Former FBI agent missing in Iran photographed in Guantánamo jumpsuit (January 2013)23 december 2013
The family of retired FBI agent Robert Levinson, who went missing in Iran in 2007, have released pictures of him dressed in an orange jumpsuit like a Guantánamo Bay prisoner, as they continue to hold hope that he is still alive.
The five photographs were taken in April 2011, just months after the family also received a video that was emailed anonymously.
Mr Levinson, a private investigator, disappeared in 2007 on the Iranian island of Kish. The Iranian government has repeatedly denied knowing anything about his disappearance.
However, the consensus among US officials involved in the case is that despite years of denials, Iran’s intelligence service was almost certainly behind the 54-second video and five photographs.
An expert on Russian organised crime, Mr Levinson, who would now be 64, retired from the FBI in 1998 and became a private investigator. He was investigating cigarette smuggling in early 2007, and his family has said that took him to the Iranian island of Kish, where he was last seen.Kish is a popular resort area and a hotbed of smuggling and organised crime. It is also a free-trade zone, meaning US citizens do not need visas to travel there.
Mr Levinson’s wife, Christine, decided to release the images because she felt her husband’s disappearance was not getting the attention it deserves from the US government.
“There isn’t any pressure on Iran to resolve this,” she said. “It’s been much too long.”
She said that because her husband disappeared in Iran, she believes he is still being held there.
“It needs to come front and centre again,” she told The Associated Press. “There needs to be a lot more public outcry.”
She said she has met with Barack Obama and John Brennan, the president’s nominee to head the CIA. She said that both men had pledged to do everything they could to free her husband. Now, nearly six years after his disappearance, she thinks Iran is being let off the hook.
“He’s a good man,” she said. “He just doesn’t deserve this.”
FBI spokeswoman Jacqueline Maguire said: “As we near the sixth anniversary of his disappearance, the FBI remains committed to bringing Bob home safely to his family.”
By Barney Henderson
8:44PM GMT 08 Jan 2013
Find this story at 8 January 2013
© Copyright of Telegraph Media Group Limited 2013
WikiLeaks: Vanished FBI officer Robert Levinson ‘held by Iranian Revolutionary Guards’ (February 2011)23 december 2013
A former FBI officer who disappeared in mysterious circumstances in Iran four years ago has been held by the country’s Revolutionary Guard, the cables suggest.
Robert Levinson vanished in 2007 while working as a private investigator on Kish Island, a popular tourist resort in the Persian Gulf. Since then the Tehran regime has rebuffed all efforts from his family to discover his fate, insisting it has no information.
But testimony from a political prisoner who managed to flee the country casts doubt on the official Iranian line and indicates that Mr Levinson may have spent time in one of the Revolutionary Guard’s notorious secret jails.
The informant, who was detained in August 2009 amid the civil unrest sparked by the country’s disputed presidential elections, claims that he saw the words “B. LEVINSON” written on the frame of his cell, beneath three lines of English which he assumed to be a “plea for help”.
The American diplomat who interviewed the source two months later wrote to Washington: “He said that at the time he did not know who Levinson was and only after his release did he use the search engine Google to find that Levinson was a missing American citizen.”
While unable to provide information on the American’s current whereabouts, the prisoner painted a bleak picture of conditions in the Tehran jail, which he described as having a “smell of blood”.
During his four-day ordeal, the source claims that guards burned him with cigarettes and subjected him to sexual assaults.
The US is generally sceptical of information supplied by untested sources, wary of those who concoct false intelligence in the hope of financial reward or assistance with asylum applications.
But the diplomat who interviewed the source noted that he “asked us for no favours” and gave no indication of dishonest motives.
Mr Levinson, who would now be 62, was reportedly investigating a cigarette-smuggling ring when he disappeared in March 2007. The US has always denied he was still working for the FBI.
By Matthew Moore
6:30AM GMT 03 Feb 2011
Find this story at 3 February 2011
© Copyright of Telegraph Media Group Limited 2013
Meet the Spies Doing the NSA’s Dirty Work; This obscure FBI unit does the domestic surveillance that no other intelligence agency can touch.3 december 2013
With every fresh leak, the world learns more about the U.S. National Security Agency’s massive and controversial surveillance apparatus. Lost in the commotion has been the story of the NSA’s indispensable partner in its global spying operations: an obscure, clandestine unit of the Federal Bureau of Investigation that, even for a surveillance agency, keeps a low profile.
When the media and members of Congress say the NSA spies on Americans, what they really mean is that the FBI helps the NSA do it, providing a technical and legal infrastructure that permits the NSA, which by law collects foreign intelligence, to operate on U.S. soil. It’s the FBI, a domestic U.S. law enforcement agency, that collects digital information from at least nine American technology companies as part of the NSA’s Prism system. It was the FBI that petitioned the Foreign Intelligence Surveillance Court to order Verizon Business Network Services, one of the United States’ biggest telecom carriers for corporations, to hand over the call records of millions of its customers to the NSA.
But the FBI is no mere errand boy for the United States’ biggest intelligence agency. It carries out its own signals intelligence operations and is trying to collect huge amounts of email and Internet data from U.S. companies — an operation that the NSA once conducted, was reprimanded for, and says it abandoned.
The heart of the FBI’s signals intelligence activities is an obscure organization called the Data Intercept Technology Unit, or DITU (pronounced DEE-too). The handful of news articles that mentioned it prior to revelations of NSA surveillance this summer did so mostly in passing. It has barely been discussed in congressional testimony. An NSA PowerPoint presentation given to journalists by former NSA contractor Edward Snowden hints at DITU’s pivotal role in the NSA’s Prism system — it appears as a nondescript box on a flowchart showing how the NSA “task[s]” information to be collected, which is then gathered and delivered by the DITU.
But interviews with current and former law enforcement officials, as well as technology industry representatives, reveal that the unit is the FBI’s equivalent of the National Security Agency and the primary liaison between the spy agency and many of America’s most important technology companies, including Google, Facebook, YouTube, and Apple.
The DITU is located in a sprawling compound at Marine Corps Base Quantico in Virginia, home of the FBI’s training academy and the bureau’s Operational Technology Division, which runs all the FBI’s technical intelligence collection, processing, and reporting. Its motto: “Vigilance Through Technology.” The DITU is responsible for intercepting telephone calls and emails of terrorists and foreign intelligence targets inside the United States. According to a senior Justice Department official, the NSA could not do its job without the DITU’s help. The unit works closely with the “big three” U.S. telecommunications companies — AT&T, Verizon, and Sprint — to ensure its ability to intercept the telephone and Internet communications of its domestic targets, as well as the NSA’s ability to intercept electronic communications transiting through the United States on fiber-optic cables.
For Prism, the DITU maintains the surveillance equipment that captures what the NSA wants from U.S. technology companies, including archived emails, chat-room sessions, social media posts, and Internet phone calls. The unit then transmits that information to the NSA, where it’s routed into other parts of the agency for analysis and used in reports.
After Prism was disclosed in the Washington Post and the Guardian, some technology company executives claimed they knew nothing about a collection program run by the NSA. And that may have been true. The companies would likely have interacted only with officials from the DITU and others in the FBI and the Justice Department, said sources who have worked with the unit to implement surveillance orders.
“The DITU is the main interface with providers on the national security side,” said a technology industry representative who has worked with the unit on many occasions. It ensures that phone companies as well as Internet service and email providers are complying with surveillance law and delivering the information that the government has demanded and in the format that it wants. And if companies aren’t complying or are experiencing technical difficulties, they can expect a visit from the DITU’s technical experts to address the problem.
* * *
Recently, the DITU has helped construct data-filtering software that the FBI wants telecom carriers and Internet service providers to install on their networks so that the government can collect large volumes of data about emails and Internet traffic.
The software, known as a port reader, makes copies of emails as they flow through a network. Then, in practically an instant, the port reader dissects them, removing only the metadata that has been approved by a court.
The FBI has built metadata collection systems before. In the late 1990s, it deployed the Carnivore system, which the DITU helped manage, to pull header information out of emails. But the FBI today is after much more than just traditional metadata — who sent a message and who received it. The FBI wants as many as 13 individual fields of information, according to the industry representative. The data include the route a message took over a network, Internet protocol addresses, and port numbers, which are used to handle different kinds of incoming and outgoing communications. Those last two pieces of information can reveal where a computer is physically located — perhaps along with its user — as well as what types of applications and operating system it’s running. That information could be useful for government hackers who want to install spyware on a suspect’s computer — a secret task that the DITU also helps carry out.
The DITU devised the port reader after law enforcement officials complained that they weren’t getting enough information from emails and Internet traffic. The FBI has argued that under the Patriot Act, it has the authority to capture metadata and doesn’t need a warrant to get them. Some federal prosecutors have gone to court to compel port reader adoption, the industry representative said. If a company failed to comply with a court order, it could be held in contempt.
The FBI’s pursuit of Internet metadata bears striking similarities to the NSA’s efforts to obtain the same information. After the 9/11 terrorist attacks, the agency began collecting the information under a secret order signed by President George W. Bush. Documents that were declassified Nov. 18 by Barack Obama’s administration show that the agency ran afoul of the Foreign Intelligence Surveillance Court after it discovered that the NSA was collecting more metadata than the court had allowed. The NSA abandoned the Internet metadata collection program in 2011, according to administration officials.
But the FBI has been moving ahead with its own efforts, collecting more metadata than it has in the past. It’s not clear how many companies have installed the port reader, but at least two firms are pushing back, arguing that because it captures an entire email, including content, the government needs a warrant to get the information. The government counters that the emails are only copied for a fraction of a second and that no content is passed along to the government, only metadata. The port reader is designed also to collect information about the size of communications packets and traffic flows, which can help analysts better understand how communications are moving on a network. It’s unclear whether this data is considered metadata or content; it appears to fall within a legal gray zone, experts said.
* * *
The DITU also runs a bespoke surveillance service, devising or building technology capable of intercepting information when the companies can’t do it themselves. In the early days of social media, when companies like LinkedIn and Facebook were starting out, the unit worked with companies on a technical solution for capturing information about a specific target without also capturing information related to other people to whom the target was connected, such as comments on posts, shared photographs, and personal data from other people’s profiles, according to a technology expert who was involved in the negotiations.
The technicians and engineers who work at the DITU have to stay up to date on the latest trends and developments in technology so that the government doesn’t find itself unable to tap into a new system. Many DITU employees used to work for the telecom companies that have to implement government surveillance orders, according to the industry representative. “There are a lot of people with inside knowledge about how telecommunications work. It’s probably more intellectual property than the carriers are comfortable with the FBI knowing.”
The DITU has also intervened to ensure that the government maintains uninterrupted access to the latest commercial technology. According to the Guardian, the unit worked with Microsoft to “understand” potential obstacles to surveillance in a new feature of Outlook.com that let users create email aliases. At the time, the NSA wanted to make sure that it could circumvent Microsoft’s encryption and maintain access to Outlook messages. In a statement to the Guardian, Microsoft said, “When we upgrade or update products we aren’t absolved from the need to comply with existing or future lawful demands.” It’s the DITU’s job to help keep companies in compliance. In other instances, the unit will go to companies that manufacture surveillance software and ask them to build in particular capabilities, the industry representative said.
The DITU falls under the FBI’s Operational Technology Division, home to agents, engineers, electronic technicians, computer forensics examiners, and analysts who “support our most significant investigations and national security operations with advanced electronic surveillance, digital forensics, technical surveillance, tactical operations, and communications capabilities,” according to the FBI’s website. Among its publicly disclosed capabilities are surveillance of “wireline, wireless, and data network communication technologies”; collection of digital evidence from computers, including audio files, video, and images; “counter-encryption” support to help break codes; and operation of what the FBI claims is “the largest fixed land mobile radio system in the U.S.”
The Operational Technology Division also specializes in so-called black-bag jobs to install surveillance equipment, as well as computer hacking, referred to on the website as “covert entry/search capability,” which is carried out under law enforcement and intelligence warrants.
The tech experts at Quantico are the FBI’s silent cybersleuths. “While [the division’s] work doesn’t typically make the news, the fruits of its labor are evident in the busted child pornography ring, the exposed computer hacker, the prevented bombing, the averted terrorist plot, and the prosecuted corrupt official,” according to the website.
According to former law enforcement officials and technology industry experts, the DITU is among the most secretive and sophisticated outfits at Quantico. The FBI declined Foreign Policy’s request for an interview about the unit. But in a written statement, an FBI spokesperson said it “plays a key role in providing technical expertise, services, policy guidance, and support to the FBI and the intelligence community in collecting evidence and intelligence through the use of lawfully authorized electronic surveillance.”
In addition to Carnivore, the DITU helped develop early FBI Internet surveillance tools with names like CoolMiner, Packeteer, and Phiple Troenix. One former law enforcement official said the DITU helped build the FBI’s Magic Lantern keystroke logging system, a device that could be implanted on a computer and clandestinely record what its user typed. The system was devised to spy on criminals who had encrypted their communications. It was part of a broader surveillance program known as Cyber Knight.
In 2007, Wired reported that the FBI had built another piece of surveillance malware to track the source of a bomb threat against a Washington state high school. Called a “computer and Internet protocol address verifier,” it was able to collect details like IP addresses, a list of programs running on an infected computer, the operating system it was using, the last web address visited, and the logged-in user name. The malware was handled by the FBI’s Cryptologic and Electronic Analysis Unit, located next door to the DITU’s facilities at Quantico. Wired reported that information collected by the malware from its host was sent via the Internet to Quantico.
The DITU has also deployed what the former law enforcement official described as “beacons,” which can be implanted in emails and, when opened on a target’s computer, can record the target’s IP address. The former official said the beacons were first deployed to track down kidnappers.
* * *
Lately, one of the DITU’s most important jobs has been to keep track of surveillance operations, particularly as part of the NSA’s Prism system, to ensure that companies are producing the information that the spy agency wants and that the government has been authorized to obtain.
The NSA is the most frequent requester of the DITU’s services, sources said. There is a direct fiber-optic connection between Quantico and the agency’s headquarters at Fort Meade, Maryland; data can be moved there instantly. From the companies’ perspective, it doesn’t much matter where the information ends up, so long as the government shows up with a lawful order to get it.
“The fact that either the targets are coming from the NSA or the output goes to the NSA doesn’t matter to us. We’re being compelled. We’re not going to do any more than we have to,” said one industry representative.
But having the DITU act as a conduit provides a useful public relations benefit: Technology companies can claim — correctly — that they do not provide any information about their customers directly to the NSA, because they give it to the DITU, which in turn passes it to the NSA.
But in the government’s response to the controversy that has erupted over government surveillance programs, FBI officials have been conspicuously absent. Robert Mueller, who stepped down as the FBI’s director in September, testified before Congress about disclosed surveillance only twice, and that was in June, before many of the NSA documents that Snowden leaked had been revealed in the media. On Nov. 14, James Comey gave his first congressional testimony as the FBI’s new director, and he was not asked about the FBI’s involvement in surveillance operations that have been attributed to the NSA. Attorney General Eric Holder has made few public comments about surveillance. (His deputy has testified several times.)
The former law enforcement official said Holder and Mueller should have offered testimony and explained how the FBI works with the NSA. He was concerned by reports that the NSA had not been adhering to its own minimization procedures, which the Justice Department and the FBI review and vouch for when submitting requests to the Foreign Intelligence Surveillance Court.
“Where they hadn’t done what was represented to the court, that’s unforgivable. That’s where I got sick to my stomach,” the former law enforcement official said. “The government’s position is, we go to the court, apply the law — it’s all approved. That makes for a good story until you find out what was approved wasn’t actually what was done.”
BY SHANE HARRIS | NOVEMBER 21, 2013
Find this story at 21 November 2013
©2013 The Slate Group, LLC.
FBI Pursuing Real-Time Gmail Spying Powers as “Top Priority” for 20133 december 2013
For now, law enforcement has trouble monitoring Gmail communications in real time
Despite the pervasiveness of law enforcement surveillance of digital communication, the FBI still has a difficult time monitoring Gmail, Google Voice, and Dropbox in real time. But that may change soon, because the bureau says it has made gaining more powers to wiretap all forms of Internet conversation and cloud storage a “top priority” this year.
Last week, during a talk for the American Bar Association in Washington, D.C., FBI general counsel Andrew Weissmann discussed some of the pressing surveillance and national security issues facing the bureau. He gave a few updates on the FBI’s efforts to address what it calls the “going dark” problem—how the rise in popularity of email and social networks has stifled its ability to monitor communications as they are being transmitted. It’s no secret that under the Electronic Communications Privacy Act, the feds can easily obtain archive copies of emails. When it comes to spying on emails or Gchat in real time, however, it’s a different story.
That’s because a 1994 surveillance law called the Communications Assistance for Law Enforcement Act only allows the government to force Internet providers and phone companies to install surveillance equipment within their networks. But it doesn’t cover email, cloud services, or online chat providers like Skype. Weissmann said that the FBI wants the power to mandate real-time surveillance of everything from Dropbox and online games (“the chat feature in Scrabble”) to Gmail and Google Voice. “Those communications are being used for criminal conversations,” he said.
While it is true that CALEA can only be used to compel Internet and phone providers to build in surveillance capabilities into their networks, the feds do have some existing powers to request surveillance of other services. Authorities can use a “Title III” order under the “Wiretap Act” to ask email and online chat providers furnish the government with “technical assistance necessary to accomplish the interception.” However, the FBI claims this is not sufficient because mandating that providers help with “technical assistance” is not the same thing as forcing them to “effectuate” a wiretap. In 2011, then-FBI general counsel Valerie Caproni—Weissmann’s predecessor—stated that Title III orders did not provide the bureau with an “effective lever” to “encourage providers” to set up live surveillance quickly and efficiently. In other words, the FBI believes it doesn’t have enough power under current legislation to strong-arm companies into providing real-time wiretaps of communications.
Because Gmail is sent between a user’s computer and Google’s servers using SSL encryption, for instance, the FBI can’t intercept it as it is flowing across networks and relies on the company to provide it with access. Google spokesman Chris Gaither hinted that it is already possible for the company to set up live surveillance under some circumstances. “CALEA doesn’t apply to Gmail but an order under the Wiretap Act may,” Gaither told me in an email. “At some point we may expand our transparency report to cover this topic in more depth, but until then I’m not able to provide additional information.”
Either way, the FBI is not happy with the current arrangement and is on a crusade for more surveillance authority. According to Weissmann, the bureau is working with “members of intelligence community” to craft a proposal for new Internet spy powers as “a top priority this year.” Citing security concerns, he declined to reveal any specifics. “It’s a very hard thing to talk about publicly,” he said, though acknowledged that “it’s something that there should be a public debate about.”
Ryan Gallagher is a journalist who reports from the intersection of surveillance, national security, and privacy for Slate’s Future Tense blog. He is also a Future Tense fellow at the New America Foundation.
By Ryan Gallagher
Find this story at 26 March 2013
© 2013 The Slate Group, LLC.
Is NSA Prism the New FBI Carnivore?3 december 2013
From the ‘Uncle Sam is Watching’ files:
Lots of concern and talk in the last couple of days over the Washington Post’s leaked government story on PRISM.
The TL;dr version is that PRISM was/is an NSA operation that routes American’s private information to the NSA where it can be analyzed in the interest of national security.
While the revelation about NSA PRISM is new – the fact that the U.S. Government has active programs to surveil the Internet for email and otherwise is not.
Back in 2005 it was revealed that the FBI had to abandon it’s own Internet surveillance effort known as Carnivore. With Carnivore, the FBI was quite literally injesting email and Internet content en masse from the U.S .
Officially known as the Digital Collection System 1000 (DCS-1000), Carnivore captures data traffic that flows through an Internet service provider (ISP). The system prompted a flurry of criticism from privacy advocates when it was announced in 2000 during the Clinton administration.
At the time that Carnivore was shut down, the Electronic Privacy Information Center (EPIC) speculated that, “FBI’s need for Carnivore-like Internet surveillance tools is decreasing, likely because ISPs are providing Internet traffic information directly to the government.”
Eight years later, it looks like EPIC was right – since it would appear based on the WaPo report that the NSA has been getting info directly from providers.
I saw the head of the NSA, General Alexander speak at Defcon last year and he’s slotted to speak as a keynote at Black Hat this year. I wonder if he’ll actually show up now given the revelation of PRISM.
By Sean Michael Kerner | June 06, 2013
Find this story at 6 June 2013
Copyright 2013 QuinStreet Inc.
FBI retires its Carnivore (2005)3 december 2013
FBI surveillance experts have put their once-controversial Carnivore Internet surveillance tool out to pasture, preferring instead to use commercial products to eavesdrop on network traffic, according to documents released Friday.
Two reports to Congress obtained by the Washington-based Electronic Privacy Information Center under the Freedom of Information Act reveal that the FBI didn’t use Carnivore, or its rebranded version “DCS-1000,” at all during the 2002 and 2003 fiscal years. Instead, the bureau turned to unnamed commercially-available products to conduct Internet surveillance thirteen times in criminal investigations in that period.
