iraq and the wider Middle East. While it may sound defeatist, this will not be reached due to various competing geopolitical interests and the desire to avoid intervention becoming a norm. Despite the lack of a comprehensive solution to Syria’s problems, bombing when in doubt and having nothing else to do is not a viable solution. It may be enough to win the war, but it definitely will not be enough to win the lasting peace. At least there is an Iraqi government in place to establish control when ISIS is defeated in Iraq (so long as it resolves its sectarian issues). In contrast, the people of Syria would be starting from scratch with a highly uncertain amount of international assistance. If the self-interest of nations in the conflict so far is anything to go by, international support would be minimal.
The reason why ISIS is a legitimate threat to British national security is twofold. First, the territory it controls can be used as a safe haven for planning terrorist attacks; second, its existence and prominence inspires and cultivates home-grown terrorists. In addition to the doubts surrounding the bombing of ISIS in Syria, neither of these issues would be resolved in the process.
One of the reasons behind the British Government calling for airstrikes on Syria is because it is suspected that the Tunisia beach attack was planned and coordinated from ISIS-controlled areas of Syria. Even if this is the case, one look at the simplicity of the attack highlights how it could be planned and executed anywhere – there were no specialist explosives or weaponry, there was no intricate set of demands and there was little originality. A man went onto a tourist beach, opened fire with a Kalashnikov rifle and left. It was a striking example of hit-and-run urban terrorism which has become all too familiar in recent years with the 2008 Mumbai attacks and the Charlie Hebdo shootings earlier this year. Whereas security forces are used to facing a long (stationary) standoff with terrorists, the game has changed. Simply killing as many indiscriminate targets as possible is the end goal of these shootings, not securing demands through a complex hostage-taking.
More than just unleashing terrorists on the world, with ISIS having such a high profile in the media and many foreign Muslims coming to Iraq and Syria to fight for them (including hundreds of Brits), the group has the potential to inspire Muslims in distant lands to commit terrorist attacks. But, again, simply bombing ISIS in Syria does not resolve the issue. The root of the matter is that there are disaffected young Muslims in Western states who have not been effectively integrated into society. It is known that ISIS do not look to recruit foreign Muslims with strong religious backgrounds as they cannot be moulded easily; instead, recruiters go after young, disenfranchised and vaguely religious Muslims who see ISIS as an escape from a world they do not understand. Attacking ISIS for this reason would be attacking a symptom of successive British governments’ failure to integrate young Muslims into British society.
Why Intervene?
In Syria, the UK has no horse in the race. The opposition is too weak and, like the international community, divided. Intervention will not lead to a lasting peace in Syria and the region, protect Syrian civilians or resolve the threat ISIS pose to national security. The only reason for the UK to intervene in Syria is to sure up the “Special Relationship” and prove that Britain will not shy away from a fight, reversing the damage done from the 2013 vote.
For many, while they may not say so in public, this will be enough, and why not? Fewer than 5% of coalition airstrikes in Iraq are made by the RAF’s ageing Tornado fleet, so expanding the mission to Syria would only be a token gesture of solidarity with little impact. It could also open up British bases in Cyprus to be used by other coalition partners (but Turkey recently allowing the U.S. to use some of its bases has largely resolved the issue of U.S. planes having to fly from outrageous distances to strike ISIS in Syria). It would mean Britain could do its part in this aspect of the war against ISIS, even if it does not win the peace and Syria’s chaos simply morphs into a new shape.
Bearing all of this in mind, here is something to consider. About fifty years ago, Prime Minister Harold Wilson refused to let British troops get entangled in the jungles of Vietnam, much to President Johnson’s anger and dismay. While the “Special Relationship” took a hit, British interests ultimately were not in a far off war with no clear exit strategy. In hindsight, Wilson wisely ensured that Britain avoided the South-East Asian quagmire and Britain’s relationship with the U.S. certainly rebounded. Later this year, British law-makers are likely to decide whether or not to intervene in Syria. Although it is tempting to blindly follow an ally into war, let us hope that they think carefully of where Britain’s interests truly lie in this conflict.
August 17, 2015 at 6:00 am
BY PETER STOREY
Find this story at 17 August 2015
Copyright
Exclusive: The spy who fooled the Assad regime23 oktober 2015
AMMAN // In a highly successful double-cross, a senior army officer from the Assad regime secretly gave Western-backed rebels vital intelligence that led to critical losses for government forces in southern Syria.
The defeat at Tal Al Harra, an electronic warfare station 50 kilometres south of Damascus, sent president Bashar Al Assad’s mukhabarat, or secret police, on a hunt for the source of the leaks and resulted in the killing of dozens of military personnel wrongly accused of treason.
The fog of conspiracy unleashed by the secret defection of General Mahmoud Abu Araj also helped spread discord between regime forces and their Iranian allies – and may have inadvertently played a role in the undoing of one of the Middle East’s most infamous intelligence chiefs, Syria’s Rustom Ghazalah.
Rebels overran the strategic military installation at Tal Al Harra on October 5, pushing troops loyal to Mr Al Assad out of their mountain vantage point, from where they had tracked rebel movements and shelled the surrounding countryside.
Tal Al Harra was where regime forces, and their allies from Iran and Hizbollah, intercepted Israeli communications and kept watch on Syria’s border with Israel, just 12km to the west.
A swift rebel victory there was improbable: regime forces held the only high ground for miles, the army’s 7th Division was on hand and well dug-in, and they enjoyed uncontested air superiority.
A visual guide to the battle for Tal Al Harra
All of that should have been enough to hold off a lightly armed opposition that had to fight its way up steep, exposed slopes with no air cover.
But, unknown to regime forces, one of their own had joined the effort to overthrow the Assad dynasty, which had begun as peaceful protests in nearby Deraa in March 2011.
Rather than fleeing to join the rebels, Abu Araj took the huge risk of working from within to undermine regime defences, according to rebel accounts of the defection that give a rare glimpse inside the murky spy war raging on the southern front.
The general, who commanded the 7th Division’s 121st Mechanised Brigade, contacted the rebels months before the assault on Tal Al Harra, somehow evading Mr Assad’s notoriously effective secret police – the brutal enforcers who have enabled the Assads to rule Syria for almost five decades.
As rebels planned the attack, Abu Araj smuggled out detailed plans of defensive positions, force strength, military orders, code words and information about Iranian military reinforcements from his headquarters in the town of Kanakar, 25km from Tal Al Harra.
“Gen Mahmoud supplied us with so much information, he was instrumental in our victory at Tal Al Harra,” said a rebel commander involved in intelligence operations on the southern front. He spoke on condition of anonymity.
Defectors have played a major role in Syria’s civil war, with tens of thousands of soldiers deserting Mr Al Assad’s military. Iran, Hizbollah and Iraqi Shiite militias stepped in to bolster the crumbling army, fuelling a dangerously sectarian proxy conflict in which more than 220,000 people have been killed.
Abu Araj went so far as to deploy his troops in ways that made it easier for the rebels to defeat them, said the commander, who is himself a defector and part of the opposition alliance backed by the West and Gulf states, still sometimes colloquially known as the Free Syrian Army (FSA).
“He was smart, he used to send the regime’s forces where they can be easily targeted by the FSA, and he gave orders for soldiers to retreat at just the right time for us,” the rebel commander said.
Regime intelligence agents, suspecting an insider was working against them, began to close in.
To evade capture, and to cast suspicion elsewhere, Abu Araj and the rebels he was working with staged a fake ambush when he was travelling near Sanamayn, 18km east of Tal Al Harra.
A rebel faction went so far as to boast on Facebook that it had killed the general in combat, posting a copy of his ID card as proof.
In fact, Abu Araj had crossed safely into Jordan on October 15.
Exactly what happened on the regime side after that remains unclear, but rebel commanders say there was an unprecedented rise in executions in the months after Abu Araj’s escape, with loyalist officers accused of treason and killed.
“We believe as many as 56 of its own officers were accused of treason in the months after Tal Al Harra, and executed, not all at once, but over time,” said the rebel commander, citing testimony of captured regime soldiers and intercepted communications.
Rebels involved in southern front operations say regime forces may have suspected at some stage that Abu Araj had defected, but later believed they were mistaken and that he had been captured by rebels, interrogated and killed.
Adding to the confusion, a month after he arrived in Jordan, Abu Araj, only just falsely reported dead, actually did die. The 52-year-old had apparently been suffering from a terminal heart defect – it is not clear when his health began to deteriorate but he returned to Syria just before he died of natural causes.
The loss of Tal Al Harra was a significant blow to Mr Al Assad’s forces, which had been steadily losing ground in the south and continued to do so in November and December last year.
Alarm over those defeats appear to have triggered Iran’s decision that General Qassem Suleimani, head of the Quds force, would take direct control of operations on the southern front.
That happened in January with an influx of thousands of Shiite militiamen from Lebanon, Iraq and Iran, and the start of a new counter offensive, aimed in part at retaking Tal Al Harra. Heavy fighting is ongoing in the southern area.
There have been indications that this Iranian takeover was not popular with all regime officers, especially those who consider themselves proud nationalists and were angered at being given a subservient role in their own country.
According to a Syrian source in Lebanon who is well connected to political security circles in Damascus, Rustom Ghazalah, the Assad regime’s political security chief, was among those who objected to being told to take orders from an Iranian.
“We’ve heard things that made it seem the situation was tense inside political security over this, that Ghazalah was angry and saying that he would only take orders from Assad, no one else,” the source said.
Mr Ghazalah was appointed head of political security in 2012.
He had previously dominated Lebanon as Syria’s top mukhabarat officer there from 2002 to 2005, after which he was investigated by the UN-backed tribunal into the assassination of former Lebanese prime minister, Rafik Hariri. Tribunal prosecutors have not made a formal link between Mr Ghazalah and the February 14, 2005, car bomb that killed Hariri and 21 other people.
Originally from Deraa province, Mr Ghazalah, 62, had been involved in managing the recent fight against rebels in the south, a fight that, after the fall of Tal Al Harra, the regime seemed to be losing.
In December, as rebels continued to advance, Mr Ghazalah’s palace, in his hometown of Qurfa 20km north of Deraa, was reportedly blown up. Footage uploaded to YouTube showed his mansion engulfed in flames after a huge explosion. Before the blast, the footage showed men rigging up gas canisters and cans of fuel in the property. They claimed to be from The National Resistance Movement, a secretive pro-regime organisation.
At the time, it was widely believed that Mr Ghazalah had ordered it razed to prevent it from falling into rebel hands. But Qurfa didn’t fall.
Then, in February – a month after Iran assumed command on the southern front and began to counter-attack rebels – a Syrian opposition journalist claimed Mr Ghazalah had been sacked as head of political security.
Following that, rumours circulated that he had actually been wounded, perhaps in a rebel attack. This was confirmed to pan-Arabic newspaper Alsharq Alawsat BY Assem Qanso, a member of Lebanon’s Baath party, which backs Mr Al Assad.
Mr Qanso said he had visited Mr Ghazalah in hospital, where he was being treated for shrapnel wounds sustained in fighting rebels in Deraa. He denied Mr Ghazalah had been removed as head of political security.
Al Jazeera also reported on the speculation over Mr Ghazalah, citing various theories – that he had been earmarked for assassination by an Iranian hit squad after planning to carry out a coup against Mr Al Assad, or that he knew too many regime secrets and was therefore dangerous.
In a further twist, on March 8, the pro-opposition Sham News Network carried a story that Mr Ghazalah had been detained by the regime’s military intelligence, stripped of his weapon, tortured and then dumped at a Damascus hospital.
MTV Lebanon countered the same day with a report that the office manager of the Syrian military intelligence chief, Major General Rafik Shehadeh, was suspended following a dispute with Mr Ghazalah. Other unconfirmed reports suggested Maj Gen Shehadeh assaulted Mr Ghazalah during an angry confrontation, beating him severely enough to hospitalise him for more than a week.
“We have heard all kinds of conspiracy theories about Rustom Ghazalah, that he was wounded by rebels or that he was tortured because he had disagreements with the Iranians,” said the source in Lebanon with connections to Syrian political security.
“Other people are saying his house was burnt down because the Iranians wanted to search it and he refused to let them. In Syria, it is difficult to know the truth, maybe none of it is true or maybe all of it, we will probably never know.”
Phil Sands and Suha Maayeh
March 17, 2015 Updated: March 20, 2015 06:35 PM
Find this story at 17 March 2015
Copyhttp://www.thenational.ae
A New Image for an Old al-Qaeda23 oktober 2015
Over three decades, al-Qaeda has undergone a number of changes. Faced by an alliance of powerful governments and ISIS, another is now required. What it will be, we do not know with any certainty, but a couple of possible strategies have emerged in recent months.
In a 55 minute video released at the beginning of September 2014, the leader of al-Qaeda announced that the movement was expanding into India. Emir Ayman al-Zawahiri assured Muslims in Myanmar, Bangladesh, the Indian states of Assam and Gujarat, and Kashmir, that “your brothers” in the militant organization “did not forget you and…they are doing what they can to rescue you.” The declaration came two months after ISIS leader Abu Bakr al-Baghdadi, in his black cloak of Caliph Ibrahim, declared his hegemony over Afghanistan, Pakistan, and the one hundred and seventy-five million Muslims of India. Al-Zawahiri did not mention ISIS, but repeated his allegiance to Mullah Omar, the Emir al-Mu’minin and erstwhile leader of the Afghan Taliban. He appears not to have known that Mullah Omar had died nearly a year and a half earlier.
After al-Zawahiri released the September 2014 video, he disappeared for the next eleven months. The rumor mill produced stories that he had died, been removed in a coup, or was planning some spectacular event. The failure of the Emir to praise the Yemeni branch of al-Qaeda, AQAP, for the successful attack in January upon the satirical magazine Charlie Hebdo was unusual. In addition, failing to eulogize the death of Nasir al-Wuhayshi in June, the leader of AQAP and his chosen successor, left many members worried, especially as the movement was increasingly under attack by ISIS in Afghanistan, Libya, Yemen, and Syria. The return in August of the Emir in a ten minute audio message did not explain his absence. He simply pledged his allegiance to the new leader of the Taliban, Mullah Akhtar Mansoor, and eulogized the late Mullah Omar. The surprise which might explain the disappearance was that al-Qaeda has followed the Taliban back to Afghanistan’s Helmand Province from where it had fled fourteen years ago.
However, in the same month, one other surprise was the introduction of Hamza bin Osama bin Laden in a ten minute video that was recorded in May. The twenty-four year old son of Osama bin Laden praised martyrs to the cause, urged more attacks upon the West, and pledged his allegiance to Mullah Omar. As his grooming for great things continues, his introduction comes at a time when al-Qaeda is undergoing a transformation.
Al-Zawahiri and “Political Guerrilla War”
A recording by al-Zawahiri released this September and believed to have been made towards the start of 2015 reflects the shift in al-Qaeda’s strategy. “Despite the big mistakes [of ISIS], if I were in Iraq or Syria I would co-operate with them in killing the crusaders and secularists and Shi’ites even though I don’t recognise the legitimacy of their state, because the matter is bigger than that.” Abdullah bin Mohammed, an al-Qaeda ideologue, has similarly proposed that the strategy of recent years has been a failure and that change is necessary. In what he terms “Political Guerrilla War,” he advocates the merging of the al-Qaeda movement within a coalition of jihadi organizations. For these men, the path forward for al-Qaeda relies upon limited cooperation with those once shunned.
One branch of al-Qaeda where bin Mohammed’s methods appear to have been put into operation is in Syria. Abu Mariah al-Qahtani, the second-in-command of al-Qaeda’s Syrian branch, the al-Nusra Front, has voiced his support for a strategy of Political Guerrilla War. Al-Qahtani has noted his opposition to confronting powerful states that can overwhelm the movement or creating caliphates which are easy targets for superior military forces. In recent months, the al-Nusra Front has joined with a number of other jihadist groups to form the Army of Conquest. Through this application of bin Mohammed’s strategy, the united force concluded a lengthy siege and captured Abu al-Duhur Airbase – the last remaining government military base in Idlib Province. This group has even received approval and economic and material support from the Turkish, Saudi, and Qatari sponsors.
However, there have been reservations regarding the inclusion of the al-Nusra Front in any alliance, with this strategic shift causing a schism within the organization between those wishing to focus on Syria and those wanting to pursue the traditional objective of targeting the far off enemy (the West). Responding to doubters, al-Zawahiri outlined the al-Nusra Front’s strategy earlier this year. The al-Qaeda leader instructed the leadership to adapt to the local cultural and political environment by coordinating more closely with other radical groups, while promoting a Sharia legal system and strengthening its position.
AQAP’s Consolidation of Power
AQAP has been the most active al-Qaeda branch in international operations. Among the long list of foreign attacks this branch has been implicit in, there has been the Charlie Hebdo attack, as well as attempts to send bombs to the United States. There is no evidence that the shift in policy to localize operations has been extended to AQAP in Yemen. If anything, the opposite is the case, with the first public statement of AQAP’s new leader, Qassim al-Raymi, being used to call for more attacks upon the United States.
The real change for AQAP’s seizure of territory has come as a result of the Saudi Arabian-led intervention in Yemen’s Civil War which began in March. So far, the Saudis have ignored AQAP and the al-Qaeda branch has avoided contact with the Saudis, with AQAP using this time wisely to consolidate its own position in the region. To this effect, the branch has taken control of the south-eastern province of Hadramawt – the ancestral homeland of Osama bin Laden – and is strictly enforcing Sharia law throughout the province.
A further interesting development is that Iran released five of AQAP’s leaders in a prisoner exchange with the organization at about the same time as the Saudi-led intervention began. The loss of so many of AQAP’s key personnel to drone strikes in recent years makes the return of these five a much-needed infusion of vital management, ensuring that AQAP is a more dangerous force. Of these five, Saif al-Adel is viewed to be the most dangerous. The former colonel in the Egyptian Army has a five million dollar bounty on his head and is believed to have been involved in the 1998 bombings of U.S. Embassies in East Africa. In addition, Abu Mohamed al-Misri was substantially involved in al-Qaeda’s operational planning pre-9/11, while Abul Qassam was a contemporary of Abu Musab al-Zarqawi, one of the key figures in al-Qaeda in Iraq before his death in 2006.
So long as the Saudi-led coalition is occupied through fighting Houthi rebels, AQAP has a substantial opportunity to consolidate its position in Yemen. Thus, when the time is right and the coalition inevitably abandons the battlefield, AQAP will be in a fantastic position to use its consolidated base to both strike out at the far enemy and challenge for supremacy in Yemen.
Reconciling the Two Strategies
The two potential paths of al-Qaeda are not necessarily mutually exclusive. AQAP’s unpragmatic approach may be difficult to pair with the realpolitik of al-Zawahiri and bin Mohammed’s Political Guerrilla Warfare, but the opposite need not be the case. Indeed, al-Zawahiri has also advocated lone wolf-style attacks on Western targets in addition to militants outside of the West concentrating on local conflicts and working with other extremist groups.
However, why Hamza bin Laden has been placed center-stage at this time remains an open question. A simple answer is that the young man provides al-Qaeda with a very strong psychological link to the figure who founded the organization and whom many revered as the Lion of Jihad. But is the son the Lion’s cub or will he also follow the path of Political Guerrilla Warfare? Time will tell.
OPINIONOctober 13, 2015 at 11:59 pm
BY FELIX IMONTI
Find this story at 13 October 2015
© Copyright 2015. All rights reserved.
FIRING BLIND FLAWED INTELLIGENCE AND THE LIMITS OF DRONE TECHNOLOGY (the drone papers)23 oktober 2015
The Obama administration has portrayed drones as an effective and efficient weapon in the ongoing war with al Qaeda and other radical groups. Yet classified Pentagon documents obtained by The Intercept reveal that the U.S. military has faced “critical shortfalls” in the technology and intelligence it uses to find and kill suspected terrorists in Yemen and Somalia.
THOSE SHORTFALLS STEM from the remote geography of Yemen and Somalia and the limited American presence there. As a result, the U.S. military has been overly reliant on signals intelligence from computers and cellphones, and the quality of those intercepts has been limited by constraints on surveillance flights in the region.
The documents are part of a study by a Pentagon Task Force on Intelligence, Surveillance, and Reconnaissance. They provide details about how targets were tracked for lethal missions carried out by the Joint Special Operations Command, or JSOC, in Yemen and Somalia between January 2011 and summer 2012. When the study was circulated in 2013, the Obama administration was publicly floating the idea of moving the bulk of its drone program to the Pentagon from the CIA, and the military was eager to make the case for more bases, more drones, higher video quality, and better eavesdropping equipment.
Yet by identifying the challenges and limitations facing the military’s “find, fix, finish” operations in Somalia and Yemen — the cycle of gathering intelligence, locating, and attacking a target — the conclusions of the ISR study would seem to undermine the Obama administration’s claims of a precise and effective campaign, and lend support to critics who have questioned the quality of intelligence used in drone strikes.
The study made specific recommendations for improving operations in the Horn of Africa, but a Pentagon spokesperson, Cmdr. Linda Rojas, declined to explain what, if any, measures had been taken in response to the study’s findings, saying only that “as a matter of policy we don’t comment on the details of classified reports.”
THE TYRANNY OF DISTANCE
One of the most glaring problems identified in the ISR study was the U.S. military’s inability to carry out full-time surveillance of its targets in the Horn of Africa and Yemen. Behind this problem lies the “tyranny of distance” — a reference to the great lengths that aircraft must fly to their targets from the main U.S. air base in Djibouti, the small East African nation that borders Somalia and sits just across the Gulf of Aden from Yemen.
Surveillance flights are limited by fuel — and, in the case of manned aircraft, the endurance of pilots. In contrast with Iraq, where more than 80 percent of “finishing operations” were conducted within 150 kilometers of an air base, the study notes that “most objectives in Yemen are ~ 500 km away” from Djibouti and “Somalia can be over 1,000 km.” The result is that drones and planes can spend half their air time in transit, and not enough time conducting actual surveillance.
A Pentagon chart showing that as of June 2012 manned spy planes accounted for the majority of flights over Yemen, even though drones were more efficient, since they could spend more time over a target. Over Somalia, the military used a mix of manned and unmanned aircraft. AP = Arabian Peninsula; EA = East Africa.
Compounding the tyranny of distance, the ISR study complained, was the fact that JSOC had too few drones in the region to meet the requirements mandated for carrying out a finishing operation. The military measures surveillance flights in orbits — meaning continuous, unbroken coverage of a target — and JSOC chronically failed to meet “minimum requirements” for orbits over Yemen, and in the case of Somalia had never met the minimum standards. On average, 15 flights a day, by multiple aircraft relieving or complementing one another, were needed to complete three orbits over Yemen.
The “sparse” available resources meant that aircraft had to “cover more potential leads — stretching coverage and leading to [surveillance] ‘blinks.’” Because multiple aircraft needed to be “massed” over one target before a strike, surveillance of other targets temporarily ceased, thus breaking the military’s ideal of a “persistent stare” or the “unblinking eye” of around-the-clock tracking.
When the military was focused on a “finish” — meaning kill — operation, drones were taken off the surveillance of other targets.
JSOC relied on manned spy planes to fill the orbit gap over Yemen. In June 2012 there were six U-28 spy planes in operation in East Africa and the Arabian Peninsula, as well as several other types of manned aircraft. The U-28s in Djibouti were “referred to as the ‘Chiclet line,’” according to the ISR study, and “compounded Djiboutian air control issues” because of their frequent flights.
Only in the summer of 2012, with the addition of contractor-operated drones based in Ethiopia and Fire Scout unmanned helicopters, did Somalia have the minimum number of drones commanders wanted. The number of Predator drones stationed in Djibouti doubled over the course of the study, and in 2013, the fleet was moved from the main U.S. air base, Camp Lemonnier, to another Djibouti airstrip because of overcrowding and a string of crashes.
“Blinking” remained a concern, however, and the study recommended adding even more aircraft to the area of operations. Noting that political and developmental issues hampered the military’s ability to build new bases, it suggested expanding the use of aircraft launched from ships. JSOC already made use of Fire Scout helicopter drones and small Scan Eagle drones off the coast of Somalia, as well as “Armada Sweep,” which a 2011 document from the National Security Agency, provided by former contractor Edward Snowden, describes as a “ship-based collection system” for electronic communications data. (The NSA declined to comment on Armada Sweep.)
Lt. Gen. Michael Flynn, who was head of the Defense Intelligence Agency from July 2012 to August 2014, told The Intercept that the surveillance requirements he outlined for tracking al Qaeda while in office had never been met. “We end up spending money on other stupid things instead of actually the capabilities that we need,” he said. “This is not just about buying more drones, it’s a whole system that’s required.”
According to Micah Zenko, a senior fellow at the Council on Foreign Relations who has closely studied the drone war, resource constraints in Africa “mean less time for the persistent stare that counterterrorism analysts and commanders want, and got used to in the Afghanistan-Pakistan theater.”
FIND, FIX, FINISH
The find, fix, finish cycle is known in the military as FFF, or F3. But just as critical are two other letters: E and A, for “exploit and analyze,” referring to the use of materials collected on the ground and in detainee interrogations.
F3EA became doctrine in counterinsurgency campaigns in Iraq and Afghanistan in the mid-2000s. Gen. Stanley McChrystal wrote in his memoir that the simplicity of those “five words in a line … belied how profoundly it would drive our mission.” In 2008, Flynn, who worked closely with McChrystal before becoming head of the Defense Intelligence Agency, wrote that “Exploit-Analyze starts the cycle over again by providing leads, or start points, into the network that could be observed and tracked using airborne ISR.”
Deadly strikes thus truncate the find, fix, finish cycle without exploitation and analysis — precisely the components that were lacking in the drone campaign waged in East Africa and Yemen. That shortfall points to one of the contradictions at the heart of the drone program in general: Assassinations are intelligence dead ends.
The ISR study shows that after a “kill operation” there is typically nobody on the ground to collect written material or laptops in the target’s house, or the phone on his body, or capture suspects and ask questions. Yet collection of on-the-ground intelligence of that sort — referred to as DOMEX, for “document and media exploitation,” and TIR, for “tactical interrogation report” — is invaluable for identifying future targets.
A slide from a Pentagon study notes that deadly strikes in Yemen and Somalia reduce the amount of intelligence for future operations. AUMF = 2001 Authorization for Use of Military Force; FMV = Full Motion Video; F3EA = Find, Fix, Finish, Exploit, Analyze; HOA = Horn of Africa
Stating that 75 percent of operations in the region were strikes, and noting that “kill operations significantly reduce the intelligence available from detainees and captured material,” the study recommended an expansion of “capture finishes via host-nation partners for more ‘finish-derived’ intelligence.” One of the problems with that scenario, however, is that security forces in host nations like Yemen and Somalia are profoundly unreliable and have been linked to a wide variety of abuses, including the torture of prisoners.
A report last year by retired Gen. John Abizaid and former Defense Department official Rosa Brooks noted that the “enormous uncertainties” of drone warfare are “multiplied further when the United States relies on intelligence and other targeting information provided by a host nation government: How can we be sure we are not being drawn into a civil war or being used to target the domestic political enemies of the host state leadership?”
In 2011, for example, U.S. officials told the Wall Street Journal that they had killed a local governor because Yemeni officials didn’t tell them he was present at a gathering of al Qaeda figures. “We think we got played,” one official said. (The Yemeni government disputed the report.)
Despite such warnings, the drone program has relied heavily on intelligence from other countries. One slide describes signals intelligence, or SIGINT, as coming “often from foreign partners,” and another, titled “Alternatives to Exploit/Analyze,” states that “in the reduced access environment, national intelligence partners often have the best information and access.”
The military relies heavily on intelligence from electronic communications, much of it provided by foreign governments, but acknowledges that the information is “neither as timely nor as focused as tactical intelligence.”
One way to increase the reliability of host-nation intelligence is to be directly involved in its collection — but this can be risky for soldiers on the ground. The study called for “advance force operations,” including “small teams of special force advisors,” to work with foreign forces to capture combatants, interrogate them, and seize any written material or electronic devices they possess. According to public Special Operations guidelines, advance force operations “prepare for near-term” actions by planting tracking devices, conducting reconnaissance missions, and staging for attacks. The documents obtained by The Intercept did not specify an optimum number of advisors or where they should be based or how exactly they should be involved in capture or interrogation operations.
Although the study dates from 2013, current Special Operations Commander Joseph Votel echoed its findings in July 2015. Votel noted that his troops were working closely with African Union forces and the Somali government to battle al Shabaab. He added, “We get a lot more … when we actually capture somebody or we capture material than we do when we kill someone.”
A man walks past destroyed buildings in Zinjibar, capital of Abyan province in southern Yemen on Dec. 5, 2012. Photo: Sami-al-Ansi/AFP/Getty Images
THE POVERTY OF SIGNALS INTELLIGENCE
With limited ability to conduct raids or seize materials from targeted individuals in Yemen and Somalia, JSOC relied overwhelmingly on monitoring electronic communications to discover and ultimately locate targets.
The documents state bluntly that SIGINT is an inferior form of intelligence. Yet signals accounted for more than half the intelligence collected on targets, with much of it coming from foreign partners. The rest originated with human intelligence, primarily obtained by the CIA. “These sources,” the study notes, “are neither as timely nor as focused as tactical intelligence” from interrogations or seized materials.
Making matters worse, the documents refer to “poor” and “limited” capabilities for collecting SIGINT, implying a double bind in which kill operations were reliant on sparse amounts of inferior intelligence.
The disparity with other areas of operation was stark, as a chart contrasting cell data makes clear: In Afghanistan there were 8,900 cell data reports each month, versus 50 for Yemen and 160 for Somalia. Despite that, another chart shows SIGINT comprised more than half the data sources that went into developing targets in Somalia and Yemen in 2012.
Cellphone data was critical for finding and identifying targets, yet a chart from a Pentagon study shows that the military had far less information in Yemen and Somalia than it was accustomed to having in Afghanistan. DOMEX = Document and Media Exploitation; GSM = Global System for Mobile communication; HOA = Horn of Africa; IIRs = Intelligence Information Reports; SIGINT = Signals Intelligence; TIRs = Tactical Interrogation Reports.
Flynn told The Intercept there was “way too much reliance on technical aspects [of intelligence], like signals intelligence, or even just looking at somebody with unmanned aerial vehicles.”
“I could get on the telephone from somewhere in Somalia, and I know I’m a high-value target, and say in some coded language, ‘The wedding is about to occur in the next 24 hours,’” Flynn said. “That could put all of Europe and the United States on a high-level alert, and it may be just total bullshit. SIGINT is an easy system to fool and that’s why it has to be validated by other INTs — like HUMINT. You have to ensure that the person is actually there at that location because what you really intercepted was the phone.”
In addition to using SIGINT to identify and find new targets, the documents detail how military analysts also relied on such intelligence to make sure that they had the correct person in their sights and to estimate the harm to civilians before a strike. After locating a target, usually by his cellphone or other electronics, analysts would study video feeds from surveillance aircraft “to build near-certainty via identification of distinguishing physical characteristics.”
A British intelligence document on targeted killing in Afghanistan, which was among the Snowden files, describes a similar process of “monitoring a fixed location, and tracking any persons moving away from that location, and identifying if a similar pattern is experienced through SIGINT collect.” The document explains that “other visual indicators may be used to aid the establishment of [positive identification]” including “description of clothing” or “gait.” After a shot, according to the British document and case studies in the Pentagon’s ISR report, drones would hover to determine if their target had been hit, collecting video and evidence of whether the cellphone had been eliminated. (The British intelligence agency, GCHQ, declined to comment on the document.)
A chart comparing the surveillance capabilities of the various drones and aircraft flying over Yemen and Somalia in 2012. APG = Aerial Precision Geolocation; DNR COMINT = Dial Network Recognition Communications Intelligence; ISR = Intelligence, Surveillance, and Reconnaissance; FMV = Full Motion Video; PTT COMINT = Push-to-Talk Communications Intelligence.
Yet according to the ISR study, the military faced “critical shortfalls of capabilities” in the technologies enabling that kind of precise surveillance and post-strike assessment. At the time of the study, only some of the Reaper drones had high-definition video, and most of the aircraft over the region lacked the ability to collect “dial number recognition” data.
The study cites these shortcomings as an explanation for the low rate of successful strikes against the targets on the military’s kill list in Yemen and Somalia, especially in comparison with Iraq and Afghanistan. It presents the failings primarily as an issue of efficiency, with little mention of the possible consequence of bad intelligence leading to killing the wrong people.
THE DRONE PAPERS
Cora Currier, Peter Maass
Oct. 15 2015, 1:58 p.m.
Additional reporting: Jeremy Scahill
Find this story at 15 October 2015
Copyright https://theintercept.com/
A DEATH IN ATHENS Did a Rogue NSA Operation Cause the Death of a Greek Telecom Employee?23 oktober 2015
JUST OUTSIDE THE MAIN DOWNTOWN part of Athens lies Kolonos, an old Athenian neighborhood near the archaeological park of Akadimia Platonos, where Plato used to teach. Along the maze of narrow streets, flower-filled balconies hang above open-air markets, and locals gather for hours at lazy sidewalk cafes, sipping demitasse cups of espresso and downing shots of Ouzo in quick gulps.
It was a neighborhood Costas Tsalikidis knew well. He lived at No. 18 Euclid Street, a loft apartment just down the hall from his parents. Slim and dark-haired, with a strong chin and a sly smile, he was born in Athens 38 years earlier to a middle-class family in the construction business. Talented in math and physics from an early age, he earned a degree in electrical engineering from the National Technical University of Athens, considered the most prestigious college in Greece, where he specialized in telecommunications, and later obtained his master’s in computer science in England. Putting his skills to good use, for the last 11 years he had worked for Vodafone-Panafon, also known as Vodafone Greece, the country’s largest cell phone company, and was promoted in 2001 to network-planning manager at the company’s headquarters in the trendy Halandri section of Athens.
On March 9, 2005, Costas’ brother, Panagiotis, dropped by the apartment. He thought he’d have a coffee before a business meeting scheduled for that morning. But as he entered the building, he found his mother, Georgia, running up and down the corridor yelling for help.
“Cut him down!” she was saying. “Cut him down!”
Panagiotis had no idea what she was talking about until he went inside his brother’s apartment and saw Costas hanging from a rope tied to pipes above the lintel of his bathroom door, an old wooden chair nearby. He and his mother cut the rope and laid Costas down on the bed.