Carnivore became a hot topic among civil libertarians, some network operators and many lawmakers in 2000, when an ISP’s legal challenge brought the surveillance tool’s existence to light. One controversy revolved around the FBI’s legally-murky use of the device to obtain e-mail headers and other information without a wiretap warrant — an issue Congress resolved by explicitly legalizing the practice in the 2001 USA PATRIOT Act.
Under section 216 of the act, the FBI can conduct a limited form of Internet surveillance without first visiting a judge and establishing probable cause that the target has committed a crime. In such cases the FBI is authorized to capture routing information like e-mail addresses or IP addresses, but not the contents of the communications.
According to the released reports, the bureau used that power three times in 2002 and six times in 2003 in cases in which it brought its own Internet surveillance gear to the job. Each of those surveillance operations lasted sixty days or less, except for one investigation into alleged extortion, arson and “teaching of others how to make and use destructive devices” that ran over eight months from January 10th to August 26th, 2002.
Other cases investigated under section 216 involved alleged mail fraud, controlled substance sales, providing material support to terrorism, and making obscene or harassing telephone calls within the District of Columbia. The surveillance targets’ names are not listed in the reports.
In four additional cases, twice each in 2002 and 2003, the FBI obtained a full-blown Internet wiretap warrant from a judge, permitting them to capture the contents of a target’s Internet communications in real time. No more information on those cases is provided in the reports because they involved “sensitive investigations,” according to the bureau.
The new documents only enumerate criminal investigations in which the FBI deployed a government-owned surveillance tool, not those in which an ISP used its own equipment to facilitate the spying. Cases involving foreign espionage or international terrorism are also omitted.
Developed by a contractor, Carnivore was a customizable packet sniffer that, in conjunction with other FBI tools, could capture e-mail messages, and reconstruct Web pages exactly as a surveillance target saw them while surfing the Web. FBI agents lugged it with them to ISPs that lacked their own spying capability.
Kevin Poulsen, SecurityFocus 2005-01-14
Find this story at 14 January 2005
Copyright 2010, SecurityFocus
EarthLink Says It Refuses to Install FBI’s Carnivore Surveillance Device (2000)3 december 2013
One of the nation’s largest Internet-service providers, EarthLink Inc., has refused toinstall a new Federal Bureau of Investigation electronic surveillance device on its network, saying technical adjustments required to use the device caused disruptions for customers.
The FBI has used Carnivore, as the surveillance device is called, in a number of criminal investigations. But EarthLink is the first ISP to offer a public account of an actual experience with Carnivore. The FBI has claimed that Carnivore won’t interfere with an ISP’s operations.
“It has the potential to hurt our network, to bring pieces of it down,” Steve Dougherty, EarthLink’s director of technology acquisition, said of Carnivore. “It could impact thousands of people.”
While EarthLink executives said they would continue to work with authorities in criminal investigations, they vowed not to allow the FBI to install Carnivore on the company’s network. The company also has substantial privacy concerns.
EarthLink has already voiced its concerns in court. The ISP is the plaintiff in a legal fight launched against Carnivore earlier this year with the help of attorney Robert Corn-Revere, according to people close to the case. Previously, the identity of the plaintiff in the case, which is under seal, wasn’t known. A federal magistrate ruled against EarthLink in the case early this year, forcing it to give the FBI access to its system. Mr. Corn-Revere declined to comment.
EarthLink’s problems with Carnivore began earlier this year, when the FBI installed a Carnivore device on its network at a hub site in Pasadena, Calif. The FBI had a court order that allowed it to install the equipment as part of a criminal investigation.
The FBI connected Carnivore, a small computer box loaded with sophisticated software for monitoring e-mail messages and other online communications, to EarthLink’s remote access servers, a set of networking equipment that answers incoming modem calls from customers. But Carnivore wasn’t compatible with the operating system software on the remote access servers. So EarthLink had to install an older version of the system software that would work with Carnivore, according to Mr. Dougherty.
EarthLink says the older version of the software caused its remote access servers to crash, which in turn knocked out access for a number of its customers. Mr. Dougherty declined to specify how many, saying only that “many” people were affected.
EarthLink executives said they were also concerned about privacy. The company said it had no way of knowing whether Carnivore was limiting its surveillance to the criminal investigation at hand or trolling more broadly. Other ISPs have said there could be serious liability issues for them if the privacy of individuals not connected to an investigation is compromised.
“There ought to be some transparency to the methods and tools that law enforcement is using to search-and-seize communications,” said John R. LoGalbo, vice president of public policy at PSINet Inc., an ISP in Ashburn, Va.
EarthLink executives declined to say whether the company has received court orders for information about other customers since the disruption earlier this year. EarthLink said it would help authorities in criminal investigations using techniques other than Carnivore.
The FBI insists that Carnivore doesn’t affect the performance or stability of an ISP’s existing networks. The bureau says Carnivore passively monitors traffic, recording only information that is relevant to FBI investigations.
In some cases, the FBI said, the ISP is equipped to turn over data without the use of Carnivore. This is common in cases where only e-mail messages are sought because that type of data can easily be obtained through less-intrusive means.
Attorney General Janet Reno said Thursday that she was putting the system under review. She said the Justice Department would investigate Carnivore’s constitutional implications and make sure that the FBI was using it in “a consistent and balanced way.”
Write to Nick Wingfield at nick.wingfield@wsj.com , Ted Bridis at ted.bridis@wsj.com and Neil King Jr. at neil.king@wsj.com
By NICK WINGFIELD, TED BRIDIS and
NEIL KING JR. | Staff Reporters of
THE WALL STREET JOURNAL
Find this story at 14 July 2000
Copyright ©2013 Dow Jones & Company, Inc.
Carnivore (2000) FOIA documents3 december 2013
On July 11, 2000, the existence of an FBI Internet monitoring system called “Carnivore” was widely reported. Although the public details were sketchy, reports indicated that the Carnivore system is installed at the facilities of an Internet Service Provider (ISP) and can monitor all traffic moving through that ISP. The FBI claims that Carnivore “filters” data traffic and delivers to investigators only those “packets” that they are lawfully authorized to obtain. Because the details remain secret, the public is left to trust the FBI’s characterization of the system and — more significantly — the FBI’s compliance with legal requirements.
One day after the initial disclosures, EPIC filed a Freedom of Information Act (FOIA) request seeking the public release of all FBI records concerning Carnivore, including the source code, other technical details, and legal analyses addressing the potential privacy implications of the technology. On July 18, 2000, after Carnivore had become a major issue of public concern, EPIC asked the Justice Department to expedite the processing of its request. When DOJ failed to respond within the statutory deadline, EPIC filed suit in U.S. District Court seeking the immediate release of all information concerning Carnivore.
At an emergency hearing held on August 2, 2000, U.S. District Judge James Robertson ordered the FBI to report back to the court by August 16 and to identify the amount of material at issue and the Bureau’s schedule for releasing it. The FBI subsequently reported that 3000 pages of responsive material were located, but it refused to commit to a date for the completion of processing.
In late January 2001, the FBI completed its processing of EPIC’s FOIA request. The Bureau revised its earlier estimate and reported that there were 1756 pages of responsive material; 1502 were released in part and 254 were withheld in their entirety (see link below for sample scanned documents).
On August 1, 2001, the FBI moved for summary judgment, asserting that it fully met its obligations under FOIA. On August 9, 2001, EPIC filed a motion to stay further proceedings pending discovery, on the grounds that the FBI has failed to conduct an adequate search for responsive documents.
On March 25, 2002, the court issued an order directing the FBI to initiate a new search for responsive documents. The new search was to be conducted in the offices of General Counsel and Congressional & Public Affairs, and be completed no later than May 24, 2002. The documents listed above were located and released as a result of that court-ordered search.
Find this story at 11 July 2000
Find the FOIA documents at
And here
Carnivore Details Emerge (2000)3 december 2013
A web spying capability, multi-million dollar price tag, and a secret Carnivore ancestor are some of the details to poke through heavy FBI editing.
“ Carnivore is remarkably tolerant of network aberration, such a speed change, data corruption and targeted smurf type attacks. ”
FBI report
WASHINGTON–The FBI’s Carnivore surveillance tool monitors more than just email. Newly declassified documents obtained by Electronic Privacy Information Center (EPIC) under the Freedom of Information Act reveal that Carnivore can monitor all of a target user’s Internet traffic, and, in conjunction with other FBI tools, can reconstruct web pages exactly as a surveillance target saw them while surfing the web. The capability is one of the new details to emerge from some six-hundred pages of heavily redacted documents given to the Washington-based nonprofit group this week, and reviewed by SecurityFocus Wednesday. The documents confirm that Carnivore grew from an earlier FBI project called Omnivore, but reveal for the first time that Omnivore itself replaced a still older tool. The name of that project was carefully blacked out of the documents, and remains classified “secret.” The older surveillance system had “deficiencies that rendered the design solution unacceptable.” The project was eventually shut down. Development of Omnivore began in February 1997, and the first prototypes were delivered on October 31st of that year. The FBI’s eagerness to use the system may have slowed its development: one report notes that it became “difficult to maintain the schedule,” because the Bureau deployed the nascent surveillance tool for “several emergency situations” while it was still in beta release. “The field deployments used development team personnel to support the technical challenges surrounding the insertion of the OMNIVORE device,” reads the report. The ‘Phiple Troenix’ Project In September 1998, the FBI network surveillance lab in Quantico launched a project to move Omnivore from Sun’s Solaris operating system to a Windows NT platform. “This will facilitate the miniaturization of the system and support a wide range of personal computer (PC) equipment,” notes the project’s Statement of Need. (Other reasons for the switch were redacted from the documents.) The project was called “Phiple Troenix”–apparently a spoonerism of “Triple Phoenix,” a type of palm tree–and its result was dubbed “Carnivore.” Phiple Troenix’s estimated price tag of $800,000 included training for personnel at the Bureau’s Washington-based National Infrastructure Protection Center (NIPC). Meanwhile, the Omnivore project was formally closed down in June 1999, with a final cost of $900,000. Carnivore came out of beta with version 1.2, released in September 1999. As of May 2000, it was in version 1.3.4. At that time it underwent an exhaustive series of carefully prescribed tests under a variety of conditions. The results, according to a memo from the FBI lab, were positive. “Carnivore is remarkably tolerant of network aberration, such a speed change, data corruption and targeted smurf type attacks.
RELATED STORIES
Corporate Carnivore Available
Forty-five days of the Carnivore
Carnivore: Just Say No?
Carnivore in Court
“We call ours ‘Sniffy.'”
FBI Defends Carnivore
The FBI can
configure the tool to store all traffic to or from a particular Internet IP address, while monitoring DHCP and RADIUS protocols to track a particular user. In “pen mode,” in which it implements a limited type of surveillance not requiring a wiretap warrant, Carnivore can capture all packet header information for a targeted user, or zero in on email addresses or FTP login data. Web Surveillance Version 2.0 will include the ability to display captured Internet traffic directly from Carnivore. For now, the tool only stores data as raw packets, and another application called “Packeteer” is later used to process those packets. A third program called “CoolMiner” uses Packeteer’s output to display and organize the intercepted data. Collectively, the three applications, Carnivore, Packeteer and CoolMiner, are referred to by the FBI lab as the “DragonWare suite.” The documents show that in tests, CoolMiner was able to reconstruct HTTP traffic captured by Carnivore into coherent web pages, a capability that would allow FBI agents to see the pages exactly as the user saw them while surfing the web. Justice Department and FBI officials have testified that Carnivore is used almost exclusively to monitor email, but noted that it was capable of monitoring messages sent over web-based email services like Hotmail. An “Enhanced Carnivore” contract began in November 1999, the papers show, and will run out in January of next year at a total cost of $650,000. Some of the documents show that the FBI plans to add yet more features to version 2.0 and 3.0 of the surveillance tool, but the details are almost entirely redacted. A document subject to particularly heavy editing shows that the FBI was interested in voice over IP technology, and was in particular looking at protocols used by Net2Phone and FreeTel. EPIC attorney David Sobel said the organization intends to challenge the FBI’s editing of the released documents. In the meantime, EPIC is hurriedly scanning in the pages and putting them on the web, “so that the official technical review is not the only one,” explained Sobel. “We want an unofficial review with as wide a range of participants as possible.” The FBI’s next release of documents is scheduled for mid-November.
Kevin Poulsen, SecurityFocus 2000-10-04
Find this story at 4 October 2000
Copyright 2010, SecurityFocus
FBI agent Marcus C. Thomas (who is mentioned in the EPIC FOIA documents) made a very interesting presentation at NANOG 20 yesterday morning, discussing Carnivore. (2000)3 december 2013
Agent Thomas gave a demonstration of both Carnivore 1.34 (the currently
deployed version) and Carnivore 2.0 (the development version) as well as
some of the other DragonWare tools.
Most of this information isn’t new, but it demonstrates that the
DragonWare tools can be used to massively analyze all network traffic
accessible to a Carnivore box.
The configuration screen of Carnivore shows that protocol information can
be captured in 3 different modes: Full, Pen, and None. There are check
boxes for TCP, UDP, and ICMP.
Carnivore can be used to capture all data sent to or from a given IP
address, or range of IP addresses.
It can be used to search on information in the traffic, doing matching
against text entered in the “Data Text Strings” box. This, the agent
assured us, was so that web mail could be identified and captured, but
other browsing could be excluded.
It can be used to automatically capture telnet, pop3, and FTP logins with
the click of a check box.
It can monitor mail to and/or from specific email addresses.
It can be configured to monitor based on IP address, RADIUS username, MAC
address, or network adaptor.
IPs can be manually added to a running Carnivore session for monitoring.
Carnivore allows for monitoring of specific TCP or UDP ports and port
ranges (with drop down boxes for the most common protocols).
Carnivore 2.0 is much the same, but the configuration menu is cleaner, and
it allows Boolean statements for exclusion filter creation.
—
The Packeteer program takes raw network traffic dumps, reconstructs the
packets, and writes them to browsable files.
CoolMiner is the post-processor session browser. The demo was version
1.2SP4. CoolMiner has the ability to replay a victim’s steps while web
browsing, chatting on ICQ, Yahoo Messenger, AIM, IRC. It can step through
telnet sessions, AOL account usage, and Netmeeting. It can display
information sent to a network printer. It can process netbios data.
CoolMiner displays summary usage, broken down by origination and
destination IP addresses, which can be selectively viewed.
Carnivore usually runs on Windows NT Workstation, but could run on Windows
2000.
Some choice quotes from Agent Thomas:
“Non-relevant data is sealed from disclosure.”
“Carnivore has no active interaction with any devices on the network.”
“In most cases Carnivore is only used with a Title III. The FBI will
deploy Carnivore without a warrant in cases where the victim is willing to
allow a Carnivore box to monitor his communication.”
“We rely on the ISP’s security [for the security of the Carnivore box].”
“We aren’t concerned about the ISP’s security.”
When asked how Carnivore boxes were protected from attack, he said that
the only way they were accessible was through dialup or ISDN. “We could
take measures all the way up to encryption if we thought it was
necessary.”
While it doesn’t appear that Carnivore uses a dial-back system to prevent
unauthorized access, Thomas mentioned that the FBI sometimes “uses a
firmware device to prevent unauthorized calls.”
When asked to address the concerns that FBI agents could modify Carnivore
data to plant evidence, Thomas reported that Carnivore logs FBI agents’
access attempts. The FBI agent access logs for the Carnivore box become
part of the court records. When asked the question “It’s often common
practice to write back doors into [software programs]. How do we know you
aren’t doing that?”, Thomas replied “I agree 100%. You’re absolutely
right.”
When asked why the FBI would not release source, he said: “We don’t sell
guns, even though we have them.”
When asked: “What do you do in cases where the subject is using
encryption?” Thomas replied, “This suite of devices can’t handle that.” I
guess they hand it off to the NSA.
He further stated that about 10% of the FBI’s Carnivore cases are thwarted
by the use of encryption, and that it is “more common to find encryption
when we seize static data, such as on hard drives.”
80% of Carnivore cases have involved national security.
Marcus Thomas can be contacted for questions at mthomas@fbi.gov or at
(730) 632-6091. He is “usually at his desk.”
24 October 2000
Find this story at 24 October 2000
Meet the Arab-American lawyer who the NSA spied on–back in 196727 november 2013
Abdeen Jabara was hardly shocked when the scandal over the National Security Agency’s global surveillance dragnet broke in June.
“I was not at all surprised by the Snowden revelations about the NSA,” Jabara, a prominent lawyer and a founder of the American-Arab Anti-Discrimination Committee, told me in a phone interview. “The United States has this huge, huge international surveillance apparatus in place and after 9/11 they were going to use it as much as they could as part of the war on terror. It was just too tempting.”
He would know–he’s lived it. Jabara is one of many Americans to have been personally spied on by the NSA decades ago. A court battle that started in 1972 eventually forced the secretive surveillance agency to acknowledge that it pried into the life of an American in an effort that began in August 1967. The disclosure was the first time the U.S. admitted it had spied on an American.
Jabara’s story lays bare the deep roots of the NSA’s surveillance. Today, with the NSA operating under the ethos of “collect it all,” there’s much more surveillance of Americans when compared to prior decades. But the current spying occurs in a less targeted way.
Documents published by The Guardian have revealed that virtually every American’s communications are swept up by phone and Internet surveillance, though the government is not targeting individual Americans. Instead, the NSA is targeting foreigners but has retained–and sometimes searched– information about Americans in communication with foreign subjects of spying. In contrast, Jabara was working as a lawyer at a time when the NSA was specifically targeting domestic dissidents.
In 1972, Jabara filed suit against the government for prying into his life. A young Detroit-based attorney at the time, Jabara represented people from the Arab-American community caught up in legal trouble. He also took on the cases of people harassed by the Federal Bureau of Investigation, which had stepped up efforts to surveil Arab activists in the aftermath of the 1967 war, when the U.S. alliance with Israel was solidified. Jabara was caught up in what was called “Operation Boulder,” a Nixon administration-era program that put Arabs under surveillance. “Operation Boulder,” which was sparked by the murder of Israeli athletes at the Munich Olympics in 1972, went after domestic activist groups and was instrumental in the deportation of hundreds of people on technical irregularities.
Jabara was spied on without a warrant, albeit incidentally–the U.S. government never targeted him, but surveilled phone calls and telegrams from his clients. His case forced the government to disclose that Jabara was spied on and that non-governmental domestic groups shared information on Jabara with the U.S. The FBI was the primary agency tracking him, but it was the NSA that furnished the federal law enforcement agency with records of Jabara’s phone conversations.
In 1979, a federal district court judge handed Jabara and his legal team a victory with a ruling that said the U.S. had violated Jabara’s Fourth Amendment and privacy rights. The federal government appealed, and a separate court delivered a setback to Jabara. In 1982, an appeals court ruled that the government can intercept conversations between U.S. citizens and people overseas–even if there is no reason to believe the citizen is a “foreign agent.” The final step in the case came in 1984, when the FBI agreed to destroy all the files on Jabara and stipulated that the lawyer did not engage in criminal activity.
The timeline of Jabara’s case traverses a changing legal landscape governing surveillance. When Jabara first filed suit, there was no legal framework prohibiting the government from spying on Americans without a warrant. But in the wake of disclosures about the NSA keeping a “watch list” of some 1,650 anti-war activists and other evidence of domestic surveillance, the Foreign Intelligence Surveillance Act was passed in 1979. The act required intelligence agencies to go to a secretive court–where the judges are handpicked by the Supreme Court’s Chief Justice–in order to target Americans. It’s an open question whether the secretive court, criticized for being deferential to government claims, would have denied the NSA’s and FBI’s bid to spy on Jabara. But it would have had to show probable cause that Jabara was an agent of a foreign power–an assertion that federal judges eventually rejected.
Parallels between current-day surveillance and the spying on Jabara are easy to come by. The U.S. government attempted to shield disclosing data on surveilling Jabara by asserting the “state secrets” privilege. The Obama administration used the same argument to try to dismiss a lawsuit against the NSA. Both surveillance efforts raise the question of how to square a secret spying regime with a Constitution that ostensibly protects privacy. And the government revealed that it shared information on Jabara with three foreign governments–a foreshadowing of revelations that the U.S. shares intelligence information with allies, including the Israeli government. (Jabara suspected that the U.S. shared data on him with Israel, though the government denied that.)
Lee Tien, a senior staff attorney with the Electronic Frontier Foundation, said that not much had shifted since the government spied on Jabara. “What has changed is that the intelligence community is doing even more surveillance,” Tien told me in an interview. “What didn’t change? They’re still surveilling people in the United States and they’re doing it illegally.”
Now, the question is whether more legal checks will be put on the NSA’s surveillance regime. The secretive agency is battling civil liberties groups in courts and could be reined in by new legislation proposed by elected officials. But Jabara’s case–and the long history of NSA spying–shows that despite reform efforts, spying on Americans continues unabated.
Alex Kane on October 3, 2013
Find this story at 3 October 2013
© 2013 Mondoweiss
Arab-American Attorney Abdeen Jabara: I Was Spied on by the National Security Agency 40 Years Ago27 november 2013
As more revelations come to light about the National Security Agency, we speak to civil rights attorney Abdeen Jabara, co-founder of the American-Arab Anti-Discrimination Committee. He was involved in a groundbreaking court case in the 1970s that forced the NSA to acknowledge it had been spying on him since 1967. At the time of the spying, Jabara was a lawyer in Detroit representing Arab-American clients and people being targeted by the FBI. The disclosure was the first time the NSA admitted it had spied on an American.
Transcript
This is a rush transcript. Copy may not be in its final form.
AMY GOODMAN: I want to turn now to a—perhaps related, but certainly to the climate, I want to end today’s show on the National Security Agency. Our guest here in New York, Abdeen Jabara, who was co-founder of the American-Arab Anti-Discrimination Committee, was involved in a groundbreaking court case in the 1970s that forced the National Security Agency to acknowledge it had been spying on him since 1967. The disclosure was the first time, I believe, that the NSA admitted it had spied on an American. I mean, this is at a time, Abdeen Jabara, that most people had no idea what the NSA was. This is not like these last few months.
ABDEEN JABARA: Well, it was—this is very interesting. I didn’t know what the NSA was. I mean, I started a lawsuit against the FBI, because I thought that the FBI had been spying on me and monitoring my activities—
AMY GOODMAN: Why?
ABDEEN JABARA: —and that of my clients. Well, I’ll tell you why. Because I had been very, very active in Palestinian support work. And one day I read in Newsweek magazine, in the Periscope section, that 26 Arabs in the United States had been targeted for surveillance, electronic surveillance. So, I thought, surely, some of those had been clients of mine or had talked to me on the phone about issues and so forth. And that’s when I brought the lawsuit. And—
AMY GOODMAN: So you sued the FBI in 1972.
ABDEEN JABARA: Right, I sued the FBI in 1972, and the FBI answered. And on the issue about electronic surveillance, they declined to answer on the basis that it was privileged and state secret. At that point in time, the ACLU came in to represent me, and we forced them to answer that question. They admitted that there had been some overhears, alright, that I had not been personally targeted for electronic surveillance, but there had been overhears of my conversations with some of my clients. And they also said they received information from other federal agencies. And they didn’t want to answer that, who that agency was. And the court compelled them to answer. And it turned out that other agency was the NSA. And we didn’t know, you know, what the NSA was. Jim Bamford’s book, The Puzzle Palace, hadn’t yet been published. And we found out that the FBI had requested any information that the NSA had, and the NSA had six different communications that I had made. I was president of the Association of American Arab University Graduates in 1972, so I had a great deal of work on my plate as the president of the association. And I don’t know what these communications were.
And the district court, Judge Ralph Freeman, held that my First Amendment and my Fourth Amendment rights had been violated. An appeal was made to the Sixth Circuit Court of Appeals in Cincinnati. And the Sixth Circuit set aside part of that ruling, saying that there is no violation of a Fourth Amendment right by the National Security Agency to surveil an American’s communications overseas, even though the person is not a foreign agent. And, in fact, five years ago, Congress codified that, where they have said—and there’s an article in today’s New York Times about this—by saying that there’s no warrant requirement where the target is a foreign target, even though an American citizen is communicating overseas.
So, this whole issue, I was surprised, after all the revelations about the Snowden-NSA brouhaha, that nobody had looked back at what had occurred back in the—in the ’70s to show that at that time it came out in the press that over 1,600 Americans had been surveilled by the NSA. And this was before the passage of FISA, Foreign Intelligence Surveillance Act. Out of that issue in the ’70s, they passed this FISA Act, which said that—and they set up a secret court, which is the national security court. The judges of that are appointed by the chief justice of the Supreme Court.
AMY GOODMAN: We have less than a minute. So—
ABDEEN JABARA: Yes.
AMY GOODMAN: —keep going.
ABDEEN JABARA: So, they set that up, and they said that that will create safeguards, alright? This will create safeguards, and that the only targets can be foreign agents.
AMY GOODMAN: Finally, Abdeen Jabara, so there are all these records on you, not only that the FBI and NSA had. How many other agencies had them? And did you get them expunged?
ABDEEN JABARA: As a matter of fact, I did. After the case was remanded to the trial court, the district in Detroit, we entered into a settlement with the FBI whereby they acknowledged that I had not been in violation of any U.S. laws, that I had been exercising my constitutional rights, and that they would destroy the entire file that they had collected on me.
AMY GOODMAN: How many agencies had they shared this file with?
ABDEEN JABARA: They had shared it with three foreign governments and 17—
AMY GOODMAN: Which governments?
ABDEEN JABARA: —17 domestic agencies.
AMY GOODMAN: Which governments?
ABDEEN JABARA: Well, they didn’t tell us.
AMY GOODMAN: Ah—
ABDEEN JABARA: But you can just surmise.
AMY GOODMAN: I want to thank you all for being with us. Thank you so much, Abdeen Jabara, former vice chair of the ADC, one of the founders of the American-Arab Anti-Discrimination Committee; Albert Mokhiber, former president of the ADC; and Congressmember John Conyers. Congratulations on your almost 50 years of service.
I’ll be speaking on Saturday at 2:00 at the Green Fest in Los Angeles, and at 6:00 at Newport Beach Marriott in California.
The original content of this program is licensed under a Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 United States License. Please attribute legal copies of this work to democracynow.org. Some of the work(s) that this program incorporates, however, may be separately licensed. For further information or additional permissions, contact us.
Thursday, October 17, 2013
Find this story at 17 October 2013
Spy Copters, Lasers, and Break-In Teams; How the FBI keeps watch on foreign diplomats.22 november 2013
Between 2006 and 2009, surveillance helicopters conducted daily flights over northwest Washington, D.C., taking high-resolution photographs of the new Chinese Embassy being constructed on Van Ness Street. The aircraft belonged to the Federal Bureau of Investigation, which wanted to determine where the embassy’s communications center was being located. But the Chinese construction crews hid their work on this part of the building by pulling tarpaulins over the site as it was being constructed.
The FBI also monitored the movements and activities of the Chinese construction workers building the embassy, who were staying at a Days Inn on Connecticut Avenue just north of the construction site, in the hopes of possibly recruiting one or two of them. According to one Chinese diplomat, his fellow officials detected individuals who they assumed to be FBI agents covertly monitoring the construction materials and equipment being used to build the embassy, which were stored on the University of the District of Columbia’s soccer field across the street from where the Chinese Embassy currently stands. The diplomat added that Chinese security officials assumed that the FBI agents were trying to determine whether it was possible to plant eavesdropping devices inside the construction materials stored at the site.
In recent weeks, the U.S. National Security Agency’s efforts to monitor foreign diplomats have become the stuff of worldwide headlines. But the FBI has been in the business of spying on diplomats and breaking their codes for far longer than the NSA has. The surveillance of the Chinese Embassy was just one piece of a far larger espionage operation. The FBI not only endeavors to steal or covertly compromise foreign government, military, and commercial computer, telecommunications, and encryption systems being used in the United States, but the FBI and NSA work closely to intercept the communications of all diplomatic missions and international organizations located on American soil. In some important respects, the FBI’s cryptologic work is more secretive than that being performed by the NSA because of the immense diplomatic sensitivity of these operations if they were to ever be exposed publicly.
The Bureau of Investigation, the predecessor to today’s FBI, has been monitoring diplomatic communications since at least 1910, when it periodically solved Mexican government and revolutionary group cable traffic coming in and out of the United States. And for over a century, the FBI and its predecessors have been aggressive practitioners of the age-old art of stealing codes and ciphers. In June 1916, Bureau of Investigations agents surreptitiously obtained a copy of the new Mexican consular code by picking the pockets of a Mexican diplomatic courier while he cavorted with “fast women” in one of the innumerable border fleshpots along the Rio Grande.
More FP Coverage
the NSA Leaks
Meet the Spies Doing the NSA’s Dirty Work
Exclusive: Inside America’s Plan to Kill Online Privacy Rights Everywhere
The FBI is Helping the NSA Spy, but Senators Don’t Want to Know About It
Little has changed in the intervening century. Despite the creation of the NSA in 1952 to centralize in one agency all U.S. government signals intelligence (SIGINT) collection and processing work, the FBI, which did not respond to requests for comment for this story, has never ceased its own independent cryptologic efforts, especially when those efforts have been aim at diplomats on American soil.
***
The number of foreign government targets that the FBI monitors inside the United States is huge and growing. State Department records show that 176 countries maintain embassies in Washington, not including Cuba and Iran, which the U.S. government does not have diplomatic relations with but which maintain interest sections inside the Swiss and Pakistani embassies, respectively.
In addition, 115 of the 193 members of the United Nations maintain diplomatic missions of varying sizes in New York City. There are also 62 consulates in Los Angeles, 52 in Chicago, 42 in San Francisco, 38 in Houston, 35 in Miami, and 26 in Boston and Atlanta.
All told, there are almost 600 foreign government embassies, consulates, missions, or representative offices in the United States, all of which are watched to one degree or another by the counterintelligence officers of the FBI. Only eight countries do not maintain any diplomatic presence in the United States whatsoever, the most important of which is nuclear-armed North Korea.
Every one of these embassies and consulates is watched by the FBI’s legion of counterintelligence officers to one degree or another. But some countries’ receive the vast majority of the FBI’s attention, such as Russia, China, Libya, Israel, Egypt, Syria, Jordan, Lebanon, Saudi Arabia, Iraq, Afghanistan, India, Pakistan, and Venezuela. The Cuban and Iranian interests section in Washington — and their missions to the United Nations in New York — of course receive special attention as well.
Unsurprisingly, most of the FBI’s surveillance is technical in nature. For example, with substantial technical assistance from the NSA and the “big three” American telecommunications companies (AT&T, Verizon, and Sprint), the FBI taps the phones (including cell phones) of virtually every embassy and consulate in the United States. The FBI also intercepts the home phones and emails of many diplomats. The FBI’s Washington and New York field offices have special wiretap centers that specialize in collecting all telephone, email, instant messaging, text messaging, and cellular telephone traffic coming in and out of all high-priority diplomatic targets in the United States 24 hours a day, seven days a week. According to a former Justice Department source, over the past decade these extremely sensitive intercepts have identified a number of spies working for governments that were caught in the act of stealing U.S. government secrets, as well as a larger number of cases involving the theft of industrial secrets from American companies.
Since 1978, all electronic communications, both plaintext and encrypted, between these embassies and their home countries have been routinely intercepted by the NSA’s BLARNEY fiber-optic-cable intercept program. The NSA provides copies of all these intercepts, including telephone calls and emails, to the FBI’s secretive signals-intelligence unit, the Data Intercept Technology Unit (DITU) at the Quantico Marine Corps base in Northern Virginia, and to the FBI’s electronic-eavesdropping centers in Washington and New York.
The FBI also uses a wide range of vehicles and airborne surveillance assets to monitor the movements and activities of foreign diplomats and intelligence operatives in Washington and New York. Some of the vans, aircraft, and helicopters used by the FBI for this purpose are equipped with equipment capable of intercepting cell-phone calls and other electronic forms of communication. And when that doesn’t work, the FBI calls in the burglars.
***
Another important part of the FBI’s surveillance effort is dedicated to trying to surreptitiously get inside these diplomatic establishments on behalf of the NSA, which increasingly depends on the FBI to penetrate the computer and telecommunications networks used by these embassies and compromise their information security systems.
The FBI perfected this clandestine technique, known as the Surreptitious Entry Program operation, during Cold War intelligence-gathering operations directed at the Soviet Union and its Eastern European allies. These missions remain highly classified because of the diplomatic sensitivity surrounding breaking into the embassies of friends and enemies alike. In one instance during the 1960s, FBI agents reportedly drove a garbage truck into the central courtyard of the Czech Embassy in the middle of the night and spirited away one of the embassy’s cipher machines for study by the NSA’s code breakers.
The FBI is still conducting these highly sensitive operations. Specially trained teams of FBI agents are still periodically breaking into foreign embassies and consulates in the United States, primarily in New York and Washington. In New York, a special team of FBI burglars is based in a converted warehouse in Long Island City in Queens, according to a former FBI employee who worked there. The nondescript facility is large enough that the FBI can build mock-ups of the exteriors and interiors of embassies being targeted for break-ins. The FBI has a similar facility in Northern Virginia, where full-size mock-ups of embassies in Washington are constructed to train FBI teams prior to conducting black-bag jobs of the facilities.
To facilitate these operations, the FBI has a huge library of architectural drawings, floor plans, building permits, and any other documents that it can lay its hands on concerning the layouts of every embassy and consulate in the United States. Many of these documents were obtained in close conjunction with the diplomatic security staff of the State Department and the uniformed branch of the Secret Service, which is responsible for providing security for foreign diplomatic establishments in the United States. The FBI also interviews the repair and maintenance personnel who service the leased computers and telecommunications equipment used by a host of embassies and other diplomatic establishments in Washington and New York.
Since the 9/11 terrorist attacks, the tempo of FBI clandestine operations designed to steal, compromise, or influence foreign computer, telecommunications, or encryption systems has increased by several orders of magnitude. According to a former Justice Department official, over the past decade clandestine human-intelligence operations run by the FBI’s Washington and New York field offices have been enormously successful in compromising a wide range of computer systems and encryption technology used by foreign governments and corporate entities. In a number of important cases, these FBI operations have allowed the NSA’s code-breakers to penetrate foreign encryption systems that had defied the ability of the code-breakers to solve through conventional cryptanalytic means. For example, the FBI was able to give the NSA the daily changes in cipher keys for an encryption system used by a country in the developing world. In another case, the FBI was able to covertly insert spyware into the operating system of a computer being used by a foreign mission in New York, allowing the NSA to read the plaintext versions of cables before they were encrypted.
***
But by far the most productive and sensitive intelligence source about what is going on inside embassies and consulates in the United States is a joint FBI-NSA electronic-eavesdropping program known as Close Access SIGINT. It enables the FBI and NSA to listen to what is transpiring inside these buildings by using a wide range of covert technical sensors that are monitored in real time from covert listening posts located in close proximity to the targets.
Some of these operations involve spyware software that has been covertly planted inside the computer systems of embassies and consulates, which allows the NSA’s computer-hacking organization, the Office of Tailored Access Operations (TAO), to read in real time everything that is being stored on individual computers or on the computer network itself. Some of these implants are designed and operated by TAO. Others are designed by the FBI’s SIGINT unit, the DITU. Some sensors periodically copy the contents of computer hard drives; another sensor takes screen shots of documents being processed or reviewed on compromised computer systems. The FBI is also using sophisticated laser and acoustic systems to image and record the sounds of what is being typed on computers, according to a source with access to the trove of documents leaked to the media by former NSA contractor Edward Snowden.
To pick up the signals from these clandestine sensors, the FBI uses front companies to lease office space within line of sight of nearly 50 embassies and consulates in Washington and New York. In other instances, the FBI and NSA have installed disguised receivers on building rooftops near these embassies to pick up the data signals from clandestine sensors implanted inside these embassies and consulates. Some of these disguised receivers can clearly be seen on the rooftop of a building located within line of sight of the Chinese, Israeli, and Pakistani embassies on Van Ness Street in northwest Washington. It’s a neighborhood that’s awfully familiar to the FBI and its eavesdroppers.
Save big when you subscribe to FP.
MICHAEL BRADLEY/AFP/Getty Images
Matthew M. Aid is the author of Intel Wars: The Secret History of the Fight Against Terror and The Secret Sentry: The Untold History of the National Security Agency.
BY MATTHEW M. AID | NOVEMBER 19, 2013
Find this story at 19 November 2013
© 2013 The Slate Group, LLC. All rights reserved.
UNLEASHED AND UNACCOUNTABLE; The FBI’s Unchecked Abuse of Authority22 november 2013
The Federal Bureau of Investigation serves a crucial role in securing the United States from
criminals, terrorists, and hostile foreign agents. Just as importantly, the FBI also protects civil
rights and civil liberties, ensures honest government, and defends the rule of law. Its agents serve
around the country and around the world with a high degree of professionalism and competence,
often under difficult and dangerous conditions. But throughout its history, the FBI has also
regularly overstepped the law, infringing on Americans’ constitutional rights while
overzealously pursuing its domestic security mission.
After the September 11, 2001 terrorist attacks, Congress and successive attorneys general
loosened many of the legal and internal controls that a previous generation had placed on the FBI
to protect Americans’ constitutional rights. As a result, the FBI is repeating mistakes of the past
and is again unfairly targeting immigrants, racial and religious minorities, and political dissidents
for surveillance, infiltration, investigation, and “disruption strategies.”
But modern technological innovations have significantly increased the threat to American liberty
by giving today’s FBI the capability to collect, store, and analyze data about millions of innocent
Americans. The excessive secrecy with which it cloaks these domestic intelligence gathering
operations has crippled constitutional oversight mechanisms. Courts have been reticent to
challenge government secrecy demands and, despite years of debate in Congress regarding the
proper scope of domestic surveillance, it took unauthorized leaks by a whistleblower to finally
reveal the government’s secret interpretations of these laws and the Orwellian scope of its
domestic surveillance programs.
There is evidence the FBI’s increased intelligence collection powers have harmed, rather than
aided, its terrorism prevention efforts by overwhelming agents with a flood of irrelevant data and
false alarms. Former FBI Director William Webster evaluated the FBI’s investigation of Maj.
Nadal Hasan prior to the Ft. Hood shooting and cited the “relentless” workload resulting from a
“data explosion” within the FBI as an impediment to proper intelligence analysis. And members
of Congress questioned several other incidents in which the FBI investigated but failed to
interdict individuals who later committed murderous terrorist attacks, including the Boston
Marathon bombing. While preventing every possible act of terrorism is an impossible goal, an
examination of these cases raise serious questions regarding the efficacy of FBI methods. FBI
data showing that more than half of the violent crimes, including over a third of the murders in
the U.S., go unsolved each year calls for a broader analysis of the proper distribution of law
enforcement resources.
With the appointment of Director James Comey, the FBI has seen its first change in leadership
since the 9/11 attacks, which provides an opportunity for Congress, the president, and the
attorney general to conduct a comprehensive evaluation of the FBI’s policies and programs. This
report highlights areas in which the FBI has abused its authority and recommends reforms to ensure the FBI fulfills its law enforcement and security missions with proper public oversight
and respect for constitutional rights and democratic ideals.
The report describes major changes to law and policy that unleashed the FBI from its traditional
restraints and opened the door to abuse. Congress enhanced many of the FBI’s surveillance
powers after 9/11, primarily through the USA Patriot Act and the Foreign Intelligence
Surveillance Act Amendments. The recent revelations regarding the FBI’s use of Section 215 of
the USA Patriot Act to track all U.S. telephone calls is only the latest in a long line of abuse.
Five Justice Department Inspector General audits documented widespread FBI misuse of Patriot
Act authorities in 2007 and 2008. Congress and the American public deserve to know the full
scope of the FBI’s spying on Americans under the Patriot Act and all other surveillance
authorities.
Attorney General Michael Mukasey rewrote the FBI’s rule book in 2008, giving FBI agents
unfettered authority to investigate anyone they choose without any factual basis for suspecting
wrongdoing. The 2008 Attorney General’s Guidelines created a new kind of intrusive
investigation called an “assessment,” which requires no “factual predicate” and can include
searches through government or commercial databases, overt or covert FBI interviews, and
tasking informants to gather information about anyone or to infiltrate lawful organizations. In a
two-year period from 2009 to 2011, the FBI opened over 82,000 “assessments” of individuals or
organizations, less than 3,500 of which discovered information justifying further investigation.
The 2008 guidelines also authorized the FBI’s racial and ethnic mapping program, which
allows the FBI to collect demographic information to map American communities by race and
ethnicity for intelligence purposes, based on crass racial stereotypes about the crimes each group
commits. FBI documents obtained by the American Civil Liberties Union show the FBI mapped
Chinese and Russian communities in San Francisco for organized crime purposes, all Latino
communities in New Jersey and Alabama because there are street gangs, African Americans in
Georgia to find “Black separatists,” and Middle-Eastern communities in Detroit for terrorism.
The FBI also claimed the authority to sweep up voluminous amounts of information secretly
from state and local law enforcement and private data aggregators for data mining purposes. In
2007, the FBI said it amassed databases containing 1.5 billion records, which were predicted to
grow to 6 billion records by 2012, which is equal to 20 separate “records” for every person in the
United States. The largest of these databases, the Foreign Terrorist Tracking Task Force,
currently has 360 staff members running 40 separate projects. A 2013 Inspector General audit
determined it “did not always provide FBI field offices with timely and relevant information.”