Costas Tsalikidis Photo: Courtesy of the Tsalikidis familyThe day before his death, Costas’ boss at Vodafone had ordered that a newly discovered code — a powerful and sophisticated bug — be deactivated and removed from its systems. The wiretap, placed by persons unknown, targeted more than 100 top officials, including then Prime Minister Kostas Karamanlis and his wife, Natassa; the mayor of Athens; members of the Ministerial Cabinet; as well as journalists, capturing not only the country’s highest secrets, but also its most intimate conversations. The question was, who did it?
For a year, the eavesdropping case remained secret, but when the affair finally became public, it was regarded as Greece’s Watergate. One newspaper called it “a scandal of monumental proportions.” And at its center was the dark underside of the 2004 Summer Olympic Games in Athens. While the athletes were competing for medals as millions watched, far in the shadows spies had hacked into the country’s major telecom systems to listen and record.
A decade later, Costas’ death is caught up in an investigation into what now appears to have been a U.S. covert operation in Greece. Last February, Greek authorities took the extraordinary step of issuing an international arrest warrant for a CIA official the Greeks believe was a key figure in the operation while based in Athens. Unnoticed by the U.S. press, the warrant was a nearly unprecedented action by an allied country. The intelligence official, identified as William George Basil, was accused of espionage and eavesdropping. But by then he had already left the country, and the U.S. government, as it has done for the past 10 years, continues to stonewall Greek authorities on the agency’s involvement.
The Greek charges only touch the surface, however, and Basil may be less a key figure than simply a spy guilty of poor tradecraft. An investigation by The Intercept has uncovered not only the role of the CIA, but also that of the NSA, as well as how and why the operation was carried out. The investigation began while I was producing a documentary for PBS NOVA on cyberwarfare, scheduled to air on October 14, for which some of the interviews were conducted. In addition, I have had exclusive access to highly classified and previously unreported NSA documents released by Edward Snowden.
The Intercept, along with the Greek newspaper Kathimerini, interviewed over two dozen people familiar with the wiretapping case, ranging from U.S. intelligence officials and Greek government officials to those involved in the investigation and its aftermath. Many of those interviewed agreed to talk on condition that their names not be used, fearing criminal prosecution for speaking on intelligence matters or professional retribution. While some questions remain, the evidence points to a massive illegal eavesdropping program that may have led to Costas’ tragic death.
“COSTAS WAS ENGAGED,” his brother, Panagiotis, told me last year. “He was planning to get married.” Like Costas, who was three years younger, Panagiotis spoke fluent English, the product of frequent trips to the U.S., both on business and vacation.
After a dinner of lamb and hummus at a restaurant not far from the apartment where Costas died, Panagiotis spoke emotionally about his brother. “He had met the woman of his life and they were planning to get married really soon. And for that reason, they were looking to get a house and they had already started buying things that they could use in their new household. Costas was happy and optimistic and things had been working out really good for him.”
At the time, Panagiotis couldn’t understand what had happened; Costas was in good health and, at least until recently, seemed to love his job at Vodafone. “I thought there was no reason for him to commit suicide,” he said, although he acknowledged Costas had been under more pressure than usual. “In the last year of his life, he was working very hard because Greece had undertaken the Olympic Games of 2004,” he said. “And that meant a lot of hours at work and a lot of planning to beef up the networks.”
Given the enormous numbers of journalists and tourists who were planning to attend the events, all wanting to communicate, Costas’ workload increased enormously in the months before the games were to begin. Eventually, the technical infrastructure created by the Athens Olympics Organizing Committee for staff and media involved more than 11,000 computers, 23,000 fixed-line telephone devices, and 9,000 mobile phones. But the Olympics ended more than six months before Costas’ death, so there had to be another reason.
At work, things suddenly began to change. Costas told his brother that he wanted to quit. “He tendered his resignation to the company, but it wasn’t accepted,” Panagiotis told me. “He wanted to get out.” And he sent a text to his fiancée, a piano teacher named Sara Galanopoulou, saying he had to leave his job, adding cryptically that it was a “matter of life and death.”
As Costas Tsalikidis and his colleagues at Vodafone worked overtime in the months leading up to the games, thousands of miles away another group was also getting ready for the Summer Olympics in Greece: members of the U.S. National Security Agency. But rather than communicating, they were far more interested in listening. According to previously undisclosed documents from the Snowden archive, NSA has a long history of tapping into Olympic Games, both overseas and within the U.S. “NSA has had an active role in the Olympics since 1984 Los Angeles games,” according to a classified document from 2003, “and has seen its involvement increase with the recent games in Atlanta, Sydney, and Salt Lake City. During the 2002 Winter Olympics in Salt Lake City, the focus was on counterterrorism, and NSA acted largely in support of the FBI in a fusion cell known as the Olympics Intelligence Center (OIC). … NSA’s support to the 2004 Olympics in Athens will be much more complicated.”
In 2004, for the first time since the 9/11 attacks of 2001, the Summer Olympic Games would be held outside the U.S., and thus the difficulties would be far greater. “Several factors will make the Athens Olympics vastly different,” the document continued, “not the least of which is the fact these Olympics will not be held at a domestic location. Also different is that the security organization that NSA will support is the EYP, or Greek National Intelligence Service. NSA will gather information and tip off the EYP of possible terrorist or criminal actions. Without a doubt, the communication between NSA and EYP will take some coordination, and for that reason preparations are already underway.”
According to a former senior U.S. intelligence official involved with the operation, there was close cooperation between NSA and the Greek government. “The Greeks identified terrorist nets, so NSA put these devices in there and they told the Greeks, OK, when it’s done we’ll turn it off,” said the source. “They put them in the Athens communications system, with the knowledge and approval of the Greek government. This was to help with security during the Olympics.”
The Olympic Games ran smoothly — there were no serious terrorist threats and Greece had its best medal tally in more than a century. On August 29, 16 days after the games began, closing ceremonies were held at the Athens Olympic Stadium. As 70,000 people watched, Greek performers displayed traditional dances, a symbolic lantern was lit with the Olympic Flame, and Dr. Jacques Rogge, president of the International Olympics Committee, gave a short speech and then officially closed the games.
Two weeks later, the Paralympics ended, and at that point, keeping their promise to the Greek government, the NSA employees should have quietly disconnected their hardware and deleted their software from the local telecommunications systems, packed up their bugging equipment, and boarded a plane for Fort Meade. The problem was, they didn’t. Instead, they secretly kept the spying operation active, but instead of terrorists, they targeted top Greek officials. According to the former U.S. intelligence official involved with the operation, the NSA began conducting the operation secretly, without the approval or authorization of the CIA chief of station in Athens, the U.S. ambassador, or the Greek government.
“We had a huge problem right after the Greek Olympics,” the source said. “They [NSA] said when the Olympics is over, we’ll turn it off and take it away. And after the Olympics they turned it off but they didn’t take it away and they turned it back on and the Greeks discovered it. They triangulated some signals, anonymous signals, and it all pointed back to the embassy.”
At that point, the source said, someone from the Greek government called Richard Eric Pound, the CIA chief of station at the embassy in Athens and the person officially responsible for all intelligence operations in the country. Pound had arrived in May 2004, replacing Michael F. Walker, the agency’s former deputy director of the paramilitary Special Activities Division, as chief of station in Athens. Describing himself as “a small town boy from Indiana who set off to see the world,” Pound had joined the agency in 1976. Hefty and mustachioed, he was a veteran of the agency’s backwater posts in Africa.
Pound, according to the source, knew nothing about the operation having been turned back on, so he called his boss at CIA headquarters to ask about it. “He says, ‘What in God’s name is this all about?’” said the source (Pound declined to speak to The Intercept). Pound’s boss then immediately called his NSA counterpart. “Oh, yeah, we were going to tell you about that,” the NSA official told Pound’s CIA boss, according to the source. “They didn’t take it out and they turned it back on.”
National Security Agency Deputy Director John Chris Inglis testifies before the House Select Intelligence Committee on the NSA’s PRISM program, which tracks web traffic and US citizens’ phone records, during a hearing on Capitol Hill in Washington, DC, June 18, 2013. AFP PHOTO / Saul LOEB (Photo credit should read SAUL LOEB/AFP/Getty Images) National Security Agency Deputy Director John Chris Inglis in Washington, D.C., June 18, 2013. Photo: Saul Loeb/AFP/Getty ImagesNot informing the chief of station and the ambassador was an enormous breach of protocol. The chain of events surprised another source, a long-time veteran of the CIA’s National Clandestine Service, who was once a colleague of Basil in Athens. “I can’t think of another time in my experience when that ever happened, that’s how unusual it is,” the source said. “I’m astounded by that.”
In 2006, Chris Inglis became the NSA’s deputy director, the agency’s No. 2 official, who was thus in a position to discover what had happened. In an interview, I questioned him about the scandal and the illegal bugging operation. “Was the NSA involved?” I asked. Inglis offered no denial. “I couldn’t say whether NSA was involved in that or any other activity that might have been alleged to be conducted by an intelligence service, let alone NSA.”
Inglis did confirm, however, that NSA operations in foreign countries would normally have the approval of the CIA chief of station. “The chief of station,” he said, “would speak on intelligence matters for the nation, or essentially be expected to adjudicate matters on behalf of the nation.” He added, “So if NSA was expected to conduct an intelligence operation physically in some particular place of the world, I would expect that the chief of mission — the ambassador — and that the chief of station — the intelligence rep — would have some influence on that, some kind of ability to understand what it was and to ensure that it was done in the proper way.”
I also put the question to Gen. Michael Hayden, the NSA director at the time. “Do you remember the incident that came up involving Greece?” I asked. “Not anything we’re going to talk about here,” he said. “Did that come to your attention?” I pressed. “Not something I can talk about,” he replied.
At the time of the Greek bugging operation, Hayden was also secretly running the NSA’s illegal warrantless eavesdropping and metadata dragnet surveillance programs, the largest domestic spying operations in U.S. history.
FILE – In this Dec. 6, 2002 an aerial file photo of the US embassy in Athens, Greece. Theodoros Pangalos a former foreign minister of Greece said on Tuesday, Oct. 29, 2013 the U.S. is not the only country eavesdropping on foreign diplomats: his country’s secret services did that to U.S. ambassadors in Athens and Ankara in the 1990s. (AP Photo/Thanassis Stavrakis, File) An aerial file photo of the U.S. Embassy in Athens, Greece, Dec. 6, 2002. Photo: Thanassis Stavrakis/AP
Stonewalled by the U.S., over the past decade Greek investigators were nevertheless able to follow a digital trail right to the front door of the U.S. Embassy in Athens, and then to William George Basil, a mysterious embassy official with a Greek background.
Although very little is publicly known about Basil, interviews with his relatives and childhood friends in Greece, as well as fellow embassy employees and intelligence officials in Athens and the U.S., shed light on his background.
Basil was born on December 10, 1950, in Baltimore, where many of his relatives had settled after emigrating from Greece. Much of his extended family came from the small Greek island of Karpathos in the Aegean Sea, a port of call for the Argonauts traveling between Libya and Crete, and mentioned in Homer’s Iliad. There, his ancestors worked as stonemasons and as farmhands in mountainside wheat fields.
His father, George, had emigrated to the U.S. where Basil and his sister, Maria, spent their early years. But when Basil was 9, his now-divorced father became engaged to a woman from Karpathos and they all traveled to the island for the wedding. An old snapshot shows a young Basil in a suit jacket sitting uneasily on the back of a donkey. After a few months, the family returned to the U.S., then in the 1960s, when Basil was in his early teens, moved back to Karpathos for good.
Today, childhood friends there still remember Basil as “Billy,” an Americanized youth who liked to spend time on the beach. His cousin Nikos Kritikos often played sports with him. “He played rugby when he was young,” Nikos said. “He was amazingly smart. … We grew up in the same house; his stepmother, Marigoula, raised us.” And Basil’s uncle Manolis Kritikos, a local schoolteacher, remembered him as “a happy kid who smiled.” “He was always restless as a young man, he searched things,” he said. “Most of all he liked the history of this place, the folklore. … And he loved Greece and [the Karpathos village of] Olympos more than anything.”
Basil 9 years old attending his father’s wedding on Karpathos Basil, 9 years old, attending his father’s wedding on Karpathos. After graduating from high school at the American Community Schools in Athens in 1968, Basil joined the Army for five years and was posted to Alaska. Then, according to Basil’s former CIA colleague, he took a job as a Baltimore County deputy sheriff and later joined the CIA’s Office of Security as a polygraph expert. But, after nearly two decades, said the colleague, he grew bored with strapping recruits and potential agents to lie detector machines and sought a position in the agency’s Directorate of Operations. Largely based on his Greek heritage and fluency in the language, he was accepted and quickly disappeared behind the agency’s heavy black curtain, emerging undercover as a Foreign Service Officer with the State Department.
With a black diplomatic passport in his pocket, he was soon on his way to Athens, a city he knew well; he had owned an apartment in the city for many years, which he rented out. Soon after arriving, he moved into an apartment near the beach in Glyfada, one of the most exclusive areas of the city, home to ship owners and wealthy business executives. A long-time biker, he would often cruise around the city on his motorcycle.
At the U.S. Embassy in Athens, he was officially a second secretary in the regional affairs section, later promoted to first secretary. In reality, he joined the CIA station as a terrorism expert. The station, located on the embassy’s top floor (with the forgery section in the basement), was one of the largest in Europe, because it often served smaller Middle East stations with logistical help and temporary personnel. Protected by a bulletproof vest under his shirt, a 9 mm pistol strapped to his belt, and a small M38 handgun on his ankle, Basil, who had a reputation as an Olympic-level shooter, drove around the city in an armored car looking for informants to recruit and liaising with the Greek police organization. According to a confidential report by Greek prosecutor Yiannis Diotis, obtained by The Intercept, Basil played a role in a March 2003 operation — just prior to the U.S. invasion of Iraq — that involved an informant recruited by the embassy’s CIA station. The operation, code-named “Net,” led to the discovery, by a joint U.S.-Greek team, of a small cache of guns and explosives in the basement of the Iraq Embassy in Athens.
While most CIA assignments to Athens were two years, Basil kept extending his tour, giving him an opportunity to spend time on Karpathos, visiting friends and relatives and playing backgammon. “He never withheld where he was working or what he was doing,” recalled his cousin Nikos. “A lot of times we would call each other and he would tell me, ‘I am in the Middle East.’ His job was to report on the sentiment of those countries’ society. … From what he said he had a lot of friends in high places. I understood that he was acquainted with Ministers of Interior and Ministers of Public Order in Greece.”
One person who knew Basil in passing was John Brady Kiesling, a now-retired career Foreign Service Officer who had worked as the embassy’s political officer from July 2000 to March 2003. I spoke to him in his apartment in the historic Plaka section of Athens, a labyrinth of winding streets and colorful shops in the shadow of the Acropolis. After leaving his post at the embassy, he decided to remain in Greece, where he has followed the bugging case closely. When I brought up the possibility of the NSA conducting a covert operation out of the embassy, without the knowledge of either the ambassador or the CIA chief of station, he looked surprised. “I would say that a rogue agency was performing it if it was performed without the prior clearance with the ambassador, as the president’s representative in Greece,” he said. “It definitely is something that is hanging as a sort of swinging sword blade over the U.S.-Greek relationship.”
But according to Basil’s former CIA colleague in Athens, there are occasions when an ambassador is not informed by the agency because of the sensitivity of the operation. However, there was never a time when a chief of station was kept in the dark. “There were times we didn’t inform the ambassador — it was just too sensitive — and we would have to get a waiver signed,” the source said.
william-george-basil Visa from U.S. passport of William George Basil. A half-dozen miles southwest of Athens is the city of Piraeus. The largest passenger port in Europe and the third largest in the world, it services about 20 million passengers a year. Piraeus is to ships what Chicago’s O’Hare Airport is to planes. There are long rows of ferries, endless quays, hydrofoils and mega-yachts, tankers and cruise ships. It was here, not far from the pier for ferries to Karpathos that the planning ended and the operation began. According to the Greek prosecutor’s report, on June 8, 2004, someone entered the Mobile Telecommunication Center at 31 Akti Miaouli Street, and in the name of a “Markos Petrou,” purchased the first four of what would eventually be 14 prepaid cell phones.
They would become the “shadow” phones. As normal calls from Vodafone went to and from legitimate parties, a parallel stream of digitized voice and data — an exact copy — was directed to the NSA’s shadow phones. The data would then be automatically transferred miles away to NSA receivers and computers for monitoring, analysis, and storage.
Not long after, according to the Snowden documents I reviewed, the NSA contingent began arriving at US-966G, the surveillance agency’s code for the Athens embassy. The planning had already been underway. “Although the first race, dive, and somersault are still a year away,” noted a Signals Intelligence Directorate document, “SID Today,” dated August 15, 2003, “in truth, NSA has been gearing up for the 2004 Olympics for quite some time, in anticipation of playing a larger role than ever before at the international games.” The document then noted that NSA would be sending “the largest contingent of personnel in support of the games in our history. A team of 10 NSA analysts will arrive in Greece anywhere from 30-45 days before the Olympics and stay until the flame is extinguished. … The scope of the Olympics is tremendous, and so will be the support of SID [Signals Intelligence Directorate] and NSA.”
Then, in a note of unintended irony, the writer added, “The world will be watching and so will NSA!”
A key part of the operation would be obtaining secret access to the Greek telecom network. And it is here that Costas Tsalikidis may have entered the picture. As a senior engineer in charge of network planning, working for the country’s largest cellular service provider, he would have been one of those in a position to become the team’s inside person. But he was also far from the only one. “Of course, it could have even been me,” said another Vodafone technician interviewed.
The operation could have been accomplished a number of ways. At the beginning, the installation of the bugging software, while illegal according to Greek law, had been secretly authorized by the Greek government. Thus, an inside person would have been operating outside the law in providing assistance to U.S. intelligence, but with the patriotic objective of helping protect Greece from terrorists. Also, the person may never have been told that the software was supposed to be removed following the conclusion of the games. In any case, it is unlikely that the person would have known who the targets were since they were just lists of phone numbers.
In fact, recruiting a foreign telecom employee as an “inside person” for a major bugging operation was standard operating procedure for both the NSA and the CIA, according to the senior intelligence official involved with the Athens operation. “What the NSA really doesn’t like to admit, about 70 percent of NSA’s exploitation is human enabled,” the former official said. “For example, at a foreign Ministry of Post and Telecommunications, if NSA determines it needs to get access to that system, NSA and/or the CIA in coordination would come up with a mechanism that would allow them to replicate the existing switch to be swapped out. The CIA would then go and seek out the person who had access to that switch — like a Nortel switch or a router — go in there, and then it would be the CIA that would effect the operation. And then the take from it would be exploited by the NSA.”
And according to a highly classified NSA document provided by Snowden and previously published by The Intercept, covertly recruiting employees in foreign telecom companies has long been one of the NSA’s deepest secrets. A program code-named “Sentry Owl,” for example, deals with “foreign commercial platform[s]” and “human asset[s] cooperating with the NSA/CSS [Central Security Service].” The document warns that information related to Sentry Owl must be classified at an unusually high level, known as ECI, or Exceptionally Controlled Information, well above top secret.
“Human intelligence guys can provide sometimes the needed physical access without which you just can’t do the signals intelligence activity,” Gen. Hayden, the NSA head at the time of the Athens bugging, who later ran the CIA, told me.
Basil’s ties to Greece made him very good at developing local agents. “He was the best recruiter the station had, the best,” said the former CIA associate in Athens. “[Basil] may have been in charge of recruiting the guy on the inside. He may have made the initial recruitment.”
With an agent in place inside the network, the next step would be to implant spyware capable of secretly transmitting the conversations of the NSA’s targets to the shadow phones where they could be resent to NSA computers. Developing such complex malware is the job of the NSA’s Tailored Access Operations (TAO) organization. And, according to the previously undisclosed Snowden documents, members of the group “performed CNE [Computer Network Exploitation] operations against Greek communications providers” as part of the preparations for the Olympics. In lay terms, this means they developed malware to secretly extract communications data. Also involved were members of the Special Source Operations (SSO) group, the specialists who work covertly with telecom companies, such as AT&T — or in this case Vodafone — to get secret access to their networks.
The key to the operation was hijacking a particular piece of software, the “lawful intercept” program. Installed in most modern telecom systems, it gave a telecom company the technical capability to respond to a legal warrant from the local government to monitor a suspect’s communications. Vodafone’s central switching equipment was made by Ericsson, the large Swedish company, and on January 31, 2002, Ericsson delivered to Vodafone an upgrade containing the lawful intercept program, a piece of software known as the Remote Control Equipment Subsystem (RES). According to a report by Greece’s Authority for Communication Security and Privacy (ADAE), Costas was the Vodafone employee who accepted delivery of the upgrade.
Normally, when a lawful warrant is submitted to a company such as Vodafone Greece, the information, including the target phone numbers, would first be logged into a program called the Interception Management System (IMS). This creates a permanent record of the request that can later be audited. The information is then sent to the RES, which initiates the actual monitoring by secretly creating a duplicate communications stream for the targeted number. That duplicate stream is then transmitted, along with the metadata — date, time, and number calling or being called — to the law enforcement agency.
But despite having the capability to initiate wiretaps with the RES program, at the time of the Olympics Greece did not have laws in place to permit them. As a result, Vodafone never paid the additional fee to Ericsson for the IMS program and the digital key to activate the system. Far behind the NSA, the Greek government had only simple wiretap technology. “All they had was some primitive suitcase methods that would allow very limited surveillance of very specific targets,” said Kiesling, the former U.S. Embassy official. “From an American point of view, that was terrifyingly primitive.”
Thus, according to Greek sources, prior to the Olympics U.S. officials began asking the Greek government for permission to secretly activate the lawful intercept program, which led to the government agreeing to the U.S. bugging operation. Ironically, the presidential decree permitting widespread eavesdropping was finally enacted on March 10, 2005, the day after Costas’ death.
For NSA, the missing IMS program was the technical opening its operatives needed. In essence, they created malware that would secretly turn on the RES program and begin tapping. But without the IMS program there would be no audit trail, no indication or evidence that eavesdropping was going on as the target numbers were being tapped and transmitted to the shadow phones by the RES. “It was a very complex system, because it was invisible to detection,” Vodafone Greece CEO George Koronias told investigators. “It functioned independently of whether the lawful interception system was activated, and bypassed the security alarm.”
Exploiting the weaknesses associated with lawful intercept programs was a common trick for NSA. According to a previously unreleased top-secret PowerPoint presentation from 2012, titled “Exploiting Foreign Lawful Intercept Roundtable,” the agency’s “countries of interest” for this work included, at that time, Mexico, Indonesia, Egypt, and others. The presentation also notes that NSA had about 60 “Fingerprints” — ways to identify data — from telecom companies and industry groups that develop lawful intercept systems, including Ericsson, as well as Motorola, Nokia, and Siemens.
There are also a variety of “Access Methods” used to penetrate other countries’ lawful intercept programs. These include using the highly secret Special Collection Service. Known internally as “F-6,” it is described in another Snowden document as “a joint NSA-CIA organization whose mission is to covertly collect SIGINT [Signals Intelligence] from official U.S. establishments abroad, such as embassies and consulates.” The organization’s job, according to the PowerPoint, is to intercept microwaves, the thousands of communications-packed signals that crisscross a city. The PowerPoint also suggested using the Special Source Operations unit, the people who work out secret arrangements with the local telecom companies. And with the Tailored Access Operations unit, techniques could be developed to hack into the country’s telecom systems. For the Athens Olympics operation, it would be a full house.
With the malware installed, the NSA was set to go, with more than a dozen shadow phones purchased and a contingent of employees from at least 11 different NSA organizations poised to begin eavesdropping during “24-hour watches.” According to the ADAE report, the tappers first activated the malware at Vodafone’s communications centers on August 4, 2004, and five days later they began inserting the target phone numbers. Then on September 28, following the conclusion of the Paralympic Games, some of the malware was removed. But less than a week later, long after the Olympic Torch had been extinguished, new malware was implanted.
“And then,” said Kiesling, looking both troubled and perplexed, “the mystery becomes why it continued after the Olympics, and that’s a mystery that still has not been solved.” It was a question I asked a former senior NSA official with long involvement in worldwide eavesdropping operations. “They never [remove it],” the official said with a laugh. “Once you have access, you have access. You have the opportunity to put implants in, that’s an opportunity.”
“FEVER,” COSTAS WROTE. Several of the antennas used for the bugging operation were heating up, and to Costas, it was as if they had a fever. After the Olympic Games concluded, Costas started having problems at work. In the weeks following Costas’ death, his brother discovered one of his notebooks, dating from October and November 2004, after the Olympics, and it described a number of incidents. “In his notes he said that at certain points in time certain antennas seemed to get overworked and they were trying to figure out why that was happening,” said Panagiotis. “Now it turned out that those antennas were the same antennas that were connected with the system of the wiretapping.” In another entry, which Panagiotis submitted to the prosecutor, Costas wrote about a month before he died: “Something is not right at the company.”
Then, at 7:56 p.m. on January 24, 2005, someone installed a routine update in the NSA’s bugging software at Vodafone’s facility in the Paiania section of the city. It would turn out to be anything but routine. Within seconds, errors appeared, which caused hundreds of text messages from customers to go undelivered, and people began complaining. At the same time, an automatic failure report was sent to Vodafone management. It was as if a burglar alarm had gone off during a robbery. As normally happens, Vodafone sent the voluminous logs and data dumps to Ericsson for analysis, while those involved quietly waited — and worried. The once cheerful and upbeat Costas turned glum and angry. “We have heard that Costas was in meetings inside the company, in meetings that were very loud and a lot of people were arguing,” said Panagiotis. “He tendered his resignation to the company, but it wasn’t accepted. … He wanted to get out.”
On March 4, after weeks of investigation, Ericsson notified Vodafone that it had discovered a sophisticated piece of malware, containing a hefty 6,500 lines of code — evidence of a large bugging operation. The company also turned up the target phone numbers of the prime minister and his wife, the mayor of Athens, members of the Ministerial Cabinet, and scores of high officials, as well as the numbers for the shadow phones and the metadata describing when the calls were made.
Three days later, Vodafone technicians isolated the malware. Then on March 8, before law enforcement had an opportunity to get involved, Koronias, the Vodafone Greece CEO, ordered the software deactivated and removed, thus hampering any future investigation. Apparently alerted, those involved in the bugging operation immediately turned off their shadow phones. “Vodafone’s decision to deactivate the software meant our hands were tied,” Yiannis Korandis, the chief of the EYP, the Greek National Intelligence Service, told investigators.
The next morning Panagiotis discovered his brother’s body hanging from a white rope tied to a pipe above the bathroom doorway. To this day, he is convinced that Costas was murdered to keep him quiet and prevent him from quitting and going public with the details. “He probably wanted answers there and then and I think that led to his demise,” he said. The bugging, Panagiotis suspects, may have been the reason Costas sent the text to his fiancée about leaving his job being a “matter of life and death.”
Athens, GREECE: Vodafone Greece Chief Executive Officer George Koronias holds documents 06 April 2006 before the start of a parliamentary committee hearing investigating the case of a phone-tapping scandal, which targeted Prime Minister Costas Karamanlis and top officials during and after the 2004 Athens Olympics games. AFP PHOTO / Louisa Gouliamaki (Photo credit should read LOUISA GOULIAMAKI/AFP/Getty Images) Vodafone Greece CEO George Koronias holds documents in April 2006 before the start of a parliamentary committee hearing investigating the phone-tapping scandal. Photo: Louisa Gouliamaki /AFP/Getty ImagesWithin hours of Costas’ death, Ericsson prepared a formal “Incident Case Description,” outlining technical details about the malware and how it worked. It contained the warning: “This document is to be treated as highly confidential and … all necessary steps to protect this information must be taken, including the mandatory use of Entrust encryption within Ericsson.” After seven pages of technical detail, the report concluded that someone had loaded unauthorized “corrections,” i.e. malware implants, “designed to introduce RES functionality in such a way that it is not visible to any observer. Neither Ericsson nor Vodafone have any knowledge of the corrections. Nor is it known who supplied the correction, who loaded them or how long they have been loaded in the network.” In other words, someone had introduced malware to secretly activate the lawful intercept’s tapping function while at the same time hiding the fact that it had been turned on. On March 10, the report was turned over to Vodafone Greece CEO Koronias.
The Tsalikidis family’s former lawyer, Themistoklis Sofos, believes that Costas discovered the spy software by chance and then reported it. “Some people were afraid that he would talk so they killed him in a professional manner,” he told a Greek newspaper. Although the official coroner’s report said he took his own life, no suicide note was ever found, and the initial forensic report was inconclusive.
Nevertheless, Supreme Court prosecutor Dimitris Linos said that Costas’ death was clearly tied to the eavesdropping operation. “If there had not been the phone tapping, there would not have been a suicide,” he said in June 2006. In his report, prosecutor Yiannis Diotis also said that Costas had knowledge of the illegal phone-tapping software. And Giorgos Constantinopoulos, a former colleague in charge of communications security for Vodafone, reportedly told prosecutors that he was sure Costas was in a position to know about the spy software, and that his death was likely connected to that discovery.
THROUGHOUT THIS PAST SUMMER in Athens as the debt crisis mounted, crowds of pro-government demonstrators filled Syntagma Square shouting angry chants against European creditors. A few blocks away on Panepistimiou Street, an anarchy symbol was spray-painted on the walls of the headquarters of the Bank of Greece. And behind the Doric columns and yellow neo-classical façade of the Parliament Building, nervous politicians huddled and debated what to do next.
But a mile and a half away, in a heavily guarded compound near Pedion tou Areos, one of the largest parks in Athens, prosecutors were finally bringing to a close a decade of investigations. And on June 26 the finger of guilt was pointed directly at America’s Central Intelligence Agency. Now it is up to the Justices’ Council to decide how to proceed, and it may prove very embarrassing for the United States.
From the very start, according to a former senior Greek official involved in the investigation, there was no doubt within the highest levels of government that the U.S. was behind the bugging. On Friday, March 25, 2005, two weeks after Panagiotis cut the rope from his brother’s neck, Greeks celebrated Independence Day, followed by a weekend of festivities. But in Maximos Mansion, the Greek White House, the talk was far from jubilant. As Greek Navy helicopters flew low over the Acropolis during a military parade, members of the Greek inner circle were meeting with Prime Minister Costas Karamanlis about the bugging scandal that had targeted him and his wife.
A few days before, Foreign Minister Petros Molyviatis was in Washington engaged in high-level meetings with top officials. Secretary of State Condoleezza Rice spoke of the “excellent state of relations between Greece and the United States,” and President George W. Bush issued a proclamation declaring “our special ties of friendship, history, and shared values with Greece.” He noted, “Our two Nations are founded on shared ideals of liberty.” But based on the investigation up to that point, close aides, including Foreign Minister Molyviatis, were convinced that U.S. intelligence was behind the operation. Although at least one member of the group wanted to bury the whole matter rather than cause a rupture in relations with the U.S., Karamanlis disagreed, according to the source. “No way,” Karamanlis said. “If they find this on us 10 years from now, things will prove really difficult.”
The decision was made to have the police and the EYP intelligence service launch an investigation. Although far from exhaustive, with many questions left unanswered, Minister of Public Order George Voulgarakis and several other officials finally held a televised press conference in February 2006. Scribbling with a blue marker on a white board, they noted that the 14 shadow cell phones were using four mobile phone antennas with a radius of about 2 kilometers in central Athens.
Within that area was the U.S. Embassy on Vassilissis Sofias Avenue, which turned out to be a matter of great embarrassment for both the U.S. and Greek governments. “The U.S. has been fingered in the media as the culprit,” U.S. Ambassador Charles P. Ries noted in a classified memo to Washington, released by WikiLeaks. Ries suspected Voulgarakis of the leak. Calling him “a less reliable ally,” Ries said Voulgarakis “has allowed rumors to circulate that the U.S. is behind [the] major eavesdropping case in Greece.” Nevertheless, both sides wanted to pretend all was normal. Thus, Foreign Minister Molyviatis suggested to Ries that they move a previously scheduled meeting between them from the ambassador’s residence to the very public Grande Bretagne Hotel in central Athens. There, Ries noted in his memo, “All could see that the U.S.-Greece relationship was unimpaired.”
It was an odd lunch. Molyviatis was sitting across from the man whose embassy, he believed, had been listening in on his cell phone for months. And Ries, out of the loop because it was a rogue NSA/CIA operation, still may not have known of his embassy’s involvement. “Addressing the eavesdropping case,” Ries said in his memo, “Molyviatis gave his opinion that the whole hullabaloo [the press conference] had been unnecessary. It would have been sufficient to hand the matter to the judicial authorities for investigation and, if appropriate, prosecution, he said. But now, both he and the Prime Minister were keen to show that the current hysteria did not detract from excellent U.S.-Greece relations.”
For some, however, the cozy relations only seemed to increase the anger. In May, a Greek terrorist organization, “Revolutionary Struggle,” attempted to assassinate Voulgarakis with a remote-controlled bomb. Pointing to the wiretapping scandal and weakening Greek sovereignty as a key reason for the attack, the group said it opposed state-sponsored “terrorism of mass surveillance.” At the U.S. Embassy, the deputy chief of mission sent a classified cable to Washington, released by WikiLeaks, with a warning. “This group is to be taken seriously,” he said. “While there is no mention thus far of targeting foreign ‘capitalist-imperialists,’ it would not be a leap of faith for RS to focus its attention on the U.S. presence in Greece.” Ten months later, the group fired a rocket at the embassy.
Around the time the eavesdropping was discovered, Basil left the country, apparently with a quick reassignment by CIA to Sudan. Then, according to Greek documents obtained by The Intercept, on August 4, as things quieted down, he obtained a visa at the Greek Embassy in Khartoum and returned 10 days later to Athens and his cover job as first secretary for regional affairs. The diplomatic position gave him immunity from arrest.
The investigation was the first of what would be five major probes stretching over a decade in which more than 500 witnesses would be questioned, including agents of the EYP. Evidence built up slowly as investigators picked apart the telltale computer logs, traced the cell phone signals, and dissected layers and layers of software. Over the years, piece after piece, the puzzle began to come together.
In his testimony, Ericsson’s managing director for Greece, Bill Zikou, laid out the “how,” describing the method by which the bugging was accomplished. “What happened in this incident,” he said, “is that a complex, sophisticated, non-Ericsson intruder piece of software was planted into the Vodafone Greece network,” which by activating the RES function “thus made illegal interceptions possible.”
william-basil200 William George Basil. Date unknown. Photo: FacebookThen investigators turned to the “who.” At the conclusion of its operation, the NSA was hoping that it could disappear into the night without leaving a trace. “Unlike the athletes, when the Olympics are over, the NSA team is hoping you won’t even know they were there,” said one of the classified documents. It bore the ironic title, “Another Successful Olympics Story.” But as a result of sloppy intelligence tradecraft by the American spies, each step pointed the investigators closer and closer to the U.S.
One person who spent a great deal of time buying shadow phones was William Basil. “We used to call him the telephone man,” said the former CIA colleague in Athens. “All we do is we buy burner phones. Just drive in any direction you want and go to a random phone store and just buy a phone, make a call, and throw the phone away.”
But Basil wasn’t the only one buying shadow phones. According to the prosecutor’s confidential report, issued June 26, 2015 and obtained by The Intercept, investigators traced four of the shadow cell phones to the shop in Piraeus. There, the prosecutor showed pictures of Basil and his wife, Irene, to the store’s manager. “She is known” to the store, the manager said. The prosecutor then noted in his report that Irene was “acting as designated by him [Basil] and on his behalf.” And according to registered deeds, the family of Irene Basil has long owned a home in Piraeus just a few miles from the shop.
Things got even sloppier. After purchasing the four shadow phones, meant to be untraceable, the SIM card from one of them was removed and placed in a cell phone registered to the U.S. Embassy. It was a direct link between the covert operation and the U.S. government. Investigators then traced more than 40 calls to and from the U.S. Embassy involving the phone. The numbers listed in the ADAE report include the embassy’s main number, the emergency after-hours number, the Marine guard, and the FBI office. There was even a call to a women’s clothing store in Athens, Rouge Paris.
Then, on the same shadow phone using another SIM card, investigators found calls to Maryland. Based on the phone numbers, The Intercept was able to determine that those calls were made to Ellicott City, where Basil and his wife used to own property, and to neighboring Cantonsville, both bedroom communities for NSA. The implications greatly worried the investigators. “We were scared,” one told a parliamentary committee. “This is something that the Foreign and Justice Ministries should investigate.”
Finally, after years of slow, ineffective, and politically hindered investigations that produced more fog than clarity, the determined work of the ADAE and a few others began paying off. The evidence pointed at the U.S. Embassy, and with a bit of luck and thanks to the American spies’ mistakes, prosecutors came up with a name, William Basil, and the international arrest warrant was issued last February.
But by then, he was long gone. After Athens, Basil was promoted to deputy chief of station in Islamabad, Pakistan, then sent back to a desk job at headquarters, that of director of human resources at the agency’s Counterterrorism Center. Now retired and no longer protected by diplomatic immunity, he may never see Greece again, the country where his wife currently lives in her family’s home in Piraeus. In 2012, according to a petition he signed protesting a planned marine park on Karpathos, he wrote, “I own property in Karpathos and plan to retire there next year.”
Today the two-story house near the beach in Diafani sits empty; construction materials are stacked on the porch, its exterior unpainted. Nearby, friends and relatives can’t believe that Billy from Karpathos could have secretly wiretapped their top officials, or spied on their government. “There’s no way he did what they say he did,” said Basil’s cousin Nikos. “Because of his love [for] Greece, they would know that if that thing [the wiretapping] needed to be done, they would most certainly ask somebody else to do it. No way he did it. It is well known that he was first and foremost a Greek patriot.”
Months before the arrest warrant was issued, Basil had been in touch by phone with a prominent criminal lawyer in Athens, Ilias G. Anagnostopoulos, according to a Greek source, who asked not to be named because of the confidential nature of the information. When asked by the attorney if he would be willing to testify if it came to that, Basil, according to the source, replied: “If there are questions, of course I can answer them.” The attorney met with the prosecutor, but after leaks to the press, Basil told Anagnostopoulos to drop the matter for the time being. Complicating matters, the prosecutor has filed the eavesdropping case alongside a much larger, but unconnected, conspiratorial case involving an assassination attempt on former Prime Minister Karamanlis, a key target of the wiretapping operation.
CIA Chief of Station Eric Pound left Athens in 2007, returning to headquarters to become chief of the External Operations and Cover Division, the organization responsible for creating front companies overseas for clandestine officers masquerading as business executives or other occupations. After he retired in September 2009, Pound mentioned to a college audience that the CIA has an obsession to learn the truth. He added, “But obsession does not always lead to success.”
Costas Tsalikides March 9, 2005 Costas Tsalikidis, March 9, 2005.
Panagiotis and other family members also want the truth. In 2011, Costas’ family asked two coroners to reexamine the medical records. One was Dr. Steven Karch, a forensic pathologist and former medical examiner in San Francisco, and the other was Dr. Theodoros Vougiouklakis, an associate professor of forensic medicine in Greece. Karch called the original autopsy “farcical.” Based on pictures of the body, the coroners concluded that the marks to Costas’ neck couldn’t have come from simply jumping off the chair. “Something was done to him prior,” Karch told The Intercept.
The family agrees with this conclusion. “I believe there are people who know what happened, what exactly and who exactly did it and they will give us those facts,” said Panagiotis. “I believe that as time goes by the reasons for protecting the perpetrators will fade and mouths will open.” Last March, on the 10th anniversary of Costas’ death, his mother spoke to a local Greek reporter for the first time. “I want to know what happened to my child and nobody that investigated until now, 10 years [later], gave me the slightest response,” she said. “As long as I live I will live with this suffering. I want to punish those who are guilty for what happened, and those who know [but] do not speak.”
There appears little chance that her questions will be answered, however. It is extremely unlikely the Obama administration will ever allow Basil, or any other intelligence official, to be extradited. Nor is it likely that Basil will return to Greece voluntarily with an arrest warrant waiting for him. Around 2009 he appeared in a Facebook picture, seemingly in disguise, sporting a long white beard and moustache. “Dude, Santa’s job isn’t available for what … another seven months,” a friend joked on Facebook. Though he has not responded to requests for an interview, pictures online show him in Greece in 2013 attending his daughter’s wedding, without the beard, in the Glyfada section of Athens. Multiple attempts to reach Basil by phone, and through family members, were unsuccessful. Both the CIA and NSA declined to comment on any issue surrounding the Athens wiretapping, including Basil’s indictment.
As for the NSA, a classified review of the Greek Olympics asked the now ironic question, “After this year’s gold medal performance, what comes next?” Next will certainly be the Olympics scheduled for Rio de Janeiro, Brazil, next summer. According to a previously published top-secret NSA slide, the agency has already planted malware throughout the country’s telecommunications system. And, if history is any guide, in the weeks leading up to the start of the games, teams from the SCS, SSO, TAO, and other organizations will arrive once again to begin 24/7 eavesdropping. And as in Greece, they may just happen to leave some of their monitoring equipment behind.
Sitting in his apartment overlooking Athens’ Plaka, John Brady Kiesling could make little sense of it all. “I don’t see a shred of evidence that this wiretapping did the U.S. government any good,” he said. “I think it’s just important to underscore that intelligence gathering is never free. It always comes at a human and political cost to someone. In this case it was paid by an innocent Vodafone technician.”
Aggelos Petropoulos of the Athens-based newspaper Kathimerini contributed reporting from Greece, and Ryan Gallagher, senior reporter at The Intercept, contributed research and reporting from the Snowden Archive.
Documents published with this story:
Another Successful Olympics Story
Exploiting Foreign Lawful Intercept Roundtable
Gold Medal Support for Olympic Games
NSA Team Selected for Olympics Support
SID Trains for Athens Olympics
James Bamford
Sep. 29 2015, 4:01 a.m.
Find this story at 29 September 2015
Copyright https://theintercept.com/
Bonn and the Putsch23 oktober 2015
JAKARTA/BONN/PULLACH (Own report) – Germany’s Federal Intelligence Service (BND) has been heavily involved in the 1965 murderous putsch in Indonesia – the guest nation of this year’s Frankfurt Book Fair. This was confirmed in secret documents from the Bundestag, the German Parliament. According to BND President at the time, Gerhard Wessel’s manuscript for a talk he delivered to a session of the Bundestag’s “Confidential Committee” in June 1968, the BND did more than merely support the Indonesian military in their blood-soaked “liquidation of the CPI” (Communist Party of Indonesia) – resulting in the murder of hundreds of thousands, possibly even millions – with advisors, equipment and finances. Suharto, who subsequently took power, had even attributed a “large part … of the success” of the operation to the BND. Up to now, mainly the US-American assistance to the putsch has been known. The putsch, and the more than 30 year-long dictatorship that followed – which also had been reliably promoted by West Germany – are important themes being presented by Indonesian writers at this year’s Frankfurt Book Fair. To this day, the German government has refused to allow an investigation of the BND’s support for the putsch and the Indonesian military’s excessive brutality.
Hundreds of Thousands Dead
The Indonesian putsch, bringing Maj. Gen. Haji Mohamed Suharto to power in Jakarta, began in October 1965 as a reaction to an attempted coup d’état, killing several officers on September 30. Suharto’s dictatorial reign lasted until 1998. The attempted coup was falsely attributed to the Communist Party of Indonesia (CPI). Subsequently, the military launched excessively brutal operations against all genuine and suspected members and sympathizers of the communist party. Hundreds of thousands, possibly even millions, were murdered; millions were imprisoned. The exact number is still unknown. The crimes committed at the time by the military have never really been brought to light.
50 to 100 Victims Each Night
One of the things never brought to light is what support western powers had given to the Suharto putsch. US complicity, having had the best relations to the Indonesian armed forces, has, to some extent, already been exposed. According to experts, for example, by 1965, around 4,000 Indonesian officers had been trained in US military installations as well as high-ranking officers having been trained in counter-insurgency on the basis of US field manuals at Indonesia’s elite military institutes.[1] December 2, 1965, the US ambassador gave his consent to providing financial support to the “Kap-Gestapu” movement, a movement – as he put it – “inspired by the army, even though comprised of civilian action groups,” which “shouldered the task of the ongoing repressive measures against Indonesia’s Communist Party.”[2] The ambassador must have known what this would mean. November 13, his employees had passed on information from the Indonesian police indicating, “between 50 and 100 members of the CPI in Eastern and Central Java were being killed each night.” April 15, the embassy had admitted, “it did not know if the actual number” of murdered CPI activists “was not closer to 100,000 or 1,000,000.” In spite of the mass murder, the US ambassador in Jakarta reported back to Washington (August 10, 1966) that the authorities in Jakarta had been provided a list of the leading CPI members.[3]
“Reliable Friend of Germany”
Agencies of the West German government had also been involved in the putsch. The BND had supported “Indonesia’s military intelligence service’s 1965 defeat of a left-wing putsch in Jakarta, with submachine guns, shortwave radios and money (with a total value of 300,000 DM),” reported “Der Spiegel” in March 1971.[4] Twelve weeks later, the magazine added that “a commando of BND men” had “trained military intelligence service operatives in Indonesia” and “relieved their CIA colleagues, who were under the heavy pressure of anti-American propaganda.”[5] By “supplying Soviet rifles and Finnish ammunition, the BND instructors” were even actually intervening in that “civil war.” If one can believe the BND’s founder, Reinhard Gehlen, Bonn, at the time, had the best contacts to leading military officers. In his “Memoirs,” published in 1971, Gehlen wrote, “two of Germany’s reliable friends” were among the Indonesian officers, murdered September 30, including “the longtime and highly revered military attaché in Bonn, Brig. Gen. Pandjaitan.” During the putsch, the BND was “in the fortunate position of being able to provide the West German government with timely and detailed reports – from excellent sources – … on the progress of those days, which had been so crucial for Indonesia.”[6]
An Excellent Resident
Other indications have emerged from the research published by the expert of intelligence services, Erich Schmidt-Eenboom and the political scientist, Matthias Ritzi. Their findings confirmed that there was close coordination between the BND and CIA. In April 1961, BND headquarters in Pullach had informed the US Central Intelligence Agency that it had “an excellent Chief of Station” in Jakarta, writes Schmidt-Eenboom. The CIA thought the BND was referring to Rudolf Oebsger-Röder, a former colonel of the SS working in the Reich Security Central Office (Reichssicherheitshauptamt) in Nazi Germany, who joined West Germany’s Organization Gehlen in 1948 and was later on post in Indonesia, as a correspondent for the Süddeutsche Zeitung and the Neue Zürcher Zeitung.[7] The BND had maintained Oebsger-Röder on its staff until the mid-’60s. In mid-January 1964, a high-ranking CIA representative paid Gehlen a visit and asked him how the West Germans were handling the developments in Indonesia, explain Schmidt-Eenboom and Ritzi. Gehlen told him that he is keeping Bonn up-to-date, but does not yet know how the chancellery intends to proceed.
“A Large Part BND”
The manuscript for a talk BND President Gerhard Wessel presented June 21 1968 to the Bundestag’s Confidential Committee provides more details. In the form of notes, Wessel gave “details of BND activities” in support of its Indonesian partner service, explained Schmidt-Eenboom and Ritzi. Explicitly the manuscript explains that “the close ties already in place to the Indonesian strategic ND (intelligence service) by October 1965, had facilitated support (advisors, equipment, money) to Indonesia’s ND and its special military organs during the elimination of the CPI (and Sukarno’s disempowerment – control and support of demonstrations).”[8] The “CPI’s elimination” included the assassination of hundreds of thousands of genuine and suspected members and sympathizers of the Indonesian CP. According to the manuscript, BND President Wessel continued his speech to the Confidential Committee, “in the opinion of Indonesian politicians and military officers ((Suharto, Nasution, Sultan) a large part thanks to the BND.”
Praise from Pullach
Reflecting back, BND founder Gehlen was praising these crimes almost effusively. “The significance of the Indonesian army’s success, which … pursued the elimination of the entire Communist Party with all consequences and severity, cannot – in my opinion – be appraised highly enough,” Gehlen wrote in his 1971 “Memoirs.”[9]
Berlin’s Priorities
The German government is still refusing to shed light on Germany’s participation in these crimes. In a parliamentary interpellation, the government was asked if it has knowledge of “foreign governments, intelligence services or other organizations’ direct or indirect support of the massacres.” In Mai 2014, it responded, “after a thorough assessment, the government concludes that it cannot give an open answer.” It is “imperative” to keep the “requested information” secret. The “protection of sources” is a “principle of primary importance to the work of intelligence services.”[10] For the German government, the Indonesian civil society’s need to have information on foreign support for the immense mass murder is of less importance than its “protection of sources.”
[1] Rainer Werning: Putsch nach “Pütschchen”. junge Welt 01.10.2015.
[2], [3] Rainer Werning: Der Archipel Suharto. In: Konflikte auf Dauer? Osnabrücker Jahrbuch Frieden und Wissenschaft, herausgegeben vom Oberbürgermeister der Stadt Osnabrück und dem Präsidenten der Universität Osnabrück. Osnabrück 2008, S. 183-199.
[4] Hermann Zolling, Heinz Höhne: Pullach intern. Der Spiegel 11/1971.
[5] Hermann Zolling, Heinz Höhne: Pullach intern. Der Spiegel 23/1971.
[6] Reinhard Gehlen: Der Dienst. Erinnerungen 1942-1971. Mainz/Wiesbaden 1971.
[7], [8] Matthias Ritzi, Erich Schmidt-Eenboom: Im Schatten des Dritten Reiches. Der BND und sein Agent Richard Christmann. Berlin 2011. See Review: Im Schatten des Dritten Reiches.
[9] Reinhard Gehlen: Der Dienst. Erinnerungen 1942-1971. Mainz/Wiesbaden 1971.
[10] Antwort der Bundesregierung auf die Kleine Anfrage der Abgeordneten Andrej Hunko, Jan van Aken, Sevim Dağdelen, weiterer Abgeordneter und der Fraktion DIE LINKE. Deutscher Bundestag Drucksache 18/1554, 27.05.2014.
Bonn and the Putsch
Find this story at 15 October 2015
© Informationen zur Deutschen Außenpolitik
CIA Cover-Up Thwarted FBI’s Nuclear Diversion Investigations Evidence that missing uranium went to Israel withheld since 196823 oktober 2015
According to formerly top-secret and secret Central Intelligence Agency files (PDF) released August 31 in response to a Freedom of Information Act lawsuit (PDF), the agency’s long retention of key information ultimately stymied two FBI investigations into the 1960s diversion of weapons-grade uranium from a Pennsylvania-based government contractor into the Israeli nuclear weapons program.
The Nuclear Materials and Equipment Corporation (NUMEC) was a nuclear fuel processing company founded by legendary chemist Zalman Mordecai Shapiro and financed by entrepreneur David Luzer Lowenthal. According to the Department of Energy, during Shapiro’s reign at NUMEC, the company lost more weapons-grade uranium – 337 kilograms after accounting for losses – much of a particularly unique and high enrichment level than any other U.S. facility. Losses only returned to industry norms after Shapiro, who later unsuccessfully tried to get a job working on advanced hydrogen bomb designs, was forced out of NUMEC.
In the 1950’s Shapiro developed vital breakthroughs for US Navy nuclear propulsion systems. In the 1940s Lowenthal fought in Israel’s War of Independence, serving as a smuggler who developed close contacts with high Israeli intelligence officials. An ardent supporter of Israel, Shapiro was Pittsburgh Chapter President of the Zionist Organization of America. According to the Jerusalem Post, Shapiro later joined the board of governors of the Israeli Intelligence Heritage Center, an organization that honors spies who secretly took action to advance Israel. NUMEC holding company Apollo Industries President Morton Chatkin also held a ZOA leadership role while Apollo Executive Vice President Ivan J. Novick went on to become ZOA’s national president. David Lowenthal, who raised capital for acquiring NUMEC’s facilities (an old steel mill in the center of the village) served as Apollo’s treasurer.
In 1968 CIA Director Richard Helms sent an urgent request for an investigation to Attorney General Ramsey Clark (PDF) stating “You are well aware of the great concern which exists at the highest levels of this Government with regard to the proliferation of nuclear weapons…It is critical for us to establish whether or not the Israelis now have the capability of fabricating nuclear weapons which might be employed in the Near East…I urge that the Federal Bureau of Investigation be called upon to initiate a discreet intelligence investigation of all source nature of Dr. Shapiro in order to establish the nature and extent of his relationship with the Government of Israel.” (PDF)
The FBI investigation documented Shapiro’s many meetings with top Israeli nuclear weapons development officials such as Avraham Hermoni and wiretapped a conversation representative of the overall lack of concern over worker safety and the environment by Shapiro and Lowenthal. The FBI discovered that NUMEC had formed a joint venture with the Israel Atomic Energy Commission called Isorad to supply food irradiators to Israel. The now-defunct Atomic Energy Agency questioned Zalman Shapiro in 1969 – never asking if he had diverted material – over his many meetings with Israelis known to the FBI to be intelligence operatives. After the AEC defended Shapiro and his continued holding of security clearances, the FBI terminated its intelligence investigation.
In 1976 the Ford administration reopened the NUMEC investigation in order to determine if a diversion had occurred and whether a government cover-up had ensued. The 130-page release is replete with formal CIA denials to Congressional Committee investigators, the GAO and the Nuclear Regulatory Commission inquiries about whether the CIA had participated in any illegal diversions, or whether it was aware of any presidential finding authorizing such an operation. Arizona Democrat Morris Udall asked bluntly on August 23, 1977 “Is it possible that President Johnson, who was known to be a friend of Israel, could have encouraged the flow of nuclear materials to the Israelis?” Citing CIA’s role in alerting the attorney general to the problem as evidence that it was not involved, the agency also repeatedly emphasized “we in CIA are not and have not been concerned with the law enforcement aspects of this problem. Indeed, Dick Helms turned the matter over to the FBI in order to avoid such involvement.” Rather, exploring the NUMEC-Israel link was part of CIA’s intelligence function to substantiate why its National Intelligence Estimate concluded Israel had a nuclear arsenal.
FBI special agents soon lost morale over being sent unprepared into a second investigation. The CIA, for its part, continued withholding critical information that could have provided both motivation and a tool for confronting hostile interviewees. This was according to the newly released CIA files “information…of obvious importance in reaching an intelligence decision on the probability of diversion, it is not of any legal pertinence to the FBI’s criminal investigation of NUMEC. In our discussions with the FBI we have alluded to this information but we have not made the details available to special agents from the Washington Field Office of the FBI who are working on the case. While Mr. Bush’s [then-CIA Director George H.W. Bush] conversations are not known to us, we have had no substantive discussions with officials at FBI Headquarters on this matter.” It was this sensitive CIA information, made available only to the president, cabinet, and a limited number of top agency officials that led one National Security Council staffer to conclude, “I do not think that the President has plausible deniability.”
On June 6, 1977 Associate Deputy Director for Operations Theodore Shackley briefed the FBI agents in charge of the NUMEC investigation. They grumbled that since they had not established that the diversion took place, they could not begin to address the second question about a cover-up. They then pleaded for “new information” from the CIA, blithely ignorant that their reasoning was completely backward – it was old information they required, and it was the CIA’s withholding of it that was the true cover-up. The FBI also thought it needed a NUMEC insider willing to blow the whistle in order to finally break the case open.
Unknown to the FBI, every CIA director was complicit in withholding a key clandestine operational finding from investigators. According to a May 11, 1977 report by Shackley, the “CIA has not furnished to the FBI sensitive agent reporting…since the decision was made by Directors Helms, Colby and Bush that this information would not further the investigation of NUMEC but would compromise sources and methods.”
Though carefully redacted from the CIA release, the omitted fact was likely that highly enriched uranium of a signature unique to NUMEC had been detected in Israel, a country that did not have facilities to enrich uranium. This sensitive information (PDF) was delivered to former Atomic Energy Commissioner Glen Seaborg by two Department of Energy investigators sifting for more facts about NUMEC in June of 1978. It was powerful enough evidence that the retired Seaborg subsequently refused to be interviewed by less informed FBI investigators.
The CIA noted FBI investigators “indicated that even if they came up with a case, it was extremely unlikely that Justice and State would allow it to come to trial…they feel that they have been given a job to do with none of the tools necessary to do it.” Although in 1981 special agents finally identified a former NUMEC employee who had personally witnessed the means of the diversion – Zalman Shapiro and other NUMEC officials stuffing HEU canisters into irradiators (PDF) sealed and rushed to Israel – lacking the missing CIA puzzle piece the FBI investigation went dormant as the statute of limitations for Atomic Energy Act violations – punishable by death – finally expired.
Grant F. Smith is the author of DIVERT! NUMEC, Zalman Shapiro, and the diversion of U.S. weapons-grade uranium into the Israeli nuclear weapons program. He currently serves as director of research at the Institute for Research: Middle Eastern Policy in Washington (IRmep), D.C. Read other articles by Smith, or visit the IRmep website.
by Grant Smith, September 07, 2015
Find this story at 7 September 2015
Copyright © Antiwar.com 2015
U.S. Suspected Israeli Involvement in 1960s Missing Uranium (2014)23 oktober 2015
Officials Believed Ally Used Materials Lifted From Pennsylvania Toward a Weapons Program
Declassified documents from the 1970s provide new evidence that federal officials believed bomb-grade uranium that disappeared from a Pennsylvania nuclear facility in the 1960s was likely taken for use in a clandestine Israeli atomic-weapons program.
The documents, obtained earlier this year through public-records requests by a Washington-based nonprofit group, also indicate that senior officials wanted to keep the matter under wraps for fear it could undermine U.S. Middle East peace efforts.
Though the Central Intelligence Agency’s case for the suspected theft wasn’t conclusive, it was sufficiently persuasive that “I do not think that the President has plausible deniability” regarding the question, said a memo dated July 28, 1977, by a National Security Council staffer in President Jimmy Carter’s administration.
A security council memo to Mr. Carter a few days later expressed more uncertainty about whether a theft had occurred, but noted that then-Secretary of State Cyrus Vance had a coming Middle East trip and discussed the need to keep attention “away from the CIA’s information.”
The question of whether one of America’s closest allies was involved in the theft of some of its most valuable and dangerous material in pursuit of nuclear weapons has been one of the enduring mysteries of the atomic age. The suspected theft has drawn the attention of at least three presidents and other senior government officials.
The evidence suggested that “something did transpire,” said Zbigniew Brzezinski, Mr. Carter’s national-security adviser, in a recent interview. “But until you have conclusive evidence you don’t want to make an international incident. This is a potentially very explosive, controversial issue.” Besides, he added, even if a theft was proved, “What are we going to say to the Israelis, ‘Give it back?’ ”
Israel hasn’t ever said whether it has nuclear weapons. A spokeswoman for the Israeli Embassy in Washington, D.C., declined to comment for this article.
So did a spokeswoman for the Obama administration, which like past U.S. administrations has declined to say whether it believes Israel has an atomic arsenal. A CIA spokesman also declined to comment.
Mr. Carter, who said at a 2008 gathering in Britain that he believes Israel has nuclear weapons, declined through a spokeswoman to be interviewed.
His diplomatic efforts as president, which helped produce a peace treaty between Israel and Egypt in 1979, likely wouldn’t have been possible “if there was some huge scandal at the time about this,” said John Marcum, the staffer who wrote the July 28, 1977, memo, in a recent interview.
The theft suspicions surround events at a now-dismantled facility in Apollo, Pa., owned by a company called Nuclear Materials & Equipment Corp., or Numec. In the mid-1960s, some 200 pounds of bomb-grade uranium—enough possibly for several Hiroshima-sized bombs—couldn’t be accounted for there.
ENLARGE
An FBI investigation begun in the late 1960s, which drew interest from top Nixon administration officials, including the president, couldn’t determine what happened to the uranium, according to Federal Bureau of Investigation and other agency documents. But FBI officials did raise questions about suspected dealings between Numec’s founder and president, Zalman Shapiro, and Israeli intelligence officials, according to government documents. Babcock & Wilcox Co., a nuclear-technology and energy company that acquired Numec in 1971, declined to comment.
In an interview late last year, the 93-year-old Mr. Shapiro, who has long argued the material had been lost in the production process, said that no theft took place. He said his dealings with Israel, where Numec had commercial activities, were legitimate and to his knowledge never involved intelligence officials.
Potentially crucial sections of the recently released documents—obtained by the Institute for Research: Middle Eastern Policy, an organization that has been critical of Israel—remain classified.
The latest document release underscores the need for the government to declassify the remaining information about the suspected theft, some former federal officials say.
“We know the CIA thought the material was stolen. We want to know why they thought that,” said Victor Gilinsky, a former commissioner of the Nuclear Regulatory Commission.
Government records show that a federal nuclear-enrichment facility in Ohio sent shipments to Numec containing the highest percentage of U235, the explosive form of uranium, ever known to have been produced, said Roger Mattson, another former NRC official.
Did the CIA later find that such uranium had turned up in Israel, as some documentary evidence suggests? “That’s not something that’s declassified,” said Jessica Tuchman Mathews, a national-security official in the Carter administration who wrote or received some of the recently declassified documents.
By JOHN R. EMSHWILLER
Updated Aug. 6, 2014 7:41 p.m. ET
Find this story at 6 August 2014
Copyright ©2015 Dow Jones & Company, Inc.
MI6 spy Gareth Williams found dead in bag had ‘hacked Clinton secrets’23 oktober 2015
A MI6 spy who was discovered dead in a holdall at his apartment in 2010 had hacked into sensitive information about former US President Bill Clinton, it has been claimed. The spy had obtained Clinton’s diary for an event and passed it to a friend.
Gareth Williams, 31, hacked into the event’s guest list as it was to be attended by President Clinton, passing it to his friend who was also to be a guest at the party, according to sources speaking on condition of anonymity to the Sun on Sunday.
“The Clinton diary hack came at a time when Williams’s work with America was of the most sensitive nature,” one source said. “It was a diplomatic nightmare for Sir John Sawers, the new director of MI6 at the time.”
The death of Williams remains an unsolved case after five years. A three-year investigation by the Metropolitan Police ended in 2013, deciding that no one else was involved in Williams’ death and his being locked inside the bag, which was found in his bath. A coroner’s report following his death judged that he was killed unlawfully, however.
Another inside source told the newspaper that before his death, living with a new identity has been taking its toll on Williams. “Williams’s state of mind in the months before his death was worrying those closest to him,” the source told the paper. “He found the training so stressful and his mood blackened even talking about it.”
“Typically he’d be asked to learn a new identity then report to a country hotel to meet an interrogation team. There he would be grilled about his new ID for 48 hours without sleep, the source added. “His wrist was broken once after he was handcuffed to a metal bar inside a van that was driven around the country for several hours while he faced a barrage of questions.”
Last week, it was reported that spies may have broken into Williams’ flat in Pimlico, central London, through a skylight, re-entering the residence in order to destroy evidence while the property was under armed guard after the spy’s death. An anonymous source told the Mirror that forensic officers realised that equipment in the flat had been moved in their absence. Williams was a keen cyclist from Anglesey in North Wales and before his death had attended a hacking conference in the US and also a drag show by himself two days before his death.
International Business TimesBy Jack Moore | International Business Times – Sun, Aug 30, 2015
Find this story at 30 August 2015
copyright https://uk.news.yahoo.com/
MI6 spy Gareth Williams was ‘killed by Russia for refusing to become double agent’, former KGB man claims (2015)23 oktober 2015
Defector Boris Karpichkov claims Russia had a secret agent in GCHQ and Williams knew who it was
A Russian defector has claimed that the MI6 spy who was found dead in a padlocked holdall in his bath in Pimlico was “exterminated” by Russian intelligence agents because he refused to become a double agent and knew the identity of a Kremlin spy working inside GCHQ.
Codebreaker Gareth Williams was found dead at his home in 2010. He had been a cipher expert at GCHQ but was on secondment to MI6 when he died.
MI6 spy in a bag case: Gareth Williams ‘probably’ locked himself in
Scotland Yard boss Horgan-Howe warns MI6 over spy Gareth Williams
Spy Gareth Williams was probably the victim of a ‘criminally mediated’
Coroner criticises MI6 investigation into spy Gareth Williams’ death
MI6 spy Gareth Williams ‘poisoned or suffocated’
MI6 spy Gareth Williams tied himself to bed, says landlady
According to the coroner at the subsequent inquest, his death was likely a “criminally mediated” unlawful killing, though it was “unlikely” to be satisfactorily explained. Police investigating Williams’ death suggested he had died as the result of a sex game gone wrong.
But a defector, Boris Karpichkov, claims intelligence sources in Russia have admitted the MI6 spy was killed by the SVR, the current incarnation of the country’s espionage agency which was formerly known as the KGB.
Speaking to the Daily Mirror, Karpichkov claimed the SVR attempted to recruit Williams as a double agent, allegedly using details from the British cypher’s private life as leverage.
Police disclosed at the time of Williams’ death that he owned £15,000 worth of women’s designer clothing, a wig and make up. It had been suggested that Williams dressed as a woman outside of work, though a forensics expert has since said they believe the spy likely worked undercover as a woman.
Spy Gareth Williams was probably the victim of a ‘criminally mediated’ unlawful killing
Karpichkov, who is ex-KGB, claims the SVR threatened to reveal the Briton was a transvestite, before Williams in turn revealed he knew the identity of the person who had “tipped the Russians off” about him.
“The SVR then had no alternative but to exterminate him in order to protect their agent inside GCHQ,” he alleges.
Karpichkov, who also lives in the Pimlico area, said he had seen Russian diplomatic cars in the area around the time of Williams’ death but had believed they had been sent to monitor himself. He claims to have not seen the cars since Williams died.
Karpichkov has also claimed that Williams was killed by an untraceable poison which was pushed into his ear using a needleless syringe.
At the time of the inquiry the coroner said that the involvement of intelligence services in Williams’ death remained a “legitimate line of inquiry” but stressed “there was no evidence to support that he died at the hands” of a government agency.
Loulla-Mae Eleftheriou-Smith Monday 28 September 2015 12:55 BST1 comment
Find this story at 28 September 2015
copyright http://www.independent.co.uk/
MI6 spy found dead in bag probably locked himself inside, Met says (2013)23 oktober 2015
Three-year investigation by Scotland Yard concludes Gareth Williams probably died as a result of a tragic accident
Gareth Williams: last year a coroner concluded that the spy was probably unlawfully killed and his death the result of a criminal act.
The MI6 spy found dead in a bag three years ago probably locked himself in the holdall and died as a result of a tragic accident, Scotland Yard has said.
Outlining the results of a three-year investigation on Wednesday, the Metropolitan police said Gareth Williams most likely died alone in his flat.
But Detective Assistant Commissioner Martin Hewitt said the police could not “fundamentally and beyond doubt” rule out the possibility that a third party was involved in his death.
Williams’s naked body was found in the padlocked bag, with the keys discovered under his body, in the otherwise empty bath in his flat in Pimlico, central London, in August 2010.
Last year, a coroner concluded that Williams was probably unlawfully killed and his death the result of a criminal act. Following an eight-day inquest, the Westminster coroner, Dr Fiona Wilcox, said he was probably either suffocated or poisoned, before a third party locked and placed the bag in the bath.
But Hewitt said Scotland Yard’s three-year inquiry had come to a different conclusion and that Williams was “most probably” alone when he died.
“Despite all of this considerable effort, it is still the case that there is insufficient evidence to be definitive on the circumstances that led to Gareth’s death,” he said.
“Rather, what we are left with is either individual pieces of evidence, or a lack of such evidence, that can logically support one of a number of hypotheses.”
Hewitt added that the investigation had added “some clarity and detail” to the case, but that “no evidence has been identified to establish the full circumstances of Gareth’s death beyond all reasonable doubt”.
A forensic examination of Williams’s flat, a security service safe house, has concluded that there was no sign of forced entry or DNA that pointed to a third party present at the time of the spy’s death.
Scotland Yard’s inquiry also found no evidence of Williams’s fingerprints on the padlock of the bag or the rim of the bath, which the coroner last year said supported her assertion of “third-party involvement” in the death. Hewitt said it was theoretically possible for Williams to lower himself into the holdall without touching the rim of the bath.
Winding down the lengthy investigation, which has drawn interviews and statements from 27 of Williams’s colleagues in MI6 and GCHQ, Hewitt said the death remained a tragedy that would be kept under review by detectives.
In a statement, Williams’s family said they were disappointed with the police findings and that they agreed with the coroner’s conclusions that he was most likely killed unlawfully.”We are naturally disappointed that it is still not possible to state with certainty how Gareth died and the fact that the circumstances of his death are still unknown adds to our grief,” the family said.
“We note that the investigation has been conducted with further interviews upon some of the witnesses who gave evidence at the inquest and that the investigation team were at last able to interview directly members of GCHQ and SIS [MI6].
“We consider that on the basis of the facts at present known the coroner’s verdict accurately reflects the circumstances of Gareth’s death.”
In a press briefing at Scotland Yard, Hewitt admitted it was “a cause of some regret” that the police were not able to definitively explain the circumstances surrounding the 31-year-old’s death.