The next section of the report discusses the ways the FBI avoids accountability by skirting
internal and external oversight. The FBI, which Congress exempted from the Whistleblower
Protection Act, effectively suppresses internal dissent by retaliating against employees who
report waste, fraud, abuse, and illegality. As a result, 28 percent of non-supervisory FBI employees surveyed by the Inspector General said they “never” reported misconduct they saw or
heard about on the job. The FBI also aggressively investigates other government whistleblowers,
which has led to an unprecedented increase in Espionage Act prosecutions over the last five
years. And the FBI’s overzealous pursuit of government whistleblowers has also resulted in the
inappropriate targeting of journalists for investigation, infringing on free press rights. Recent
coverage of overbroad subpoenas for telephone records of Associated Press journalists and an
inappropriate search warrant for a Fox News reporter are only the latest examples of abuse. In
2010 the Inspector General reported the FBI used an illegal “exigent letter” to obtain the
telephone records of 7 New York Times and Washington Post reporters. And the FBI thwarts
congressional oversight with excessive secrecy and delayed or misleading responses to
questions from Congress.
Finally, the report highlights evidence of abuse that requires greater regulation, oversight, and
public accountability. These include many examples of the FBI targeting First Amendment
activities by spying on protesters and religious groups with aggressive tactics that infringe on
their free speech, religion, and associational rights. In 2011, the ACLU exposed flawed and
biased FBI training materials that likely fueled these inappropriate investigations.
The FBI also operates increasingly outside the United States, where its activities are more
difficult to monitor. Several troubling cases indicate the FBI may have requested, facilitated,
and/or exploited the arrests of U.S. citizens by foreign governments, often without charges, so
they could be held and interrogated, sometimes tortured, and then interviewed by FBI agents.
The ACLU represents two proxy detention victims, including Amir Meshal, who was arrested
at the Kenya border in 2007 and subjected to more than four months of detention in three
different East African countries without charge, access to counsel, or presentment before a
judicial officer, at the behest of the U.S. government. FBI agents interrogated Meshal more than
thirty times during his detention.
Other Americans traveling abroad discover that their government has barred them from flying;
the number of U.S. persons on the No Fly List has doubled since 2009. There is no fair
procedure for those mistakenly placed on the list to challenge their inclusion. Many of those
prevented from flying home have been subjected to FBI interviews after seeking assistance from
U.S. Embassies. The ACLU is suing the government on behalf of 10 American citizens and
permanent residents who were prevented from flying to the U.S., arguing that barring them from
flying without due process is unconstitutional.
These FBI abuses of authority must end. We call on President Barack Obama and Attorney
General Eric Holder to tighten FBI authorities to prevent unnecessary invasions of Americans’
privacy; prohibit profiling based on race, ethnicity, religion and national origin; and protect First
Amendment activities. And we call on Congress to make these changes permanent through
statute and improve oversight to prevent future abuse. The FBI serves a crucial role in protecting
Americans, but it must protect our rights as it protects our security.
Find this story at 17 September 2013
© ACLU
FBI Taps Hacker Tactics to Spy on Suspects22 november 2013
Law-Enforcement Officials Expand Use of Tools Such as Spyware as People Under Investigation ‘Go Dark,’ Evading Wiretaps
Law-enforcement officials in the U.S. are expanding the use of tools routinely used by computer hackers to gather information on suspects, bringing the criminal wiretap into the cyber age.
Federal agencies have largely kept quiet about these capabilities, but court documents and interviews with people involved in the programs provide new details about the hacking tools, including spyware delivered to computers and phones through email or Web links—techniques more commonly associated with attacks by criminals.
People familiar with the Federal Bureau of Investigation’s programs say that the use of hacking tools under court orders has grown as agents seek to keep up with suspects who use new communications technology, including some types of online chat and encryption tools. The use of such communications, which can’t be wiretapped like a phone, is called “going dark” among law enforcement.
A spokeswoman for the FBI declined to comment.
The FBI develops some hacking tools internally and purchases others from the private sector. With such technology, the bureau can remotely activate the microphones in phones running Google Inc.’s GOOG +0.10% Android software to record conversations, one former U.S. official said. It can do the same to microphones in laptops without the user knowing, the person said. Google declined to comment.
The bureau typically uses hacking in cases involving organized crime, child pornography or counterterrorism, a former U.S. official said. It is loath to use these tools when investigating hackers, out of fear the suspect will discover and publicize the technique, the person said.
The FBI has been developing hacking tools for more than a decade, but rarely discloses its techniques publicly in legal cases.
Related
Earlier this year, a federal warrant application in a Texas identity-theft case sought to use software to extract files and covertly take photos using a computer’s camera, according to court documents. The judge denied the application, saying, among other things, that he wanted more information on how data collected from the computer would be minimized to remove information on innocent people.
Since at least 2005, the FBI has been using “web bugs” that can gather a computer’s Internet address, lists of programs running and other data, according to documents disclosed in 2011. The FBI used that type of tool in 2007 to trace a person who was eventually convicted of emailing bomb threats in Washington state, for example.
The FBI “hires people who have hacking skill, and they purchase tools that are capable of doing these things,” said a former official in the agency’s cyber division. The tools are used when other surveillance methods won’t work: “When you do, it’s because you don’t have any other choice,” the official said.
Surveillance technologies are coming under increased scrutiny after disclosures about data collection by the National Security Agency. The NSA gathers bulk data on millions of Americans, but former U.S. officials say law-enforcement hacking is targeted at very specific cases and used sparingly.
Still, civil-liberties advocates say there should be clear legal guidelines to ensure hacking tools aren’t misused. “People should understand that local cops are going to be hacking into surveillance targets,” said Christopher Soghoian, principal technologist at the American Civil Liberties Union. “We should have a debate about that.”
Mr. Soghoian, who is presenting on the topic Friday at the DefCon hacking conference in Las Vegas, said information about the practice is slipping out as a small industry has emerged to sell hacking tools to law enforcement. He has found posts and resumes on social networks in which people discuss their work at private companies helping the FBI with surveillance.
A search warrant would be required to get content such as files from a suspect’s computer, said Mark Eckenwiler, a senior counsel at Perkins Coie LLP who until December was the Justice Department’s primary authority on federal criminal surveillance law. Continuing surveillance would necessitate an even stricter standard, the kind used to grant wiretaps.
But if the software gathers only communications-routing “metadata”—like Internet protocol addresses or the “to” and “from” lines in emails—a court order under a lower standard might suffice if the program is delivered remotely, such as through an Internet link, he said. That is because nobody is physically touching the suspect’s property, he added.
An official at the Justice Department said it determines what legal authority to seek for such surveillance “on a case-by-case basis.” But the official added that the department’s approach is exemplified by the 2007 Washington bomb-threat case, in which the government sought a warrant even though no agents touched the computer and the spyware gathered only metadata.
In 2001, the FBI faced criticism from civil-liberties advocates for declining to disclose how it installed a program to record the keystrokes on the computer of mobster Nicodemo Scarfo Jr. to capture a password he was using to encrypt a document. He was eventually convicted.
A group at the FBI called the Remote Operations Unit takes a leading role in the bureau’s hacking efforts, according to former officials.
Officers often install surveillance tools on computers remotely, using a document or link that loads software when the person clicks or views it. In some cases, the government has secretly gained physical access to suspects’ machines and installed malicious software using a thumb drive, a former U.S. official said.
The bureau has controls to ensure only “relevant data” are scooped up, the person said. A screening team goes through all of the data pulled from the hack to determine what is relevant, then hands off that material to the case team and stops working on the case.
The FBI employs a number of hackers who write custom surveillance software, and also buys software from the private sector, former U.S. officials said.
Italian company HackingTeam SRL opened a sales office in Annapolis, Md., more than a year ago to target North and South America. HackingTeam provides software that can extract information from phones and computers and send it back to a monitoring system. The company declined to disclose its clients or say whether any are in the U.S.
U.K.-based Gamma International offers computer exploits, which take advantage of holes in software to deliver spying tools, according to people familiar with the company. Gamma has marketed “0 day exploits”—meaning that the software maker doesn’t yet know about the security hole—for software including Microsoft Corp.’s Internet Explorer, those people said. Gamma, which has marketed its products in the U.S., didn’t respond to requests for comment, nor did Microsoft.
The Wall Street Journal
August 1, 2013, 6:59 p.m. ET
By JENNIFER VALENTINO-DEVRIES and DANNY YADRON
Find this story at 1 August 2013
Copyright ©2013 Dow Jones & Company, Inc.
Jeremy Hammond: FBI directed my attacks on foreign government sites21 november 2013
Anonymous hacktivist told court FBI informant and fellow hacker Sabu supplied him with list of countries vulnerable to cyber-attack
Hammond said: ‘I took responsibility by pleading guilty, but when will the government be made to answer for its crimes?’ Photograph: Michael Gottschalk/AFP
The Anonymous hacktivist sentenced on Friday to 10 years in federal prison for his role in releasing thousands of emails from the private intelligence firm Stratfor has told a Manhattan court that he was directed by an FBI informant to break into the official websites of several governments around the world.
Jeremy Hammond, 28, told a federal court for the southern district of New York that a fellow hacker who went under the internet pseudonym “Sabu” had supplied him with lists of websites that were vulnerable to attack, including those of many foreign countries. The defendant mentioned specifically Brazil, Iran and Turkey before being stopped by judge Loretta Preska, who had ruled previously that the names of all the countries involved should be redacted to retain their secrecy.
Within a couple of hours of the hearing, the three countries had been identified publicly by Forbes, the Huffington Post and Twitter feeds serving more than a million followers. “I broke into numerous sites and handed over passwords and backdoors that enabled Sabu – and by extension his FBI handlers – to control these targets,” Hammond told the court.
The 28-year-old hacker has floated the theory in the past that he was used as part of an effective private army by the FBI to target vulnerable foreign government websites, using the informant Sabu – real name Hector Xavier Monsegur – as a go-between. Sabu, who was a leading figure in the Anonymous-affiliated hacking group LulzSec, was turned by the FBI into one of its primary informants on the hacker world after he was arrested in 2011, about six months before the Stratfor website was breached.
Referring to the hacking of foreign government websites, Hammond said that in one instance, he and Sabu provided details on how to crack into the websites of one particular unidentified country to other hackers who then went on to deface and destroy those websites. “I don’t know how other information I provided to [Sabu] may have been used, but I think the government’s collection and use of this data needs to be investigated,” he told the court
He added: “The government celebrates my conviction and imprisonment, hoping that it will close the door on the full story. I took responsibility for my actions, by pleading guilty, but when will the government be made to answer for its crimes?”
Hammond’s 10-year federal prison service makes it one of the longest punishments dished out for criminal hacking offences in US history. It joins a lengthening line of long jail terms imposed on hackers and whistleblowers as part of the US authorities’ attempt to contain data security of government agencies and corporations in the digital age.
Preska also imposed a three-year period of probationary supervision once Hammond is released from jail that included extraordinary measures designed to prevent him ever hacking again. The terms of the supervision state that when he is out of prison he must: have no contact with “electronic civil disobedience websites or organisations”; have all his internet activity monitored; subject himself to searches of his body, house, car or any other possessions at any time without warrant; and never do anything to hide his identity on the internet.
Hammond’s 10-year sentence was the maximum available to the judge after he pleaded guilty to one count of the Computer Fraud and Abuse Act (CFAA) relating to his December 2011 breach of the website of the Austin, Texas-based private intelligence company Strategic Forecasting, Inc. Delivering the sentence, Preska dismissed the defendant’s explanation of his motivation as one of concern for social justice, saying that he had in fact intended to create “maximum mayhem”. “There is nothing high-minded and public-spirited about causing mayhem,” the judge said.
She quoted from comments made by Hammond under various internet handles at the time of the Stratfor hack in which he had talked about his goal of “destroying the heart, hoping for bankruptcy, collapse”. She criticised what she called his “unrepentant recidivism – he has an almost unbroken record of offences that demonstrate an almost total disrespect for the law.”
Before the sentence came down, Hammond read out an outspoken statement to court in which he said he had been motivated to join the hacker group Anonymous because of a desire to “continue the work of exposing and confronting corruption”. He said he had been “particularly moved by the heroic actions of Chelsea Manning, who had exposed the atrocities committed by US forces in Iraq and Afghanistan. She took an enormous personal risk to leak this information – believing that the public had a right to know and hoping that her disclosures would be a positive step to end these abuses.”
In his own case, he said that as a result of the Stratfor hack, “some of the dangers of the unregulated private intelligence industry are now known. It has been revealed through Wikileaks and other journalists around the world that Stratfor maintained a worldwide network of informants that they used to engage in intrusive and possibly illegal surveillance activities on behalf of large multinational corporations.”
Margaret Kunstler, a prominent member of the Hammond’s defence team, told the Guardian after the sentencing that the maximum punishment was “not a great surprise”. She said that Preska had turned Hammond’s own comments in web chats against him, “but I think she doesn’t understand the language that’s used in chat rooms and the internet – for her to have used such language against him and not understand what his comments meant seemed piggy to say the least.”
• This article was amended on 17 November 2013. An earlier version incorrectly described Margaret Kunstler as Hammond’s lead defence lawyer.
Ed Pilkington in New York
theguardian.com, Friday 15 November 2013 20.22 GMT
Find this story at 15 November 2013
© 2013 Guardian News and Media Limited or its affiliated companies. All rights reserved.
Jeremy Hammond: Stung or entrapped? The case of the Stratfor hacker raises troubling questions about FBI’s involvement in catching or creating crime21 november 2013
On the day he learned he was to spend 10 years in federal prison for his involvement in an Anonymous hack, 28-year-old Jeremy Hammond read a statement to the Manhattan court. As well as framing his hacktivism as a public service, aimed at revealing the shadier operations of corporate intelligence firms, Hammond told the court that the FBI had played a significant role in cyberattacks in which he had participated, using infamous Anonymous snitch Sabu to provide information to hackers.
Hammond specifically noted that the FBI informant had provided him with information on vulnerabilities within the official websites of various governments around the world, including Brazil, Syria, Iran and Turkey. (The names of the nations were redacted from the court statement, but soon emerged online.)
Hammond stated: “I broke into numerous sites and handed over passwords and back doors that enabled Sabu — and by extension his FBI handlers — to control these targets … The government celebrates my conviction and imprisonment, hoping that it will close the door on the full story. I took responsibility for my actions, by pleading guilty, but when will the government be made to answer for its crimes?”
The hackivist’s contention here is that the U.S. government used hackers to garner information on, and cyber-advantage over, foreign governments. The hackers were then condemned as criminal, having unwittingly performed services for the U.S. government through illegal hacks. Whether or not the targets provided by Sabu were actually of interest to U.S. national intelligence, or whether they were simply valueless sting bate for hackers is unclear. What is evident, however, is that without government assistance, a number of illegal hacks would not have been carried out as they were. The decades-old question thus arises of when a government sting crosses the boundary into entrapment. In the years since 9/11, little more than a faint line in the sand seems to distinguish (legal) stings and (illegal) entrapment operations by the FBI.
advertisement
The criterion purportedly dividing sting and entrapment operations is weak. An operation counts as a sting (as opposed to entrapment) if it can be shown that a suspect would have carried out the crime, given the chance. It’s a perverse logic of hypotheticals when the government provides all the conditions for a crime to take place (e.g., providing talented hackers with government targets) — conditions that would not have been in place otherwise. A number of recent FBI cases relating to political activism have reeked of entrapment, but have been framed as stings. Recall, for example, the group of young Cleveland anarchists, strung along by an FBI agent into agreeing on a plan to blow up a bridge. The young men were, at every turn, prompted and offered materials by an FBI informant. “The alleged terrorist masterminds end up seeming, when the full story comes out, unable to terrorize their way out of a paper bag without law enforcement tutelage,” noted Rick Perlstein on the case in Rolling Stone last year.
Hammond’s case is different. The 28-year-old is a smart, articulate and experienced activist and hacker. As his guilty plea made clear, he knew what he was doing and he acted in what he felt was the public interest, to expose and hold accountable the private intelligence industry. However, Hammond also engaged in wholly government-prompted hacks and is now being ferociously punished. If it can be shown that the U.S. government used information gathered by hackers on Sabu’s tips, crucial questions arise about why the hackers and not the government agencies that used their skills are being persecuted. If, however, Sabu’s information about foreign government sites’ vulnerabilities were no more than a lure, questions of entrapment should be raised. Either way, as Hammond begins his lengthy federal prison sentence for a nonviolent crime, through which he received no personal enrichment, the FBI’s role in catching the hacktivist deserves greater scrutiny.
monday, Nov 18, 2013 05:51 PM +0100
Natasha Lennard
Find this story at 18 November 2013
© 2013 Salon Media Group, Inc.
Jailed Anonymous hacker Jeremy Hammond: ‘My days of hacking are done’21 november 2013
Hammond calls his 10-year sentence a ‘vengeful, spiteful act’ by US authorities eager to put a chill on political hacking
‘I knew when I started out with Anonymous that being put in jail and having a lengthy sentence was a possibility,’ Hammond said. Photo: AP
Jeremy Hammond, the Anonymous hacktivist who released millions of emails relating to the private intelligence firm Stratfor, has denounced his prosecution and lengthy prison sentence as a “vengeful, spiteful act” designed to put a chill on politically-motivated hacking.
Hammond was sentenced on Friday at federal court in Manhattan to the maximum 10 years in jail, plus three years supervised release. He had pleaded guilty to one count under the Computer Fraud and Abuse Act (CFAA) flowing from his 2011 hack of Strategic Forecasting, Inc, known as Stratfor. In an interview with the Guardian in the Metropolitan Correction Center in New York, conducted on Thursday, he said he was resigned to a long prison term which he sees as a conscious attempt by the US authorities to put a chill on political hacking.
He had no doubt that his sentence would be long, describing it as a “vengeful, spiteful act”. He said of his prosecutors: “They have made it clear they are trying to send a message to others who come after me. A lot of it is because they got slapped around, they were embarrassed by Anonymous and they feel that they need to save face.”
Most pointedly, Hammond suggested that the FBI may have manipulated him to carry out hacking attacks on “dozens” of foreign government websites. During his time with Anonymous, the loose collective of hackers working alongside WikiLeaks and other anti-secrecy groups, he was often directed by a individual known pseudonomously on the web as “Sabu”, the leader of the Anonymous-affiliated group Lulzsec, who turned out to be an FBI informant.
Hammond, who is under court orders restricting what he says in public, told the Guardian that Sabu presented him with a list of targets, including many foreign government sites, and encouraged him to break into their computer systems. He said he was not sure whether Sabu was in turn acting on behalf of the FBI or other US government agency, but it was even possible that the FBI was using Sabu’s internet handle directly as contact between the two hackers was always made through cyberspace, never face-to-face.
“It is kind of funny that here they are sentencing me for hacking Stratfor, but at the same time as I was doing that an FBI informant was suggesting to me foreign targets to hit. So you have to wonder how much they really care about protecting the security of websites.”
In the interview, conducted in a secure prison meeting room hours before the 28-year-old Chicagoan was sentenced, he was sanguine about his prospects. “I knew when I started out with Anonymous that being put in jail and having a lengthy sentence was a possibility. Given the nature of the targets I was going after I knew I would upset a lot of powerful people.”
Dressed in a brown prison jump suit, and with a long wispy goatee and moustache (he planned to shave both off before the sentencing hearing), Hammond was scathing about the way the CFAA was being twisted in his view for political ends. “They are widening the definition of what is covered by the Act and using it to target specifically political activists,” he said.
He invoked the memory of Aaron Swartz, the open-data crusader who killed himself in January while awaiting trial under the CFAA for releasing documents from behind the subscription-only paywall of an online research group. “The same beast bit us both,” Hammond said. “They went after Aaron because of his involvement in legitimate political causes – they railroaded charges against him, and look what happened.”
Hammond has been in custody since March 2012 having been arrested in Chicago on suspicion of the Stratfor leak of millions of emails that were eventually released by WikiLeaks as the Global Intelligence Files. His sentence is an indication of the aggression with which prosecutors have been pursuing political hackers in the US – other Anonymous members in Britain involved in the breach of Stratfor were sentenced to much shorter jail terms.
Hammond stressed that he had not benefitted personally in any way from the Stratfor email release, that exposed surveillance by private security firms on activists including Anonymous members themselves, Occupy protesters and campaigners in Bhopal, India involved in the push for compensation for victims of the 1984 industrial catastrophe. “Our main purpose in carrying out the Stratfor hack was to find out what private security and intelligence companies were doing, though none of us had any idea of the scale of it.”
Paradoxically, Hammond insists that he would never have carried out the breach of Stratfor’s computer system had he not been led into doing it by Sabu – real name Hector Xavier Monsegur – the fellow hacker who is himself awaiting sentencing having pleaded guilty to 12 hacking-related criminal charges. “I had never heard of Stratfor until Sabu brought in another hacker who told me about it. Practically, I would never have done the Stratfor hack without Sabu’s involvement.”
Hammond discovered that Monsegur was an FBI informant the day after his own arrest. As he was reading the criminal complaint against him, he saw quotes marked CW for “co-operating witness” that contained details that could only have come from Sabu.