He rejected suggestions that the security services had “pulled the wool” over his eyes, following concerns over how MI6 and counter-terrorism officers had handled some evidence during the initial investigation. It emerged on Wednesday that police only gained access to Williams’s spy agency personnel and vetting files after the coroner’s inquest ended last May.
Williams, a maths prodigy and fitness enthusiast originally from Anglesey, was a private person with few other close friends aside from his family, police said. In interviews, MI6 and GCHQ colleagues described him as a “conscientious and decent man” and detectives were unable to identify anyone with any animosity towards him or a motive for causing him harm.
As part of the fresh investigation, a forensic sweep of Williams’s flat discovered 10 to 15 unidentified traces of DNA, which are being kept under examination, but none on the North Face holdall or around the bath area of the en suite bathroom of the flat’s main bedroom. There was also no evidence of a “deep clean” of the flat to wipe all trace of DNA.
Hewitt said: “There are really three hypotheses that you can use here. One is that Gareth, for whatever reason, got himself into that bag and then was unable to get himself out and died as a result of that.
“One is that Gareth, with someone else, got into the bag consensually, then something went wrong and he died as a result of that. The third is that someone murdered Gareth by putting him in that bag. I would argue that any physical absence [of evidence of] a third party being present tends to make the hypotheses that there is a third party present less likely.”
He added: “The coroner drew an inference. I am now drawing a different inference.”
At the coroner’s inquest, two experts tried 400 times to lock themselves into the 32in by 19in holdall without success, with one remarking that even Harry Houdini “would have struggled” to squeeze himself inside. But days after the inquest, footage emerged of a retired army sergeant climbing into the bag and locking it from the inside.
Hewitt said it was now established that it was theoretically possible for a person to climb into the bag and that it was “more probable” that Williams did this before suffocating as a result of the accident. It emerged during the inquest that Williams had an interest in escapology, but the police said it would be speculation to link his death to a failed attempt to escape from the locked holdall.
Josh Halliday
Wednesday 13 November 2013 14.44 GMT Last modified on Thursday 22 May 2014 09.11 BST
Find this story at 13 November 2013
© 2015 Guardian News and Media Limited
MI6 and Met condemned over Gareth Williams’ death (2012)23 oktober 2015
Coroner criticises intelligence agency for failing to report missing MI6 officer and rules he was probably killed unlawfully
The coroner in the Gareth Williams case delivered a damning verdict that was highly critical of the Metropolitan police’s counter-terrorism branch and MI6 as she ruled that the officer had probably been killed unlawfully.
The cause of death of Williams, 31, who was found padlocked in a holdall in the bath at his flat in Pimlico, central London, was “unnatural and likely to have been criminally mediated”, said Dr Fiona Wilcox.
Passing a narrative verdict, she said she was satisfied that “a third party placed the bag in the bath and on the balance of probabilities locked the bag”.
She was, therefore, “satisfied that on the balance of probabilities that Gareth was killed unlawfully”.
Wilcox levelled devastating criticism at Williams’s employers at MI6 who failed to report him missing for seven days when he did not turn up for work. The explanation from his line manager lacked credibility, she said, and she could “only speculate as to what effect this [delay] had on the investigation”.
The lawyer for the Secret Intelligence Service, Andrew O’Connor, delivered deep regrets and an unprecedented apology to the family from Sir John Sawers, chief of the SIS, who recognised that “failure to act more swiftly” when Williams was absent had contributed to their “anguish and suffering”.
Officers in the Met’s counter-terrorism branch, SO15, whose role was to interview SIS witnesses, were also strongly criticised. SO15 failed to inform DCI Jackie Sebire, senior investigating officer, of the existence of nine memory sticks and a black holdall found at Williams’ MI6 office until two days before the inquest ended, the coroner said. On discovering this, Wilcox said she had seriously questioned whether she should adjourn the inquest at that point.
No formal statements were taken by S015 officers who interviewed Williams’ colleagues, “and I find this did affect the quality of evidence heard in this court,” she said.
She also criticised the handling of an iPhone belonging to Williams and found in his work locker, which contained deleted images of him naked in a pair of boots. The officer involved kept it in his possession before handing it to homicide detectives the following day, “demonstrating disregard for the rules governing continuity of evidence”, she said.
Many agencies “fell short of the ideal”, she said, including LGC Forensics in relation to DNA contamination, and the coroner’s office for failing to inform police officers of a second postmortem.
Williams, a fitness fanatic from Anglesey, north Wales, was probably alive when put in the bag but probably suffocated very soon afterwards either from CO2 poisoning, hypercapnia, or the effects of a short-acting poison, she said.
Scotland Yard has always treated the death as suspicious and unexplained, but held back from describing it as murder or manslaughter. Recording her verdict, Wilcox stated her belief that a criminal hand was involved, although police said afterwards that there was no evidence of this. The Guardian understands police inquiries have focused on the theory that Williams died accidentally in a private sexual liaison that went wrong.
The coroner, however, ruled out bondage or auto-erotic activity as explanations.
The dead man’s family said in a statement that their grief had been exacerbated by the failure of his employers at MI6 to make “even the most basic inquiries of his whereabouts and welfare” when he was absent from work for seven days.
They were “extremely disappointed at the failure and reluctance of MI6” to provide relevant information and called on the Metropolitan police commissioner, Bernard Hogan-Howe, to conduct a review of how the investigation would proceed “in the light of the total inadequacy of S015’s investigations into MI6”.
Wilcox said there was no evidence to suggest that any SIS colleague had been involved, but it remained a legitimate line of inquiry given Williams socialised with so few people, and never let anyone he didn’t know into his flat. So any third party would be “someone he knew or someone there without invitation”.
An SIS spokesman said: “We fully co-operated with the police and will continue to do so during the ongoing investigation. We gave all the evidence to the police when they wanted it; at no time did we withhold any evidence.”
An iPhone found in his living room had recently been wiped and restored to factory settings, and it could not be ruled out that contact with a third party had been made via the internet on that phone, she said.
Wilcox was “sure that a third party moved the bag containing Gareth into the bath”. There were two possibilities: either he entered the bag outside the bathroom and it was carried in by a third party, or he was locked in the bag by a third party and lifted into the bath.
She dismissed an interest in bondage, and female clothing, as being irrelevant, condemning leaks to the media about him cross-dressing as a possible attempt “by some third party to manipulate a section of the evidence”.
She said: “Gareth was naked in a bag, not cross-dressed, not in high-heeled shoes.” If his interest was bondage, she would have expected much more internet activity on such websites, when his visits made up a tiny percentage of his browsing. His interest was in fashion, she said. Dismissing any auto-erotic activity, she said he was a “scrupulous risk assessor” and if he had locked himself into the bag would have taken a knife in with him to escape.
She said that despite a 21-month police inquiry: “Most of the fundamental questions in relation to how Gareth died remained unanswered.”
Detectives believe scientific tests on a crumpled green hand towel found in his flat may yet yield crucial DNA evidence, as the Metropolitan police launched a review into the case.
The towel was originally in the bathroom, and moved to the kitchen, police believe, by the “third party”. More tests are being conducted on the bag. The memory sticks, which have now been examined by police, are said not to have produced any significant evidence, but will be examined more closely.
Martin Hewitt, deputy assistant commissioner of the Met, said the circumstances of the death were particularly complex and continued to be the subject of a thorough investigation.
He added: “We have listened to the detailed ruling by the coroner and the concerns raised by Gareth’s family. We are giving both very careful consideration.”
Detectives were “currently undertaking actions in order to develop existing DNA profiles, to trace unidentified individuals who may have information about Gareth’s death, and to further develop analysis of telephone communications”.
Caroline Davies and Sandra Laville
Wednesday 2 May 2012 20.31 BST Last modified on Wednesday 21 May 2014 02.01 BST
Find this story at 2 May 2012
© 2015 Guardian News and Media Limited
THE DRONE PAPERS: THE ASSASSINATION COMPLEXSECRET MILITARY DOCUMENTS EXPOSE THE INNER WORKINGS OF OBAMA’S DRONE WARS16 oktober 2015
From his first days as commander in chief, the drone has been President Barack Obama’s weapon of choice, used by the military and the CIA to hunt down and kill the people his administration has deemed — through secretive processes, without indictment or trial — worthy of execution. There has been intense focus on the technology of remote killing, but that often serves as a surrogate for what should be a broader examination of the state’s power over life and death.
DRONES ARE A TOOL, not a policy. The policy is assassination. While every president since Gerald Ford has upheld an executive order banning assassinations by U.S. personnel, Congress has avoided legislating the issue or even defining the word “assassination.” This has allowed proponents of the drone wars to rebrand assassinations with more palatable characterizations, such as the term du jour, “targeted killings.”
When the Obama administration has discussed drone strikes publicly, it has offered assurances that such operations are a more precise alternative to boots on the ground and are authorized only when an “imminent” threat is present and there is “near certainty” that the intended target will be eliminated. Those terms, however, appear to have been bluntly redefined to bear almost no resemblance to their commonly understood meanings.
The first drone strike outside of a declared war zone was conducted more than 12 years ago, yet it was not until May 2013 that the White House released a set of standards and procedures for conducting such strikes. Those guidelines offered little specificity, asserting that the U.S. would only conduct a lethal strike outside of an “area of active hostilities” if a target represents a “continuing, imminent threat to U.S. persons,” without providing any sense of the internal process used to determine whether a suspect should be killed without being indicted or tried. The implicit message on drone strikes from the Obama administration has been one of trust, but don’t verify.
Photo: The Intercept
Document
SMALL FOOTPRINT OPERATIONS 2/13Document
SMALL FOOTPRINT OPERATIONS 5/13Document
OPERATION HAYMAKERDocument
GEOLOCATION-WATCHLISTThe Intercept has obtained a cache of secret slides that provides a window into the inner workings of the U.S. military’s kill/capture operations at a key time in the evolution of the drone wars — between 2011 and 2013. The documents, which also outline the internal views of special operations forces on the shortcomings and flaws of the drone program, were provided by a source within the intelligence community who worked on the types of operations and programs described in the slides. The Intercept granted the source’s request for anonymity because the materials are classified and because the U.S. government has engaged in aggressive prosecution of whistleblowers. The stories in this series will refer to the source as “the source.”
The source said he decided to provide these documents to The Intercept because he believes the public has a right to understand the process by which people are placed on kill lists and ultimately assassinated on orders from the highest echelons of the U.S. government. “This outrageous explosion of watchlisting — of monitoring people and racking and stacking them on lists, assigning them numbers, assigning them ‘baseball cards,’ assigning them death sentences without notice, on a worldwide battlefield — it was, from the very first instance, wrong,” the source said.
“We’re allowing this to happen. And by ‘we,’ I mean every American citizen who has access to this information now, but continues to do nothing about it.”
The Pentagon, White House, and Special Operations Command all declined to comment. A Defense Department spokesperson said, “We don’t comment on the details of classified reports.”
The CIA and the U.S. military’s Joint Special Operations Command (JSOC) operate parallel drone-based assassination programs, and the secret documents should be viewed in the context of an intense internal turf war over which entity should have supremacy in those operations. Two sets of slides focus on the military’s high-value targeting campaign in Somalia and Yemen as it existed between 2011 and 2013, specifically the operations of a secretive unit, Task Force 48-4.
Additional documents on high-value kill/capture operations in Afghanistan buttress previous accounts of how the Obama administration masks the true number of civilians killed in drone strikes by categorizing unidentified people killed in a strike as enemies, even if they were not the intended targets. The slides also paint a picture of a campaign in Afghanistan aimed not only at eliminating al Qaeda and Taliban operatives, but also at taking out members of other local armed groups.
One top-secret document shows how the terror “watchlist” appears in the terminals of personnel conducting drone operations, linking unique codes associated with cellphone SIM cards and handsets to specific individuals in order to geolocate them.
A top-secret document shows how the watchlist looks on internal systems used by drone operators.
The costs to intelligence gathering when suspected terrorists are killed rather than captured are outlined in the slides pertaining to Yemen and Somalia, which are part of a 2013 study conducted by a Pentagon entity, the Intelligence, Surveillance, and Reconnaissance Task Force. The ISR study lamented the limitations of the drone program, arguing for more advanced drones and other surveillance aircraft and the expanded use of naval vessels to extend the reach of surveillance operations necessary for targeted strikes. It also contemplated the establishment of new “politically challenging” airfields and recommended capturing and interrogating more suspected terrorists rather than killing them in drone strikes.
The ISR Task Force at the time was under the control of Michael Vickers, the undersecretary of defense for intelligence. Vickers, a fierce proponent of drone strikes and a legendary paramilitary figure, had long pushed for a significant increase in the military’s use of special operations forces. The ISR Task Force is viewed by key lawmakers as an advocate for more surveillance platforms like drones.
The ISR study also reveals new details about the case of a British citizen, Bilal el-Berjawi, who was stripped of his citizenship before being killed in a U.S. drone strike in 2012. British and American intelligence had Berjawi under surveillance for several years as he traveled back and forth between the U.K. and East Africa, yet did not capture him. Instead, the U.S. hunted him down and killed him in Somalia.
Taken together, the secret documents lead to the conclusion that Washington’s 14-year high-value targeting campaign suffers from an overreliance on signals intelligence, an apparently incalculable civilian toll, and — due to a preference for assassination rather than capture — an inability to extract potentially valuable intelligence from terror suspects. They also highlight the futility of the war in Afghanistan by showing how the U.S. has poured vast resources into killing local insurgents, in the process exacerbating the very threat the U.S. is seeking to confront.
Read more
FIND, FIX, FINISH These secret slides help provide historical context to Washington’s ongoing wars, and are especially relevant today as the U.S. military intensifies its drone strikes and covert actions against ISIS in Syria and Iraq. Those campaigns, like the ones detailed in these documents, are unconventional wars that employ special operations forces at the tip of the spear.
The “find, fix, finish” doctrine that has fueled America’s post-9/11 borderless war is being refined and institutionalized. Whether through the use of drones, night raids, or new platforms yet to be unleashed, these documents lay bare the normalization of assassination as a central component of U.S. counterterrorism policy.
“The military is easily capable of adapting to change, but they don’t like to stop anything they feel is making their lives easier, or is to their benefit. And this certainly is, in their eyes, a very quick, clean way of doing things. It’s a very slick, efficient way to conduct the war, without having to have the massive ground invasion mistakes of Iraq and Afghanistan,” the source said. “But at this point, they have become so addicted to this machine, to this way of doing business, that it seems like it’s going to become harder and harder to pull them away from it the longer they’re allowed to continue operating in this way.”
The articles in The Drone Papers were produced by a team of reporters and researchers from The Intercept that has spent months analyzing the documents. The series is intended to serve as a long-overdue public examination of the methods and outcomes of America’s assassination program. This campaign, carried out by two presidents through four presidential terms, has been shrouded in excessive secrecy. The public has a right to see these documents not only to engage in an informed debate about the future of U.S. wars, both overt and covert, but also to understand the circumstances under which the U.S. government arrogates to itself the right to sentence individuals to death without the established checks and balances of arrest, trial, and appeal.
Among the key revelations in this series:
HOW THE PRESIDENT AUTHORIZES TARGETS FOR ASSASSINATION
Read more
KILL CHAINIt has been widely reported that President Obama directly approves high-value targets for inclusion on the kill list, but the secret ISR study provides new insight into the kill chain, including a detailed chart stretching from electronic and human intelligence gathering all the way to the president’s desk. The same month the ISR study was circulated — May 2013 — Obama signed the policy guidance on the use of force in counterterrorism operations overseas. A senior administration official, who declined to comment on the classified documents, told The Intercept that “those guidelines remain in effect today.”
U.S. intelligence personnel collect information on potential targets, as The Intercept has previously reported, drawn from government watchlists and the work of intelligence, military, and law enforcement agencies. At the time of the study, when someone was destined for the kill list, intelligence analysts created a portrait of a suspect and the threat that person posed, pulling it together “in a condensed format known as a ‘baseball card.’” That information was then bundled with operational information and packaged in a “target information folder” to be “staffed up to higher echelons” for action. On average, it took 58 days for the president to sign off on a target, one slide indicates. At that point, U.S. forces had 60 days to carry out the strike. The documents include two case studies that are partially based on information detailed on baseball cards.
The system for creating baseball cards and targeting packages, according to the source, depends largely on intelligence intercepts and a multi-layered system of fallible, human interpretation. “It isn’t a surefire method,” he said. “You’re relying on the fact that you do have all these very powerful machines, capable of collecting extraordinary amounts of data and information,” which can lead personnel involved in targeted killings to believe they have “godlike powers.”
ASSASSINATIONS DEPEND ON UNRELIABLE INTELLIGENCE AND HURT INTELLIGENCE GATHERING
Read more
FIRING BLINDIn undeclared war zones, the U.S. military has become overly reliant on signals intelligence, or SIGINT, to identify and ultimately hunt down and kill people. The documents acknowledge that using metadata from phones and computers, as well as communications intercepts, is an inferior method of finding and finishing targeted people. They described SIGINT capabilities in these unconventional battlefields as “poor” and “limited.” Yet such collection, much of it provided by foreign partners, accounted for more than half the intelligence used to track potential kills in Yemen and Somalia. The ISR study characterized these failings as a technical hindrance to efficient operations, omitting the fact that faulty intelligence has led to the killing of innocent people, including U.S. citizens, in drone strikes.
The source underscored the unreliability of metadata, most often from phone and computer communications intercepts. These sources of information, identified by so-called selectors such as a phone number or email address, are the primary tools used by the military to find, fix, and finish its targets. “It requires an enormous amount of faith in the technology that you’re using,” the source said. “There’s countless instances where I’ve come across intelligence that was faulty.” This, he said, is a primary factor in the killing of civilians. “It’s stunning the number of instances when selectors are misattributed to certain people. And it isn’t until several months or years later that you all of a sudden realize that the entire time you thought you were going after this really hot target, you wind up realizing it was his mother’s phone the whole time.”
Within the special operations community, the source said, the internal view of the people being hunted by the U.S. for possible death by drone strike is: “They have no rights. They have no dignity. They have no humanity to themselves. They’re just a ‘selector’ to an analyst. You eventually get to a point in the target’s life cycle that you are following them, you don’t even refer to them by their actual name.” This practice, he said, contributes to “dehumanizing the people before you’ve even encountered the moral question of ‘is this a legitimate kill or not?’”
By the ISR study’s own admission, killing suspected terrorists, even if they are “legitimate” targets, further hampers intelligence gathering. The secret study states bluntly: “Kill operations significantly reduce the intelligence available.” A chart shows that special operations actions in the Horn of Africa resulted in captures just 25 percent of the time, indicating a heavy tilt toward lethal strikes.
STRIKES OFTEN KILL MANY MORE THAN THE INTENDED TARGET
Read more
MANHUNTING IN THE HINDU KUSH The White House and Pentagon boast that the targeted killing program is precise and that civilian deaths are minimal. However, documents detailing a special operations campaign in northeastern Afghanistan, Operation Haymaker, show that between January 2012 and February 2013, U.S. special operations airstrikes killed more than 200 people. Of those, only 35 were the intended targets. During one five-month period of the operation, according to the documents, nearly 90 percent of the people killed in airstrikes were not the intended targets. In Yemen and Somalia, where the U.S. has far more limited intelligence capabilities to confirm the people killed are the intended targets, the equivalent ratios may well be much worse.
“Anyone caught in the vicinity is guilty by association,” the source said. When “a drone strike kills more than one person, there is no guarantee that those persons deserved their fate. … So it’s a phenomenal gamble.”
THE MILITARY LABELS UNKNOWN PEOPLE IT KILLS AS “ENEMIES KILLED IN ACTION”
Read more
MANHUNTING IN THE HINDU KUSH The documents show that the military designated people it killed in targeted strikes as EKIA — “enemy killed in action” — even if they were not the intended targets of the strike. Unless evidence posthumously emerged to prove the males killed were not terrorists or “unlawful enemy combatants,” EKIA remained their designation, according to the source. That process, he said, “is insane. But we’ve made ourselves comfortable with that. The intelligence community, JSOC, the CIA, and everybody that helps support and prop up these programs, they’re comfortable with that idea.”
The source described official U.S. government statements minimizing the number of civilian casualties inflicted by drone strikes as “exaggerating at best, if not outright lies.”
THE NUMBER OF PEOPLE TARGETED FOR DRONE STRIKES AND OTHER FINISHING OPERATIONS
Read more
KILL CHAINAccording to one secret slide, as of June 2012, there were 16 people in Yemen whom President Obama had authorized U.S. special operations forces to assassinate. In Somalia, there were four. The statistics contained in the documents appear to refer only to targets approved under the 2001 Authorization for Use of Military Force, not CIA operations. In 2012 alone, according to data compiled by the Bureau of Investigative Journalism, there were more than 200 people killed in operations in Yemen and between four and eight in Somalia.
HOW GEOGRAPHY SHAPES THE ASSASSINATION CAMPAIGN
Read more
FIRING BLINDIn Afghanistan and Iraq, the pace of U.S. strikes was much quicker than in Yemen and Somalia. This appears due, in large part, to the fact that Afghanistan and Iraq were declared war zones, and in Iraq the U.S. was able to launch attacks from bases closer to the targeted people. By contrast, in Somalia and Yemen, undeclared war zones where strikes were justified under tighter restrictions, U.S. attack planners described a serpentine bureaucracy for obtaining approval for assassination. The secret study states that the number of high-value targeting operations in these countries was “significantly lower than previously seen in Iraq and Afghanistan” because of these “constraining factors.”
Even after the president approved a target in Yemen or Somalia, the great distance between drone bases and targets created significant challenges for U.S. forces — a problem referred to in the documents as the “tyranny of distance.” In Iraq, more than 80 percent of “finishing operations” were conducted within 150 kilometers of an air base. In Yemen, the average distance was about 450 kilometers and in Somalia it was more than 1,000 kilometers. On average, one document states, it took the U.S. six years to develop a target in Somalia, but just 8.3 months to kill the target once the president had approved his addition to the kill list.
INCONSISTENCIES WITH WHITE HOUSE STATEMENTS ABOUT TARGETED KILLING
Read more
KILL CHAINThe White House’s publicly available policy standards state that lethal force will be launched only against targets who pose a “continuing, imminent threat to U.S. persons.” In the documents, however, there is only one explicit mention of a specific criterion: that a person “presents a threat to U.S. interest or personnel.” While such a rationale may make sense in the context of a declared war in which U.S. personnel are on the ground in large numbers, such as in Afghanistan, that standard is so vague as to be virtually meaningless in countries like Yemen and Somalia, where very few U.S. personnel operate.
While many of the documents provided to The Intercept contain explicit internal recommendations for improving unconventional U.S. warfare, the source said that what’s implicit is even more significant. The mentality reflected in the documents on the assassination programs is: “This process can work. We can work out the kinks. We can excuse the mistakes. And eventually we will get it down to the point where we don’t have to continuously come back … and explain why a bunch of innocent people got killed.”
The architects of what amounts to a global assassination campaign do not appear concerned with either its enduring impact or its moral implications. “All you have to do is take a look at the world and what it’s become, and the ineptitude of our Congress, the power grab of the executive branch over the past decade,” the source said. “It’s never considered: Is what we’re doing going to ensure the safety of our moral integrity? Of not just our moral integrity, but the lives and humanity of the people that are going to have to live with this the most?”
Jeremy Scahill
Oct. 15 2015, 1:57 p.m.
Find this story at 15 October 2015
Copyright https://theintercept.com/
German spy scandal deepens16 oktober 2015
The German intelligence service has spied on European and American embassies in ways that may have been beyond its mandate, German media ARD and Spiegel Online reported on Wednesday (14 October).
The Bundesnachtrichtendienst (BND) reportedly targeted French and US institutions and eavesdropped on them to acquire information about countries like Afghanistan.
The news follows reports in April that the BND spied on France and the European Commission on behalf of the US’ National Security Agency (NSA). But according to the new reports, BND also spied on allies on its own initiative.
For its spying programme, the BND used thousands of search queries, so-called selectors, including phone numbers and IP addresses, possibly queries the service chose itself.
“The question is … whether the used queries were covered by the BND’s mandate”, MP Clemens Binninger of chancellor Angela Merkel’s centre-right CDU party told ARD.
Binninger is head of the Bundestag’s supervisory body that oversees the intelligence service.
The German media sourced their news at a secret meeting of the overseeing body on Wednesday evening.
The revelations are remarkable considering the criticism that followed revelations by Edward Snowden in 2013 that the NSA had spied on EU leaders, including Merkel.
“Spying among friends – that is just not done”, Merkel said following the scandal.
The BND programme stopped around the same time as the Snowden revelations revealed the NSA practices, in the autumn of 2013.
German MPs are planning to interview staff next week at the BND headquarters in Pullach and review the list of search queries to determine if there has been any illegal practice.
By PETER TEFFER
BRUSSELS, 15. OCT, 09:11
Find this story at 15 October 2015
Copyright https://euobserver.com/
German spy charged with treason for aiding CIA and Russia16 oktober 2015
Prosecutors have charged a German spy with treason, breach of official secrecy and taking bribes for allegedly providing secret documents to both the CIA and Russia’s intelligence agency. Prosecutors say Thursday Aug. 20, 2015, the 32-year-old man,handled mail and classified documents for Germany’s foreign intelligence agency BND. ( Stephan Jansen/dpa via AP)
BERLIN (AP) — A German spy who allegedly acted as a double agent for the United States and Russia has been charged with treason, breach of official secrecy and taking bribes, Germany’s federal prosecutors’ office said Thursday.
The 32-year-old, identified only as Markus R. due to privacy rules, is accused of offering his services to the CIA in early 2008 while working for Germany’s foreign intelligence agency BND. Documents he gave the U.S. spy agency would have revealed details of the BND’s work and personnel abroad, officials said.
“In doing so the accused caused serious danger to Germany’s external security,” prosecutors said in a statement. “In return the accused received sums amounting to at least 95,000 euros ($104,900) from the CIA.”
Shortly before his arrest in July 2014, Markus R. also offered to work for Russian intelligence and provided them with three documents, again harming Germany’s national security, prosecutors said.
The discovery that the CIA had allegedly been spying on its German counterpart caused anger in Berlin, adding to diplomatic tension between Germany and the United States over reports about U.S. surveillance of Chancellor Angela Merkel’s cellphone.
Following the arrest, the German government demanded the removal of the CIA station chief in Berlin.
Prosecutors said Markus R. would have had access to sensitive documents because his job involved handling mail and classified documents for the BND’s foreign operations department.
German weekly Der Spiegel reported that the 218 documents Markus R. allegedly passed to the CIA included a list of all BND agents abroad, a summary of an eavesdropped phone call between former U.S. Secretary of State Hillary Rodham Clinton and former U.N. Secretary-General Kofi Annan, as well as a draft counter-espionage strategy. A spokeswoman for the federal prosecutors’ office declined to comment on the report.
If convicted, Markus R. could face between one and 15 years in prison.
Associated Press By FRANK JORDANS
August 20, 2015 11:07 AM
Find this story at 20 August 2015
Copyright http://news.yahoo.com/
Deliberate Deception Washington Gave Answer Long Ago in NSA Case16 oktober 2015
For months, the German government sought to create the impression it was still waiting for an answer from the US on whether it could share NSA target lists for spying with a parliamentary investigation. The response came months ago.
The order from Washington was unambiguous. The United States Embassy in Berlin didn’t want to waste any time and moved to deliver the diplomatic cable without delay. It was May 10, 2015, a Sunday — and even diplomats aren’t crazy about working weekends. On this day, though, they had no other choice. James Melville, the embassy’s second-in-command, hand delivered the mail from the White House to Angela Merkel’s Chancellery at 9 p.m.
The letter that Melville handed over to Merkel’s staff contained the long-awaited answer to how the German federal government could proceed with highly classified lists of NSA spying targets. The so-called “selector” lists had become notorious in Germany and the subject of considerable grief for Merkel because her foreign intelligence agency, the BND, may have helped the NSA to spy on German firms as a result of them. The selector lists, which were fed into the BND’s monitoring systems on behalf of the NSA, are reported to have included both German and European targets that were spied on by the Americans.
The letter put the German government in a very delicate position. The expectation had been that the US government would flat out refuse to allow officials in Berlin to present the lists to members of the federal parliament, which is currently investigating NSA spying in Germany, including the eavesdropping of Merkel’s own mobile phone. But that wasn’t the case. Instead, the Americans delivered a more differentiated letter, making it all the more interesting.
Canned Answers
Nevertheless, the German government remained silent about the letter’s existence. It disposed of all queries by saying that talks with the US on how to deal with the lists were still ongoing. The government kept giving the same reply whenever journalists from SPIEGEL or other media asked if it had received an answer from the Americans.
On May 11, for example, one day after Chancellery officials received the letter, Merkel’s spokesman Steffen Seibert responded to a query by saying: “The heads of the Parliamentary Control Panel (responsible for parliamentary oversight of Germany’s intelligence agencies) and the NSA investigative committee are all being informed about all relevant things in the context of this consultation process.” Is it not relevant when the US government provides its first official response to the Germans’ request to present the lists to parliament?
Two days later, on May 13, Seibert was asked explicitly by a reporter whether there had been any new developments on the NSA issue. “I have nothing new to report,” the government spokesman answered. At the very least, his reply was a deliberate deception of the public by the government. The letter, after all, didn’t come from just anyone — it came from US President Barack Obama’s White House chief of staff, Denis McDonough. A letter from such a high-ranking official is most certainly a new development. When questioned by SPIEGEL on the matter, the German government responded that “it would not publicly comment on confidential communications with foreign parties.”
Several sources familiar with the contents of the letter claim that in it, Obama’s people express their great respect for the parliamentary oversight of intelligence services and also accept that the committee will learn more about the NSA target list. At the same time, the letter also includes the decisive requirement: that the German government had to make sure no information contained in the target lists went public.
Keeping the Public in the Dark
The demand created a dilemma for the government. It meant, on the one Hand, that Merkel’s Chancellery could no longer hide behind the Americans as an excuse to withhold the information from parliament. On the other hand, the Chancellery didn’t want to take the risk of sharing the lists with members of the Bundestag because doing so, they worried, would create the risk that someone might then leak them to the media.
Merkel and her people instead deliberately kept German citizens and members of parliament in the dark about the Americans’ position. Almost two weeks after receipt of the letter from Washington, Merkel’s chief of staff, Chancellery Minister Peter Altmaier, informed the heads of the NSA investigative committee in a highly confidential meeting of an answer by the Americans, but he implied it had been vague, and there was no mention of any willingness on the part of the US government to allow the German parliament to clarify the issue. Instead, Altmaier argued that Washington had listed a number of legal concerns. He said it was unlikely further discussions would lead to any green light.
When the German weekly Die Zeit reported 10 days ago that the Americans had given their okay for the release of the lists, Altmaier responded: “We could have spared ourselves a difficult debate if permission to pass (the lists) on had actually been given by the US.” Altmaier clearly attempted to skirt the question of whether the US had made any statements on the issue.
Officials in the Chancellery are now doing their best to portray the McDonough letter as a kind of kick-off in German-American consultations on how to deal with the selector lists. After receiving the letter, Chancellery Minister Altmaier had a number of exchanges with his US counterpart by phone and email. In addition, Klaus-Dieter Fritsche, the Chancellery’s intelligence coordinator, also spoke several times with the Americans.
Berlin’s approach to the negotiations says quite a bit about the outcome one should expect. Officially, the German government is asking for permission to release the selector lists without the application of any restrictions by the US government. It had to have been clear to everyone involved that a demand like that would be unrealistic, but in this instance, the government didn’t want to risk making any mistakes. Within the Chancellery, officials then agreed that any time they were approached with questions, they would always answer that the consultations were still in progress — even if a decision had already been made.
Pushback from the Opposition
“The Federal Chancellery is doing exactly the opposite of what Merkel promised,” criticizes Konstantin von Notz, the Green Party’s representative on the NSA investigative committee. “Instead of clearing things up, things are being concealed behind the scenes, also using improper means.”
As the course of the NSA scandal showed, Merkel and her people already have practice when it comes to cover-up attempts. During her election campaign in 2013, Merkel created the impression for months that there was a chance Germany might be able to reach a no-spy agreement with the US. Throughout, the White House signaled behind the scenes that it would never agree to one, but the German government told the public nothing about these discussions.
Now, a special ombudsman is supposed to steer the government out of the difficult situation in which it finds itself. It’s an idea that originated with Altmaier. Rather than providing the selector lists to the NSA investigative committee in parliament, they will instead be viewed by Kurt Graulich, a former justice with the Federal Administrative Court. Altmaier’s hope is that this path will prevent details from being leaked to the press.
The opposition parties in parliament are against the idea. And why shouldn’t they be? In recent years, the Chancellery has done everything in its power to downplay spying by US intelligence services on Germany. Altmaier’s predecessor, Ronald Pofalla, even went so far in August 2013 as to say that the NSA scandal had been “cleared up.” The revelation, arguably the biggest, that Merkel’s own mobile phone had been tapped by the NSA followed two months later. Now the Green and Left parties want to prevent the government from choosing its own inspector. They are considering a legal challenge at the Federal Constitutional Court to stop Merkel’s government.
08/21/2015 07:44 PM
By Matthias Gebauer, René Pfister and Holger Stark
Find this story at 21 August 2015
© SPIEGEL ONLINE 2015
An American Tip to German Spies Points to a More Complex Relationship16 oktober 2015
BERLIN — In the summer of 2011, American intelligence agencies spied on a senior German official who they concluded had been the likely source of classified information being leaked to the news media.
The Obama administration authorized the top American spy in Germany to reveal to the German government the identity of the official, according to German officials and news media reports. The decision was made despite the risk of exposing that the United States was monitoring senior national security aides to Chancellor Angela Merkel.
The tip-off appears to have led to a senior German intelligence official being barred from access to sensitive material. But it also raises suspicions that Ms. Merkel’s government had strong indications of the extent of American surveillance at least two years before the disclosures by Edward J. Snowden, which included the number of a cellphone used by the chancellor.
The decision by the United States to risk disclosing a surveillance operation against a close ally indicates the high level of concern over the perceived security breach. It is unclear, however, what that information might have been or if it involved intelligence provided to Germany by the United States.
The German newsmagazine Der Spiegel reported Friday that it believed the American effort to expose the German intelligence official arose from conversations by its own journalists. It filed a complaint with the federal prosecutor in Germany over espionage activity and a violation of Germany’s data protection laws. The prosecutor’s office declined to comment, other than to confirm that the filing had been received.
In Washington, a spokesman for the National Security Council, Ned Price, declined on Friday to comment on the reported surveillance other than to indicate that the government does not spy on foreign journalists. “The United States is not spying on ordinary people who don’t threaten our national security,” Mr. Price said.
The disclosure is the latest intelligence revelation to shake the alliance, even though it is unclear that the National Security Agency actively listened to Ms. Merkel’s calls. Among other actions that widened the rift, the Germans last summer expelled the then-C.I.A. chief. And this week material uncovered by the antisecrecy group WikiLeaks suggested that the Americans had been spying on their German allies back to the 1990s.
The first hints emerged in the German media this year. The Bild am Sonntag newspaper reported that Hans Josef Vorbeck, a deputy director of the chancellery’s intelligence division, had been “put out in the cold” in 2011 after the then-C.I.A. station chief in Berlin gave information to Mr. Vorbeck’s boss, Günter Heiss. Der Spiegel said Mr. Heiss was specifically told of contacts with its journalists.
Mr. Heiss, a quiet but powerful figure in German intelligence activities, was questioned for nearly six hours at an open hearing of a German parliamentary committee on Thursday. Mr. Heiss was particularly reticent when asked about Mr. Vorbeck. He repeatedly declined to answer questions about him, challenging the mandate of the committee to pose such queries, and arguing that he was not allowed to discuss a third party in public.
Konstantin von Notz, a lawmaker for the opposition Green Party, which has been vocal in its criticism of Ms. Merkel and the German handling of alleged American espionage, accused Mr. Heiss of hiding behind a “cascade” of excuses.
Eventually, Hans-Christian Ströbele, a longtime lawmaker for the Greens, asked Mr. Heiss whether he ever had a “concrete suspicion” that Mr. Vorbeck was leaking classified information. Mr. Heiss said there was no “concrete suspicion” that would have led to “concrete action.” He indicated the matter had been discussed in the chancellery, but declined to give specifics.
But when asked whether Mr. Vorbeck had been the target of spying, Mr. Heiss declared: “No. That much I can say.”
In a report in the edition it published on Saturday, Der Spiegel said Mr. Heiss had learned of the suspicions against Mr. Vorbeck in the summer of 2011, when invited by the C.I.A. station chief to take a walk.
Appearing before the committee last month, Guido Müller, a senior intelligence official, at first said he could not recall Mr. Vorbeck’s transfer to a lower-level job. Mr. Müller then said he could remember it only if testifying behind closed doors.
When he appeared before the committee, two days shy of his 64th birthday, Mr. Vorbeck himself was cagey. When Mr. von Notz raised the Bild am Sonntag reports and asked for more detail, the demoted intelligence officer replied that he “did not know much more than what has been in the papers,” according to a transcript on a live-blog at netzpolitik.org, a website that tracks intelligence matters.
André Hahn, a lawmaker for the opposition Left party, asked Mr. Vorbeck whether he had a good relationship with Mr. Heiss — “at first,” Mr. Vorbeck answered — and whether he had ever been charged with betraying secrets. “Not then and not now,” Mr. Vorbeck replied, according to the netzpolitik blog.
Mr. Vorbeck is suing the government for material damages he said he suffered as a result of being transferred to a senior archival post concerning the history of German intelligence. His lawyer declined to return a call seeking comment or access to his client.
The dimensions of German anger over American espionage have been evidenced in public opinion polls and in protests against a possible trans-Atlantic trade pact. German officials have talked about creating an internal Internet so that communications among Germans do not have to pass outside the country.
What makes these disclosures different is that they suggest that German publications have been either direct or indirect targets of American surveillance. “Spiegel suspects spying by U.S. secret services,” the online edition of the respected weekly Die Zeit reported Friday.
The latest disclosures by WikiLeaks — a summary of an October 2011 conversation Ms. Merkel had with an adviser about the debt crisis in Greece, a document from her senior adviser on European affairs, plus a list of 69 telephone numbers of important ministries and senior officials that appeared to date back to the 1990s — had already prompted Ms. Merkel’s chief of staff on Thursday to invite the United States ambassador, John B. Emerson, to explain.
A government statement following that meeting did not confirm the material, but made plain that violations of German laws would be prosecuted. The government defended its heightened counterintelligence operations, hinting at the depth of anger with the United States.
Steffen Seibert, the German government spokesman, referred inquiries on Friday to another government spokesman who said he could not be identified by name. He reiterated that the government did not comment on personnel moves, and that it reported on intelligence services only to the relevant supervisory committee in Parliament.
The spokesman added in an email that Mr. Heiss had testified on Thursday that there was no reason to take disciplinary or other action regarding Mr. Vorbeck.
Alison Smale and Melissa Eddy reported from Berlin, David E. Sanger from Vienna and Eric Schmitt from Washington.
By ALISON SMALE, MELISSA EDDY, DAVID E. SANGER and ERIC SCHMITTJULY 3, 2015
Find this story at 3 July 2015
© 2015 The New York Times Company
Germany trades citizens’ metadata for NSA’s top spy software16 oktober 2015
Spies keen to use XKeyscore, less keen to tell German government or citizens.
In order to obtain a copy of the NSA’s main XKeyscore software, whose existence was first revealed by Edward Snowden in 2013, Germany’s domestic intelligence agency agreed to hand over metadata of German citizens it spies on. According to documents seen by the German newspaper Die Zeit, after 18 months of negotiations, the US and Germany signed an agreement in April 2013 that would allow the Federal Office for the Protection of the Constitution (Bundesamtes für Verfassungsschutz—BfV) to obtain a copy of the NSA’s most important program and to adopt it for the analysis of data gathered in Germany.
This was a lower level of access compared to the non-US “Five Eyes” nations—the UK, Australia, Canada, and New Zealand—which had direct access to the main XKeyscore system. In return for the software, the BfV would “to the maximum extent possible share all data relevant to NSA’s mission.” Interestingly, there is no indication in the Die Zeit story that the latest leak comes from Snowden, which suggests that someone else has made the BfV’s “internal documents” available.
Unlike Germany’s foreign intelligence service, the Bundesnachrichtendienst (BND), the domestic-oriented BfV does not employ bulk surveillance of the kind also deployed on a vast scale by the NSA and GCHQ. Instead, it is only allowed to monitor individual suspects in Germany and, even to do that, must obtain the approval of a special parliamentary commission. Because of this targeted approach, BfV surveillance is mainly intended to gather the content of specific conversations, whether in the form of e-mails, telephone exchanges, or even faxes, if anyone still uses them. Inevitably, though, metadata is also gathered, but as Die Zeit explains, “whether the collection of this [meta]data is consistent with the restrictions outlined in Germany’s surveillance laws is a question that divides legal experts.”
The BfV had no problems convincing itself that it was consistent with Germany’s laws to collect metadata, but rarely bothered since—remarkably—all analysis was done by hand before 2013, even though metadata by its very nature lends itself to large-scale automated processing. This explains the eagerness of the BfV to obtain the NSA’s XKeyscore software after German agents had seen its powerful metadata analysis capabilities in demonstrations.
It may also explain the massive expansion of the BfV that the leaked document published by Netzpolitik had revealed earlier this year. As Die Zeit notes, the classified budget plans “included the information that the BfV intended to create 75 new positions for the ‘mass data analysis of Internet content.’ Seventy-five new positions is a significant amount for any government agency.”
FURTHER READING
GERMANY’S TOP PROSECUTOR FIRED OVER NETZPOLITIK “TREASON” PROBE
Heads begin to roll, but the investigation has not yet been dropped.
The BfV may have been keen to deploy XKeyscore widely, but it wasn’t so keen to inform the German authorities about the deal with the NSA. Peter Schaar, who was data protection commissioner at the time, told Die Zeit: “I knew nothing about such an exchange deal [of German metadata for US software].” He says that he only discovered that the BfV was using XKeyscore when he asked the surveillance service explicitly after reading about the program in Snowden’s 2013 revelations. The same is true for another key oversight body: “The Parliamentary Control Panel learned that the BfV had received XKeyscore software and had begun using it. But even this very general briefing was only made after the panel had explicitly asked following the Snowden revelations,” according to Die Zeit.
This post originated on Ars Technica UK
by Glyn Moody (UK) – Aug 27, 2015 5:32pm CEST
Find this story at 27 August 2015
© 2015 Condé Nast
New WikiLeaks Revelations: NSA Targeted Phones of All of German Chancellor Angela Merkel’s Top Aides16 oktober 2015
BERLIN — WikiLeaks on Wednesday published a new list of German phone numbers it claims showed the U.S. National Security Agency targeted phones belonging to Chancellor Angela Merkel’s close aides and chancellery offices for surveillance.
Wednesday’s publication came a week after WikiLeaks released a list of numbers it said showed the NSA targeted officials at various other German ministries and elsewhere. That rekindled concerns over U.S. surveillance in Germany after reports two years ago that Merkel’s own cellphone was targeted.
Merkel’s chief of staff last week asked the U.S. ambassador to a meeting and told him that German law must be followed.
There was no immediate comment from the German government on the latest publication.
The list includes a cellphone number attributed to Ronald Pofalla, Merkel’s chief of staff from 2009-13; a landline number that appears to belong to the leader of Merkel’s parliamentary caucus; various other connections at Merkel’s office; and a cellphone number for the chancellor that WikiLeaks says was used until 2013.
It was unclear when exactly the partially redacted list of 56 German phone numbers dates from and it wasn’t immediately possible to confirm the accuracy of that and other documents released by WikiLeaks.
Those documents, WikiLeaks said, are NSA reports based on interceptions — including one from 2009 that details Merkel’s views on the international financial crisis and another from 2011 summarizing advisers’ views on plans for the eurozone’s rescue fund.
According to the secret-spilling site, the list of phone numbers was updated for more than a decade after 2002 and a “close study” of it shows it evolved from an earlier target list dating back into the 1990s.
July 8, 2015
Associated Press
Find this story at 8 July 2015
Copyright http://www.matthewaid.com/
BEHIND THE CURTAIN A Look at the Inner Workings of NSA’s XKEYSCORE (II)16 oktober 2015
The sheer quantity of communications that XKEYSCORE processes, filters and queries is stunning. Around the world, when a person gets online to do anything — write an email, post to a social network, browse the web or play a video game — there’s a decent chance that the Internet traffic her device sends and receives is getting collected and processed by one of XKEYSCORE’s hundreds of servers scattered across the globe.
In order to make sense of such a massive and steady flow of information, analysts working for the National Security Agency, as well as partner spy agencies, have written thousands of snippets of code to detect different types of traffic and extract useful information from each type, according to documents dating up to 2013. For example, the system automatically detects if a given piece of traffic is an email. If it is, the system tags if it’s from Yahoo or Gmail, if it contains an airline itinerary, if it’s encrypted with PGP, or if the sender’s language is set to Arabic, along with myriad other details.
This global Internet surveillance network is powered by a somewhat clunky piece of software running on clusters of Linux servers. Analysts access XKEYSCORE’s web interface to search its wealth of private information, similar to how ordinary people can search Google for public information.
Based on documents provided by NSA whistleblower Edward Snowden, The Intercept is shedding light on the inner workings of XKEYSCORE, one of the most extensive programs of mass surveillance in human history.
How XKEYSCORE works under the hood
It is tempting to assume that expensive, proprietary operating systems and software must power XKEYSCORE, but it actually relies on an entirely open source stack. In fact, according to an analysis of an XKEYSCORE manual for new systems administrators from the end of 2012, the system may have design deficiencies that could leave it vulnerable to attack by an intelligence agency insider.
XKEYSCORE is a piece of Linux software that is typically deployed on Red Hat servers. It uses the Apache web server and stores collected data in MySQL databases. File systems in a cluster are handled by the NFS distributed file system and the autofs service, and scheduled tasks are handled by the cron scheduling service. Systems administrators who maintain XKEYSCORE servers use SSH to connect to them, and they use tools such as rsync and vim, as well as a comprehensive command-line tool, to manage the software.
John Adams, former security lead and senior operations engineer for Twitter, says that one of the most interesting things about XKEYSCORE’s architecture is “that they were able to achieve so much success with such a poorly designed system. Data ingest, day-to-day operations, and searching is all poorly designed. There are many open source offerings that would function far better than this design with very little work. Their operations team must be extremely unhappy.”
Analysts connect to XKEYSCORE over HTTPS using standard web browsers such as Firefox. Internet Explorer is not supported. Analysts can log into the system with either a user ID and password or by using public key authentication.
As of 2009, XKEYSCORE servers were located at more than 100 field sites all over the world. Each field site consists of a cluster of servers; the exact number differs depending on how much information is being collected at that site. Sites with relatively low traffic can get by with fewer servers, but sites that spy on larger amounts of traffic require more servers to filter and parse it all. XKEYSCORE has been engineered to scale in both processing power and storage by adding more servers to a cluster. According to a 2009 document, some field sites receive over 20 terrabytes of data per day. This is the equivalent of 5.7 million songs, or over 13 thousand full-length films.
This map from a 2009 top-secret presentation does not show all of XKEYSCORE’s field sites.
When data is collected at an XKEYSCORE field site, it is processed locally and ultimately stored in MySQL databases at that site. XKEYSCORE supports a federated query system, which means that an analyst can conduct a single query from the central XKEYSCORE website, and it will communicate over the Internet to all of the field sites, running the query everywhere at once.
There might be security issues with the XKEYSCORE system itself as well. As hard as software developers may try, it’s nearly impossible to write bug-free source code. To compensate for this, developers often rely on multiple layers of security; if attackers can get through one layer, they may still be thwarted by other layers. XKEYSCORE appears to do a bad job of this.
When systems administrators log into XKEYSCORE servers to configure them, they appear to use a shared account, under the name “oper.” Adams notes, “That means that changes made by an administrator cannot be logged.” If one administrator does something malicious on an XKEYSCORE server using the “oper” user, it’s possible that the digital trail of what was done wouldn’t lead back to the administrator, since multiple operators use the account.
There appears to be another way an ill-intentioned systems administrator may be able to cover their tracks. Analysts wishing to query XKEYSCORE sign in via a web browser, and their searches are logged. This creates an audit trail, on which the system relies to assure that users aren’t doing overly broad searches that would pull up U.S. citizens’ web traffic. Systems administrators, however, are able to run MySQL queries. The documents indicate that administrators have the ability to directly query the MySQL databases, where the collected data is stored, apparently bypassing the audit trail.
AppIDs, fingerprints and microplugins
Collecting massive amounts of raw data is not very useful unless it is collated and organized in a way that can be searched. To deal with this problem, XKEYSCORE extracts and tags metadata and content from the raw data so that analysts can easily search it.
This is done by using dictionaries of rules called appIDs, fingerprints and microplugins that are written in a custom programming language called GENESIS. Each of these can be identified by a unique name that resembles a directory tree, such as “mail/webmail/gmail,” “chat/yahoo,” or “botnet/blackenergybot/command/flood.”
One document detailing XKEYSCORE appIDs and fingerprints lists several revealing examples. Windows Update requests appear to fall under the “update_service/windows” appID, and normal web requests fall under the “http/get” appID. XKEYSCORE can automatically detect Airblue travel itineraries with the “travel/airblue” fingerprint, and iPhone web browser traffic with the “browser/cellphone/iphone” fingerprint.
PGP-encrypted messages are detected with the “encryption/pgp/message” fingerprint, and messages encrypted with Mojahedeen Secrets 2 (a type of encryption popular among supporters of al Qaeda) are detected with the “encryption/mojaheden2” fingerprint.
When new traffic flows into an XKEYSCORE cluster, the system tests the intercepted data against each of these rules and stores whether the traffic matches the pattern. A slideshow presentation from 2010 says that XKEYSCORE contains almost 10,000 appIDs and fingerprints.
AppIDs are used to identify the protocol of traffic being intercepted, while fingerprints detect a specific type of content. Each intercepted stream of traffic gets assigned up to one appID and any number of fingerprints. You can think of appIDs as categories and fingerprints as tags.
If multiple appIDs match a single stream of traffic, the appID with the lowest “level” is selected (appIDs with lower levels are more specific than appIDs with higher levels). For example, when XKEYSCORE is assessing a file attachment from Yahoo mail, all of the appIDs in the following slide will apply, however only “mail/webmail/yahoo/attachment” will be associated with this stream of traffic.
To tie it all together, when an Arabic speaker logs into a Yahoo email address, XKEYSCORE will store “mail/yahoo/login” as the associated appID. This stream of traffic will match the “mail/arabic” fingerprint (denoting language settings), as well as the “mail/yahoo/ymbm” fingerprint (which detects Yahoo browser cookies).
Sometimes the GENESIS programming language, which largely relies on Boolean logic, regular expressions and a set of simple functions, isn’t powerful enough to do the complex pattern-matching required to detect certain types of traffic. In these cases, as one slide puts it, “Power users can drop in to C++ to express themselves.” AppIDs or fingerprints that are written in C++ are called microplugins.
Here’s an example of a microplugin fingerprint for “botnet/conficker_p2p_udp_data,” which is tricky botnet traffic that can’t be identified without complicated logic. A botnet is a collection of hacked computers, sometimes millions of them, that are controlled from a single point.
Here’s another microplugin that uses C++ to inspect intercepted Facebook chat messages and pull out details like the associated email address and body of the chat message.
One document from 2009 describes in detail four generations of appIDs and fingerprints, which begin with only the ability to scan intercepted traffic for keywords, and end with the ability to write complex microplugins that can be deployed to field sites around the world in hours.
If XKEYSCORE development has continued at a similar pace over the last six years, it’s likely considerably more powerful today.
—
Illustration for The Intercept by Blue Delliquanti
Documents published with this article:
Advanced HTTP Activity Analysis
Analyzing Mobile Cellular DNI in XKS
ASFD Readme
CADENCE Readme
Category Throttling
CNE Analysis in XKS
Comms Readme
DEEPDIVE Readme
DNI101
Email Address vs User Activity
Free File Uploaders
Finding and Querying Document Metadata
Full Log vs HTTP
Guide to Using Contexts in XKS Fingerprints
HTTP Activity in XKS
HTTP Activity vs User Activity
Intro to Context Sensitive Scanning With XKS Fingerprints
Intro to XKS AppIDs and Fingerprints
OSINT Fusion Project
Phone Number Extractor
RWC Updater Readme
Selection Forwarding Readme
Stats Config Readme
Tracking Targets on Online Social Networks
TRAFFICTHIEF Readme
Unofficial XKS User Guide
User Agents
Using XKS to Enable TAO
UTT Config Readme
VOIP in XKS
VOIP Readme
Web Forum Exploitation Using XKS
Writing XKS Fingerprints
XKS Application IDs
XKS Application IDs Brief
XKS as a SIGDEV Tool
XKS, Cipher Detection, and You!
XKS for Counter CNE
XKS Intro
XKS Logos Embedded in Docs
XKS Search Forms
XKS System Administration
XKS Targets Visiting Specific Websites
XKS Tech Extractor 2009
XKS Tech Extractor 2010
XKS Workflows 2009
XKS Workflows 2011
UN Secretary General XKS
Micah Lee, Glenn Greenwald, Morgan Marquis-Boire
July 2 2015, 4:42 p.m.
Second in a series.
Find this story at 2 July 2015
Copyright https://theintercept.com/
XKEYSCORE: NSA’s Google for the World’s Private Communications (I)16 oktober 2015
One of the National Security Agency’s most powerful tools of mass surveillance makes tracking someone’s Internet usage as easy as entering an email address, and provides no built-in technology to prevent abuse. Today, The Intercept is publishing 48 top-secret and other classified documents about XKEYSCORE dated up to 2013, which shed new light on the breadth, depth and functionality of this critical spy system — one of the largest releases yet of documents provided by NSA whistleblower Edward Snowden.
The NSA’s XKEYSCORE program, first revealed by The Guardian, sweeps up countless people’s Internet searches, emails, documents, usernames and passwords, and other private communications. XKEYSCORE is fed a constant flow of Internet traffic from fiber optic cables that make up the backbone of the world’s communication network, among other sources, for processing. As of 2008, the surveillance system boasted approximately 150 field sites in the United States, Mexico, Brazil, United Kingdom, Spain, Russia, Nigeria, Somalia, Pakistan, Japan, Australia, as well as many other countries, consisting of over 700 servers.
These servers store “full-take data” at the collection sites — meaning that they captured all of the traffic collected — and, as of 2009, stored content for 3 to 5 days and metadata for 30 to 45 days. NSA documents indicate that tens of billions of records are stored in its database. “It is a fully distributed processing and query system that runs on machines around the world,” an NSA briefing on XKEYSCORE says. “At field sites, XKEYSCORE can run on multiple computers that gives it the ability to scale in both processing power and storage.”
XKEYSCORE also collects and processes Internet traffic from Americans, though NSA analysts are taught to avoid querying the system in ways that might result in spying on U.S. data. Experts and privacy activists, however, have long doubted that such exclusions are effective in preventing large amounts of American data from being swept up. One document The Intercept is publishing today suggests that FISA warrants have authorized “full-take” collection of traffic from at least some U.S. web forums.
The system is not limited to collecting web traffic. The 2013 document, “VoIP Configuration and Forwarding Read Me,” details how to forward VoIP data from XKEYSCORE into NUCLEON, NSA’s repository for voice intercepts, facsimile, video and “pre-released transcription.” At the time, it supported more than 8,000 users globally and was made up of 75 servers absorbing 700,000 voice, fax, video and tag files per day.
The reach and potency of XKEYSCORE as a surveillance instrument is astonishing. The Guardian report noted that NSA itself refers to the program as its “widest reaching” system. In February of this year, The Intercept reported that NSA and GCHQ hacked into the internal network of Gemalto, the world’s largest provider of cell phone SIM cards, in order to steal millions of encryption keys used to protect the privacy of cell phone communication. XKEYSCORE played a vital role in the spies’ hacking by providing government hackers access to the email accounts of Gemalto employees.
Numerous key NSA partners, including Canada, New Zealand and the U.K., have access to the mass surveillance databases of XKEYSCORE. In March, the New Zealand Herald, in partnership with The Intercept, revealed that the New Zealand government used XKEYSCORE to spy on candidates for the position of World Trade Organization director general and also members of the Solomon Islands government.
These newly published documents demonstrate that collected communications not only include emails, chats and web-browsing traffic, but also pictures, documents, voice calls, webcam photos, web searches, advertising analytics traffic, social media traffic, botnet traffic, logged keystrokes, computer network exploitation (CNE) targeting, intercepted username and password pairs, file uploads to online services, Skype sessions and more.
Bulk collection and population surveillance
XKEYSCORE allows for incredibly broad surveillance of people based on perceived patterns of suspicious behavior. It is possible, for instance, to query the system to show the activities of people based on their location, nationality and websites visited. For instance, one slide displays the search “germansinpakistn,” showing an analyst querying XKEYSCORE for all individuals in Pakistan visiting specific German language message boards.
As sites like Twitter and Facebook become increasingly significant in the world’s day-to-day communications (a Pew study shows that 71 percent of online adults in the U.S. use Facebook), they become a critical source of surveillance data. Traffic from popular social media sites is described as “a great starting point” for tracking individuals, according to an XKEYSCORE presentation titled “Tracking Targets on Online Social Networks.”
When intelligence agencies collect massive amounts of Internet traffic all over the world, they face the challenge of making sense of that data. The vast quantities collected make it difficult to connect the stored traffic to specific individuals.
Internet companies have also encountered this problem and have solved it by tracking their users with identifiers that are unique to each individual, often in the form of browser cookies. Cookies are small pieces of data that websites store in visitors’ browsers. They are used for a variety of purposes, including authenticating users (cookies make it possible to log in to websites), storing preferences, and uniquely tracking individuals even if they’re using the same IP address as many other people. Websites also embed code used by third-party services to collect analytics or host ads, which also use cookies to track users. According to one slide, “Almost all websites have cookies enabled.”
The NSA’s ability to piggyback off of private companies’ tracking of their own users is a vital instrument that allows the agency to trace the data it collects to individual users. It makes no difference if visitors switch to public Wi-Fi networks or connect to VPNs to change their IP addresses: the tracking cookie will follow them around as long as they are using the same web browser and fail to clear their cookies.
Apps that run on tablets and smartphones also use analytics services that uniquely track users. Almost every time a user sees an advertisement (in an app or in a web browser), the ad network is tracking users in the same way. A secret GCHQ and CSE program called BADASS, which is similar to XKEYSCORE but with a much narrower scope, mines as much valuable information from leaky smartphone apps as possible, including unique tracking identifiers that app developers use to track their own users. In May of this year, CBC, in partnership with The Intercept, revealed that XKEYSCORE was used to track smartphone connections to the app marketplaces run by Samsung and Google. Surveillance agency analysts also use other types of traffic data that gets scooped into XKEYSCORE to track people, such as Windows crash reports.
In a statement to The Intercept, the NSA reiterated its position that such sweeping surveillance capabilities are needed to fight the War on Terror:
“The U.S. Government calls on its intelligence agencies to protect the United States, its citizens, and its allies from a wide array of serious threats. These threats include terrorist plots from al-Qaeda, ISIL, and others; the proliferation of weapons of mass destruction; foreign aggression against the United States and our allies; and international criminal organizations.”
Indeed, one of the specific examples of XKEYSCORE applications given in the documents is spying on Shaykh Atiyatallah, an al Qaeda senior leader and Osama bin Laden confidant. A few years before his death, Atiyatallah did what many people have often done: He googled himself. He searched his various aliases, an associate and the name of his book. As he did so, all of that information was captured by XKEYSCORE.
XKEYSCORE has, however, also been used to spy on non-terrorist targets. The April 18, 2013 issue of the internal NSA publication Special Source Operations Weekly boasts that analysts were successful in using XKEYSCORE to obtain U.N. Secretary General Ban Ki-moon’s talking points prior to a meeting with President Obama.
XKEYSCORE for hacking: easily collecting user names, passwords and much more
XKEYSCORE plays a central role in how the U.S. government and its surveillance allies hack computer networks around the world. One top-secret 2009 NSA document describes how the system is used by the NSA to gather information for the Office of Tailored Access Operations, an NSA division responsible for Computer Network Exploitation (CNE) — i.e., targeted hacking.
Particularly in 2009, the hacking tactics enabled by XKEYSCORE would have yielded significant returns as use of encryption was less widespread than today. Jonathan Brossard, a security researcher and the CEO of Toucan Systems, told The Intercept: “Anyone could be trained to do this in less than one day: they simply enter the name of the server they want to hack into XKEYSCORE, type enter, and are presented login and password pairs to connect to this machine. Done. Finito.” Previous reporting by The Intercept revealed that systems administrators are a popular target of the NSA. “Who better to target than the person that already has the ‘keys to the kingdom?’” read a 2012 post on an internal NSA discussion board.
This system enables analysts to access web mail servers with remarkable ease.
The same methods are used to steal the credentials — user names and passwords — of individual users of message boards.
Hacker forums are also monitored for people selling or using exploits and other hacking tools. While the NSA is clearly monitoring to understand the capabilities developed by its adversaries, it is also monitoring locations where such capabilities can be purchased.
Other information gained via XKEYSCORE facilitates the remote exploitation of target computers. By extracting browser fingerprint and operating system versions from Internet traffic, the system allows analysts to quickly assess the exploitability of a target. Brossard, the security researcher, said that “NSA has built an impressively complete set of automated hacking tools for their analysts to use.”
Given the breadth of information collected by XKEYSCORE, accessing and exploiting a target’s online activity is a matter of a few mouse clicks. Brossard explains: “The amount of work an analyst has to perform to actually break into remote computers over the Internet seems ridiculously reduced — we are talking minutes, if not seconds. Simple. As easy as typing a few words in Google.”
These facts bolster one of Snowden’s most controversial statements, made in his first video interview published by The Guardian on June 9, 2013. “I, sitting at my desk,” said Snowden, could “wiretap anyone, from you or your accountant, to a federal judge to even the president, if I had a personal email.”
Indeed, training documents for XKEYSCORE repeatedly highlight how user-friendly the program is: with just a few clicks, any analyst with access to it can conduct sweeping searches simply by entering a person’s email address, telephone number, name or other identifying data. There is no indication in the documents reviewed that prior approval is needed for specific searches.
In addition to login credentials and other target intelligence, XKEYSCORE collects router configuration information, which it shares with Tailored Access Operations. The office is able to exploit routers and then feed the traffic traveling through those routers into their collection infrastructure. This allows the NSA to spy on traffic from otherwise out-of-reach networks. XKEYSCORE documents reference router configurations, and a document previously published by Der Spiegel shows that “active implants” can be used to “cop[y] traffic and direc[t]” it past a passive collector.
XKEYSCORE for counterintelligence
Beyond enabling the collection, categorization, and querying of metadata and content, XKEYSCORE has also been used to monitor the surveillance and hacking actions of foreign nation states and to gather the fruits of their hacking. The Intercept previously reported that NSA and its allies spy on hackers in order to collect what they collect.
Once the hacking tools and techniques of a foreign entity (for instance, South Korea) are identified, analysts can then extract the country’s espionage targets from XKEYSCORE, and gather information that the foreign power has managed to steal.
Monitoring of foreign state hackers could allow the NSA to gather techniques and tools used by foreign actors, including knowledge of zero-day exploits—software bugs that allow attackers to hack into systems, and that not even the software vendor knows about—and implants. Additionally, by monitoring vulnerability reports sent to vendors such as Kaspersky, the agency could learn when exploits they were actively using need to be retired because they’ve been discovered by a third party.
Seizure v. searching: oversight, audit trail and the Fourth Amendment
By the nature of how it sweeps up information, XKEYSCORE gathers communications of Americans, despite the Fourth Amendment protection against “unreasonable search and seizure” — including searching data without a warrant. The NSA says it does not target U.S. citizens’ communications without a warrant, but acknowledges that it “incidentally” collects and reads some of it without one, minimizing the information that is retained or shared.
But that interpretation of the law is dubious at best.
XKEYSCORE training documents say that the “burden is on user/auditor to comply with USSID-18 or other rules,” apparently including the British Human Rights Act (HRA), which protects the rights of U.K. citizens. U.S. Signals Intelligence Directive 18 (USSID 18) is the American directive that governs “U.S. person minimization.”
Kurt Opsahl, the Electronic Frontier Foundation’s general counsel, describes USSID 18 as “an attempt by the intelligence community to comply with the Fourth Amendment. But it doesn’t come from a court, it comes from the executive.”
If, for instance, an analyst searched XKEYSCORE for all iPhone users, this query would violate USSID 18 due to the inevitable American iPhone users that would be grabbed without a warrant, as the NSA’s own training materials make clear.
Opsahl believes that analysts are not prevented by technical means from making queries that violate USSID 18. “The document discusses whether auditors will be happy or unhappy. This indicates that compliance will be achieved by after-the-fact auditing, not by preventing the search.”
Screenshots of the XKEYSCORE web-based user interface included in slides show that analysts see a prominent warning message: “This system is audited for USSID 18 and Human Rights Act compliance.” When analysts log in to the system, they see a more detailed message warning that “an audit trail has been established and will be searched” in response to HRA complaints, and as part of the USSID 18 and USSID 9 audit process.
Because the XKEYSCORE system does not appear to prevent analysts from making queries that would be in violation of these rules, Opsahl concludes that “there’s a tremendous amount of power being placed in the hands of analysts.” And while those analysts may be subject to audits, “at least in the short term they can still obtain information that they shouldn’t have.”
During a symposium in January 2015 hosted at Harvard University, Edward Snowden, who spoke via video call, said that NSA analysts are “completely free from any meaningful oversight.” Speaking about the people who audit NSA systems like XKEYSCORE for USSID 18 compliance, he said, “The majority of the people who are doing the auditing are the friends of the analysts. They work in the same office. They’re not full-time auditors, they’re guys who have other duties assigned. There are a few traveling auditors who go around and look at the things that are out there, but really it’s not robust.”
In a statement to The Intercept, the NSA said:
“The National Security Agency’s foreign intelligence operations are 1) authorized by law; 2) subject to multiple layers of stringent internal and external oversight; and 3) conducted in a manner that is designed to protect privacy and civil liberties. As provided for by Presidential Policy Directive 28 (PPD-28), all persons, regardless of their nationality, have legitimate privacy interests in the handling of their personal information. NSA goes to great lengths to narrowly tailor and focus its signals intelligence operations on the collection of communications that are most likely to contain foreign intelligence or counterintelligence information.”
—
Coming next: A Look at the Inner Workings of XKEYSCORE
Source maps: XKS as a SIGDEV Tool, p. 15, and XKS Intro, p. 6
Documents published with this article:
Advanced HTTP Activity Analysis
Analyzing Mobile Cellular DNI in XKS
ASFD Readme
CADENCE Readme
Category Throttling
CNE Analysis in XKS
Comms Readme
DEEPDIVE Readme
DNI101
Email Address vs User Activity
Free File Uploaders
Finding and Querying Document Metadata
Full Log vs HTTP
Guide to Using Contexts in XKS Fingerprints
HTTP Activity in XKS
HTTP Activity vs User Activity
Intro to Context Sensitive Scanning With XKS Fingerprints
Intro to XKS AppIDs and Fingerprints
OSINT Fusion Project
Phone Number Extractor
RWC Updater Readme
Selection Forwarding Readme
Stats Config Readme
Tracking Targets on Online Social Networks
TRAFFICTHIEF Readme
Unofficial XKS User Guide
User Agents
Using XKS to Enable TAO
UTT Config Readme
VOIP in XKS
VOIP Readme
Web Forum Exploitation Using XKS
Writing XKS Fingerprints
XKS Application IDs
XKS Application IDs Brief
XKS as a SIGDEV Tool
XKS, Cipher Detection, and You!
XKS for Counter CNE
XKS Intro
XKS Logos Embedded in Docs
XKS Search Forms
XKS System Administration
XKS Targets Visiting Specific Websites
XKS Tech Extractor 2009
XKS Tech Extractor 2010
XKS Workflows 2009
XKS Workflows 2011
UN Secretary General XKS
Morgan Marquis-Boire, Glenn Greenwald, Micah Lee
July 1 2015, 4:49 p.m.
Illustrations by Blue Delliquanti and David Axe for The Intercept
Find this story at 1 July 2015
copyright https://firstlook.org/theintercept/
XKeyscore: A Dubious Deal with the NSA16 oktober 2015
Internal documents show that Germany’s domestic intelligence agency, the BfV, received the coveted software program XKeyscore from the NSA – and promised data from Germany in return.