“I felt betrayed, obviously. Though I knew these things happen. What surprised me was that Sabu was involved in so much strategic targeting, in actually identifying targets. He gave me the information on targets.”
Part of Sabu’s interest in him, he now believes, was that Hammond had access to advanced tools including one known as PLESK that allowed him to break into web systems used by large numbers of foreign governments. “The FBI and NSA are clearly able to do their own hacking of other countries. But when a new vulnerability emerges in internet security, sometimes hackers have access to tools that are ahead of them that can be very valuable,” he said.
Looking back on his involvement with anonymous, the Chicagoan said that he had been drawn to work with Anonymous, because he saw it as “a model of resistance – it was decentralised, leaderless.” He grew increasingly political in his hacking focus, partly under the influence of the Occupy movement that began in Wall Street in September 2011 and spread across the country.
Chelsea Manning, the US soldier formerly known as Bradley who leaked a massive trove of state secrets to WikiLeaks now serving a 35-year sentence in military jail, was a major influence on him. Manning showed him that “powerful institutions – whether military or private security firms – are involved in unaccountable activities that the public is totally unaware of that can only be exposed by whistleblowers and hackers”.
Hammond has often described himself as an anarchist. He has a tattoo on his left shoulder of the anarchy symbol with the words: “Freedom, equality, anarchy”. Another tattoo on his left forearm shows the Chinese representation of “leader” or “army”, and a third tattoo on his right forearm is a glider signifying the hacking open-source movement that is drawn from the computer simulation Game of Life .
He says he plans to use his time in prison “reading, writing, working out and playing sports – training myself to become more disciplined so I can be more effective on my release”. As to that release, he says he cannot predict how he will be thinking when he emerges from jail, but doubts that he would go back to hacking. “I think my days of hacking are done. That’s a role for somebody else now,” he said.
Ed Pilkington in New York
theguardian.com, Friday 15 November 2013 17.12 GMT
Find this story at 15 November 2013
© 2013 Guardian News and Media Limited or its affiliated companies. All rights reserved.
A Conversation With Jeremy Hammond, American Political Prisoner Sentenced to 10 Years21 november 2013
Jeremy Hammond, the Chicago activist and hacktivist (an activist who uses computer networks for political
protests and other actions), was sentenced last week to 10 years in prison and three years of supervised release for hacking into the intelligence contractor Strategic Forcasting (or Stratfor) and other government, law enforcement and military suppliers’ websites.
The Stratfor hack resulted in a cache of 5.2 million leaked emails and account information for approximately 860,000 Stratfor subscribers and clients, including information from 60,000 credit cards. To list a few of the many revelations, the emails revealed domestic spying on activists, including Occupy Wall Street; surveillance through persona management programs or fake online personas (“sock puppets”); and attempts to link American activist and journalist Alexa O’Brien to al-Qaeda. The Stratfor hack pullled back the curtain on the ofttimes illegal goings-on in the shadowy world of intelligence contractors.
Mr. Hammond’s supervised release includes limited computer access and prohibits him using encryption and from associating with civil disobedience groups. The ban on encryption shows a fundamental misunderstanding of how the Internet works. Encryption is used in nearly every online transaction, such as email, social networking and online banking. The broad ban on freedom of association raises potential Constitutional issues. At the time of his arrest, Mr. Hammond was working under the banner of AntiSec, an offshoot of the hacktivist collective Anonymous.
Jeremy Hammond, American Political Prisoner, courtesy of @FreeAnons.
The packed courtroom looked more like a church wedding than a sentencing, with dozens of Westpoint cadets on a field trip sitting on the left and Mr. Hammond’s parents, friends and supporters — who caravanned from all over the U.S. to show solidarity for their fallen comrade — sitting on the right. Mr. Hammond, his attorneys, Sarah, Emily and Margaret Kunstler and Susan Kellman faced the stoic Judge Loretta Preska presiding over the solemn ceremony.
On September 10th I visited Jeremy Hammond at Manhattan Correctional Center where he had been incarcerated for 18 months. Mr. Hammond, who was denied bail, was also disallowed all visitors, including family members. I am the first journalist with whom Mr. Hammond met since his arrest in March 2012. This interview was held months before sentencing. At the request of Mr. Hammond’s attorneys, who feared his words would be used at sentencing against him, I delayed publishing.
____________________________
Vivien Lesnik Weisman: You are both a boots on the ground activist and a hacktivist. Can you explain hacktivisim, hacking for political purposes and off line activism?
Jeremy Hammond: Hackers are by nature critical of systems, hacking is activism. The very act of hacking is inherently activist and political.
VLW: How effective is activism without the added thread of technology, or hacktivism, in the modern world? Which is more effective?
JH: Hacking is never going to take the place of grassroots community organizing. They complement each other.
There is more to it of course than hacking. Hacktivism involves online social networking, sharing ideas. Protest is predictable; they know how to contain it. The government knows how to ignore it. Both direct action and civil disobedience are unpredictable. I’m all for it.
I see hacktivism as a direct action tool. Offensive hacking with political intent is really nothing more than one more direct action tool. What you do when you get the information is what determines its efficacy as a direct action tool.
And now because of the state of the world — foreclosures, the wars — hackers are becoming politicized. We break into systems and then movements like Occupy deliver the message. It all works together. There is street protest. There is direct action, and hacking is one more tool.
Subverzo, hacktivist, at post-sentencing rally, Foley Square. Photo credit: Still from The Reality Wars, A.J. Abucay DP
VLW: How did the decision to target the intelligence contractor, Stratfor, come about and what was your involvement?
JH: Another hacker, who has not been indicted and therefore I will not name, brought the vulnerability. He had the credit cards already, before I ever got involved, on the Dec 5th. He chose Stratfor and brought it to us. There were 12 of us in the IRC (chat room) at that time.
Stratfor was chosen by that hacker because Stratfor had targeted Anonymous and specifically #OpCartel (Anonymous action against Mexican drug cartels).
Then the 12 of us in a private IRC channel approved it on the merits, as a meritocracy, the Anon way.
None of the 12 in that chat room that included me and Sabu [hacker leader turned FBI informant] have ever been caught.
Amongst the 12 were not only hackers. Some were social media types who brought attention to the actions.
I did the Stratfor hack all by myself except for the original vulnerability. I was the main hacker in Anti-Sec.
Sabu refers to Hetcor Xavier Monsegur, hacker and leader of LulzSec, an offshoot of Anonymous. LulzSec was an elite hacker collective that obtained notoriety as much for their high profile targets as for their clever self-promotion. Sabu was arrested by the FBI and began working for them that day. The following day he announced the formation of AntiSec, “the biggest unified collective of hackers in history.” Both in private IRC and through his various public Twitter accounts he encouraged hackers to join AntiSec and commit hacking crimes. Many hacktivists and rights organizations see these — including the Statfor hack — as government created crimes given that Sabu was working for his FBI handlers at the time he was inciting hackers to join AntiSec. After Sabu was turned, all of his actions can be seen as government actions. In essence, the name Sabu and the government can be used interchangeably in this context.
He is responsible for the arrests of many Anons including Jeremy Hammond.
Hector Xavier Monsegur Jr, hacker known by his nom de guerre Sabu, FBI informant.
VLW: Did you ever suspect that Sabu was a Fed (FBI informant) before that became public?
JH: I was in a chat room with 12 hackers. Chances are someone in there was a Fed. I don’t work with anyone who has not taken risks alongside me. Sabu had taken risks and hacked himself. Still, I could have done this all on my own. I was the main hacker in Anti-Sec.
VLW: And that hacker who provided the exploits also came with the credit cards? And were the credit cards live?
JH: Yes. The credit cards were live. We all spoke on Dec 6th and planned a coordinated day of action when we would choose charities and use the credit cards to make donations for Christmas to these charities, Christmas donations.
VLW: LulzXmas?
JH: Yes.
Jeremy Hammond is often referred to as a digital Robin Hood for his participation in LulzXmas. Margaret Ratner Kunstler, Hammond’s attorney, clarified that her client did not himself make any donations or use the credit cards. He also did not personally profit from the hacked credit cards.
JH: But our main focus was the emails, to reveal the spying. Stratfor was spying on the world. We revealed the anti-WikiLeaks actions by Stratfor. Stratfor was spying on Occupy Wall Street, WikiLeaks, and Anonymous.
We didn’t even know about the Venezuelan coup discussions proving U.S. involvement in the attempted coup until we saw that in the Strafor emails later.
It was all revealed on WikLeaks but I had moved on. I’d rather be hacking.
[He smiles.]
VLW: There is speculation that the Stratfor hack was designed by the government and carried out by their informant Sabu as an attempt to entrap Julian Assange by getting him to solicit information or even sell him information. Were you aware of such a plan and if so did you make a conscious decision to foil that plan by dumping on the Pirate Bay before the transaction could be completed?
JH: No, that did not happen. Julian Assange and WikiLeaks was not a factor.
In fact, many hacktivists make the claim that the Stratfor hack was designed to entrap Julian Assange. Hammond is not necessarily in a position to know whether that was the case or not.
VLW: Stratfor was notified by the government that they had been penetrated and told to do nothing. Why did they allow Stratfor to be sacrificed?
JH: We do not know to what degree they notified Stratfor. Interesting question, but we don’t know.
VLW: Why did the Stratfor hack take so long to complete? And why destroy the servers?
JH: I had to get to the mail servers. It takes time. We always destroy the servers.
First you deface, then you take the information, then you destroy the server, for the Lulz [for fun], and so they can’t rebuild the system. We don’t want them to rebuild. And to destroy forensic information that could be used to find out who did it and how it was done.
VLW: What are your preferred targets?
JH: My preferred targets are military contractors, military suppliers and law enforcement.
VLW: Intelligence contractors like Stratfor?
JH: Tech intelligence firms are a preferred target. Tech firms — where white hat hackers are paid to target the 99% for their corporate overlord clients.
Chris Hedges, journalist, TruthDig columnist, speaks at Hammond Rally. Photo credit: Still from The Reality Wars, A.J. Abucay DP
Those firms also contain the keys to their corporate clients so there is a big payoff — Endgame Systems and Palantir, for example.
Endgame Systems is the subject of much discussion. Engame Systems is self-described as providing offensive and defensive vulnerability research, mitigation of cyber-threats and cyber operations platforms. It is in the business of selling “zero day exploits.” That is, the vulnerabilities that have not yet been detected. According to a Business Week article, these zero day exploits are militarized and include entire blueprints of the computer systems of airports and other critical infrastructure including that of our western allies for example Paris’s Charles De Gaulle Airport. It is difficult to see how the sale of these exploits makes us more secure.
A package of these zero day exploits can be purchased for 2.5 million dollars a year. The price list was revealed in a cache of emails in the HBGary hack, an earlier Anonymous operation. Endgame weaponry is sold by region — China, the Middle East, Russia, Latin America, and Europe. There are even target packs for European and other allies. That raises the question of whether these exploits are being sold to foreign actors. Even if not sold directly to enemies of the U.S., cyber munitions like conventional arms have a way of showing up in unintended places. Once these exploits are out there they are vulnerable to rouge hackers and rogue states.
JH: White hat hackers are being paid to do supposedly defensive actions but they are offensive. White hat hackers are supposed to identify a vulnerability and then announce. But instead they sell the vulnerability, the exploits. So if you hack for the thrill it’s not ok. But for money, like Endgames, then somehow it is. And instead of going to jail for hacking you get awarded a government contract.
At least, the NSA is supposed to — and that is a big “supposed to” — have some kind of government oversight and again that’s overstated; these government contractors, intel firms and tech firms like Stratfor have no oversight whatsoever. They are not bound by any laws. They are above the law. No FOIA (request for classified or other non-public information from the government under the Freedom Of Information Act) can compel them to reveal what they do. Rogue hackers have better access to vulnerabilities than government hackers.
VLW: That reminds me of The Conscience of a Hacker by the Mentor. Did you read that?
Known as the Hacker Manifesto, it could just be Jeremy Hammond’s ethos.
It reads:
You build atomic bombs, you wage wars, you murder, cheat, and lie to us and try to make us believe it’s for our own good, yet we’re the criminals.
Yes, I am a criminal. My crime is that of curiosity. My crime is that of judging people by what they say and think, not what they look like.
My crime is that of outsmarting you, something that you will never forgive me for. I am a hacker, and this is my manifesto. You may stop this individual, but you can’t stop us all… after all, we’re all alike.
JH: From the 90’s? You hate me because I’m better than you are. Yeah, yeah.
[He smiles.]
Citizen journalist/activist and Hammond supporter Tara Jill Livestreams outside the court house. Photo credit: Still from The Reality Wars, A.J. Abucay DP
VLW: What do you think about the new battlefield, or cyberwarfare?
JH: The government calls it cybersecurity, but it’s really offensive hacking not just defensive.
The Department of Defense deals in war and aggression but it is not called Department of War is it? The government calls what they do mitigation of the threat of a cyber offensive. But these are offensive acts. They are acts of war. This is the new terrain. The new battlefield.
The war is on and it’s for the Internet. They spy on us, they spy on others, intellectual property rights wars, censorship….
For example, when encryption first came out PGP (Pretty Good Privacy, the first publicly available encryption software) it was called a munition and they immediately tried to ban it.
Encryption is part of our arsenal. It trumps the surveillance state.
As Mr. Hammond was waiting to be handcuffed in order for me to be escorted out of the small room at Manhattan Correctional Center where Mr. Hammond and I had conversed for over 4 hours, I asked him one last question.
VLW: You want to challenge the political system in the US and the world with technology. Is technology your weapon in the same way rifles were weapons in the past? Are you willing to die for your cause?
Handcuffed and standing before me with the guard awaiting my exit he pondered the question. As the guard ushered me out he responded.
JH: Die for my cause? Yes.
Go to prison, die for my cause… or choose to live a life of submission.
____________________________
Mr. Hammond’s bold and principled stand is sure to inspire others to make a similar choice.
This is part one of a two part article.
I am currently working on The Reality Wars, a feature length documentary about the targeting of activists, hacktivists and journalists by the US government and the nexus between intelligence contractors and the surveillance state. Jeremy Hammond and the Stratfor hack are covered in my film.
Posted: 11/19/2013 10:18 am
Find this story at 19 November 2013
© 2013 TheHuffingtonPost.com, Inc.
Cyber-Activist Jeremy Hammond Sentenced to 10 Years In Prison; The hacker, who pleaded guilty in May, is given the maximum sentence by a federal judge21 november 2013
Cyber-activist Jeremy Hammond was sentenced to 10 years in federal prison this morning by Judge Loretta A. Preska in a federal courtroom in lower Manhattan for hacking the private intelligence firm Stratfor. When released, Hammond will be placed under supervised control, the terms of which include a prohibition on encryption or attempting to anonymize his identity online.
Hammond has shown a “total lack of respect for the law,” Judge Preska said in her ruling, citing Hammond’s criminal record – which includes a felony conviction for hacking from when he was 19 – and what she called “unrepentant recidivism.” There is a “desperate need to promote respect for the law,” she said, as well as a “need for adequate public deterrence.”
Read ‘Enemy of the State,’ Our 2012 Feature on Jeremy Hammond’s Rise and Fall
As Hammond was led into the courtroom, he looked over the roughly 100 supporters who had shown up, smiled, and said, “What’s up, everybody?” Prior to the verdict, he read from a prepared statement and said it was time for him to step away from hacking as a form of activism, but recognized that tactic’s continuing importance. “Those in power do not want the truth exposed,” Hammond said from the podium, wearing black prison garb. He later stated that the injustices he has fought against “cannot be cured by reform, but by civil disobedience and direct action.” He spoke out against capitalism and a wide range of other social ills, including mass incarceration and crackdowns on protest movements.
The Stratfor hack exposed previously unknown corporate spying on activists and organizers, including PETA and the Yes Men, and was largely constructed by the FBI using an informant named Hector Monsegur, better known by his online alias Sabu. Co-defendants in the U.K. were previously sentenced to relatively lighter terms. Citing Hammond’s record, Judge Preska said “there will not be any unwarranted sentencing disparity” between her ruling and the U.K. court’s decision.
Hammond’s supporters and attorneys had previously called on Judge Preska to recuse herself following the discovery that her husband was a victim of the hack she was charged with ruling on. That motion was denied. (Full disclosure: This reporter previously spoke at a rally calling on Judge Preska to recuse herself.)
Hammond’s defense team repeatedly stressed that their client was motivated by charitable intentions, a fact they said was reflected in his off-line life as well. Hammond has previously volunteered at Chicago soup kitchens, and has tutored fellow inmates in GED training during his incarceration.
Rosemary Nidiry, speaking for the prosecution, painted a picture of a malicious criminal motivated by a desire to create “maximum mayhem,” a phrase Hammond used in a chat log to describe what he hoped would come from the Stratfor hack. Thousands of private credit card numbers were released as a result of the Stratfor hack, which the government argued served no public good.
Sarah Kunstler, a defense attorney for Hammond, takes issue with both the prosecution and judge’s emphasis on the phrase “maximum mayhem” to the exclusion of Hammond’s broader philosophy shows an incomplete picture. “Political change can be disruptive and destructive,” Kunstler says. “That those words exclude political action is inaccurate.”
Many supporters see Hammond’s case as part of a broader trend of the government seeking what they say are disproportionately long sentences for acts that are better understood as civil disobedience than rampant criminality. Aaron Swartz, who faced prosecution under the Computer Fraud and Abuse Act – the same statute used to prosecute Hammond – took his own life last year, after facing possible decades in prison for downloading academic journals from an MIT server. “The tech industry promised open access and democratization,” says Roy Singham, Swartz’s old boss and executive chairman of ThoughtWorks, a software company that advocates for social justice. “What we’ve given the world is surveillance and spying.” Singham says it’s “shameful” that “titans of the tech world” have not supported Hammond.
Following his first conviction for hacking, Hammond said, he struggled with returning to that life, but felt it was his responsibility. That decision ultimately lead to the Stratfor hack. “I had to ask myself, if Chelsea Manning fell into the abysmal nightmare of prison fighting for the truth, could I in good conscience do any less, if I was able?” he said, addressing the court. “I thought the best way to demonstrate solidarity was to continue the work of exposing and confronting corruption.”
by John Knefel
NOVEMBER 15, 2013
Find this story at 15 November 2013
©2013 Rolling Stone
105 Years in Jail for Posting a Link? That’s what Barrett Brown is facing.20 november 2013
A few months ago [1] I passed along the story of Barrett Brown, a young journalist/activist who relentlessly followed up on documents leaked by Anonymous, was targeted for this by the FBI, and who was eventually harassed enough that he cracked—which took the unfortunate form of recording a YouTube rant promising to “destroy” one of his tormentors.
Brown was indicted for posting the YouTube threats, and there’s no question that it was an ill-advised rant regardless of the FBI instigation. But David Carr follows up with more today. It turns out that only three of the charges against Brown are related to the video. Twelve more are related to a link he posted in a chat room: [2]
In December 2011, approximately five million e-mails from Stratfor Global Intelligence, an intelligence contractor, were hacked by Anonymous and posted on WikiLeaks. The files contained revelations about close and perhaps inappropriate ties between government security agencies and private contractors. In a chat room for Project PM, Mr. Brown posted a link to it.
Among the millions of Stratfor files were data containing credit cards and security codes, part of the vast trove of internal company documents….According to one of the indictments, by linking to the files, Mr. Brown “provided access to data stolen from company Stratfor Global Intelligence to include in excess of 5,000 credit card account numbers, the card holders’ identification information, and the authentication features for the credit cards.”
….But keep in mind that no one has accused Mr. Brown of playing a role in the actual stealing of the data, only of posting a link to the trove of documents….“The YouTube video was a mistake, a big one,” said Gregg Housh, a friend of Mr. Brown’s who first introduced him to the activities of Anonymous. “But it is important to remember that the majority of the 105 years he faces are the result of linking to a file. He did not and has not hacked anything, and the link he posted has been posted by many, many other news organizations.”
This is almost a textbook case of prosecutorial overreach. As Carr points out, the guy who actually stole the Stratfor information is facing a sentence of only ten years. So why is Brown facing 105 years? Certainly not for a video posted while he was in withdrawal from heroin addiction. More likely, it’s because the government considers him a thorn in their side and wants to send a message to anyone else planning to follow in Brown’s footsteps. That just ain’t right. As Carr says, “Punishment needs to fit the crime and in this instance, much of what has Mr. Brown staring at a century behind bars seems on the right side of the law, beginning with the First Amendment of the Constitution.”
Links:
[1] http://www.motherjones.com/kevin-drum/2013/03/barrett-brown-and-fbi
[2] http://www.nytimes.com/2013/09/09/business/media/a-journalist-agitator-facing-prison-over-a-link.html?ref=business&pagewanted=all
By Kevin Drum | Mon Sep. 9, 2013 8:47 AM PDT
Social Title:
105 years in jail for posting a link?