The agents from the Federal Office for the Protection of the Constitution (BfV), Germany’s domestic intelligence agency, were deeply impressed. They wanted to be able to do that too. On Oct. 6, 2011, employees of the US intelligence agency NSA were in the Bavarian town of Bad Aibling to demonstrate all that the spy software XKeyscore could do. To make the demonstration as vivid as possible, the Americans fed data into their program that the BfV had itself collected during a warranted eavesdropping operation. An internal memo shows how enthusiastic the German intelligence agents were: Analyzing data with the help of the software, the memo reads in awkward officialese, resulted in “a high recognition of applications used, Internet applications and protocols.” And in the data, XKeyscore was able to “recognize, for example, Hotmail, Yahoo or Facebook. It was also able to identify user names and passwords.” In other words, it was highly effective.
It was far beyond the capabilities of the BfV’s own system. In response, then-BfV President Heinz Fromm made a formal request five months later to his American counterpart, NSA head Keith Alexander, for the software to be made available to the German intelligence agency. It would, he wrote, superbly complement the current capabilities for monitoring and analyzing Internet traffic.
But fully a year and a half would pass before a test version of XKeyscore could begin operating at the BfV facility in the Treptow neighborhood of Berlin. It took that long for the two agencies to negotiate an agreement that regulated the transfer of the software in detail and which defined the rights and obligations of each side.
The April 2013 document called “Terms of Reference,” which ZEIT ONLINE and DIE ZEIT has been able to review, is more than enlightening. It shows for the first time what Germany’s domestic intelligence agency promised their American counterparts in exchange for the use of the coveted software program. “The BfV will: To the maximum extent possible share all data relevant to NSA’s mission,” the paper reads. Such was the arrangement: data in exchange for software.
It was a good deal for the BfV. Being given the software was a “proof of trust,” one BfV agent exulted. Another called XKeyscore a “cool system.” Politically and legally, however, the accord is extremely delicate. Nobody outside of the BfV oversees what data is sent to the NSA in accordance with the “Terms of Reference,” a situation that remains unchanged today. Neither Germany’s data protection commissioner nor the Parliamentary Control Panel, which is responsible for oversight of the BfV, has been fully informed about the deal. “Once again, I have to learn from the press of a new BfV-NSA contract and of the impermissible transfer of data to the US secret service,” complains the Green Party parliamentarian Hans-Christian Ströbele, who is a member of the Parliamentary Control Panel. The Federal Office for the Protection of the Constitution, for its part, insists that it has adhered strictly to the law.
SOFTWARE GEGEN DATEN
Interne Dokumente belegen, dass der Verfassungsschutz vom amerikanischen Geheimdienst NSA die begehrte Spionagesoftware XKeyscore bekam. Dafür versprachen die Verfassungsschützer, so viele Daten aus deutschen G-10-Überwachungsmaßnahmen an die NSA zu liefern, wie möglich.
Lesen Sie dazu:
Der Datendeal: Was Verfassungsschutz und NSA miteinander verabredeten – was Parlamentarier und Datenschützer dazu sagen
Read the english version here: A Dubious Deal with the NSA
Dokument: Die Übereinkunft zwischen Verfassungsschutz und NSA im Wortlaut
Read the english version here: XKeyscore – the document
Die Software: Der Datenknacker “Poseidon” findet jedes Passwort
The data in question is regularly part of the approved surveillance measures carried out by the BfV. In contrast, for example, to the Bundesnachrichtendienst (BND), Germany’s foreign intelligence agency, the BfV does not use a dragnet to collect huge volumes of data from the Internet. Rather, it is only allowed to monitor individual suspects in Germany — and only after a special parliamentary commission has granted approval. Because such operations necessarily imply the curtailing of rights guaranteed by Article 10 of Germany’s constitution, they are often referred to as G-10 measures. Targeted surveillance measures are primarily intended to turn up the content of specific conversations, in the form of emails, telephone exchanges or faxes. But along the way, essentially as a side effect, the BfV also collects mass quantities of so-called metadata. Whether the collection of this data is consistent with the restrictions outlined in Germany’s surveillance laws is a question that divides legal experts. Well-respected constitutional lawyers are of the opinion that intelligence agencies are not allowed to analyze metadata as they see fit. The agencies themselves, naturally, have a different view.
It is clear, after all, that metadata also enables interesting conclusions to be drawn about the behavior of those under surveillance and their contacts, just as, in the analog world, the sender and recipient written on an envelope can also be revealing, even if the letter inside isn’t read. Those who know such data can identify communication networks and establish movement and behavioral profiles of individuals. Prior to 2013, Germany’s domestic intelligence agency was only able to analyze metadata by hand — and it was rarely done as a result. But that changed once the agency received XKeyscore. The version of the software obtained by the BfV is unable to collect data on the Internet itself, but it is able to rapidly analyze the huge quantities of metadata that the agency has already automatically collected. That is why XKeyscore is beneficial to the BfV. And, thanks to the deal, that benefit is one that extends to the NSA.
In practice, it assumedly works as follows: When an Islamist who is under surveillance by the BfV regularly receives calls from Afghanistan, for example, then the telephone number is likely exactly the kind of information that is forwarded on to the NSA. That alone is not necessarily cause for concern; after all, combatting terrorism is the goal of intelligence agency cooperation. But nobody outside of the BfV knows whose data, and how much of it, is being shared with the NSA. Nobody can control the practicalities of the data exchange. And it is completely unclear where political responsibility lies.
In 2013 alone, the BfV began 58 new G-10 measures and continued 46 others from the previous year. Who was targeted? What information was passed on to the NSA? Was information pertaining to German citizens also shared? When confronted with such questions, the BfV merely responded: “The BfV is unable to publicly comment on the particulars of the cooperation or on the numbers of data collection operations.”
How important XKeyscore has become for the BfV can also be seen elsewhere. Not long ago, the website Netzpolitik.org published classified budget plans for 2013 which included the information that the BfV intended to create 75 new positions for the “mass data analysis of Internet content.” Seventy-five new positions is a significant amount for any government agency. A new division called 3C was to uncover movement profiles and contact networks and to process raw data collected during G-10 operations. The name XKeyscore does not appear in the documents published by Netzpolitik.org. But it is reasonable to suspect that the new division was established to deploy the new surveillance software.
Germany’s domestic intelligence agency is itself also aware of just how sensitive its deal with the Americans is. Back in July 2012, a BfV division warned that even the tests undertaken with XKeyscore could have “far-reaching legal implications.” To determine the extent of the software’s capabilities, the division warned, employees would have to be involved who didn’t have the appropriate security clearance to view the data used in the tests. The BfV has declined to make a statement on how, or whether, the problem was solved.
Germany’s data protection commissioner was apparently not informed. “I knew nothing about such an exchange deal,” says Peter Schaar, who was data protection commissioner at the time. “I am also hearing for the first time about a test with real data.” He says he first learned that BfV was using XKeyscore after he asked of his own accord in 2013 — in the wake of revelations about the program from whistleblower Edward Snowden.
Schaar is of the opinion that the agency was obliged to inform him. Because real data was used during the tests, Schaar says, it constituted data processing. The BfV, by contrast, is of the opinion that the use of XKeyscore has to be controlled solely by the G-10 commission. It is a question that has long been the source of contention. In testimony before the parliamentary investigative committee that is investigating NSA activities in Germany, Schaar has demanded that the G-10 law be more clearly formulated to remove the ambiguity.
The fact that the BfV recognized the problems with its NSA cooperation can be seen elsewhere in the files as well. During the negotiations over the XKeyscore deal, the BfV noted: “Certain NSA requests … cannot be met insofar as German law prevents it.” But the Americans insisted that the software finally be “used productively.” The NSA wants “working results,” the German agents noted. There is, they wrote, apparently “high internal pressure” to receive information from the Germans.
Ultimately, the BfV arrived at the conclusion that transferring information obtained with the help of XKeyscore to the NSA was consistent with German law. Insights gathered by way of G-10 operations were already being “regularly” shared with “foreign partner agencies.” That, at least, is what the BfV declared to the German Interior Ministry in January 2014. Furthermore, the agency declared, a special legal expert would approve each data transfer.
That, it seems, was enough oversight from the perspective of the BfV. The agency apparently only partially informed its parliamentarian overseers about the deal. The Parliamentary Control Panel learned that the BfV had received XKeyscore software and had begun using it. But even this very general briefing was only made after the panel had explicitly asked following the Snowden revelations. The deal between the intelligence agencies, says the Green Party parliamentarian Ströbele, “is undoubtedly an ‘occurrence of particular import,’ about which, according to German law, the German government must provide sufficient information of its own accord.” He intends to bring the issue before the Parliamentary Control Panel. The NSA investigative committee in German parliament will surely take a closer look as well.
Translated by Charles Hawley
Von Kai Biermann und Yassin Musharbash
26. August 2015, 18:11 Uhr
Find this story at 26 August 2015
copyright http://www.zeit.de/
Wikileaks: ‘Massive’ NSA spying on top German officials16 oktober 2015
Wikileaks says its latest release of documents shows the wide reach of economic espionage conducted by the NSA in Germany. Documents released by the whistleblowers suggest an intense interest in the Greek debt crisis.
A new batch of documents released by Wikileaks on Wednesday purports to show the extent to which the spying conducted by the US National Security Agency (NSA) on German officials was economic in nature , as opposed to being focused on security issues.
As far back as the late 1990s, the phone numbers of officials in the German Ministry of Finance, including sometimes the ministers themselves, were targeted by NSA spies, according to a Wikileaks press release. The list of high priority targets for Germany are mostly telephone numbers within the finance ministry, some within the ministry of agriculture, a few within offices responsible for European policy, and advisors who assisted Merkel ahead of G7 and WTO meetings. One of the targets was within the European Central Bank itself.
NSA interest in the course of Greek bailout
Some of the espionage also dealt with the handling of the Greek debt crisis, particularly in “intercepted talk between Chancellor Merkel and her assistant, the Chancellor talks about her views on solutions to the Greek financial crisis and her disagreement with members of her own cabinet, such as Finance Minister Wolfgang Schäuble, on matters of policy.”
The NSA was also interested in Merkel’s discussions of “the positions of French leaders, and of the heads of the key institutions of the Troika: European Commission President Jose Manuel Barroso, European Central Bank President Jean-Claude Trichet and IMF Director Christine Lagarde,” with regard to the Greece’s bailout issues.
This intercept, which is dated to October 2011, is classified as highly sensitive, “two levels above top secret.” Despite this, it was still cleared for distribution among the “US-led ‘Five Eyes’ spying alliance of UK, Canada, Australia and New Zealand.”
Wikileaks also says that the NSA was given a German intercept gathered by British Intelligence (GCHQ), which “details the German government’s position ahead of negotiations on a EU bailout plan for Greece.”
“The report refers to an overview prepared by German Chancellery Director-General for EU Affairs Nikolaus Meyer-Landrut. Germany was, according to the intercept, opposed to giving a banking license to the European Financial Stability Facility (EFSF), however it would support a special IMF fund into which the BRICS nations would contribute to bolster European bailout activities.”
Julian Assange, Wikileaks’ embattled editor-in-chief, made a statement on Wednesday’s release, saying that it “further demonstrates that the United States’ economic espionage campaign extends to Germany and to key European institutions and issues such as the European Central Bank and the crisis in Greece.”
“Would France and Germany have proceeded with the BRICS bailout plan for Greece if this intelligence was not collected and passed to the United States – who must have been horrified at the geopolitical implications?” he asked.
The “Süddeutsche Zeitung” daily was given access to the leaked documents. It reports that a spokesman for the German government said Berlin is not familiar enough with the information published by Wikileaks to offer an analysis or response.
es/gsw
01.07.2015
Find this story at 1 July 2015
© 2015 Deutsche Welle
Selektorenliste der NSA Welche Nummern der Kanzlerin die NSA abhörte16 oktober 2015
Anhand der Telefonnummern in dieser Selektorenliste wird deutlich, dass die Ausspähung durch die NSA beispielsweise auch die Telefone von Ronald Pofalla, Peter Altmaier und Volker Kauder umfasste.
Der amerikanische Nachrichtendienst hat die deutsche Politik weitaus systematischer ausgespäht als bisher bekannt – und das seit Jahrzehnten.
Neue Dokumente der Enthüllungsplattform Wikileaks belegen, dass auch die Regierungen der Kanzler Helmut Kohl und Gerhard Schröder von der NSA belauscht wurden.
Bund und Berlin ziehen Bilanz zu HauptstadtbautenBild vergrößern
Das Kanzleramt in Berlin steht im Mittelpunkt der neuen Wikileaks-Enthüllungen. (Foto: dpa)
Diese Erkenntnisse können aus den neuen Enthüllungen gewonnen werden:
Die neuen Wikileaks-Enthüllungen katapultieren die Diskussion in eine neue Höhe. Es geht darin um das Kanzleramt – es wurde über Jahrzehnte von der NSA ausgespäht, in Bonn und in Berlin. Die Liste umfasst 56 Anschlüsse und wurde von Wikileaks am Mittwochabend ins Netz gestellt. SZ, NDR und WDR konnten sie vorab prüfen.
Die Regierungen von Helmut Kohl, Gerhard Schröder und Angela Merkel waren alle im Visier des amerikanischen Nachrichtendienstes. Die halbe Mannschaft von Ex-Kanzler Schröder steht auf der Liste. Bodo Hombach, der für eine kurze Zeit Kanzleramtsminister war und schwierige Operationen in Nahost auszuführen hatte, ist ebenso aufgeführt wie der sicherheitspolitische Berater Michael Steiner und Schröders Mann für die Weltwirtschaftsgipfel, Klaus Gretschmann.
Etwa zwei Dutzend Nummern der Bundeskanzlerin stehen auf der Liste. Darunter ihre Handynummer, die mindestens bis Ende 2013 gültig war; ihre Büronummer; eine ihr zugeschriebene Nummer in der CDU-Bundesgeschäftsstelle und ihre Faxnummern; auch ihr enger Vertrauter Volker Kauder, Vorsitzender der CDU/CSU-Bundestagsfraktion, war Ziel der NSA.
Auch Merkels ehemaliger Kanzleramtsminister Ronald Pofalla steht auf der Liste. Es findet sich darauf seine bis heute aktive Handynummer.
Auffällig ist, dass die Abteilung 2 des Kanzleramts, die für Außen- und Sicherheitspolitik zuständig ist, oft vorkommt. Auch der Bereich Wirtschaftspolitik ist stark vertreten, ebenso Abteilung 6 – sie ist für den Bundesnachrichtendienst zuständig.
Vorige Woche hatte Wikileaks erste Unterlagen der NSA veröffentlicht, die Deutschland betreffen. Drei Bundesministerien – das Wirtschafts-, das Landwirtschafts- und das Finanzministerium – standen dabei im Mittelpunkt.
Lesen Sie mehr zu den neuen Wikileaks-Enthüllungen in der digitalen Ausgabe der Süddeutschen Zeitung.
IhreSZ Flexi-Modul Header
Ihr Forum
Wie sollte sich Merkel angesichts der jüngsten Wikileaks-Enthüllungen verhalten?
Die NSA hat Wikileaks-Dokumenten zufolge über Jahrzehnte das Bundeskanzleramt abgehört. Betroffen von den Spähangriffen waren die Regierungen von Bundeskanzlerin Merkel sowie die ihrer Vorgänger Schröder und Kohl. Das Ausmaß des Lauschangriffs ist damit deutlich größer als bislang angenommen. Ihr Forum
Helmut Kohl mit Gerhard Schröder im Bundestag, 1999
Tatort Kanzleramt
Kurzer Draht zur Macht
Die NSA hat die deutsche Politik weitaus systematischer ausgespäht als bisher bekannt – und das seit Jahrzehnten. Neue Dokumente von Wikileaks belegen, dass auch die Kanzler Helmut Kohl und Gerhard Schröder belauscht wurden.
Kohl NSA
Wikileaks-Dokumente
Von Kohl bis Merkel – die NSA hörte mit
Wikileaks-Dokumente belegen: Jahrzehntelang hat der US-Geheimdienst das Kanzleramt ausgeforscht. Auch die Telefone von Ronald Pofalla, Peter Altmaier und Volker Kauder wurden angezapft.
9. Juli 2015, 06:11 Uhr
Find this story at 9 July 2015
Copyright www.sueddeutsche.de
Neue Dokumente von WikiLeaks Kanzleramt schon seit Kohl-Ära im NSA-Visier16 oktober 2015
Die NSA hat nach Informationen von WikiLeaks schon seit Jahrzehnten das Bundeskanzleramt abgehört. Das zeigen neue Dokumente, die NDR, WDR und SZ vor Veröffentlichung einsehen konnten. Betroffen waren demnach neben Kanzlerin Merkel auch ihre Vorgänger Schröder und Kohl.
Noch in der vergangenen Woche hatten der Geheimdienstkoordinator im Kanzleramt, Günter Heiß, und der ehemalige Kanzleramtschef Ronald Pofalla (CDU) bei einer Befragung im NSA-Untersuchungsausschuss abgewiegelt. Auf die Frage, ob Merkels Handy abgehört worden sei, sagte Heiß, es gebe Indizien dafür. Es könne aber auch sein, dass ein Gespräch “zufällig” abgehört worden sei, als ein “Beifang” etwa bei einem Telefonat mit dem russischen Präsidenten Putin. Pofalla sagte, er halte es bis heute für nicht bewiesen, dass das Handy der Kanzlerin abgehört worden sei. Der “Spiegel” hatte 2013 erstmals über diesen Verdacht berichtet.
Nun liegen die neuen WikiLeaks-Dokumente vor – eine Liste mit 56 Telefonnummern, darunter Merkels Handy-Nummer, die sie bis mindestens Ende 2013 genutzt hat. Die Nummern stammen offenbar aus einer Datenbank der NSA, in der Abhörziele erfasst sind. Und in dieser Liste findet sich nicht nur Merkels alte Mobilnummer, sondern auch mehr als ein Dutzend weiterer Festnetz-, Handy- und Faxanschlüsse aus ihrem direkten Umfeld – darunter die Durchwahl ihrer Büroleiterin im Kanzleramt, Beate Baumann, ihres Stellvertreters sowie weitere Nummern aus dem Kanzlerbüro.
Eine Liste mit Telefonnummern von Wikileaks galerieWikiLeaks hat eine Liste mit Telefonnummern und Namen aus dem Bundeskanzleramt veröffentlicht, die offenbar aus einer Datenbank mit Abhörzielen der NSA stammen [die letzten Ziffern wurden von der Redaktion unkenntlich gemacht].
Außerdem steht der Name des Unions-Fraktionschefs Volker Kauder, einem engen Vertrauten von Merkel, samt einer Nummer im Bundestag auf der Liste und eine Merkel zugeordnete Nummer in der CDU-Bundesgeschäftsstelle. Auch die aktuelle Handy-Nummer von Ronald Pofalla ist in der NSA-Datenbank erfasst. Er hatte es anscheinend schon geahnt. In der Sitzung des NSA-Untersuchungsausschusses wies ihn jemand darauf hin, dass seine Nummer bislang nicht aufgetaucht sei. Pofallas Antwort: “Kommt noch.”
Gezieltes Vorgehen der NSA
Die Liste zeigt, dass die NSA offenbar sehr gezielt vorgegangen ist. Außer der Kanzlerin und ihrem Büro umfasst sie vor allem Nummern und Namen von der Leitung des Bundeskanzleramts sowie von den Abteilungen 2, 4 und 6 – zuständig für Außen- und Sicherheitspolitik, Wirtschaftspolitik und die Nachrichtendienste. Selbst die Telefonzentrale des Kanzleramts inklusive der Faxnummer wurde offenbar ausspioniert. Von wann die Liste stammt, ist nicht bekannt. Viele der aufgeführten Nummern sind bis heute aktuell, andere – teils noch aus Bonner Zeiten – sind anscheinend veraltet.
Mitarbeiter von Kohl und Schröder im Visier
Wann der US-Geheimdienst den Lauschangriff auf das Zentrum der deutschen Regierung gestartet hat, ist nicht klar. Aber einiges deutet daraufhin, dass auch Mitarbeiter von Merkels Vorgängern abgehört wurden. Die ersten Ziele hat die NSA offenbar bereits vor mehr als 20 Jahren in die Datenbank aufgenommen und in den folgenden Jahren stetig erweitert. Unter anderem findet sich eine alte Bonner Nummer mit dem Eintrag “DR LUDEWIG CHIEF OF DIV 4” in der Liste. Dr. Johannes Ludewig leitete von 1991 bis 1994 die Wirtschaftsabteilung des Kanzleramts, die Abteilung 4. Danach wechselte er ins Wirtschaftsministerium. Ausgespäht wurde offenbar auch ein persönlicher Referent des damaligen CDU-Staatsministers Anton Pfeiffer, ein enger Vertrauter von Helmut Kohl.
Außerdem stehen unter anderem auf der Liste: Bodo Hombach, der 1998/99 einige Monate lang das Kanzleramt geleitet hat; Schröders sicherheitspolitischer Berater Michael Steiner; Klaus Gretschmann, ehemaliger Leiter der Abteilung für Wirtschaftspolitik, der unter anderem die Weltwirtschaftsgipfel für den Kanzler vorbereitet hat; Ernst Uhrlau, von 1998 bis 2005 im Kanzleramt für die Aufsicht über die Nachrichtendienste zuständig.
NSA hörte Kanzleramt offenbar jahrzehntelang ab
tagesthemen 22:15 Uhr, 08.07.2015, S. Buchen/J. Goetz/C. Deker, NDR
Icon facebook Icon Twitter Icon Google+ Icon Briefumschlag
Download der Videodatei
Weitere “streng geheime” Abhörprotokolle veröffentlicht
WikiLeaks hat außer der Telefonliste erneut einige als “streng geheim” eingestufte Abhörprotokolle der NSA veröffentlicht, darunter abgefangene Gespräche von Kanzlerin Merkel unter anderem mit Scheich Muhammad bin Zayid Al Nahyan aus den Vereinigten Arabischen Emiraten aus dem Jahr 2009 über die Situation im Iran. Laut einem weiteren Protokoll – ebenfalls von 2009 – hat sie intern kurz vor dem damals geplanten G20-Gipfel in London Vorschläge der US-Notenbank zur Lösung der Finanzkrise kritisiert. Es ging um “toxische Anlagen”, die in “bad banks” ausgelagert werden sollten. Merkel habe sich skeptisch dazu geäußert, dass Banken sich komplett ihrer Verantwortung entziehen.
Mitte Juni hat Generalbundesanwalt Harald Range ein Ermittlungsverfahren wegen des mutmaßlichen Ausspähens von Merkels Handy eingestellt. Die Vorwürfe seien nicht gerichtsfest nachzuweisen. Beweisdokumente habe die Behörde nicht beschaffen können. Kurz darauf – Anfang Juli – hat Wikileaks erste Abhörprotokolle und eine Liste mit Abhörzielen veröffentlicht, die auf einen umfassenden Lauschangriff der NSA auf die deutsche Regierung hindeuteten.
Bundesregierung prüft Veröffentlichungen
Als Reaktion auf die erste Enthüllung bat die Bundesregierung den US-Botschafter in Deutschland, John B. Emerson, zu einem Gespräch ins Kanzleramt. Die Bundesanwaltschaft prüft nun mögliche neue Ermittlungen wegen der NSA-Aktivitäten. Und in Regierungskreisen hieß es, man wundere sich in dieser Sache über gar nichts mehr. Beschwerden in Washington seien aber offenbar sinnlos. Die Bundesregierung erklärte nun auf Anfrage von NDR, WDR und SZ, die Veröffentlichung aus der vergangenen Woche werde von den zuständigen Stellen geprüft und bewertet, dies dauere an. “Insbesondere da ein Nachweis der Authentizität der veröffentlichten Dokumente fehlt, ist eine abschließende Bewertung derzeit nicht möglich.”
Zu den in den aktuellen Dokumenten aufgeführten Mobilfunknummern will die Bundesregierung nicht öffentlich Stellung nehmen. Eine Sprecher betonte jedoch, dass weiterhin gelte, was der Chef des Bundeskanzleramts, Peter Altmaier, in der vergangenen Woche gegenüber dem US-Botschaft deutlich gemacht habe: “Die Einhaltung deutschen Rechts ist unabdingbar und festgestellte Verstöße werden mit allen Mitteln des Rechtsstaats verfolgt werden. Darüber hinaus wird die für die Sicherheit unserer Bürger unverzichtbare Zusammenarbeit der deutschen und amerikanischen Nachrichtendienste durch derartige wiederholte Vorgänge belastet. Bereits seit dem vergangenen Jahr hat die Bundesregierung ihre Spionageabwehr verstärkt und fühlt sich darin durch die neuesten Veröffentlichungen bestätigt.”
Die US-Regierung hat sich bislang weder offiziell noch inoffiziell zur aktuellen Abhörpraxis in Deutschland geäußert. Nur Kanzlerin Merkel hat nach den ersten Berichten über das Abhören ihres Handys eine Art No-Spy-Garantie von US-Präsident Obama bekommen. Dabei ging es allerdings tatsächlich nur um sie persönlich, stellte der frühere NSA- und CIA-Direktor Michael Hayden in einem “Spiegel”-Interview klar. “Das war kein Versprechen, das für irgendjemand anderes an der Spitze der Bundesregierung gilt.”
Rechercheverbund
Die investigativen Ressorts von NDR, WDR und “Süddeutscher Zeitung” kooperieren unter Leitung von Georg Mascolo themen- und projektbezogen. Die Rechercheergebnisse, auch zu komplexen internationalen Themen, werden für Fernsehen, Hörfunk, Online und Print aufbereitet.
Stand: 09.07.2015 09:40 Uhr
Von John Goetz, Janina Findeisen und Christian Baars (NDR)
Find this story at 9 July 2015
© ARD-aktuell / tagesschau.de
WikiLeaks: Steinmeier target of systematic NSA spying16 oktober 2015
WikiLeaks has published evidence that the NSA systematically spied on German Foreign Minister Frank-Walter Steinmeier, as well as other officials. The alleged spying reportedly predates the September 11, 2001 attacks.
German Foreign Minister Frank-Walter Steinmeier was reportedly the target of systematic spying by the US National Security Agency (NSA), according to information released Monday by transparency organization WikiLeaks.
WikiLeaks documented an intercepted conversation or phone call held by Steinmeier on November 29, 2005 shortly after he had completed his first official visit to the United States as foreign minister.
It is unclear with whom Steinmeier was speaking at the time, but the subject of the call was the US Central Intelligence Agency’s (CIA) controversial renditions program. It was alleged that the US had used the airspace and airport facilities of cooperating European countries to illegally abduct European citizens and residents in order to interrogate them at secret “black site” prisons.
Steinmeier denied knowledge of the alleged rendition flights in 2005 and according to the intercept, “seemed relieved that he had not received any definitive response from the US secretary of state regarding press reports of CIA flights through Germany to secret prisons in Eastern Europe allegedly used for interrogating terrorism subjects.”
Human rights groups have accused the United States of having used the so-called “extraordinary renditions” in order to interrogate suspected terrorists using methods not allowed in the US itself, including torture.
NSA Symbolbild
WikiLeaks has revealed what appears to be a years-long effort to spy on the German Foreign Ministry
‘Tacit complicity of European governments’
The US has acknowledged that the CIA operated a secret detention program outside its borders, but denied the use of torture. In 2008, Steinmeier again denied Germany had in any way supported the rendition flights at a parliamentary hearing, calling such accusations “utter nonsense.”
“Today’s publication indicates that the NSA has been used to help the CIA kidnap and torture with impunity. For years the CIA was systematically abducting and torturing people, with the tacit complicity of European governments,” WikiLeaks founder Julian Assange said in a statement.
The new documents paint a picture of an apparent years-long NSA effort to spy on the German Foreign Ministry, dating back to before the September 11, 2001 terrorist attacks. The documents reveal a list of 20 phone numbers the NSA targeted for monitoring, two of which were assigned to Steinmeier as well one number potentially assigned to Joschka Fischer, Germany’s vice chancellor and foreign minister from 1998 to 2005.
The German Foreign Ministry has not commented on the latest revelations, which come shortly after WikiLeaks revealed the NSA had allegedly spied on top German politicians for decades .
German Green Party parliamentarian Hans-Christian Ströbele demanded an explanation from the government and secret service in light of the latest revelations.
“They must say what they will do now to resolve the spying and avert damage,” Ströbele said after Monday’s revelations. He also questioned whether Steinmeier in 2006 “actually failed to answer questions regarding US rendition flights over Germany.”
bw/cmk (AFP, dpa)
20.07.2015
Find this story at 20 July 2015
© 2015 Deutsche Welle
An Attack on Press Freedom SPIEGEL Targeted by US Intelligence16 oktober 2015
Revelations from WikiLeaks published this week show how boundlessly and comprehensively American intelligence services spied on the German government. It has now emerged that the US also conducted surveillance against SPIEGEL.
Walks during working hours aren’t the kind of pastime one would normally expect from a leading official in the German Chancellery. Especially not from the head of Department Six, the official inside Angela Merkel’s office responsible for coordinating Germany’s intelligence services.
But in the summer of 2011, Günter Heiss found himself stretching his legs for professional reasons. The CIA’s station chief in Berlin had requested a private conversation with Heiss. And he didn’t want to meet in an office or follow standard protocol. Instead, he opted for the kind of clandestine meeting you might see in a spy film.
Officially, the CIA man was accredited as a counsellor with the US Embassy, located next to Berlin’s historic Brandenburg Gate. Married to a European, he had already been stationed in Germany once before and knew how to communicate with German officials. At times he could be demanding and overbearing, but he could also be polite and courteous. During this summer walk he also had something tangible to offer Heiss.
The CIA staffer revealed that a high-ranking Chancellery official allegedly maintained close contacts with the media and was sharing official information with reporters with SPIEGEL.
The American provided the name of the staffer: Hans Josef Vorbeck, Heiss’ deputy in Department Six. The information must have made it clear to Heiss that the US was spying on the German government as well as the press that reports on it.
The central Berlin stroll remained a secret for almost four years. The Chancellery quietly transferred Vorbeck, who had until then been responsible for counterterrorism, to another, less important department responsible dealing with the history of the BND federal intelligence agency. Other than that, though, it did nothing.
Making a Farce of Rule of Law
Officials in the Chancellery weren’t interested in how the CIA had obtained its alleged information. They didn’t care to find out how, and to which degree, they were being spied on by the United States. Nor were they interested in learning about the degree to which SPIEGEL was being snooped on by the Americans. Chancellery officials didn’t contact any of the people in question. They didn’t contact members of the Bundestag federal parliament sitting on the Parliamentary Control Panel, the group responsible for oversight of the intelligence services. They didn’t inform members of the Office for the Protection of the Constitution, the agency responsible for counterintelligence in Germany, either. And they didn’t contact a single public prosecutor. Angela Merkel’s office, it turns out, simply made a farce of the rule of law.
As a target of the surveillance, SPIEGEL has requested more information from the Chancellery. At the same time, the magazine filed a complaint on Friday with the Federal Public Prosecutor due to suspicion of intelligence agency activity.
Because now, in the course of the proceedings of the parliamentary investigative committee probing the NSA’s activities in Germany in the wake of revelations leaked by whistleblower Edward Snowden, details about the event that took place in the summer of 2011 are gradually leaking to the public. At the beginning of May, the mass-circulation tabloid Bild am Sonntag reported on a Chancellery official who had been sidelined “in the wake of evidence of alleged betrayal of secrets through US secret services.”
Research conducted by SPIEGEL has determined the existence of CIA and NSA files filled with a large number of memos pertaining to the work of the German newsmagazine. And three different government sources in Berlin and Washington have independently confirmed that the CIA station chief in Berlin was referring specifically to Vorbeck’s contacts with SPIEGEL.
An Operation Justified by Security Interests?
Obama administration sources with knowledge of the operation said that it was justified by American security interests. The sources said US intelligence services had determined the existence of intensive contacts between SPIEGEL reporters and the German government and decided to intervene because those communications were viewed as damaging to the United States’ interests. The fact that the CIA and NSA were prepared to reveal an ongoing surveillance operation to the Chancellery underlines the importance they attached to the leaks, say sources in Washington. The NSA, the sources say, were aware that the German government would know from then on that the US was spying in Berlin.
As more details emerge, it is becoming increasingly clear that representatives of the German government at best looked away as the Americans violated the law, and at worst supported them.
Just last Thursday, Günter Heiss and his former supervisor, Merkel’s former Chief of Staff Ronald Pofalla, were questioned by the parliamentary investigative committee and attempted to explain the egregious activity. Heiss confirmed that tips had been given, but claimed they hadn’t been “concrete enough” for measures to be taken. When asked if he had been familiar with the issue, Pofalla answered, “Of course.” He said that anything else he provided had to be “in context,” at which point a representative of the Chancellery chimed in and pointed out that could only take place in a meeting behind closed doors.
In that sense, the meeting of the investigative committee once again shed light on the extent to which the balance of power has shifted between the government and the Fourth Estate. Journalists, who scrutinize and criticize those who govern, are an elementary part of the “checks and balances” — an American invention — aimed at ensuring both transparency and accountability. When it comes to intelligence issues, however, it appears this system has been out of balance for some time.
Government Lies
When SPIEGEL first reported in Summer 2013 about the extent of NSA’s spying on Germany, German politicians first expressed shock and then a certain amount of indignation before quickly sliding back into their persona as a loyal ally. After only a short time and a complete lack of willingness on the part of the Americans to explain their actions, Pofalla declared that the “allegations are off the table.”
But a number of reports published in recent months prove that, whether out of fear, outrage or an alleged lack of knowledge, it was all untrue. Everything the government said was a lie. As far back as 2013, the German government was in a position to suspect, if not to know outright, the obscene extent to which the United States was spying on an ally. If there hadn’t already been sufficient evidence of the depth of the Americans’ interest in what was happening in Berlin, Wednesday’s revelations by WikiLeaks, in cooperation with Süddeutsche Zeitung, filled in the gaps.
SPIEGEL’s reporting has long been a thorn in the side of the US administration. In addition to its reporting on a number of other scandals, the magazine exposed the kidnapping of Murat Kurnaz, a man of Turkish origin raised in Bremen, Germany, and his rendition to Guantanamo. It exposed the story of Mohammed Haydar Zammar, who was taken to Syria, where he was tortured. The reports triggered the launch of a parliamentary investigative committee in Berlin to look also into the CIA’s practices.
When SPIEGEL reported extensively on the events surrounding the arrest of three Islamist terrorists in the so-called “Sauerland cell” in Germany, as well as the roles played by the CIA and the NSA in foiling the group, the US government complained several times about the magazine. In December 2007, US intelligence coordinator Mike McConnell personally raised the issue during a visit to Berlin. And when SPIEGEL reported during the summer of 2009, under the headline “Codename Domino,” that a group of al-Qaida supporters was believed to be heading for Europe, officials at the CIA seethed. The sourcing included a number of security agencies and even a piece of information supplied by the Americans. At the time, the station chief for Germany’s BND intelligence service stationed in Washington was summoned to CIA headquarters in Langley, Virginia.
The situation escalated in August 2010 after SPIEGEL, together with WikiLeaks, the Guardian and the New York Times, began exposing classified US Army reports from Afghanistan. That was followed three months later with the publication of the Iraq war logs based on US Army reports. And in November of that year, WikiLeaks, SPIEGEL and several international media reported how the US government thinks internally about the rest of the world on the basis of classified State Department cables. Pentagon officials at the time declared that WikiLeaks had “blood on its hands.” The Justice Department opened an investigation and seized data from Twitter accounts, e-mail exchanges and personal data from activists connected with the whistleblowing platform. The government then set up a Task Force with the involvement of the CIA and NSA.
Not even six months later, the CIA station chief requested to go on the walk in which he informed the intelligence coordinator about Vorbeck and harshly criticized SPIEGEL.
Digital Snooping
Not long later, a small circle inside the Chancellery began discussing how the CIA may have got ahold of the information. Essentially, two possibilities were conceivable: either through an informant or through surveillance of communications. But how likely is it that the CIA had managed to recruit a source in the Chancellery or on the editorial staff of SPIEGEL?
The more likely answer, members of the circle concluded, was that the information must have been the product of “SigInt,” signals intelligence — in other words, wiretapped communications. It seems fitting that during the summer of 2013, just prior to the scandal surrounding Edward Snowden and the documents he exposed pertaining to NSA spying, German government employees warned several SPIEGEL journalists that the Americans were eavesdropping on them.
At the end of June 2011, Heiss then flew to Washington. During a visit to CIA headquarters in Langley, the issue of the alleged contact with SPIEGEL was raised again. Chancellery staff noted the suspicion in a classified internal memo that explicitly names SPIEGEL.
One of the great ironies of the story is that contact with the media was one of Vorbeck’s job responsibilities. He often took part in background discussions with journalists and even represented the Chancellery at public events. “I had contact with journalists and made no secret about it,” Vorbeck told SPIEGEL. “I even received them in my office in the Chancellery. That was a known fact.” He has since hired a lawyer.
It remains unclear just who US intelligence originally had in its scopes. The question is also unlikely to be answered by the parliamentary investigative committee, because the US appears to have withheld this information from the Chancellery. Theoretically, at least, there are three possibilities: The Chancellery — at least in the person of Hans Josef Vorbeck. SPIEGEL journalists. Or blanket surveillance of Berlin’s entire government quarter. The NSA is capable of any of the three options. And it is important to note that each of these acts would represent a violation of German law.
Weak Arguments
So far, the Chancellery has barricaded itself behind the argument that the origin of the information had been too vague and abstract to act on. In addition, the tip had been given in confidentiality, meaning that neither Vorbeck nor SPIEGEL could be informed. But both are weak arguments, given that the CIA station chief’s allegations were directed precisely at SPIEGEL and Vorbeck and that the intelligence coordinator’s deputy would ultimately be sidelined as a result.
And even if you follow the logic that the tip wasn’t concrete enough, there is still one committee to whom the case should have been presented under German law: the Bundestag’s Parliamentary Control Panel, whose proceedings are classified and which is responsible for oversight of Germany’s intelligence services. The nine members of parliament on the panel are required to be informed about all intelligence events of “considerable importance.”
Members of parliament on the panel did indeed express considerable interest in the Vorbeck case. They learned in fall 2011 of his transfer, and wanted to know why “a reliable coordinator in the fight against terrorism would be shifted to a post like that, one who had delivered excellent work on the issue,” as then chairman of the panel, Social Demoratic Party politician Thomas Oppermann, criticized at the time.
But no word was mentioned about the reasons behind the transfer during a Nov. 9, 2011 meeting of the panel. Not a single word about the walk taken by the CIA chief of station. Not a word about the business trip to Washington taken by Günter Heiss afterward. And not a word about Vorbeck’s alleged contacts with SPIEGEL. Instead, the parliamentarians were told a myth — that the move had been made necessary by cutbacks. And also because he was needed to work on an historical appraisal of Germany’s foreign intelligence agency, the BND.
Deceiving Parliament
Officials in the Chancellery had decided to deceive parliament about the issue. And for a long time, it looked as though they would get away with it.
The appropriate way of dealing with the CIA’s incrimination would have been to transfer the case to the justice system. Public prosecutors would have been forced to follow up with two investigations: One to find out whether the CIA’s allegations against Vorbeck had been true — both to determine whether government secrets had been breached and out of the obligation to assist a longtime civil servant. It also would have had to probe suspicions that a foreign intelligence agency conducted espionage in the heart of the German capital.
That could, and should, have been the case. Instead, the Chancellery decided to go down the path of deception, scheming with an ally, all the while interpreting words like friendship and partnership in a highly arbitrary and scrupulous way.
Günter Heiss, who received the tip from the CIA station chief, is an experienced civil servant. In his earlier years, Heiss studied music. He would go on as a music instructor to teach a young Ursula von der Leyen (who is Germany’s defense minister today) how to play the piano. But then Heiss, a tall, slightly lanky man, switched professions and instead pursued a career in intelligence that would lead him to the top post in the Lower Saxony state branch of the Office for the Protection of the Constitution. Even back then, the Christian Democrat was already covering up the camera on his laptop screen with tape. At the very least “they” shouldn’t be able to see him, he said at the time, elaborating that the “they” he was referring to should not be interpreted as being the US intelligence services, but rather the other spies – “the Chinese” and, “in any case, the Russians.” For conservatives like Heiss, America, after all, is friendly territory.
‘Spying Among Friends Not Acceptable’
If there was suspicion in the summer of 2011 that the NSA was spying on a staff member at the Chancellery, it should have set off alarm bells within the German security apparatus. Both the Office for the Protection of the Constitution, which is responsible for counter-intelligence, and the Federal Office for Information Security should have been informed so that they could intervene. There also should have been discussions between the government ministers and the chancellor in order to raise government awareness about the issue. And, going by the maxim the chancellor would formulate two years later, Merkel should have had a word with the Americans along the lines of “Spying among friends is not acceptable.”
And against the media.
If it is true that a foreign intelligence agency spied on journalists as they conducted their reporting in Germany and then informed the Chancellery about it, then these actions would place a huge question mark over the notion of a free press in this country. Germany’s highest court ruled in 2007 that press freedom is a “constituent part of a free and democratic order.” The court held that reporting can no longer be considered free if it entails a risk that journalists will be spied on during their reporting and that the federal government will be informed of the people they speak to.
“Freedom of the press also offers protection from the intrusion of the state in the confidentiality of the editorial process as well as the relationship of confidentiality between the media and its informants,” the court wrote in its ruling. Freedom of the press also provides special protection to the “the secrecy of sources of information and the relationship of confidentiality between the press, including broadcasters, and the source.”
Criminalizing Journalism
But Karlsruhe isn’t Washington. And freedom of the press is not a value that gives American intelligence agencies pause. On the contrary, the Obama administration has gained a reputation for adamantly pursuing uncomfortable journalistic sources. It hasn’t even shied away from targeting American media giants.
In spring 2013, it became known that the US Department of Justice mandated the monitoring of 100 telephone numbers belonging to the news agency Associated Press. Based on the connections that had been tapped, AP was able to determine that the government likely was interested in determining the identity of an important informant. The source had revealed to AP reporters details of a CIA operation pertaining to an alleged plot to blow up a commercial jet.
The head of AP wasn’t the only one who found the mass surveillance of his employees to be an “unconstitutional act.” Even Republican Senators like John Boehner sharply criticized the government, pointing to press freedoms guaranteed by the Bill of Rights. “The First Amendment is first for a reason,” he said.
But the Justice Department is unimpressed by such formulations. New York Times reporter James Risen, a two-time Pulitzer Prize winner, was threatened with imprisonment for contempt of court in an effort to get him to turn over his sources — which he categorically refused to do for seven years. Ultimately, public pressure became too intense, leading Obama’s long-time Attorney General Eric Holder to announce last October that Risen would not be forced to testify.
The Justice Department was even more aggressive in its pursuit of James Rosen, the Washington bureau chief for TV broadcaster Fox. In May 2013, it was revealed that his telephone was bugged, his emails were read and his visits to the State Department were monitored. To obtain the necessary warrants, the Justice Department had labeled Rosen a “criminal co-conspirator.”
The strategy of criminalizing journalism has become something of a bad habit under Obama’s leadership, with his government pursuing non-traditional media, such as the whistleblower platform WikiLeaks, with particular aggression.
Bradley Manning, who supplied WikiLeaks with perhaps its most important data dump, was placed in solitary confinement and tormented with torture-like methods, as the United Nations noted critically. Manning is currently undergoing a gender transition and now calls herself Chelsea. In 2013, a military court sentenced Manning, who, among other things, publicized war crimes committed by the US in Iraq, to 35 years in prison.
In addition, a criminal investigation has been underway for at least the last five years into the platform’s operators, first and foremost its founder Julian Assange. For the past several years, a grand jury in Alexandria, Virginia has been working to determine if charges should be brought against the organization.
Clandestine Proceedings
The proceedings are hidden from the public, but the grand jury’s existence became apparent once it began to subpoena witnesses with connections to WikiLeaks and when the Justice Department sought to confiscate data belonging to people who worked with Assange. The US government, for example, demanded that Twitter hand over data pertaining to several people, including the Icelandic parliamentarian Brigitta Jonsdottir, who had worked with WikiLeaks on the production of a video. The short documentary is an exemplary piece of investigative journalism, showing how a group of civilians, including employees of the news agency Reuters, were shot and killed in Baghdad by an American Apache helicopter.
Computer security expert Jacob Appelbaum, who occasionally freelances for SPIEGEL, was also affected at the time. Furthermore, just last week he received material from Google showing that the company too had been forced by the US government to hand over information about him – for the time period from November 2009 until today. The order would seem to indicate that investigators were particularly interested in Appelbaum’s role in the publication of diplomatic dispatches by WikiLeaks.
Director of National Intelligence James Clapper has referred to journalists who worked with material provided by Edward Snowden has his “accomplices.” In the US, there are efforts underway to pass a law pertaining to so-called “media leaks.” Australia already passed one last year. Pursuant to the law, anyone who reveals details about secret service operations may be punished, including journalists.
Worries over ‘Grave Loss of Trust’
The German government isn’t too far from such positions either. That has become clear with its handling of the strictly classified list of “selectors,” which is held in the Chancellery. The list includes search terms that Germany’s foreign intelligence agency, the BND, used when monitoring telecommunications data on behalf of the NSA. The parliamentary investigative committee looking into NSA activity in Germany has thus far been denied access to the list. The Chancellery is concerned that allowing the committee to review the list could result in uncomfortable information making its way into the public.
That’s something Berlin would like to prevent. Despite an unending series of indignities visited upon Germany by US intelligence agencies, the German government continues to believe that it has a “special” relationship with its partners in America — and is apparently afraid of nothing so much as losing this partnership.
That, at least, seems to be the message of a five-page secret letter sent by Chancellery Chief of Staff Peter Altmaier, of Merkel’s Christian Democrats, to various parliamentary bodies charged with oversight. In the June 17 missive, Altmaier warns of a “grave loss of trust” should German lawmakers be given access to the list of NSA spying targets. Opposition parliamentarians have interpreted the letter as a “declaration of servility” to the US.
Altmaier refers in the letter to a declaration issued by the BND on April 30. It notes that the spying targets passed on by the NSA since 2005 include “European political personalities, agencies in EU member states, especially ministries and EU institutions, and representations of certain companies.” On the basis of this declaration, Altmaier writes, “the investigative committee can undertake its own analysis, even without knowing the individual selectors.”
Committee members have their doubts. They suspect that the BND already knew at the end of April what WikiLeaks has now released — with its revelations that the German Economics Ministry, Finance Ministry and Agriculture Ministry were all under the gaze of the NSA, among other targets. That would mean that the formulation in the BND declaration of April 30 was intentionally misleading. The Left Party and the Greens now intend to gain direct access to the selector list by way of a complaint to Germany’s Constitutional Court.
The government in Berlin would like to prevent exactly that. The fact that the US and German intelligence agencies shared selectors is “not a matter of course. Rather, it is a procedure that requires, and indicates, a special degree of trust,” Almaier writes. Should the government simply hand over the lists, Washington would see that as a “profound violation of confidentiality requirements.” One could expect, he writes, that the “US side would significantly restrict its cooperation on security issues, because it would no longer see its German partners as sufficiently trustworthy.”
Altmaier’s letter neglects to mention the myriad NSA violations committed against German interests, German citizens and German media.
By SPIEGEL Staff
07/03/2015 06:05 PM
Find this story at 3 July 2015
© SPIEGEL ONLINE 2015
Neue Spionageaffäre erschüttert BND16 oktober 2015
Der US-Geheimdienst NSA hat offenbar über Jahre hinweg mit Wissen des Bundesnachrichtendienstes Ziele in Westeuropa und Deutschland ausgespäht. Die Erkenntnisse darüber behielt der BND nach SPIEGEL-Informationen lange für sich.
Im Mittelpunkt des neuerlichen Skandals steht die gemeinsame Spionagetätigkeit von Bundesnachrichtendienst (BND) und US-Auslandsgeheimdienst NSA. Für die technische Aufklärung lieferte der US-Dienst seit mehr als zehn Jahren sogenannte Selektoren – also etwa IP-Adressen oder Handynummern – an die deutschen Partner. Diese wurden in die BND-Systeme zur Überwachung verschiedener Weltregionen eingespeist.
Mindestens seit dem Jahr 2008 fiel BND-Mitarbeitern mehrfach auf, dass einige dieser Selektoren dem Aufgabenprofil des deutschen Auslandsgeheimdienstes zuwiderlaufen – und auch nicht von dem “Memorandum of Agreement” abgedeckt sind, das die Deutschen und die Amerikaner zur gemeinsamen Bekämpfung des globalen Terrorismus 2002 ausgehandelt hatten. Stattdessen suchte die NSA gezielt nach Informationen etwa über den Rüstungskonzern EADS, Eurocopter oder französische Behörden. Der BND nahm das offenbar jedoch nicht zum Anlass, die Selektorenliste systematisch zu überprüfen.
Erst nach Enthüllung des NSA-Skandals im Sommer 2013 befasste sich eine BND-Abteilung gezielt mit den NSA-Suchbegriffen. Im Oktober 2013 lag das Ergebnis vor: Demnach verstießen rund 2000 der Selektoren eindeutig gegen westeuropäische und deutsche Interessen. Die Rede ist intern auch von Politikern, die demnach gezielt und unrechtmäßig ausspioniert wurden. Aber auch diesen Fund meldete der BND nicht an seine Aufsichtsbehörde, das Bundeskanzleramt. Stattdessen bat der zuständige Unterabteilungsleiter die NSA, derartige Verstöße künftig zu unterlassen.
BND-Chef von Ausschusssitzung ausgeschlossen
Das wahre Ausmaß des Skandals wurde nun erst aufgrund eines Beweisantrags bekannt, den Linke und Grüne für den NSA-Untersuchungsausschuss gestellt hatten. Die für den Ausschuss zuständige Projektgruppe des BND prüfte die NSA-Selektoren daraufhin erneut – mit dem Ergebnis, dass bis zu 40.000 davon gegen westeuropäische und deutsche Interessen gerichtet sind. Erst im März wurde das Bundeskanzleramt darüber unterrichtet. Weitere Überprüfungen wurden inzwischen angeordnet.
Am Mittwochabend unterrichtete Kanzleramtsminister Peter Altmaier (CDU) persönlich die Mitglieder des Parlamentarischen Kontrollgremiums und des NSA-Ausschusses über den Spionageskandal. BND-Präsident Gerhard Schindler wurde von der Sitzung explizit ausgeschlossen. Auch Spitzenpolitiker von SPD und CDU wurden bereits informiert.
Von Maik Baumgärtner, Hubert Gude, Marcel Rosenbach und Jörg Schindler
Donnerstag, 23.04.2015 – 16:23 Uhr
Find this story at 24 April 2015
© SPIEGEL ONLINE 2015
Airbus va porter plainte pour soupçons d’espionnage en Allemagne (2015)16 oktober 2015
Airbus Group a annoncé jeudi son intention de porter plainte en Allemagne après les informations selon lesquelles le BND, le service fédéral de renseignement extérieur allemand, a aidé ses homologues américains à espionner plusieurs entreprises européennes.
“Nous avons demandé des informations supplémentaires au gouvernement”, a déclaré un porte-parole d’Airbus en Allemagne. “Nous allons porter plainte contre X en raison de soupçons d’espionnage industriel.”
L’hebdomadaire Der Spiegel a rapporté la semaine dernière que des responsables du BND avaient indirectement aidé la National Security Agency (NSA) américaine à espionner plusieurs cibles en Europe pendant plus de 10 ans.
Le ministre de l’Intérieur allemand, Thomas de Maizière, un proche allié de la chancelière Angela Merkel, a nié mercredi avoir menti au Parlement à propos de la collaboration entre les services de renseignement allemands et américains.
Il est depuis plusieurs jours sous le feu des critiques de l’opposition dans ce dossier en raison de son rôle lorsqu’il était directeur de la chancellerie fédérale entre 2005 et 2009.
En 2013, après la publication d’informations selon lesquelles les Etats-Unis avaient placé le téléphone portable de la chancelière sur écoute, Angela Merkel avait déclaré que “s’espionner entre amis n’est absolument pas acceptable”.
Le quotidien Handelsblatt avait le premier fait état de la plainte d’Airbus jeudi.
Selon la presse allemande, le BND a également aidé les services de renseignement américains à espionner les services de la présidence française, le ministère français des Affaires étrangères et la Commission européenne.
En France, plusieurs responsables politiques ont réclamé jeudi des excuses de l’Allemagne et une enquête dans ce dossier.
De son côté, le président de l’exécutif européen, Jean-Claude Juncker, a déclaré lors d’une conférence de presse ignorer si des agents allemands étaient en activité à Bruxelles mais il a rappelé avoir proposé dans le passé que la Commission crée ses propres services secrets “car les agents sont partout”.
Lui-même ex-Premier ministre d’un gouvernement luxembourgeois contraint à la démission par un scandale d’espionnage et de corruption en 2013, Jean-Claude Juncker a ajouté que son expérience personnelle lui avait appris que les services secrets étaient très difficiles à contrôler.
La semaine dernière, le gouvernement allemand avait reconnu des failles au sein de ses services de renseignement et dit avoir demandé au BND de les combler.
(Victoria Bryan, avec Adrian Croft à Bruxelles, Marc Angrand pour le service français)
Source : Reuters 30/04/15 à 18:48
Mis à jour le 30/04/15 à 20:30
Find this story at 30 April 2015
© 2015 Reuters
Reaktion auf Spionageaffäre: Rausschmiss erster Klasse (2014)16 oktober 2015
Die Bundesregierung reagiert auf die USSpionage: Der oberste CIAVertreter in Berlin soll
das Land verlassen. Ein solcher Affront war bisher nur gegen Agenten von PariaStaaten wie
Iran oder Nordkorea denkbar.
Berlin Die Bundesregierung reagiert auf die neuen Spionagefälle und die Vorwürfe gegen die
USA mit einem diplomatischen Affront. Als Reaktion auf die Enthüllungen forderte Berlin den
Repräsentanten der amerikanischen Geheimdienste in Berlin auf, das Land zu verlassen.
Umgehend wurde die Botschaft unterrichtet, der Geheimdienstmann musste sich die
unfreundliche Bitte im Innenministerium von VerfassungsschutzChef HansGeorg Maaßen
anhören.
Ein paar Stunden später dann war in Berlin von einer formellen Ausweisung des CIAVertreters
die Rede, der als “station chief” die Aktivitäten des USGeheimdienstes in Deutschland leitet.
Wenig später korrigierte die Regierung, man habe nur die Ausreise empfohlen. Das ist zwar nicht
gleichzusetzen mit einer Ausweisung, faktisch aber bleibt es ein Rausschmiss erster Klasse.
Die öffentliche Geste der indirekten Ausweisung ist diplomatisch gesehen ein Erdbeben. Eine
solche Maßnahme war bisher höchstens gegen PariaStaaten wie Nordkorea oder Iran denkbar
gewesen. Zwar bat Deutschland in den 90er Jahren schon einmal einen USAgenten um seine
Ausreise, er hatte versucht, eine Quelle im Wirtschaftsministerium anzuwerben. Damals aber
geschah der Rausschmiss eher diskret.
Der deutschen Entscheidung gingen am Donnerstagmorgen Krisentelefonate zwischen
Innenminister Thomas de Maizière, Außenminister FrankWalter Steinmeier und Kanzleramtschef
Peter Altmaiervoraus. Dabei zeigten sich alle Minister enttäuscht über die wenig einlenkenden
Reaktionen der USA und waren sich einig: Deutschland könne die Angelegenheit nicht auf sich
beruhen lassen.
In den Gesprächen beriet man zunächst die bisherigen Signale aus Washington. CIAChef John
Brennan und der USBotschafter John Emerson hatten Kontakt zur deutschen Regierung gesucht.
Berlin fehlten allerdings konkrete Angebote, die Vorwürfe schnell aufzuklären. Von einer
Entschuldigung war schon gar nicht die Rede.
Im Parlamentarischen Kontrollgremium berichtete KlausDieter Fritsche, Merkels Beauftragter für
die Nachrichtendienste, am Donnerstag ernüchtert über das Telefonat mit CIAChef Brennan.
Dieser, so Fritsche, habe nichts außer Floskeln über die transatlantische Verbundenheit und
seinen Ärger über die schlechte Presselage beizutragen gehabt.
Offiziell hatte sich die Regierung in der SpionageAffäre bisher zurückgehalten. Man warte erst die
juristische Aufklärung und mögliche Erklärungen der USA ab. Offenbar aber war der Ärger bis
Donnerstag aber so gewachsen, dass die Phase der Zurückhaltung nun beendet wurde.
Innenminister Thomas de Maizière wollte nach den Beratungen keinen Kommentar abgeben.
Zwar spielte er wie zuvor Wolfgang Schäuble den möglichen Schaden herunter er nannte die
von den USA gewonnenen Informationen “lächerlich”.
Gleichsam unterstrich er, dass der politische Schaden allein durch die Verdachtsmomente gegen
die USA “unverhältnismäßig und schwerwiegend” sei. Deswegen sei ein wirksamer Schutz gegen
Angriffe auf unsere Kommunikation ebenso wie eine effektive Spionageabwehr “unverzichtbar für
unsere wehrhafte Demokratie”. Man sei dabei, beides zu stärken und auszuweiten.
Bundeskanzlerin Angela Merkel machte ihrem Ärger auf die für sie typische Weise Luft. “Mit
gesundem Menschenverstand betrachtet ist das Ausspähen von Freunden und Verbündeten ein
Vergeuden von Kraft”, so die Kanzlerin blumig und doch deutlich. Die Geheimdienste sollten nicht
alles tun, was machbar ist, sondern sich bei ihrer Arbeit “auf das Wesentliche” konzentrieren.
Bisher noch keinen Haftbefehl vorgelegt
10/16/2015 Druckversion Reaktion auf Spionageaffäre: Rausschmiss erster Klasse SPIEGEL ONLINE Politik
http://www.spiegel.de/politik/deutschland/spionagebundesregierungfordertciavertreterzurausreiseaufa980342druck.html 2/3
Erst am Mittwoch war ein neuer Spionageverdacht bekannt geworden, in diesem Fall verdächtigt
die Bundesanwaltschaft einen Länderreferenten aus der Abteilung Politik des Wehrressorts,
Informationen an einen USGeheimdienst weitergegeben zu haben. Der Militärische
Abschirmdienst (MAD) hatte den jungen Referenten, der seit gut einem Jahr in einer
Unterabteilung für die Sicherheitspolitik tätig war, wegen des Verdachts schon seit 2010
beobachtet, am Mittwoch dann rückten Ermittler vom Generalbundesanwalt im Ministerium an.
Ob der Verdacht stichhaltig war, ist schwer zu bewerten. Zwar verdächtigte man den heutigen
Referenten wegen seines engen Kontakts zu einem vermeintlichen USGeheimdienstler, den er
vor Jahren während eines Jobs im Kosovo kennengelernt hatte. Bisher aber fehlen Beweise, dass
dieser den Deutschen tatsächlich abschöpfte. Er selbst bestreitet eine Agententätigkeit. In seiner
Vernehmung habe der Mitarbeiter aus dem Wehrressort die Beziehung zu dem Amerikaner
vielmehr als reine Männerfreundschaft bezeichnet. So berichtete es der Vertreter des
Generalbundesanwalts im Kontrollgremium.
Verdächtig erschien den Ermittlern nicht zuletzt eine Überweisung von 2.000 Euro, die der USAmerikaner
vor einiger Zeit auf das Konto des Deutschen veranlasste. Auch hierfür habe der
Ministeriumsmitarbeiter eine Erklärung gehabt: Das Geld, so soll er ausgesagt haben, sei im
Rahmen einer Hochzeitsfeier geflossen und auch teilweise zurückgezahlt worden.
Auch der Generalbundesanwalt sprach nach der Durchsuchung und der Vernehmung nur von
einem Anfangsverdacht und beantragte noch nicht mal einen Haftbefehl. Trotzdem sorgte allein
die Nachricht nur wenige Tage nach dem Bekanntwerden eines ähnlichen Falls beim
Bundesnachrichtendienst (BND) für einen Schock.
10. Juli 2014, 16:36 Uhr
Von Matthias Gebauer und Veit Medick
Find this story at 10 July 2014
© SPIEGEL ONLINE 2014
Officials: Islamic State arose from US support for al-Qaeda in Iraq26 augustus 2015
A former Pentagon intelligence chief, Iraqi government sources, and a retired career US diplomat reveal US complicity in the rise of ISIS
A new memoir by a former senior State Department analyst provides stunning details on how decades of support for Islamist militants linked to Osama bin Laden brought about the emergence of the ‘Islamic State’ (ISIS).
The book establishes a crucial context for recent admissions by Michael T. Flynn, the retired head of the Pentagon’s Defense Intelligence Agency (DIA), confirming that White House officials made a “willful decision” to support al-Qaeda affiliated jihadists in Syria — despite being warned by the DIA that doing so would likely create an ‘ISIS’-like entity in the region.
J. Michael Springmann, a retired career US diplomat whose last government post was in the State Department’s Bureau of Intelligence and Research, reveals in his new book that US covert operations in alliance with Middle East states funding anti-Western terrorist groups are nothing new. Such operations, he shows, have been carried out for various short-sighted reasons since the Cold War and after.
In the 1980s, as US support for mujahideen fighters accelerated in Afghanistan to kick out the Soviet Union, Springmann found himself unwittingly at the heart of highly classified operations that allowed Islamist militants linked to Osama bin Laden to establish a foothold within the United States.
After the end of the Cold War, Springmann alleged, similar operations continued in different contexts for different purposes — in the former Yugoslavia, in Libya and elsewhere. The rise of ISIS, he contends, was a predictable outcome of this counterproductive policy.
Pentagon intel chief speaks out
Everyday brings new horror stories about atrocities committed by ISIS fighters. Today, for instance, the New York Times offered a deeply disturbing report on how ISIS has formally adopted a theology and policy of systematic rape of non-Muslim women and children. The practice has become embedded throughout the territories under ISIS control through a process of organized slavery, sanctioned by the movement’s own religious scholars.
But in a recent interview on Al-Jazeera’s flagship talk-show ‘Head to Head,’ former DIA chief Lieutenant General (Lt. Gen.) Michael Flynn told host Mehdi Hasan that the rise of ISIS was a direct consequence of US support for Syrian insurgents whose core fighters were from al-Qaeda in Iraq.
Lt. Gen. Michael T. Flynn, former Director of the Pentagon’s Defense Intelligence Agency (DIA), in a lengthy interview with Al-Jazeera’s Mehdi Hasan
Back in May, INSURGE intelligence undertook an exclusive investigation into a controversial declassified DIA document appearing to show that as early as August 2012, the DIA knew that the US-backed Syrian insurgency was dominated by Islamist militant groups including “the Salafists, the Muslim Brotherhood and al-Qaeda in Iraq.”
Asked about the DIA document by Hasan, who noted that “the US was helping coordinate arms transfers to those same groups,” Flynn confirmed that the intelligence described by the document was entirely accurate.
Telling Hasan that he had read the document himself, Flynn said that it was among a range of intelligence being circulated throughout the US intelligence community that had led him to attempt to dissuade the White House from supporting these groups, albeit without success.
Flynn added that this sort of intelligence was available even before the decision to pull out troops from Iraq:
“My job was to ensure that the accuracy of our intelligence that was being presented was as good as it could be, and I will tell you, it goes before 2012. When we were in Iraq, and we still had decisions to be made before there was a decision to pull out of Iraq in 2011, it was very clear what we were going to face.”
In other words, long before the inception of the armed insurrection in Syria — as early as 2008 (the year in which the final decision was made on full troop withdrawal by the Bush administration) — US intelligence was fully aware of the threat posed by al-Qaeda in Iraq (AQI) among other Islamist militant groups.
Supporting the enemy
Despite this, Flynn’s account shows that the US commitment to supporting the Syrian insurgency against Bashir al-Assad led the US to deliberately support the very al-Qaeda affiliated forces it had previously fought in Iraq.
Far from simply turning a blind eye, Flynn said that the White House’s decision to support al-Qaeda linked rebels against the Assad regime was not a mistake, but intentional:
Hasan: “You are basically saying that even in government at the time, you knew those groups were around, you saw this analysis, and you were arguing against it, but who wasn’t listening?”
Flynn: “I think the administration.”
Hasan: “So the administration turned a blind eye to your analysis?”
Flynn: “I don’t know if they turned a blind eye. I think it was a decision, a willful decision.”
Hasan: “A willful decision to support an insurgency that had Salafists, Al-Qaeda and the Muslim Brotherhood?”
Flynn: “A willful decision to do what they’re doing… You have to really ask the President what is it that he actually is doing with the policy that is in place, because it is very, very confusing.”
Prior to his stint as DIA chief, Lt. Gen. Flynn was Director of Intelligence for the Joint Special Operations Command (JSOC) and Commander of the Joint Functional Component Command.
Flynn is the highest ranking former US intelligence official to confirm that the DIA intelligence report dated August 2012, released earlier this year, proves a White House covert strategy to support Islamist terrorists in Iraq and Syria even before 2011.
In June, INSURGE reported exclusively that six former senior US and British intelligence officials agreed with this reading of the declassified DIA report.
Flynn’s account is corroborated by other former senior officials. In an interview on French national television , former French Foreign Minister Roland Dumas said that the US’ chief ally, Britain, had planned covert action in Syria as early as 2009 — after US intelligence had clear information according to Flynn on al-Qaeda’s threat to Syria:
“I was in England two years before the violence in Syria on other business. I met with top British officials, who confessed to me that they were preparing something in Syria. This was in Britain not in America. Britain was preparing gunmen to invade Syria.”
Former French Foreign Minister Roland Dumas on French national television confirming information received from UK Foreign Office officials in 2009 regarding operations in Syria
Al-Qaeda in Iraq, the precursor to the movement now known as ‘Islamic State,’ was on the decline due to US and Iraqi counter-terrorism operations from 2008 to 2011 in coordination with local Sunni tribes. In that period, al-Qaeda in Iraq became increasingly isolated, losing the ability to enforce its harsh brand of Islamic Shari’ah law in areas it controlled, and giving up more and more territory.
By late 2011, over 2,000 AQI fighters had been killed, just under 9,000 detained, and the group’s leadership had been largely wiped out.
Right-wing pundits have often claimed due to this background that the decision to withdraw troops from Iraq was the key enabling factor in the resurgence of AQI, and its eventual metamorphosis into ISIS.
But Flynn’s revelations prove the opposite — that far from the rise of ISIS being solely due to a vacuum of power in Iraq due to the withdrawal of US troops, it was the post-2011 covert intervention of the US and its allies, the Gulf states and Turkey, which siphoned arms and funds to AQI as part of their anti-Assad strategy.
Even in Iraq, the surge laid the groundwork for what was to come. Among the hundred thousand odd Sunni tribesmen receiving military and logistical assistance from the US were al-Qaeda sympathisers and anti-Western insurgents who had previously fought alongside al-Qaeda.
In 2008, a US Army-commissioned RAND report confirmed that the US was attempting to “to create divisions in the jihadist camp. Today in Iraq such a strategy is being used at the tactical level.” This included forming “temporary alliances” with al-Qaeda affiliated “nationalist insurgent groups” that have fought the US for four years, now receiving “weapons and cash” from the US.
The idea was, essentially, to bribe former al-Qaeda insurgents to breakaway from AQI and join forces with the Americans. Although these Sunni nationalists “have cooperated with al-Qaeda against US forces,” they are now being supported to exploit “the common threat that al-Qaeda now poses to both parties.”
In the same year, former CIA military intelligence officer and counter-terrorism specialist Philip Geraldi, stated that US intelligence analysts “are warning that the United States is now arming and otherwise subsidizing all three major groups in Iraq.” The analysts “believe that the house of cards is likely to fall down as soon as one group feels either strong or frisky enough to assert itself.” Giraldi predicted:
“The winner in the convoluted process has been everyone who wants to see a civil war.”
By Flynn’s account, US intelligence was also aware in 2008 that the empowerment of former al-Qaeda insurgents would eventually backfire and strengthen AQI in the long-run, especially given that the Shi’a dominated US-backed central government continued to discriminate against Sunni populations.
Syriana
Having provided extensive support for former al-Qaeda affiliated Sunni insurgents in Iraq from 2006 to 2008 — in order to counter AQI — US forces did succeed in temporarily routing AQI from its strongholds in the country.
Simultaneously, however, if Roland Dumas’ account is correct, the US and Britain began covert operations in Syria in 2009. From 2011 onwards, US support for the Syrian insurgency in alliance with the Gulf states and Turkey was providing significant arms and cash to AQI fighters.
The porous nature of relations between al-Qaeda factions in Iraq and Syria, and therefore the routine movement of arms and fighters across the border, was well-known to the US intelligence community in 2008.
In October 2008, Major General John Kelly — the US military official responsible for Anbar province where the bulk of US support for Sunni insurgents to counter AQI was going — complained bitterly that AQI fighters had regrouped across the border in Syria, where they had established a “sanctuary.”
The border, he said, was routinely used as an entry point for AQI fighters to enter Iraq and conduct attacks on Iraqi security forces.