Find this story at 9 September 2013
Copyright ©2013 Mother Jones and the Foundation for National Progress.
Barrett Brown’s Mother Will Be Sentenced Today20 november 2013
The mother of Anonymous-affiliated activist Barrett Brown, Karen Lancaster McCutchin, will be sentenced today, November 8, the Associated Press reports.
Back in May, she admitted to helping her son hide two laptops from federal agents that were investigating the activist. The laptops were hidden in a kitchen cabinet just as FBI agents were executing a search warrant.
As per the plea agreement, McCutchin faces up to 12 months in prison and a fine of up to $100,000 (€75,000).
In the meantime, the case of Barrett Brown continues. He is accused, among other things, of threatening a federal agent in a video published on YouTube, and posting links to information stolen by Anonymous hackers from the think tank Stratfor.
He faces up to 105 years in prison and substantial fines.
November 8th, 2013, 13:49 GMT · By Eduard Kovacs, November 8, 2013 [AP]
Find this story at 8 November 2013
© 2001 – 2013 Softpedia. All rights reserved.
Moscow Denies U.S.-Based Diplomat Sought Young Spies13 november 2013
Moscow has angrily denied that one of its diplomats in Washington tried to recruit young Americans to spy for Russian intelligence agencies, calling the allegations a “horror story” reminiscent of the Cold War.
The spy flap centering around the 59-year-old head of a Kremlin-funded cultural exchange program raises the specter of a new dispute rocking already stormy relations between Russia and the U.S.
The FBI is investigating whether Yury Zaitsev, head of the Russian Center for Science and Culture, is a Russian intelligence officer who arranged all-expense-paid trips to Russia aimed at grooming young Americans, including students, political aides, nonprofit sector workers and business executives, according to Mother Jones magazine, which first broke the story.
The Russian Embassy in Washington and Zaitsev himself rejected the allegations and expressed concern that unknown people were trying to ruin efforts by Presidents Barack Obama and Vladimir Putin to mend and expand ties.
“It’s a shame that Russian-American relations periodically echo the Cold War,” Zaitsev, who refused to speak to Mother Jones on the issue, said late Wednesday in an interview with state news agency Itar-Tass. “Someone apparently wants to see the Iron Curtain fall between our two countries once again.”
“This kind of horror story very much resembles the Cold War era,” embassy spokesman Yevgeny Khorishko said in a statement released to Russian media. “A blunt attempt is being made to distort and discredit the activities of the Russian cultural center, which focuses on developing trust and cooperation between our two countries and people.”
He warned that “somebody intends to torpedo” a goal set by Obama and Putin at a Group of Eight summit in June to expand direct contracts between Americans and Russians so as to raise relations to a new level.
But Khorishko vowed that Moscow would not be deterred by the spy allegations. ”The Russian cultural center has been working to expand contacts and improve understanding between Russian and American citizens and will continue to do this work,” he said.
The Russian center is housed in a 1895 mansion purchased by Moscow in 1957. (rccusa.org)
Mother Jones and other U.S. media reported that FBI officials had met with people who traveled to Moscow and St. Petersburg on trips organized by the Russian cultural center and quizzed them on whether Zaitsev worked for Russian intelligence and whether any attempts had been made to recruit them during their stay. The media reports, citing trip participants, said all had denied that the Russians had sought to recruit them.
The FBI refused to comment on whether it had opened an investigation into Zaitsev.
Zaitsev has diplomatic immunity, so U.S. prosecutors could not press charges against him if the FBI were to conclude that he broke the law. But the State Department could withdraw his immunity, forcing the Russian Foreign Ministry to recall him to Moscow.
The cultural center has brought 128 Americans on “short-term, fact-finding trips” to Russia since the exchange program was created under a presidential decree in 2011, according to program information on the center’s website. The global program, which seeks participants aged 25 to 35, has also invited 1,219 people from other countries, including 283 from Europe, 157 from Asia and the Middle East, 29 from Africa and South America and 750 from other former Soviet republics.
About 25 people participated in each trip from the U.S., and they stayed at five-star hotels and met with senior politicians like the mayors of Moscow and St. Petersburg and Federation Council Deputy Speaker Alexander Torshin, Mother Jones said.
Zaitsev, a St. Petersburg native, said in the interview that trip participants were being targeted in a “witch hunt” rooted in a U.S. fear of Russia. “I think it is simply unacceptable that they are ordered to tell what, why, how and why,” he said.
In a reminder of lingering suspicions in both countries, Zaitsev pointed out that the U.S. government also organizes exchange programs that bring young Russians to the United States, and he insisted that his program was as transparent as any of those. “All of the information about our programs and projects is publicly available on our website,” he said.
Zaitsev’s path to Washington is not clear from his organization’s website. He received a doctorate in economics from the Leningrad Technological Institute in 1980 and then worked in several government-run student organizations until the Soviet collapse, according to his online biography. He worked in unspecified “leadership positions in private companies” from 1992 until he was appointed head of the cultural center in July 2010. He is married and has one adult son.
The center’s second floor has a space library focusing on Russian-U.S. cooperation. (rccusa.org)
But Zaitsev faces a formidable task. Relations between the Russia and the U.S. have soured since Putin returned to the presidency last year, with Washington deploring a Kremlin crackdown on the opposition and a ban on U.S. parents adopting Russian children. Moscow for its part has assailed the U.S. Magnitsky blacklist of Russian officials accused of human rights violations.
The tensions have cast a shadow over yearlong events mean to celebrate the 80th anniversary of diplomatic relations.
The Russian cultural center, also known as Rossotrudnichestvo, is “the official home of Russian culture in the United States” and was created in 2001 under a bilateral agreement aimed at fostering relations, according to its website.
It is housed in a 1895 mansion located 20 minutes by foot from the White House that the Soviet government bought in 1957 and used for the embassy’s consular services for 40 years.
The first floor contains the Moscow Room, decorated in cream and gold leaf and with paintings of the Bolshoi Theater, the Kremlin, Moscow State University and Christ the Savior Cathedral; as well as the Hall of Mirrors, with two gala portraits of Peter the Great and Catherine the Great; and the Russian-American Room, with a colorful panorama depicting key moments in Russian-American relations.
The second floor hosts the Pushkin Library, with more than 2,000 books, 300 movies on video and DVD and more than 100 audiobooks; a space library focusing on Russian-U.S. cooperation in space exploration; and classrooms offering Russian-language lessons.
The third floor contains two guest rooms, while the basement has a kitchen that prepares meals for the center’s receptions and offers classes on Russian cuisine.
25 October 2013 | Issue 5242
By Andrew McChesney
Find this story at 25 October 2013
© Copyright 1992-2013. The Moscow Times.
Head of D.C.-based Russian cultural center being investigated as possible spy13 november 2013
The FBI is investigating whether the U.S.-based director of a Russian government-run cultural exchange program was clandestinely recruiting Americans as possible intelligence assets, according to law enforcement officials.
FBI agents have been interviewing Americans who participated in the Rossotrudnichestvo exchange program run by Yury Zaytsev, who also heads the Russian Center for Science and Culture in Washington. For the past 12 years, the program has paid for about 130 Americans to visit Russia.
Latest from National Security
Senior Navy civilians investigated in alleged fraud
Craig Whitlock 2:27 AM ET
Court records show $1.6 million was paid to an auto mechanic who produced rifle silencers for $8,000.
Two admirals face inquiry in Navy bribery scheme
Craig Whitlock NOV 9
The Navy put the pair, including its top intelligence official, on leave and suspended their access to classified material.
After teenager flees to Syria, family fights to bring him back
Michael Birnbaum and Souad Mekhennet NOV 12
A Muslim family living in Germany “kidnaps” the youth, who had jihadi aspirations, close to Syria’s border.
NSA Secrets
Full coverage of the revelations and debate surrounding National Security Agency surveillance programs.
FBI spokeswoman Amy Thoreson declined to comment on whether there was an investigation or to discuss the bureau’s role. A woman who answered the phone at the cultural center said that neither Zaytsev nor the center would comment.
“We know that the boys and girls are speaking,” said the woman, referring to the young Americans who participated in the program and have been interviewed by the FBI. “There are many. But we shall not put out a comment.”
“We are clean and transparent, friendly and true,” said the woman, who did not give her name or title.
The center, at Phelps Place in the Kalorama neighborhood of northwest Washington, offers language lessons and cultural programs, according to its Web site.
A spokesman for the Russian Embassy in Washington denied that the cultural center was involved in the recruitment of spies.
“All such ‘scaring information’ very much resembles Cold War era,” the spokesman, Yevgeniy Khorishko, said in an e-mail. He added that such allegations were being leveled only to “distort and to blacken activities of the Russian Cultural Center.”
The FBI investigation of Zaytsev was first reported by Mother Jones magazine on its Web site.
Law enforcement officials said the FBI is investigating whether Zaytsev and Rossotrudnichestvo have used trips to Russia to recruit Americans. Rossotrudnichestvo paid for all their expenses, including meals, travel, visa fees and lodging. Most of the trips involved about 25 participants, who sometimes stayed in luxury hotels and met with Russian government officials.
Zaytsev did not go on the exchange trips, said one law enforcement official, but he created files on some of the participants, allegedly to cultivate them as future intelligence assets. Law enforcement officials would not comment on whether the FBI has any evidence that Zaytsev was successful in recruiting any assets.
As part of their probe, FBI special agents are trying to interview the Americans who participated in the program, including graduate students, business executives, political aides and nonprofit workers. Rossotrudnichestvo also has cultural exchanges for young people in Europe, Africa, Latin America and Asia.
Richard Portwood, the executive director of the Center for American-Russian Engagement of Emerging Leaders and a participant in the cultural exchange program, said he was interviewed by the FBI this month and was told that Zaytsev was a foreign intelligence officer.
“These revelations came as a total surprise,” Portwood said in a statement. “My sincere hope is that Mr. Zaytsev’s alleged activities do not prevent U.S.-Russia cultural exchanges in the future.”
Portwood, 27, a graduate student at Georgetown University’s School of Foreign Service, said in a telephone interview that he took two trips to Russia through the exchange program, each lasting a little more than a week, in December 2011 and in June 2012. He said the FBI wanted to know what he and others traveling with him did on the trips, whom they met with and whether they saw anything suspicious. Portwood said the trips did not raise any suspicions. But he added: “Cold War spy games have existed for decades between the U.S. and Russia. We’re not naive to that history.”
Zaytsev, who is on a State Department list of foreign mission staff, has diplomatic immunity, according to an administration official. The United States could revoke his immunity, which would force him to return to Russia, a law enforcement official said.
By Sari Horwitz, Published: October 23 E-mail the writer
Nick Anderson contributed to this report.
Find this story at 23 October 2013
© 1996-2013 The Washington Post
FBI Probing Whether Russia Used Cultural Junkets to Recruit American Intelligence Assets13 november 2013
Did a senior Russian embassy officer set up exchange trips to Moscow to cultivate young, up-and-coming Americans as Russian intelligence assets?
On September 30, Richard Portwood, a 27-year-old Georgetown University graduate student, received a phone call from an FBI agent who said the bureau wanted to meet with him urgently. Portwood didn’t know why the FBI would have any interest in him, but two days later he sat down with a pair of agents at a coffee shop near his apartment. They told him they suspected that Yury Zaytsev, the US director of a Russian government-run cultural exchange program that Portwood had participated in, was a spy.
Since 2001, Zaytsev’s organization, Rossotrudnichestvo, has footed the bill for about 130 young Americans—including political aides, nonprofit advocates, and business executives—to visit Russia. Along with Portwood, Mother Jones has spoken to two other Rossotrudnichestvo participants who were questioned by the FBI about Zaytsev, who also heads the Russian Cultural Center in Washington.
Yury Zaytsev, a Russian diplomat. Multiple sources tell us he is the subject of an extensive FBI investigation. Rossotrudnichestvo
The FBI agents “have been very up front about” their investigation into whether Zaytsev is a Russian intelligence agent, says a 24-year-old nonprofit worker whom the FBI has interviewed twice and who asked not to be identified. The FBI agents, according to this source, said, “We’re investigating Yury for spying activities. We just want to know what interactions you’ve had with him.” The nonprofit worker was shocked. Zaytsev, he says, is “what you imagine when you imagine a Russian diplomat. He’s fairly stoic, tall, pale.” Zaytsev did not travel on the exchange trips he helped arrange, and his contact with the Americans who went on these trips was limited.
The agents who interviewed the Rossotrudnichestvo participants did not tell them what evidence they possessed to support their suspicions. FBI spokeswoman Amy Thoreson declined to confirm or deny the existence of an investigation into Zaytsev or answer any questions about FBI actions regarding the Russian. (The FBI did not ask Mother Jones to withhold this story.) But based on what the bureau’s agents said during the interviews, the Americans who were questioned concluded the FBI suspects that Zaytsev and Rossotrudnichestvo have used the all-expenses-paid trips to Russia in an effort to cultivate young Americans as intelligence assets. (An asset could be someone who actually works with an intelligence service to gather information, or merely a contact who provides information, opinions, or gossip, not realizing it is being collected by an intelligence officer.) The nonprofit worker says the FBI agents told him that Zaytsev had identified him as a potential asset. Zaytsev or his associates, the agents said, had begun to build a file on the nonprofit worker and at least one other Rossotrudnichestvo participant who had been an adviser to an American governor.
Advertise on MotherJones.com
Many countries—including the United States—place spies abroad under diplomatic cover, and it’s common for law enforcement agencies to keep a close eye on foreign diplomats who might be engaged in espionage. The Americans interviewed by the FBI say the agents did not indicate whether they believed Zaytsev had succeeded in developing Americans as assets.
The FBI appears to be mounting an extensive investigation of Zaytsev. The three Americans interviewed by the FBI say the agents told them the bureau is trying to interview every American who has attended these trips. The nonprofit worker says that FBI agents went so far as to contact a married couple, who are Rossotrudnichestvo alums, while they were vacationing in Japan. He says the agents told him they were also scouring flight manifests associated with Rossotrudnichestvo trips for names that showed up repeatedly and could be Zaytsev collaborators.
All three former participants describe their Rossotrudnichestvo experience as a typical cultural exchange program, albeit a ritzy one. The organization paid for meals, travel, lodging, and every other expense associated with the trip, down to the visa fee. During the St. Petersburg leg of a June 2012 trip, participants stayed at the Sokos Hotel Palace Bridge, a luxury hotel that has hosted delegations for the G8 and G20 summits. Participants on that trip met with the governors of Moscow and St. Petersburg and with Aleksander Torshin, a high-ranking member of Vladimir Putin’s United Russia party. Since 2011, Rossotrudnichestvo has organized six trips. Most included about 25 people, although roughly 50 visited Russia during the group’s first trip in December 2011.
The application process for this exchange program is simple. The application form calls for basic personal details—including the applicant’s place of work and job title—copies of the applicant’s passport, and a one-page letter “briefly outlining why you should be selected, why you are interested and what interests you have in collaboration with Russia.” Applicants tend to find the program through referrals. (Portwood has referred about 50 people to Rossotrudnichestvo. To his knowledge, Rossotrudnichestvo never denied any applicants.) The group also offers similar exchanges to young professionals in Asia, Latin America, Africa, and Europe.
When I called the Russian Cultural Center last week, Zaytsev answered. He declined to answer questions about the FBI’s investigation on the phone, but he eagerly invited me to visit him at the center two days later. “I welcome any questions you have for me,” he said. When I arrived, though, Galina Komissarova, a center employee, asked me to leave, saying I hadn’t sent questions in advance as Zaytsev had requested. (He hadn’t.) Komissarova would not disclose her title or role at the center. “I just clean,” she said sternly, showing me the door. I discovered later that Komissarova is Zaytsev’s wife.
Since then, Zaytsev has not replied to written questions or returned repeated phone calls.
A State Department spokeswoman confirms that Zaytsev is on a list of foreign mission staff who have diplomatic immunity. If it chose to, the United States could revoke his immunity, forcing Russia to call him home.
Portwood, who attended Rossotrudnichestvo trips in 2011 and 2012, and the other Americans questioned by the FBI were asked a similar set of questions. The agents wanted to know how they had heard about the exchange program and where in Russia they traveled. They also asked whether participants had encountered any anti-American sentiment on their trip, were offered jobs, or had suspicious interactions with Rossotrudnichestvo afterward. Portwood and the two other participants said they answered “no” to these questions.
According to three Rossotrudnichestvo alums, Zaytsev displayed no suspicious behavior and none developed an ongoing relationship with him after their excursion. For most Rossotrudnichestvo participants, they say, Zaytsev was merely the name on the congratulatory letter they received when they were accepted into the exchange program.
The third participant who spoke to Mother Jones about the exchange program, a 26-year-old resident of Washington, DC, is not surprised by the FBI’s allegations—and doesn’t care whether he was targeted as a possible intelligence asset. “There’s not a single American diplomat anywhere in the American sphere of influence who doesn’t have an open line of communication with the CIA. … [What Zaytsev is doing] is not something that every other single [foreign] cultural center in DC isn’t also doing,” he says. “And that doesn’t bother me. I don’t have a security clearance. I don’t work for an elected official. I run a social enterprise that has absolutely nothing to do with US-Russia relations.”
Rossotrudnichestvo’s most recent Russia trip was scheduled for mid-October and it’s unclear whether or not it went forward as planned. After he was questioned by the FBI, Portwood emailed people he had earlier referred to the organization to inform them of what he learned. His email read, in part: “The FBI disclosed to me that Yury Zaytsev is a Russian Foreign Intelligence officer and a professional spy, acting as the Director of the Russian Cultural Center in Washington, D.C.…only so that he can maintain a residence here in the United States. In fact, the FBI alleges that part of Mr. Zaytsev’s mission is sending young professionals from the United States to Russia as part of a cultural program wherein participants are evaluated and/or assessed for Russian counterintelligence purposes.”
Portwood was disappointed to learn the exchange program may have been a cover for Russian intelligence work. “It passed the smell test,” he says. “But I guess Russia’s Russia, you know?”
UPDATE, 6:00 p.m. EDT, Wednesday October 23: The Russian Embassy provided the following statement in an email to Mother Jones:
All such “scaring information” very much resembles Cold War era. A blunt tentative is made to distort and to blacken activities of the Russian Cultural Center in DC, which are aimed at developing mutual trust and cooperation between our peoples and countries. As a matter of fact, somebody intends to torpedo the guidelines of the Russian and U.S. Presidents, whose Joint Statement in Lough Erne emphasizes the importance of “expanding direct contracts between Americans and Russians that will serve to strengthen mutual understanding and trust and make it possible to raise U.S.-Russian relations to a qualitatively new level”.
Russian Cultural Center has been working to expand contacts and better understanding between Russian and American citizens and will continue this work.
—By Molly Redden
| Wed Oct. 23, 2013 3:00 AM PDT | UPDATED Wed Oct. 23, 2013 3:00 PM PDT
Find this story at 23 October 2013
Copyright ©2013 Mother Jones and the Foundation for National Progress.
“Terrorism is Part of Our History”: Angela Davis on ’63 Church Bombing, Growing up in “Bombingham”23 september 2013
Sunday marked the 50th anniversary of the bombing of the Sixteenth Street Baptist Church in Birmingham, Alabama, a watershed moment in the civil rights movement. On Sept. 15, 1963, a dynamite blast planted by the Ku Klux Klan killed four young girls in the church — Denise McNair, age 11, and Carole Robertson, Cynthia Wesley and Addie Mae Collins, all 14 years old. Twenty other people were injured. No one was arrested for the bombings for 14 years. We hear an address by world-renowned author, activist and scholar Angela Davis, professor emerita at University of California, Santa Cruz. She spoke last night in Oakland, California, at an event organized by the Civil Rights and Restorative Justice Project at Northeastern University School of Law.
Transcript
This is a rush transcript. Copy may not be in its final form.
AMY GOODMAN: Sunday marked the 50th anniversary of the bombing of the 16th Street Baptist Church in Birmingham, Alabama, a watershed moment in the civil rights movement. On September 15, 1963, a dynamite blast planted by the Ku Klux Klan killed four little girls in the church Denise McNair was 11 years old, Carole Robertson, Cynthia Wesley and Addie Mae Collins were all 14. Twenty other people were injured. No one was arrested for the bombings for 14 years.
We turn now to world renowned author, activist, scholar Angela Davis, Professor emeritus at University of California, Santa Cruz. She spoke last night in Oakland, California, at an event organized by the Civil Rights and Restorative Justice Project at Northeastern University School of Law.
ANGELA DAVIS: And remembering and paying tribute to this tragic event, let us not pretend that we are simultaneously celebrating the end of racist violence, and the triumph of democracy. Let us also not labor under the illusion that this church bombing was an anomaly. We know that Robert Chambliss, who was eventually convicted of carrying out the bombing, along with three others, we know that he had been responsible for bombing black homes and churches over so many years. As a matter of fact, during the eight years prior to the church bombing, there had been 21 bombings in Birmingham. This man’s nickname was “Dynamite Bob”. He was known in white communities, you know, talking about terrorism. And I want to emphasize the importance of understanding how much terrorism, racist terrorism, has shaped the history of this country. And there are lessons we need to learn from that.
But I’ve often pointed out that some of my very earliest childhood memories, are the sounds of dynamite exploding. Homes across the street from where I grew up were bombed when they were purchased by black people who were moving into a neighborhood that had been zoned for whites. So many bombings took place in the neighborhood where I grew up. And we know now that Chambliss was probably responsible. That the neighborhood came to be called “Dynamite Hill”. And of course as you know, the city of Birmingham was known as “Bombingham”. In fact on September 4, 1963, less than two weeks before the 16th Street church bombing, the home of the leading civil rights attorney in Birmingham, Arthur Shores was bombed. And that house was right down the street from our house.
You’ve also heard that from Margaret that on the day of the 16th Street Baptist Church bombing, two other black youth were killed. Johnny Robinson and Virgil Weir. Bombings continued to plague black communities in Birmingham after September 15, and everyone, including the FBI, knew who was behind them. But Robert “Dynamite Bob” Chambliss was simply charged with the possession of dynamite. And J Edgar Hoover refused to reveal the evidence that the FBI had gathered against the perpetrators so that there was no trial during that period.
Now I’m not arguing that justice would have necessarily prevailed had Robert Chambliss and the others, Thomas Blanton, Bobby Cherry and Herman Cash had been immediately tried and tried and convicted, although, since that was the only way we had to deal with such transgressions, they should have been tried and convicted. But true justice is about transformation. Justice is about changing the relations that link us together. And as you’ve heard, the Civil Rights and Restorative Justice Project attempts to forge justice in a much deeper sense than is possible within the existing criminal justice system.
A broader way of thinking about justice in the case of the Birmingham bombing would require, first of all, a fuller understanding of the event and its historical context, and would require us to ask questions about the way our lives today bear the historical imprint of that era. What I fear is that many of the 50th anniversary observances, and there are many as Margaret pointed out, many that have taken place, many to come, that many of them are just to close the book on the racist violence of the civil rights era so that we can embalm that violence and transform it into something to be gazed at through the conventional lens of the museum.
Maybe there is something to be learned from the way that Birmingham Civil Rights Institute frames that bombing. As opposed to regular museum exhibit, and if any of you have ever visited the Civil Rights Institute, you know that it is an absolutely incredible museum with amazing exhibits. But for the church bombing, there is simply a window. There is a window through which one can see the church, meditate on its history, and see it as it changes and transforms. Remembering that this was the site of one of the most vicious terror attacks this country has witnessed.
If you have ever visited Birmingham and the museum, you will also know that across 6th Avenue from the museum and kitty corner from the church is the Kelly Ingram Park, where demonstrations that were organized in the 16th Street Baptist Church were staged. It was the home base for the Children’s Crusade. And how many of us remember that it was young children, 11, 12, 13, 14 years old, some as young as 9 or 10, who faced police dogs and faced high-power water hoses and went to jail for our sake? And so there is deep symbolism in the fact that these four young girls’ lives were consumed by that bombing. It was children who were urging us to imagine a future that would be a future of equality and justice.
It’s important that we resist the temptation of abstraction. How easy it is to think about four innocent young black girls whose lives were violently taken away by white supremacists. And I’m not suggesting that this did not happen. Of course it did. What I’m saying is that it was a lot more complicated. And if we don’t attempt to understand the complexity of this historical event, then we will certainly not be capable of comprehending that violence, that racist violence, and its connections with sexist violence or homophobic and xenophobic violence, which continues to erupt in our lives today. Resisting the temptation of historical abstraction requires us to realize that this was not an extraordinary event that erupted one Sunday morning 50 years ago in otherwise peaceful city. As I pointed out, violence was very much the norm.
When I was growing up, Bull Connor, Eugene Bull Connor, was the commissioner of public safety. And of course his notoriety is linked to the way in which he used those high-power water hoses and dogs against the children and because of the KKK violence, against the Freedom Riders in Birmingham, and violence, in which the police whom Bull Connor controlled did not intervene. But I remember hearing when I was growing up, I remember growing up hearing when black people moved into previously white neighborhoods, Bull Connor would announce that there would be bloodshed. And indeed, there would be a bombing or a house would be burned.
As much talk as there has been about terrorism over the last decade, I have not heard one official acknowledgment of the terrorism that prevailed in places like Birmingham. Terrorism is a part of our history. It is not something that is alien. And, by the way, no one ever suggested that we plant dynamite in white communities as a response to that terrorism. So I guess I would say, why do we need to respond with devastating violence in Iraq and Afghanistan and Syria?
It is also not widely known that black people arm themselves. This is a story that has been excised from the official record of the “freedom movement”. And interestingly, Condoleezza Rice has described her minister father, this was recently in an interview with Al Sharpton. She described her minister father as being a leader of an armed patrol of black men in her neighborhood. And as she pointed out, no one was ever shot. Guns may have been fired to scare the Klu Klux Klan away, they may, have been, she says they may have been fired in the air, but no one was ever shot. No one was ever hurt. And I wonder why she didn’t learn this lesson about ways to respond to terrorism, you know which she could’ve used during her tenure as Secretary of State. And I should say I was happy to see that this morning Melissa Harris Perry called her out on this after showing clips of her interview with Al Sharpton.
But my father was also a member of an armed patrol in our neighborhood. Black people had guns, but only because we had no other choice. Black people had to arm themselves after the 1877 Hayes Tilden compromise in which the Republican Rutherford Hayes was handed the presidency under the condition, remember, the Republicans were supposed to be the good guys in those days, OK, under the condition that he would draw all federal troops from the south. And so black people were effectively informed that they were on their own from then on, from 1877 on. This is the period that witnessed the emergence of official structures of white supremacy that did not begin to come down until the resistance of the mid-20th century freedom movement.
Just as sediments of slavery are still with us, most dramatically represented by the country’s incarceration practices and by the racism of the death penalty. The vestiges of an era where racist violence was the norm and was condoned by officials from local governments to Washington are still haunting us. We know the names of young black and brown people who have been killed by the police or by vigilantes. We know the names of Trayvon Martin in Florida, of Haditha Pendleton in Chicago who was killed shortly after having participated in the second Obama inauguration. And then of course, here in Oakland, we know the name of Oscar Grant, Oscar Grant. And I can say, that no matter how long an individual perpetrator is sent to prison in any of these cases and any others, no one can say that justice has been done. Because we know that the roots of racist violence, the roots of the violence that claimed their lives are so tightly woven into our country’s social fabric that an eye for an eye will not do it. An eye for an eye will not do it.
AMY GOODMAN: Author, activist, scholar, Angela Davis. She grew up in Birmingham, Alabama, knew two of the girls killed in the 16th Street Baptist Church bombing 50 years ago Sunday. She spoke in Oakland Sunday night at an event organized by the Civil Rights and Restorative Justice Project, in Northeastern School of Law.
Monday, September 16, 2013
Find this story at 16 September 2013
The original content of this program is licensed under a Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 United States License. Please attribute legal copies of this work to democracynow.org. Some of the work(s) that this program incorporates, however, may be separately licensed. For further information or additional permissions, contact us.
Brooklyn Is Not Baghdad: What Is the CIA Teaching the NYPD?30 augustus 2013
Most Americans think that the CIA works overseas while the FBI and local police protect them at home. But the agency has long worked domestically, and in the last decade it has become involved in counterterrorism operations with local police as well.
A recent report by the CIA’s inspector general shows that such cooperation can easily go wrong. Between 2002 and 2012 the CIA sent four agents to help the NYPD’s counterterrorism unit (which is led by a former agency official) without making sure that they knew the limits of what they could and couldn’t do. According to the inspector general, this type of “close and direct collaboration with any local domestic police department” could lead to the perception that the agency had “exceeded its authorities.”
Author
Faiza Patel is co-director of the Liberty and National Security Program at the Brennan Centre for Justice. She is also a member of the United Nations Human Rights Council’s Working Group on the Use of Mercenaries. Full Bio
But the problem goes far beyond one of perception. We should be concerned that CIA involvement with local police will influence them to adopt a counterinsurgency mentality that is simply not warranted on home turf. When deployed in Iraq or Afghanistan, the agency has to assume that it is working in a hostile environment. It’s operations are necessarily covert. It is not restrained by the full panoply of constitutional rules that apply at home.
One cannot help but wonder whether a CIA mentality helped shape the NYPD’s Muslim surveillance program. A Pulitzer Prize-winning investigation by the Associated Press has shown that police officers monitored every aspect of the lives of Muslim New Yorkers [since 9/11]. They secretly mapped out Muslim communities, noting the details of bookstores, barbershops and cafes. Informants in mosques reported on religious beliefs and political views that had nothing to do with terrorism. Muslim student groups across the Northeast were watched. All of this information, however innocuous or irrelevant to its purported counterterrorism purpose, landed in police files. It sure sounds like a program directed at a hostile population rather than a community with an exemplary record for cooperating with law enforcement.
One counterinsurgency lesson that the CIA apparently failed to teach the NYPD was how aggressive tactics could alienate local populations. The NYPD’s surveillance program has severely damaged the police’s relationship with the Muslim community, leading to protests and lawsuits. The CIA’s involvement can only make American Muslims feel that they are being targeted by the entire U.S. government. Such perceptions undermine everyone’s safety. Decades of policing research shows that communities that do not trust law enforcement are less likely to come forward and share information.
There is also good reason for the perception that the CIA exceeded its authorities during its NYPD partnership. When the CIA was created in 1947, lawmakers instructed it not to exercise “police, subpoena, or law enforcement powers or domestic security functions.” Congress’s aim to prevent Agency operations at home is plain, but the exact nature of forbidden “domestic security functions” is now defined in large part by secret rules.
What is known about the CIA’s authority is mostly contained in Executive Order 12333, first issued by President Ronald Reagan and updated by later presidents. This order allows the agency to perform some domestic functions, including assisting federal agencies and local police. For example, the CIA is allowed to “participate in law enforcement activities to investigate or prevent” international terrorism. This should mean that CIA agents are kept away from purely domestic investigations. But according to the inspector general’s report, a loaned CIA agent overseeing NYPD investigations “did not receive briefings on the law enforcement restrictions” and believed there were “no limitations” on his activities. Another CIA operative admitted receiving “unfiltered” reports containing information about U.S. citizens unrelated to international terrorism.
The rules governing the agency’s involvement in domestic matters are very flexible, but the few safeguards that are in place should be taken seriously. The inspector general’s report showed that these standards were not met, but shied away from calling out illegality and from holding anyone responsible. Indeed, the inspector general did not even believe a full investigation was warranted. Congress might want to ask why.
Nor did the inspector general address the risk that CIA tactics honed in wars abroad could influence police operations at home. The agency should seriously evaluate this likelihood before assigning its personnel to police departments, as should the Congressional committees responsible for overseeing the intelligence community. Brooklyn is not Baghdad. American Muslim communities deserve to be treated as partners in the fight against terrorism and crime, not as hostile foreign populations.
Faiza Patel is co-director of the Liberty and National Security Program at the Brennan Centre for Justice. She is also a member of the United Nations Human Rights Council’s Working Group on the Use of Mercenaries.
Daniel Michelson-Horowitz is a legal intern with the Brennan Center for Justice.
Faiza Patel and Daniel Michelson-Horowitz
August 15, 2013
Find this story at 15 August 2013
© 2013 by National Journal Group, Inc.
NYPD secretly branded entire mosques as terrorist organisations to allow surveillance of sermons and worshippers30 augustus 2013
NYPD has opened at least 12 ’terrorism enterprise investigations’ since 9/11
Police spied on countless innocent Muslims and stored information on them
No Islamic group has been charged with operating as a terrorism enterprise
Investigations are so potentially invasive even the FBI has not opened one
Comes as NYPD fights lawsuits accusing it of engaging in racial profiling
The New York Police Department has secretly labeled entire mosques as terrorism organisations, a designation that allows police to use informants to record sermons and spy on imams, often without specific evidence of criminal wrongdoing.
Since the 9/11 attacks, the NYPD has opened at least a dozen ’terrorism enterprise investigations’ into mosques, according to interviews and confidential police documents.
The TEI, as it is known, is a police tool intended to help investigate terrorist cells and the like.
Spied on: Dr Muhamad Albar (far left) speaks during Jumu’ah prayer service at the Islamic Society of Bay Ridge mosque, which was targeted by the New York Police Department under controversial anti-terror laws
Members of the Bay Ridge mosque in prayer: Designating an entire mosque as a terrorism enterprise means that anyone who attends services is a potential subject of an investigation and fair game for surveillance
Designating an entire mosque as a terrorism enterprise means that anyone who attends prayer services there is a potential subject of an investigation and fair game for surveillance.
Many TEIs stretch for years, allowing surveillance to continue even though the NYPD has never criminally charged a mosque or Islamic organisation with operating as a terrorism enterprise.
The documents show in detail how, in its hunt for terrorists, the NYPD investigated countless innocent New York Muslims and put information about them in secret police files.
More…
Embarrassed NYPD officer who mistakenly thought a woman was catcalling him and not the man he had pulled over is being sued after ‘he took his jealousy out on the man and threw him in jail for 48-hours’
‘Sentenced to death for being thirsty’: Christian woman tells of moment she was beaten and locked up in Pakistan after ‘using Muslim women’s cup to drink water’
As a tactic, opening an enterprise investigation on a mosque is so potentially invasive that while the NYPD conducted at least a dozen, the FBI never did one, according to interviews with federal law enforcement officials.
The strategy has allowed the NYPD to send undercover officers into mosques and attempt to plant informants on the boards of mosques and at least one prominent Arab-American group in Brooklyn, whose executive director has worked with city officials, including Bill de Blasio, a front-runner for mayor.
Linda Sarsour, the executive director, said her group helps new immigrants adjust to life in the U.S. It was not clear whether the police were successful in their plans.
NYPD Secretly labeled mosques as terrorist organizations
Under suspicion: Since the 9/11 attacks, the NYPD has opened at least a dozen ’terrorism enterprise investigations’ into mosques, including the Islamic Society of Bay Ridge in Brooklyn
‘I have never felt free in the United States. The documents tell me I am right’: Zein Rimawi, founder of the Islamic Society of Bay Ridge pictured (left) reviewing the NYPD files which reveal his mosque had been under surveillance and (right) on a protest March in New York in support of ousted Egyptian president Mohamed Morsi
Sarsour, a Muslim who has met with Kelly many times, said she felt betrayed.
‘It creates mistrust in our organisations,’ said Sarsour, who was born and raised in Brooklyn. ‘It makes one wonder and question who is sitting on the boards of the institutions where we work and pray.’
The revelations about the NYPD’s massive spying operations are in documents recently obtained by The Associated Press and part of a new book, Enemies Within: Inside the NYPD’s Secret Spying Unit and bin Laden’s Final Plot Against America.
The book by AP reporters Matt Apuzzo and Adam Goldman is based on hundreds of previously unpublished police files and interviews with current and former NYPD, CIA and FBI officials.
Among the mosques targeted as early as 2003 was the Islamic Society of Bay Ridge.
‘I have never felt free in the United States. The documents tell me I am right,’ Zein Rimawi, one of the Bay Ridge mosque’s leaders, said after reviewing an NYPD document describing his mosque as a terrorist enterprise.
On the Defence: New York Mayor Michael Bloomberg (left) and NYPD Commissioner Raymond Kelly (right) have previously denied accusations that the force engaged in racial profiling while combating crime
Rimawi, 59, came to the U.S. decades ago from Israel’s West Bank.’Ray Kelly, shame on him,’ he said. ‘I am American.’
The NYPD believed the tactics were necessary to keep the city safe, a view that sometimes put it at odds with the FBI.
In August 2003, Cohen asked the FBI to install eavesdropping equipment inside a mosque called Masjid al-Farooq, including its prayer room.
Al-Farooq had a long history of radical ties. Omar Abdel Rahman, the blind Egyptian sheik who was convicted of plotting to blow up New York City landmarks, once preached briefly at Al-Farooq.
Invited preachers raged against Israel, the United States and the Bush administration’s war on terror.
One of Cohen’s informants said an imam from another mosque had delivered $30,000 to an al-Farooq leader, and the NYPD suspected the money was for terrorism.
Former CIA chief Michael Hayden (above) said a terror attack similar to the Boston Marathon bombing could not have been executed in New York because of the NYPD’s extensive spying on Muslims
But Amy Jo Lyons, the FBI assistant special agent in charge for counterterrorism, refused to bug the mosque. She said the federal law wouldn’t permit it.
The NYPD made other arrangements. Cohen’s informants began to carry recording devices into mosques under investigation. They hid microphones in wristwatches and the electronic key fobs used to unlock car doors.
Even under a TEI, a prosecutor and a judge would have to approve bugging a mosque.
But the informant taping was legal because New York law allows any party to record a conversation, even without consent from the others.
Like the Islamic Society of Bay Ridge, the NYPD never demonstrated in court that al-Farooq was a terrorist enterprise but that didn’t stop the police from spying on the mosques for years.
The disclosures come as the NYPD is fighting off lawsuits accusing it of engaging in racial profiling while combating crime. Earlier this month, a judge ruled that the department’s use of the stop-and-frisk tactic was unconstitutional.
The American Civil Liberties Union and two other groups have sued, saying the Muslim spying programs are unconstitutional and make Muslims afraid to practice their faith without police scrutiny.
Both Mayor Mike Bloomberg and Police Commissioner Raymond Kelly have denied those accusations. They say police do not unfairly target people; they only follow leads.
‘As a matter of department policy, undercover officers and confidential informants do not enter a mosque unless they are following up on a lead,’ Kelly wrote recently in The Wall Street Journal.
‘We have a responsibility to protect New Yorkers from violent crime or another terrorist attack – and we uphold the law in doing so.’
An NYPD spokesman declined to comment.
In May, former CIA chief Michael Hayden said a terror attack similar to the Boston Marathon bombing could not have been executed in New York City because of the NYPD’s extensive spying on Muslim communities.
HOW NYPD PERSUADED A JUDGE TO TARGET MOSQUES AS TERROR GROUPS
Before the NYPD could target mosques as terrorist groups, it had to persuade a federal judge to rewrite rules governing how police can monitor speech protected by the First Amendment to the U.S. Constitution.
The rules stemmed from a 1971 lawsuit, dubbed the Handschu case after lead plaintiff Barbara Handschu, over how the NYPD spied on protesters and liberals during the Vietnam War era.
David Cohen, a former CIA executive who became NYPD’s deputy commissioner for intelligence in 2002, said the old rules didn’t apply to fighting against terrorism.
Cohen told the judge that mosques could be used ’to shield the work of terrorists from law enforcement scrutiny by taking advantage of restrictions on the investigation of First Amendment activity.’
NYPD lawyers proposed a new tactic, the TEI, that allowed officers to monitor political or religious speech whenever the ‘facts or circumstances reasonably indicate’ that groups of two or more people were involved in plotting terrorism or other violent crime.
The judge rewrote the Handschu rules in 2003. In the first eight months under the new rules, the NYPD’s Intelligence Division opened at least 15 secret terrorism enterprise investigations, documents show. At least 10 targeted mosques.
And under the new Handschu guidelines, no one outside the NYPD could question the secret practice.
Martin Stolar, one of the lawyers in the Handschu case, said it’s clear the NYPD used enterprise investigations to justify open-ended surveillance.
The NYPD should only tape conversations about building bombs or plotting attacks, he said.
‘Every Muslim is a potential terrorist? It is completely unacceptable,’ he said. ‘It really tarnishes all of us and tarnishes our system of values.’
By Daily Mail Reporter
PUBLISHED: 12:43 GMT, 28 August 2013 | UPDATED: 15:04 GMT, 28 August 2013
Find this story at 28 August 2013
© Associated Newspapers Ltd
Only 1 percent of “terrorists” caught by the FBI are real30 augustus 2013
“The Terror Factory” author Trevor Aaronson exposes the Bureau’s undercover sting operations for the farce they are
In the dozen years since the 9/11 attacks, we’ve watched as a classified new legal regime for government surveillance has been hashed out, local police forces have become heavily armed military-type units and a whole new layer of bureaucracy has hatched to provide us with an abundance of “homeland security.”
Proponents of this build-up argue that it’s made us safer. They point to hundreds of foiled plots to make their case. But Trevor Aaronson, author of The Terror Factory: Inside the FBI’s Manufactured War on Terrorism, dug into these supposedly dastardly plots and found that they are much less than meets the eye.
Aaronson recently appeared on the AlterNet Radio Hour. Below is a lightly edited transcript of the discussion.
Joshua Holland: Trevor, the raw statistical data say that Americans have a significantly better chance of being struck dead by lightning than of being killed in a terrorist attack here at home. It’s obviously different for people in some other countries.