Ironically, at this time, AQI fighters in Syria were tolerated by the Assad regime. A July 2008 report by the Combating Terrorism Center at the US Military Academy at West Point documented AQI’s extensive networks inside Syria across the border with Iraq.
“The Syrian government has willingly ignored, and possibly abetted, foreign fighters headed to Iraq. Concerned about possible military action against the Syrian regime, it opted to support insurgents and terrorists wreaking havoc in Iraq.”
Yet from 2009 onwards according to Dumas, and certainly from 2011 by Flynn’s account, the US and its allies began supporting the very same AQI fighters in Syria to destabilize the Assad regime.
The policy coincided with the covert US strategy revealed by Seymour Hersh in 2007: using Saudi Arabia to funnel support for al-Qaeda and Muslim Brotherhood affiliated Islamists as a mechanism for isolating Iran and Syria.
Reversing the surge
During this period in which the US, the Gulf states, and Turkey supported Syrian insurgents linked to AQI and the Muslim Brotherhood, AQI experienced an unprecedented resurgence.
US troops finally withdrew fully from Iraq in December 2011, which means by the end of 2012, judging by the DIA’s August 2012 report and Flynn’s description of the state of US intelligence in this period, the US intelligence community knew that US and allied support for AQI in Syria was directly escalating AQI’s violence across the border in Iraq.
Despite this, in Flynn’s words, the White House made a “willful decision” to continue the policy despite the possibility it entailed “of establishing a declared or undeclared Salafist principality in Eastern Syria (Hasaka and Der Zor)” according to the DIA’s 2012 intelligence report.
The Pentagon document had cautioned that if a “Salafist principality” did appear in eastern Syria under AQI’s dominance, this would have have “dire consequences” for Iraq, providing “the ideal atmosphere for AQI to return to its old pockets in Mosul and Ramadi,” and a “renewed momentum” for a unified jihad “among Sunni Iraq and Syria.”
Most strikingly, the report warned that AQI, which had then changed its name to the Islamic State of Iraq (ISI):
“ISI could also declare an Islamic State through its union with other terrorist organisations in Iraq and Syria, which will create grave danger in regards to unifying Iraq and the protection of its territory.”
As the US-led covert strategy accelerated sponsorship of AQI in Syria, AQI’s operations in Iraq also accelerated, often in tandem with Syrian al-Qaeda affiliate, Jabhut al-Nusra.
According to Prof. Anthony Celso of the Department of Security Studies at Angelo State University in Texas, “suicide bombings, car bombs, and IED attacks” by AQI in Iraq “doubled a year after the departure of American troops.” Simultaneously, AQI began providing support for al-Nusra by inputting fighters, funds and weapons from Iraq into Syria.
As the Pentagon’s intelligence arm had warned, by April 2013, AQI formally declared itself the Islamic State in Iraq and Syria (ISIS).
In the same month, the European Union voted to ease the embargo on Syria to allow al-Qaeda and ISIS dominated Syrian rebels to sell oil to global markets, including European companies. From this date to the following year when ISIS invaded Mosul, several EU countries were buying ISIS oil exported from the Syrian fields under its control.
The US anti-Assad strategy in Syria, in other words, bolstered the very al-Qaeda factions the US had fought in Iraq, by using the Gulf states and Turkey to finance the same groups in Syria. As a direct consequence, the secular and moderate elements of the Free Syrian Army were increasingly supplanted by virulent Islamist extremists backed by US allies.
A Free Syrian Army fighter rests inside a cave at a rebel camp in Idlib, Syria on 17th September 2013. As of April 2015, moderate FSA rebels in Idlib have been supplanted by a US-backed rebel coalition led by Jabhut al-Nusra, al-Qaeda in Syria
Advanced warning
In February 2014, Lt. Gen. Flynn delivered the annual DIA threat assessment to the Senate Armed Services Committee. His testimony revealed that rather than coming out of the blue, as the Obama administration claimed, US intelligence had anticipated the ISIS attack on Iraq.
In his statement before the committee, which corroborates much of what he told Al-Jazeera, Flynn had warned that “al-Qaeda in Iraq (AQI) also known as Iraq and Levant (ISIL)… probably will attempt to take territory in Iraq and Syria to exhibit its strength in 2014, as demonstrated recently in Ramadi and Fallujah.” He added that “some Sunni tribes and insurgent groups appear willing to work tactically with AQI as they share common anti-government goals.”
Criticizing the central government in Baghdad for its “refusal to address long-standing Sunni grievances,” he pointed out that “heavy-handed approach to counter-terror operations” had led some Sunni tribes in Anbar “to be more permissive of AQI’s presence.” AQI/ISIL has “exploited” this permissive security environment “to increase its operations and presence in many locations” in Iraq, as well as “into Syria and Lebanon,” which is inflaming “tensions throughout the region.”
It should be noted that precisely at this time, the West, the Gulf states and Turkey, according to the DIA’s internal intelligence reports, were supporting AQI and other Islamist factions in Syria to “isolate” the Assad regime. By Flynn’s account, despite his warnings to the White House that an ISIS attack on Iraq was imminent, and could lead to the destabilization of the region, senior Obama officials deliberately continued the covert support to these factions.
US intelligence was also fully cognizant of Iraq’s inability to repel a prospective ISIS attack on Iraq, raising further questions about why the White House did nothing.
The Iraqi army has “been unable to stem rising violence” and would be unable “to suppress AQI or other internal threats” particularly in Sunni areas like Ramadi, Falluja, or mixed areas like Anbar and Ninewa provinces, Flynn told the Senate. As Iraq’s forces “lack cohesion, are undermanned, and are poorly trained, equipped and supplied,” they are “vulnerable to terrorist attack, infiltration and corruption.”
Senior Iraqi government sources told me on condition of anonymity that both Iraqi and American intelligence had anticipated an ISIS attack on Iraq, and specifically on Mosul, as early as August 2013.
Intelligence was not precise on the exact timing of the assault, one source said, but it was known that various regional powers were complicit in the planned ISIS offensive, particularly Qatar, Saudi Arabia and Turkey:
“It was well known at the time that ISIS were beginning serious plans to attack Iraq. Saudi Arabia, Qatar and Turkey played a key role in supporting ISIS at this time, but the UAE played a bigger role in financial support than the others, which is not widely recognized.”
When asked whether the Americans had attempted to coordinate with Iraq on preparations for the expected ISIS assault, particularly due to the recognized inability of the Iraqi army to withstand such an attack, the senior Iraqi official said that nothing had happened:
“The Americans allowed ISIS to rise to power because they wanted to get Assad out from Syria. But they didn’t anticipate that the results would be so far beyond their control.”
This was not, then, a US intelligence failure as such. Rather, the US failure to to curtail the rise of ISIS and its likely destabilization of both Iraq and Syria, was not due to a lack of accurate intelligence — which was abundant and precise — but due to an ill-conceived political decision to impose ‘regime change’ on Syria at any cost.
Vicious cycle
This is hardly the first time political decisions in Washington have blocked US intelligence agencies from pursuing investigations of terrorist activity, and scuppered their crackdowns on high-level state benefactors of terrorist groups.
According to Michael Springmann in his new book, Visas for al-Qaeda: CIA Handouts that Rocked the World, the same structural problems explain the impunity with which terrorist groups have compromised Western defense and security measures for the last few decades.
Much of his book is clearly an effort to make sense of his personal experience by researching secondary sources and interviewing other former US government and intelligence officials. While there are many problems with some of this material, the real value of Springmann’s book is in the level of detail he brings to his first-hand accounts of espionage at the US State Department, and its damning implications for understanding the ‘war on terror’ today.
Springmann served in the US government as a diplomat with the Commerce Department and the State Department’s Foreign Service, holding postings in Germany, India, and Saudi Arabia. He began his diplomatic career as a commercial officer at the US embassy in Stuttgart, Germany (1977–1980), before becoming a commercial attaché in New Delhi, India (1980–1982). He was later promoted to head of the Visa Bureau at the US embassy in Jeddah, Saudi Arabia (1987–1989), and then returned to Stuttgart to become a political/economic officer (1989–1991).
Before he was fired for asking too many questions about illegal practices at the US embassy in Jeddah, Springmann’s last assignment was as a senior economic officer at the State Department’s Bureau of Intelligence and Research (1991), where he had security clearances to access restricted diplomatic cables, along with highly classified intelligence from the National Security Agency (NSA) and CIA.
Springmann says that during his tenure at the US embassy in Jeddah, he was repeatedly asked by his superiors to grant illegal visas to Islamist militants transiting through Jeddah from various Muslim countries. He eventually learned that the visa bureau was heavily penetrated by CIA officers, who used their diplomatic status as cover for all manner of classified operations — including giving visas to the same terrorists who would later execute the 9/11 attacks.
CIA officials operating at the US embassy in Jeddah, according to Springmann, included CIA base chief Eric Qualkenbush, US Consul General Jay Frere, and political officer Henry Ensher.
Thirteen out of the 15 Saudis among the 9/11 hijackers received US visas. Ten of them received visas from the US embassy in Jeddah. All of them were in fact unqualified, and should have been denied entry to the US.
Springmann was fired from the State Department after filing dozens of Freedom of Information requests, formal complaints, and requests for inquiries at multiple levels in the US government and Congress about what he had uncovered. Not only were all his attempts to gain disclosure and accountability systematically stonewalled, in the end his whistleblowing cost him his career.
Springmann’s experiences at Jeddah, though, were not unique. He points out that Sheikh Omar Abdel Rahman, who was convicted as the mastermind of the 1993 World Trade Center bombing, received his first US visa from a CIA case officer undercover as a consular officer at the US embassy in Khartoum in Sudan.
The ‘Blind Sheikh’ as he was known received six CIA-approved US visas in this way between 1986 and 1990, also from the US embassy in Egypt. But as Springmann writes:
“The ‘blind’ Sheikh had been on a State Department terrorist watch list when he was issued the visa, entering the United States by way of Saudi Arabia, Pakistan, and the Sudan in 1990.”
In the US, Abdel Rahman took-over the al-Kifah Refugee Center, a major mujahideen recruitment hub for the Afghan war controlled by Abdullah Azzam, Osama bin Laden and Ayman al-Zawahiri. He not only played a key role in recruiting mujahideen for Afghanistan, but went on to recruit Islamist fighters for Bosnia after 1992.
Even after the 1993 WTC attack, as Springmann told BBC Newsnight in 2001, “The attack on the World Trade Center in 1993 did not shake the State Department’s faith in the Saudis, nor did the attack on American barracks at Khobar Towers in Saudi Arabia three years later, in which 19 Americans died.”
The Bosnia connection is highly significant. Springmann reports that alleged 9/11 mastermind Khalid Sheikh Muhammad “had fought in Afghanistan (after studying in the United States) and then went on to the Bosnian war in 1992…
“In addition, two more of the September 11, 2001, hijackers, Khalid al-Mihdhar and Nawaf al-Hazmi, both Saudis, had gained combat experience in Bosnia. Still more connections came from Mohammed Haydar Zammar, who supposedly helped Mohammed Atta with planning the World Trade Center attacks. He had served with Bosnian army mujahideen units. Ramzi Binalshibh, friends with Atta and Zammar, had also fought in Bosnia.”
US and European intelligence investigations have uncovered disturbing evidence of how the Bosnian mujahideen pipeline, under the tutelage of Saudi Arabia, played a major role in incubating al-Qaeda’s presence in Europe.
According to court papers filed in New York on behalf of the 9/11 families in February, covert Saudi government support for Bosnian arms and training was “especially important to al-Qaeda acquiring the strike capabilities used to launch attacks in the US.”
After 9/11, despite such evidence being widely circulated within the US and European intelligence communities, both the Bush and Obama administrations continued working with the Saudis to mobilize al-Qaeda affiliated extremists in the service of what the DIA described as rolling back “the strategic depth of the Shia expansion” across Iraq, Iran and Syria.
The existence of this policy has been confirmed by former 30-year MI6 Middle East specialist Alastair Crooke. Its outcome — in the form of the empowerment of the most virulent Islamist extremist forces in the region — was predictable, and indeed predicted.
In August 2012 — the same date as the DIA’s controversial intelligence report anticipating the rise of ISIS — I quoted the uncannily prescient remarks of Michael Scheuer, former chief of the CIA’s bin Laden unit, who forecast that US support for Islamist rebels in Syria would likely to lead to “the slaughter of some portion of Syria’s Alawite and Shia communities”; “the triumph of Islamist forces, although they may deign to temporarily disguise themselves in more innocent garb”; “the release of thousands of veteran and hardened Sunni Islamist insurgents”; and even “the looting of the Syrian military’s fully stocked arsenals of conventional arms and chemical weapons.”
I then warned that the “further militarization” of the Syrian conflict would thwart the “respective geostrategic ambitions” of regional powers “by intensifying sectarian conflict, accelerating anti-Western terrorist operations, and potentially destabilizing the whole Levant in a way that could trigger a regional war.”
Parts of these warnings have now transpired in ways that are even more horrifying than anyone ever imagined. The continued self-defeating approach of the US-led coalition may well mean that the worst is yet to come.
by Nafeez Ahmed
Aug 13
Find this story at 13 August 2015
Copyright https://medium.com/
Despite bombing, Islamic State is no weaker than a year ago26 augustus 2015
WASHINGTON (AP) — After billions of dollars spent and more than 10,000 extremist fighters killed, the Islamic State group is fundamentally no weaker than it was when the U.S.-led bombing campaign began a year ago, American intelligence agencies have concluded.
U.S. military commanders on the ground aren’t disputing the assessment, but they point to an upcoming effort to clear the important Sunni city of Ramadi, which fell to the militants in May, as a crucial milestone.
The battle for Ramadi, expected over the next few months, “promises to test the mettle” of Iraq’s security forces, Marine Corps Brig. Gen. Kevin J. Killea, who is helping run the U.S.-led coalition effort in Iraq, told reporters at the Pentagon in a video briefing from the region.
The U.S.-led military campaign has put the Islamic State group on defense, Killea said, adding, “There is progress.” Witnesses on the ground say the airstrikes and Kurdish ground actions are squeezing the militants in northern Syria, particularly in their self-proclaimed capital in Raqqa.
But U.S. intelligence agencies see the overall situation as a strategic stalemate: The Islamic State remains a well-funded extremist army able to replenish its ranks with foreign jihadis as quickly as the U.S. can eliminate them. Meanwhile, the group has expanded to other countries, including Libya, Egypt’s Sinai Peninsula and Afghanistan.
The assessments by the CIA, the Defense Intelligence Agency and others appear to contradict the optimistic line taken by the Obama administration’s special envoy, retired Gen. John Allen, who told a forum in Aspen, Colorado, last week that “ISIS is losing” in Iraq and Syria. The intelligence was described by officials who would not be named because they were not authorized to discuss it publicly.
“We’ve seen no meaningful degradation in their numbers,” a defense official said, citing intelligence estimates that put the group’s total strength at between 20,000 and 30,000, the same estimate as last August, when the airstrikes began.
The Islamic State’s staying power raises questions about the administration’s approach to the threat that the group poses to the U.S. and its allies. Although officials do not believe it is planning complex attacks on the West from its territory, the group’s call to Western Muslims to kill at home has become a serious problem, FBI Director James Comey and other officials say.
Yet under the Obama administration’s campaign of bombing and training, which prohibits American troops from accompanying fighters into combat or directing airstrikes from the ground, it could take a decade or more to drive the Islamic State from its safe havens, analysts say. The administration is adamant that it will commit no U.S. ground troops to the fight despite calls from some in Congress to do so.
The U.S.-led coalition and its Syrian and Kurdish allies have made some inroads. The Islamic State has lost 9.4 percent of its territory in the first six months of 2015, according to an analysis by the conflict monitoring group IHS.
A Delta Force raid in Syria that killed Islamic State financier Abu Sayyaf in May also has resulted in a well of intelligence about the group’s structure and finances, U.S. officials say. His wife, held in Iraq, has been cooperating with interrogators.
Syrian Kurdish fighters and their allies have wrested most of the northern Syria border from the Islamic State group, and the plan announced this week for a U.S.-Turkish “safe zone” is expected to cement those gains.
In Raqqa, U.S. coalition bombs pound the group’s positions and target its leaders with increasing regularity. The militants’ movements have been hampered by strikes against bridges, and some fighters are sending their families away to safer ground.
But American intelligence officials and other experts say the Islamic State is in no danger of being defeated any time soon.
“The pressure on Raqqa is significant … but looking at the overall picture, ISIS is mostly in the same place,” said Harleen Gambhir, a counterterrorism analyst at Institute for the Study of War, a Washington think tank.
Although U.S. officials have said it is crucial that the government in Baghdad win back disaffected Sunnis, there is little sign of that happening. American-led efforts to train Syrian rebels to fight the Islamic State have produced a grand total of 60 vetted fighters.
The militants have adjusted their tactics to thwart a U.S. bombing campaign that tries assiduously to avoid civilian casualties, officials say. Fighters no longer move around in easily targeted armored columns; they embed themselves among women and children, and they communicate through couriers to thwart eavesdropping and geolocation, the defense official said.
Oil continues to be a major revenue source. By one estimate, the Islamic State is clearing $500 million per year from oil sales, said Daniel Glaser, assistant secretary for terrorist financing at the Treasury Department. That’s on top of as much as $1 billion in cash the group seized from banks in its territory.
Although the U.S. has been bombing oil infrastructure, the militants have been adept at rebuilding oil refining, drilling and trading capacity, the defense official said.
The stalemate makes the battle for Ramadi all the more important.
Iraqi security forces, including 500 Sunni fighters, have begun preparing to retake the Sunni city, Killea said, and there have been 100 coalition airstrikes designed to support the effort. But he cautioned it will take time.
“Momentum,” he said, “is a better indicator of success than speed.”
Karam and Mroue reported from Beirut.
By KEN DILANIAN, ZEINA KARAM and BASSEM MROUE
Jul. 31, 2015 1:36 PM EDT
Find this story at 31 July 2015
© 2015 Associated Press
C.I.A. Cash Ended Up in Coffers of Al Qaeda26 augustus 2015
WASHINGTON — In the spring of 2010, Afghan officials struck a deal to free an Afghan diplomat held hostage by Al Qaeda. But the price was steep — $5 million — and senior security officials were scrambling to come up with the money.
They first turned to a secret fund that the Central Intelligence Agency bankrolled with monthly cash deliveries to the presidential palace in Kabul, according to several Afghan officials involved in the episode. The Afghan government, they said, had already squirreled away about $1 million from that fund.
Within weeks, that money and $4 million more provided from other countries was handed over to Al Qaeda, replenishing its coffers after a relentless C.I.A. campaign of drone strikes in Pakistan had decimated the militant network’s upper ranks.
“God blessed us with a good amount of money this month,” Atiyah Abd al-Rahman, the group’s general manager, wrote in a letter to Osama bin Laden in June 2010, noting that the cash would be used for weapons and other operational needs.
Photo
Abdul Khaliq Farahi, who was kidnapped by Al Qaeda in 2008. Credit Michael Kamber for The New York Times
Bin Laden urged caution, fearing the Americans knew about the payment and had laced the cash with radiation or poison, or were tracking it. “There is a possibility — not a very strong one — that the Americans are aware of the money delivery,” he wrote back, “and that they accepted the arrangement of the payment on the basis that the money will be moving under air surveillance.”
The C.I.A.’s contribution to Qaeda’s bottom line, though, was no well-laid trap. It was just another in a long list of examples of how the United States, largely because of poor oversight and loose financial controls, has sometimes inadvertently financed the very militants it is fighting.
While refusing to pay ransoms for Americans kidnapped by Al Qaeda, the Taliban or, more recently, the Islamic State, the United States has spent hundreds of billions of dollars over the last decade at war in Iraq and Afghanistan, some of which has been siphoned off to enemy fighters.
The letters about the 2010 ransom were included in correspondence between Bin Laden and Mr. Rahman that was submitted as evidence by federal prosecutors at the Brooklyn trial of Abid Naseer, a Pakistani Qaeda operative who was convicted this month of supporting terrorism and conspiring to bomb a British shopping center.
The letters were unearthed from the cache of computers and documents seized by Navy SEALs during the 2011 raid in which Bin Laden was killed in Abbottabad, Pakistan, and had been classified until introduced as evidence at the trial.
Details of the C.I.A.’s previously unreported contribution to the ransom demanded by Al Qaeda were drawn from the letters and from interviews with Afghan and Western officials speaking on the condition of anonymity because of the sensitivity of the issue. The C.I.A. declined to comment.
The diplomat freed in exchange for the cash, Abdul Khaliq Farahi, was serving as the Afghan consul general in Peshawar, Pakistan, when he was kidnapped in September 2008 as he drove to work. He had been weeks away from taking up his new job as Afghanistan’s ambassador to Pakistan.
Afghan and Pakistani insurgents had grabbed Mr. Farahi, but within days they turned him over to Qaeda members. He was held for more than two years.
The Afghan government had no direct contact with Al Qaeda, stymieing negotiations until the Haqqani network, an Afghan insurgent faction with close ties to Al Qaeda, stepped in to mediate.
Qaeda leaders wanted some captive militants released, and from the letters it appeared that they calibrated their offer, asking only for men held by Afghan authorities, not those imprisoned by the Americans, who would refuse the demand as a matter of policy. But the Afghans refused to release any prisoners, “so we decided to proceed with a financial exchange,” Mr. Rahman wrote in the June 2010 letter. “The amount we agreed on in the deal was $5 million.”
Photo
A 2009 surveillance video image of Abid Naseer, right, who was convicted this month in a bombing plot. Credit U.S. Attorney’s Office, via Associated Press
The first $2 million was delivered shortly before that letter was written. In it, Mr. Rahman asked Bin Laden if he needed money, and said “we have also designated a fair amount to strengthen the organization militarily by stockpiling good weapons.” (The Qaeda leaders named in the letters were identified by aliases. Bin Laden, for instance, signed his letters Zamray; Mr. Rahman, who was killed in a drone strike in Pakistan in August 2011, went by the alias Mahmud.)
The cash would also be used to aid the families of Qaeda fighters held prisoner in Afghanistan, and some was given to Ayman al-Zawahri, who would succeed Bin Laden as the Qaeda leader and was identified in the letters under the alias Abu-Muhammad, Mr. Rahman said.
Other militant groups had already heard about the ransom payment and had their hands out, Mr. Rahman reported. “As you know, you cannot control the news,” he wrote. “They are asking us to give them money, may God help us.”
But Bin Laden was clearly worried that the payout was an American ruse intended to reveal the locations of senior Qaeda leaders. “It seems a bit strange somewhat because in a country like Afghanistan, usually they would not pay this kind of money to free one of their men,” he wrote.
“Is any of his relatives a big official?” he continued, referring to Mr. Farahi, the diplomat. It was a prescient question: Mr. Farahi was the son-in-law of a man who had served as a mentor to then-President Hamid Karzai.
Advocating caution, Bin Laden advised Mr. Rahman to change the money into a different currency at one bank, and then go to another and exchange the money again into whatever currency was preferred. “The reason for doing that is to be on the safe side in case harmful substances or radiation is put on paper money,” Bin Laden wrote.
Neither of the two men appeared to have known where the money actually came from. Aside from the C.I.A. money, Afghan officials said that Pakistan contributed nearly half the ransom in an effort to end what it viewed as a disruptive sideshow in its relations with Afghanistan. The remainder came from Iran and Persian Gulf states, which had also contributed to the Afghan president’s secret fund.
In a letter dated Nov. 23, 2010, Mr. Rahman reported to Bin Laden that the remaining $3 million had been received and that Mr. Farahi had been released.
The C.I.A., meanwhile, continued dropping off bags of cash — ranging each time from a few hundred thousand dollars to more than $1 million — at the presidential palace every month until last year, when Mr. Karzai stepped down.
The money was used to buy the loyalty of warlords, legislators and other prominent — and potentially troublesome — Afghans, helping the palace finance a vast patronage network that secured Mr. Karzai’s power base. It was also used to cover expenses that needed to be kept off the books, such as clandestine diplomatic trips, and for more mundane costs, including rent payments for the guesthouses where some senior officials lived.
The cash flow has slowed since a new president, Ashraf Ghani, assumed office in September, Afghan officials said, refusing to elaborate. But they added that cash was still coming in, and that it was not clear how robust any current American constraints on it are.
“It’s cash,” said a former Afghan security official. “Once it’s at the palace, they can’t do a thing about how it gets spent.”
By MATTHEW ROSENBERGMARCH 14, 2015
Find this story 14 March 2015
© 2015 The New York Times Company HomeSearch
ISIS fighter was trained by State Department26 augustus 2015
Washington (CNN) An ISIS fighter who calls for jihad in a new online video was trained in counterterrorism tactics on American soil, in a program run by the United States, officials tell CNN.
The video features a former police commander from Tajikistan named Col. Gulmurod Khalimov. He appears in black ISIS garb with a sniper rifle and a bandolier of ammunition. He says in the video that he participated in programs on U.S. soil three times, at least one of which was in Louisiana.
The State Department has confirmed this claim.
“From 2003-2014 Colonel Khalimov participated in five counterterrorism training courses in the United States and in Tajikistan, through the Department of State’s Diplomatic Security/Anti-Terrorism Assistance program,” said spokeswoman Pooja Jhunjhunwala.
The program is intended to train candidates from participating countries in the latest counterterrorism tactics, so they can fight the very kind of militants that Khalimov has now joined.
A State Department official said Khalimov was trained in crisis response, tactical management of special events, tactical leadership training and related issues.
In the video, Khalimov says that what he saw during his training sessions turned him against his sponsors.
“Listen, you American pigs: I’ve been to America three times. I saw how you train soldiers to kill Muslims,” he says in Russian. “You taught your soldiers how to surround and attack, in order to exterminate Islam and Muslims.”
Then, in the most chilling part of the 10-minute video, he looks directly into the camera and says, “God willing, we will find your towns, we will come to your homes, and we will kill you.”
He then demonstrates his dexterity with a sniper rifle by blowing apart a tomato from a distance of perhaps 25 yards. The scene is played in slow motion.
Who are the women of ISIS?
The American program in which Khalimov participated is designed to teach tactics used by police and military units against terrorists by countries that cooperate with the United States on security matters. But now experts are concerned that this defector has brought ISIS not only a propaganda victory, but also an insider’s knowledge of the playbook the United States is using in the fight against ISIS.
“That is a dangerous capability,” said former Army intelligence officer Michael Breen. “It’s never a good thing to have senior counterterrorism people become terrorists.”
“It sounds like he was involved in defending sensitive people and sensitive targets,” said Breen, who is now with the Truman Project in Washington. “He knows how to plan counterterrorism operations. So he knows how the people who protect a high-value target will be thinking; he knows how people who protect an embassy would be thinking.”
Former Army sniper Paul Scharre, now with the Center for a New American Security, said Khalimov could not only help train other ISIS fighters in tactics, but also serve as a recruiter for the group.
“They’re obviously trying to draw in recruits” with the video, he said.
War against ISIS: Successes and failures
Khalimov was an officer of the primary counterterrorism unit which responds to terrorist threats in Tajikistan, a State Department official said, so he and other members of his unit were recommended for the program by the Tajik government.
“All appropriate Leahy vetting was undertaken in advance of this training,” said spokeswoman Jhunjhunwala.
Scharre, who has served as a trainer of Afghan soldiers in Afghanistan, says there is always a risk that a trainee will turn against their American instructors.
But Breen, who has also participated in training sessions overseas, said building counterterrorism partners requires a necessary leap of faith. “There’s absolutely no way to beat an opponent like the Islamic State, without training a lot of people,” he said. “That’s a core of our strategy.”
By Dugald McConnell and Brian Todd, CNN
Updated 1804 GMT (0104 HKT) May 30, 2015 | Video Source: CNN
Find this story at 30 May 2015
© 2015 Cable News Network.
Inquiry Weighs Whether ISIS Analysis Was Distorted26 augustus 2015
WASHINGTON — The Pentagon’s inspector general is investigating allegations that military officials have skewed intelligence assessments about the United States-led campaign in Iraq against the Islamic State to provide a more optimistic account of progress, according to several officials familiar with the inquiry.
The investigation began after at least one civilian Defense Intelligence Agency analyst told the authorities that he had evidence that officials at United States Central Command — the military headquarters overseeing the American bombing campaign and other efforts against the Islamic State — were improperly reworking the conclusions of intelligence assessments prepared for policy makers, including President Obama, the government officials said.
Fuller details of the claims were not available, including when the assessments were said to have been altered and who at Central Command, or Centcom, the analyst said was responsible. The officials, speaking only on the condition of anonymity about classified matters, said that the recently opened investigation focused on whether military officials had changed the conclusions of draft intelligence assessments during a review process and then passed them on.
Photo
Iraqi Army recruits in Taji in April with U.S. Army trainers. About 3,400 American troops are advising Iraqi forces. Credit John Moore/Getty Images
The prospect of skewed intelligence raises new questions about the direction of the government’s war with the Islamic State, and could help explain why pronouncements about the progress of the campaign have varied widely.
Legitimate differences of opinion are common and encouraged among national security officials, so the inspector general’s investigation is an unusual move and suggests that the allegations go beyond typical intelligence disputes. Government rules state that intelligence assessments “must not be distorted” by agency agendas or policy views. Analysts are required to cite the sources that back up their conclusions and to acknowledge differing viewpoints.
Under federal law, intelligence officials can bring claims of wrongdoing to the intelligence community’s inspector general, a position created in 2011. If officials find the claims credible, they are required to advise the House and Senate Intelligence Committees. That occurred in the past several weeks, the officials said, and the Pentagon’s inspector general decided to open an investigation into the matter.
Spokeswomen for both inspectors general declined to comment for this article. The Defense Intelligence Agency and the White House also declined to comment.
Col. Patrick Ryder, a Centcom spokesman, said he could not comment on a continuing inspector general investigation but said “the I.G. has a responsibility to investigate all allegations made, and we welcome and support their independent oversight.”
Numerous agencies produce intelligence assessments related to the Iraq war, including the Defense Intelligence Agency, the Central Intelligence Agency and others. Colonel Ryder said it was customary for them to make suggestions on one another’s drafts. But he said each agency had the final say on whether to incorporate those suggestions. “Further, the multisource nature of our assessment process purposely guards against any single report or opinion unduly influencing leaders and decision makers,” he said.
It is not clear how that review process changes when Defense Intelligence Agency analysts are assigned to work at Centcom — which has headquarters both in Tampa, Fla., and Qatar — as was the case of at least one of the analysts who have spoken to the inspector general. In the years since the Sept. 11, 2001, attacks, the Pentagon has relocated more Defense Intelligence Agency analysts from the agency’s Washington headquarters to military commands around the globe, so they can work more closely with the generals and admirals in charge of the military campaigns.
Mr. Obama last summer authorized a bombing campaign against the Islamic State, and approximately 3,400 American troops are currently in Iraq advising and training Iraqi forces. The White House has been reluctant, though, to recommit large numbers of ground troops to Iraq after announcing an “end” to the Iraq war in 2009.
The bombing campaign over the past year has had some success in allowing Iraqi forces to reclaim parts of the country formerly under the group’s control, but important cities like Mosul and Ramadi remain under Islamic State’s control. There has been very little progress in wresting the group’s hold over large parts of Syria, where the United States has done limited bombing.
Some senior American officials in recent weeks have provided largely positive public assessments about the progress of the military campaign against the Islamic State, a Sunni terrorist organization that began as an offshoot of Al Qaeda but has since severed ties and claimed governance of a huge stretch of land across Iraq and Syria. The group is also called ISIS or ISIL.
Continue reading the main story
Obama’s Evolution on ISIS
Some of President Obama’s statements about the American strategy to confront ISIS and its effectiveness.
In late July, retired Gen. John Allen — who is Mr. Obama’s top envoy working with other nations to fight the Islamic State — told the Aspen Security Forum that the terror group’s momentum had been “checked strategically, operationally, and by and large, tactically.”
“ISIS is losing,” he said, even as he acknowledged that the campaign faced numerous challenges — from blunting the Islamic State’s message to improving the quality of Iraqi forces.
During a news briefing last week, Defense Secretary Ashton B. Carter was more measured. He called the war “difficult” and said “it’s going to take some time.” But, he added, “I’m confident that we will succeed in defeating ISIL and that we have the right strategy.”
But recent intelligence assessments, including some by Defense Intelligence Agency, paint a sober picture about how little the Islamic State has been weakened over the past year, according to officials with access to the classified assessments. They said the documents conclude that the yearlong campaign has done little to diminish the ranks of the Islamic State’s committed fighters, and that the group over the last year has expanded its reach into North Africa and Central Asia.
Critics of the Obama administration’s strategy have argued that a bombing campaign alone — without a significant infusion of American ground troops — is unlikely to ever significantly weaken the terror group. But it is not clear whether Defense Intelligence Agency analysts concluded that more American troops would make an appreciable difference.
In testimony on Capitol Hill this year, Lt. Gen. Vincent R. Stewart, the agency’s director, said sending ground troops back into Iraq risked transforming the conflict into one between the West and ISIS, which would be “the best propaganda victory that we could give.”
“It’s both expected and helpful if there are dissenting viewpoints about conflicts in foreign countries,” said Micah Zenko, a fellow at the Council on Foreign Relations and author of a forthcoming book, “Red Team,” that includes an examination of alternative analysis within American intelligence agencies. What is problematic, he said, “is when a dissenting opinion is not given to policy makers.”
The Defense Intelligence Agency was created in 1961, in part to avoid what Robert McNamara, the Secretary of Defense at the time, called “service bias.” During the 1950s, the United States grossly overestimated the size of the Soviet missile arsenal, a miscalculation that was fueled in part by the Air Force, which wanted more money for its own missile systems.
During the Vietnam War, the Defense Intelligence Agency repeatedly warned that even a sustained military campaign was unlikely to defeat the North Vietnamese forces. But according to an internal history of the agency, its conclusions were repeatedly overruled by commanders who were certain that the United States was winning, and that victory was just a matter of applying more force.
“There’s a built-in tension for the people who work at D.I.A., between dispassionate analysis and what command wants,” said Paul R. Pillar, a retired senior Central Intelligence Agency analyst who years ago accused the Bush administration of distorting intelligence assessments about Iraq’s weapons programs before the beginning of the Iraq war in 2003.
“You’re part of a large structure that does have a vested interest in portraying the overall mission as going well,” he said.
By MARK MAZZETTI and MATT APUZZOAUG. 25, 2015
Find this story at 25 August 2015
© 2015 The New York Times Company
<< oudere artikelen nieuwere artikelen >>