I got that from the official terrorism statistics put out by the FBI and other related agencies. And they also track foiled attacks. These law enforcement agencies say that these foiled attacks prove that they are saving American lives. How would you respond to that?
Trevor Aaronson: I’d say that the majority of the foiled attacks that they cite are really only foiled attacks because the FBI made the attack possible, and most of the people who are caught in these so-called foiled attacks are caught through sting operations that use either an undercover FBI agent or informant posing as some sort of Al-Qaeda operative.
In all of these cases, the defendants, or the would-be terrorists, are people who at best have a vague idea that they want to commit some sort of violent act or some sort of act of terrorism but have no means on their own. They don’t have weapons. They don’t have connections with any international terrorist groups.
advertisement
In many cases they’re mentally ill or they’re economically desperate. An undercover informant or agent posing as an Al-Qaeda operative gives them everything they need… gives them the transportation, gives them the money if they need it, and then gives them the bomb and even the idea for the terrorist attack. And then when that person pushes a button to detonate the bomb that they believe will explode—a bomb that was provided to them in whole by the FBI—agents rush in, arrest them and charge them with conspiracy to use a weapon of mass destruction and then parade that person out to the public saying, “Look at us. We caught a terrorist. This is us keeping you safe.”
If you look at the record of prosecutions in the decade after 911, there has yet to be a case of some Al-Qaeda operative providing the means for a wannabe terrorist to do an act of terrorism. It’s only the FBI that’s providing the means through these sting operations. What this has done is really inflate the threat of terrorism within the United States—particularly from Muslim terrorists—because in almost all of these cases sting operations target men on the fringes of Muslim communities who might be mentally ill, economically desperate or otherwise very easily manipulated by an informant who can make a lot of money in these sting operations.
JH: The thing that I find eye-opening about this is—I’ve certainly known that many of these supposed plots were basically inventions of the FBI, but I didn’t know it was that consistent. You’re saying that this is the case with all of the suspects we’ve heard of in the post-911 era?
TA: For the purposes of my book, I used the 10 years after 9/11 as the area that I was going to analyze data in, and what we know is that in the 10 years after 9/11, there were a little more than 500 defendants who were charged with federal crimes involving international terrorism. About 250 involved people who were charged with things like immigration violations or lying to the FBI and who are somehow linked to terrorism.
Their charges did not involve any sort of terrorist plot. Of the 500, you have about 150 who were caught in sting operations; these operations that were solely the creation of the FBI through an FBI informant or undercover agent providing the means and the opportunity, the bomb, the idea and so on.
Then if you’re really being generous, you can find only about five people of the 500 charged with international terrorism who were involved in some sort of plot that either had weapons of their creation or their acquisition or were connected to international terrorists in some way. These include Najibullah Zazi who came close to bombing the New York City subway system, Faisal Shahzad, who delivered a bomb to Times Square that fortunately didn’t go off, and then you have Jose Padilla—the dirty bomber—the underwear bomber and the shoe bomber, for example.
Being generous, those are the five that you can point to in the decade after 9/11 who seemed to pose a significant threat. Fortunately, none of them were successful. That’s a handful compared to the more than 150 who were caught in these sting operations, and in these sting operations the men never had access to weapons; it was only the FBI that provided it as part of the sting operation that they were controlling from beginning to end.
JH: I’m no attorney, but this sounds like it gets close to entrapment. Have defense attorneys raised that?
TA: Yeah, and this is an interesting area of this story. Obviously, a layman like you or me looking at this thinks this is definitely entrapment. Unfortunately, the legal definition of entrapment is very different, and what we know is that 11 defendants have formally argued entrapment in these cases and none have been successful.
A large reason for that is the government is able to argue against entrapment in two ways; one is to say the person was predisposed to commit the crime. That he had done something that suggested he was interested in committing a crime before the introduction of the government agent.
Traditionally speaking, if this was a bank robbery plot, the government would have to prove that the defendant was researching bank robberies or casing banks prior to the FBI informant getting involved. The FBI and the Department of Justice are able to do this very easily in these terrorism cases in part because they are able to introduce evidence that is really sketchy to prove that there was predisposition.
For example, often the government will cite the fact that someone watched a jihad video and they’ll put on the stand a government expert who will testify that, “Hey, you know, because he watched the jihad video and this is one of Al-Qaeda’s classics,” that meant he was becoming a terrorist and the government line essentially, rather an absurd one, is that if you watch a Jihad video then, trance-like, you become a terrorist. It’s absurd on its face because I’ve watched those videos. You’ve watched those videos and I don’t think either of us are going to become terrorists.
At the same time, how the government is able to argue against entrapment is to really weight the jury in its favor and it does that by – in these sting operations, the government controls every aspect of the plot so they could have a guy who wants to commit violence and they say to him, “Okay, here’s a nine millimeter handgun. Go to the mall and shoot a couple people in the knee.”
That would be awful but it wouldn’t be something that would necessarily shatter the security of the United States of America. Instead, in these sting operations, they give the defendants these bombs that are so enormous and so big that even a sophisticated criminal organization would have trouble obtaining them. Then they have them unleash those bombs at subway stations or downtown skyscrapers and it makes the jury think, You know what? I ride that subway system. I have a son who works at that skyscraper. What that does is effectively erode any empathy that the jury might have for the defendant and that empathy is necessary for a jury to say, You know what? That person was entrapped.
What we’ve seen is a very effective role by the government in battling against this entrapment defense and now that we have 11 cases where entrapment has been formally argued, none being successful. I’m among those who say if you’re a Muslim charged with terrorism in the United States there really is no such thing as entrapment today.
JH: I’m a fan of that show Breaking Bad, and yet I have not started cooking meth in my backyard.
TA: If you ever got involved in a sting operation with meth, the fact that you’re a “Breaking Bad” fan might be used against you.
JH: Now, you said that a lot of people caught up in this dragnet, if you will, are poor, have mental health problems, are disenfranchised and sound like they are marginal people. Can you give us a few examples, specific case studies in the book to illustrate this point?
TA: Yes. One example which is really an absurd one is a man named Derek Shareef. Derek was this recent convert to Islam and he worked at a video game store in Rockford, Illinois. As it happens, his family has ostracized him as a result of his conversion and he was living in his car, which also happened to have just broken down.
Derek, who is earning close to minimum wage at this video game store, was really down on his luck. We don’t know exactly why the FBI targeted him but they sent an informant into the video game store.
This informant was a convicted drug dealer who then started working with the FBI and it happened to be the day before Ramadan and the informant strikes up a conversation with Derek and Derek explains the hard circumstances he’s found himself in.
The informant says, “You know what? I’ve got an extra bedroom at my place. I don’t use my car very often; you’re welcome to use it. Why don’t you stay with me while you get back on your feet?” Derek, being newly religious and devout, thinks this is the work of God since it’s the day before Ramadan and he goes and lives with this man, and over the course of weeks, this man’s slowly stoking Derek’s anger about his circumstances and about American foreign policy. Derek at some point says, “I want to do something about this. I want to kill a judge.” The informant says, “Okay, which judge?”
Of course, Derek couldn’t name the name of any judges and so the informant then gets Derek involved in a more manageable plot. He suggests that they go attack a shopping mall on Christmas Eve. For whatever reason, as in a lot of these plots, Derek agrees that he wants to do that, but the problem for the FBI informant and the FBI agent in this case was that Derek didn’t have any money.
He didn’t have any money to buy guns. He didn’t have any money to buy any weapons that he would need for the plot, so the FBI agents and the undercover informant cook-up this idea where the FBI informant will introduce Derek to an arms dealer who can provide grenades and Derek, in turn, has these two ratty, old stereo speakers, which are the only thing he has of earthly value and the informant tells Derek, “I think if you bring your stereo speakers to an arms dealer, he’ll just say, OK, fair trade and here’s four grenades.”
I don’t know many arms dealers in this world, but I’m pretty sure that none of them is going to accept old stereo speakers for grenades, but of course, Derek didn’t know that. Derek shows up at the shopping mall dutifully carrying his stereo speakers, gives them to the undercover agent who’s posing as the arms dealer, and the arms dealer hands over the grenades. Agents rush in, arrest Derek and charge him with conspiracy to use weapons of mass destruction, and he’s ultimately serving 17 years in prison.
Clearly that’s an example of a man on the fringes of our society, unlikely to ever commit significant violence on his own and yet through this sting operation he is empowered to get involved in a plot that, were it real, would have been really horrifying. And when it’s portrayed in the public and through the media, it does seem horrifying. Here is this man plotting with an Al-Qaeda operative, an undercover FBI informant, to blow up people in a shopping mall on one of the busiest shopping days of the year.
Of course, the truth is that that was nothing more than a fantasy by the FBI, controlled at every step by the FBI and no one was really in danger and there’s no evidence to suggest that Derek ever would have met a real Al-Qaeda operative who could have made him the terrorist that he apparently wanted to be.
JH: Trevor, let’s talk a little about the incentives here. It seems to me—and this isn’t an original thought—that there’s a bureaucratic imperative to justify agency budgets. After 9/11, kind of in a panic, we basically doubled the size of our intelligence agencies, created a new Department of Homeland Security, and the FBI refocused its mission.
How much of this tendency to entrap these people comes from that imperative to justify bloated counter-terrorism budgets in your view?
TA: Actually a lot. I’m not of the opinion that there are high-ranking people at the FBI who are saying, You know what? We want to stick it to Muslims in the United States. Although there’s evidence of xenophobia and a certain amount of Islamophobia within the FBI, I don’t think that’s the real reason behind this.
Instead, I think the reason we’re seeing these really aggressive sting operations is the result of something of a bureaucratic evil. That is every year Congress allocates the FBI’s budget, and they set the counter-terrorism budget at $3 billion, which is the largest part of the FBI’s budget, more than it receives for organized crime and financial fraud.
The FBI can’t exactly spend $3 billion and say, Hey; you know what? We spent your money and we didn’t find any terrorists. Even though the truth is that there’s a lot of money for counter-terrorism and just not a lot of terrorists going around today. What happens is that these sting operations are a very convenient mechanism for the FBI to say, Hey look at us. We’re keeping you safe.
From the highest levels of the FBI, there’s pressure to build counter-terrorism cases because they just received $3 billion from Congress and that pressure then flows down to the field offices, which then, in turn, put pressure on individual agents to build counter-terrorism cases and those individual agents then incentivize informants who can make hundreds of thousands of dollars per case.
They’re sent out in the communities looking for people interested in committing acts of terrorism. What they’re not finding are people who are actively building bombs or getting involved in significant terrorist plots.
Instead, they’re finding these outliers, these people on the fringes of communities who for the most part are loudmouths who might aspire to violence but have no means of their own. And then they’ll bring them into the plot knowing that if they get someone on the hook, they can make lots of money, and then when they get a prosecutable case, that case floats up and you have a situation where FBI director Robert Muller consistently testifies before Congress about counterterrorism and cites these cases involving sting operations and what he describes as, Oh, this would have been a terrible, terrible thing had it been allowed to occur … it was a bombing of synagogues in the Bronx, or whatever it might be and never fully describes how that plot to bomb synagogues in the Bronx was really only made possible through an FBI informant who provided everything that the guy needed.
My criticism of this is not only that this bureaucratic evil exists and this is what is happening, but on a greater level the question people should be asking is, Why, despite all of this money and 15,000 informants employed by the FBI today are they finding it so easy to catch these people who are mentally ill and economically desperate while they’re missing the really dangerous people?
Faisal Shahzad delivered his bomb to Times Square and no one knew about him until that day. If you take the case in Boston with Tamerlan Tsarnaev, this was someone that the FBI even looked at and decided he’s not a threat.
The FBI has proven itself very good at catching these people in sting operations who can be easily manipulated, but they’ve also proven themselves almost incompetent in finding the truly dangerous terrorists who do have these connections overseas.
By Joshua Holland
Wednesday, Jul 10, 2013 08:30 PM +0200
Find this story at 10 July 2013
Copyright © 2013 Salon Media Group, Inc.
Jahar’s World He was a charming kid with a bright future. But no one saw the pain he was hiding or the monster he would become.30 augustus 2013
Our hearts go out to the victims of the Boston Marathon bombing, and our thoughts are always with them and their families. The cover story we are publishing this week falls within the traditions of journalism and Rolling Stone’s long-standing commitment to serious and thoughtful coverage of the most important political and cultural issues of our day. The fact that Dzhokhar Tsarnaev is young, and in the same age group as many of our readers, makes it all the more important for us to examine the complexities of this issue and gain a more complete understanding of how a tragedy like this happens. –THE EDITORS
Peter Payack awoke around 4 a.m. on April 19th, 2013, and saw on his TV the grainy surveillance photo of the kid walking out of the minimart. The boy, identified as “Suspect #2” in the Boston bombing, looked familiar, thought Payack, a wrestling coach at the Cambridge Rindge and Latin School. On the other hand, there were a million skinny kids with vaguely ethnic features and light-gray hoodies in the Boston area, and half the city was probably thinking they recognized the suspect. Payack, who’d been near the marathon finish line on the day of the bombing and had lost half of his hearing from the blast, had hardly slept in four days. But he was too agitated to go back to bed. Later that morning, he received a telephone call from his son. The kid in the photo? “Dad, that’s Jahar.”
“I felt like a bullet went through my heart,” the coach recalls. “To think that a kid we mentored and loved like a son could have been responsible for all this death. It was beyond shocking. It was like an alternative reality.”
People in Cambridge thought of 19-year-old Dzhokhar Tsarnaev – “Jahar” to his friends – as a beautiful, tousle-haired boy with a gentle demeanor, soulful brown eyes and the kind of shy, laid-back manner that “made him that dude you could always just vibe with,” one friend says. He had been a captain of the Cambridge Rindge and Latin wrestling team for two years and a promising student. He was also “just a normal American kid,” as his friends described him, who liked soccer, hip-hop, girls; obsessed over The Walking Dead and Game of Thrones; and smoked a copious amount of weed.
Payack stared at his TV, trying to reconcile Dzhokhar, the bomber accused of unspeakable acts of terrorism, with the teenage boy who had his American nickname “Jahar” inscribed on his wrestling jacket. He’d worn it all the time.
That afternoon, Payack spoke with CNN, where he issued a direct appeal. “Jahar,” he said, “this is Coach Payack. There has been enough death, destruction. Please turn yourself in.”
At that precise moment, just west of Cambridge, in suburban Watertown, Jahar Tsarnaev lay bleeding on the floor of a 22-foot motorboat dry-docked behind a white clapboard house. He’d been wounded just after midnight in a violent confrontation with police that had killed his 26-year-old brother, Tamerlan. For the next 18 hours, he would lie quietly in the boat, as the dawn broke on a gray day and thousands of law-enforcement officials scoured a 20-block area in search of him. He was found just after 6 p.m., though it would take nearly three more hours for FBI negotiators to persuade him to surrender.
The following morning, Payack received a text from one of the agents with the FBI’s Crisis Negotiating Unit. He’d heard Payack’s televised appeal, told him he’d invoked the coach’s name while speaking with Jahar. “I think it helped,” the agent said. Payack was relieved. “Maybe by telling Jahar that I was thinking about him, it gave him pause,” Payack says. “Maybe he’d seen himself going out as a martyr for the cause. But all of a sudden, here’s somebody from his past, a past that he liked, that he fit in with, and it hit a soft spot.”
When investigators finally gained access to the boat, they discovered a jihadist screed scrawled on its walls. In it, according to a 30-count indictment handed down in late June, Jahar appeared to take responsibility for the bombing, though he admitted he did not like killing innocent people. But “the U.S. government is killing our innocent civilians,” he wrote, presumably referring to Muslims in Iraq and Afghanistan. “I can’t stand to see such evil go unpunished. . . . We Muslims are one body, you hurt one, you hurt us all,” he continued, echoing a sentiment that is cited so frequently by Islamic militants that it has become almost cliché. Then he veered slightly from the standard script, writing a statement that left no doubt as to his loyalties: “Fuck America.”
I
n the 12 years since the attacks on the World Trade Center and the Pentagon, there have been more than 25 plots to strike the United States hatched by Americans, most of which were ill-conceived or helped along by undercover operatives who, in many cases, provided their targets with weapons or other materials. A few – including the plots to blow up the New York subway system and Times Square – were legitimate and would have been catastrophic had they come to fruition. Yet none did until that hazy afternoon of April 15th, 2013, when two pressure-cooker bombs exploded near the marathon finish line on Boylston Street, killing three people, including an eight-year-old boy. Close to 300 more were injured by flying shrapnel, with many losing a leg, or an arm, or an eye; a scene of unbelievable carnage that conjured up images of Baghdad, Kabul or Tel Aviv.
An uneasy panic settled over Boston when it was revealed that the Tsarnaev brothers were not, as many assumed, connected to a terrorist group, but young men seemingly affiliated with no one but themselves. Russian émigrés, they had lived in America for a decade – and in Cambridge, a city so progressive it had its own “peace commission” to promote social justice and diversity. Tamerlan, known to his American friends as “Tim,” was a talented boxer who’d once aspired to represent the United States in the Olympics. His little brother, Jahar, had earned a scholarship to the University of Massachusetts Dartmouth and was thinking about becoming an engineer, or a nurse, or maybe a dentist – his focus changed all the time. They were Muslim, yes, but they were also American – especially Jahar, who became a naturalized U.S. citizen on September 11th, 2012.
Since the bombing, friends and acquaintances of the Tsarnaevs, as well as the FBI and other law-enforcement officials, have tried to piece together a narrative of the brothers, most of which has focused on Tamerlan, whom we now know was on multiple U.S. and Russian watch lists prior to 2013, though neither the FBI nor the CIA could find a reason to investigate him further. Jahar, however, was on no one’s watch list. To the contrary, after several months of interviews with friends, teachers and coaches still reeling from the shock, what emerges is a portrait of a boy who glided through life, showing virtually no signs of anger, let alone radical political ideology or any kind of deeply felt religious beliefs.
At his arraignment at a federal courthouse in Boston on July 10th, Jahar smiled, yawned, slouched in his chair and generally seemed not to fully grasp the seriousness of the situation, while pleading innocent to all charges. At times he seemed almost to smirk – which wasn’t a “smirk,” those who know him say. “He just seemed like the old Jahar, thinking, ‘What the fuck’s going on here?'” says Payack, who was at the courthouse that day.
It had been the coach who’d helped Jahar come up with his nickname, replacing the nearly impossible-to-decipher Dzhokhar with a simpler and cooler-sounding rendering. “If he had a hint of radical thoughts, then why would he change the spelling of his name so that more Americans in school could pronounce it?” asks one longtime friend, echoing many others. “I can’t feel that my friend, the Jahar I knew, is a terrorist,” adds another. “That Jahar isn’t, to me.”
“Listen,” says Payack, “there are kids we don’t catch who just fall through the cracks, but this guy was seamless, like a billiard ball. No cracks at all.” And yet a deeply fractured boy lay under that facade; a witness to all of his family’s attempts at a better life as well as to their deep bitterness when those efforts failed and their dreams proved unattainable. As each small disappointment wore on his family, ultimately ripping them apart, it also furthered Jahar’s own disintegration – a series of quiet yet powerful body punches. No one saw a thing. “I knew this kid, and he was a good kid,” Payack says, sadly. “And, apparently, he’s also a monster.”
T
hough Dzhokhar Tsarnaev was raised largely in America, his roots are in the restive North Caucasus, a region that has known centuries of political turmoil. Born on July 22nd, 1993, he spent the first seven years of his life in the mountainous Central Asian republic of Kyrgyzstan, where his father, Anzor, had grown up in exile. Anzor is from Chechnya, the most vilified of the former Soviet republics, whose people have been waging a near-continuous war since the 18th century against Russian rule. Dzhokhar’s mother, Zubeidat, is an Avar, the predominantly Muslim ethnic group of Chechnya’s eastern neighbor, Dagestan, which has been fighting its own struggle for independence against the Russians since the late 1700s. After the fall of the Soviet Union, Chechen nationalists declared their independence, which resulted in two brutal wars where the Russian army slaughtered tens of thousands of Chechens and leveled its capital city, Grozny. By 1999, the violence had spread throughout the region, including Dagestan.
Though Islam is the dominant religion of the North Caucasus, religion played virtually no role in the life of Anzor Tsarnaev, a tough, wiry man who’d grown up during Soviet times, when religious worship in Kyrgyzstan was mostly underground. In Dagestan, where Islam had somewhat stronger footing, many women wear hijabs; Zubeidat, though, wore her dark hair like Pat Benatar. The couple met while Anzor was studying law and were married on October 20th, 1986. The next day, their first child, Tamerlan, was born. Three more children would follow, all of them born in Kyrgyzstan, where Anzor secured a job as an investigator in the prosecutor’s office in the nation’s capital, Bishkek.
It was a prestigious position, especially for a Chechen, but Anzor had larger ambitions. He hoped to take his family to America, where his brother, Ruslan, an attorney, was building an upper-middle-class life. After Russia invaded Chechnya in 1999, setting off the second of the decade’s bloody wars, Anzor was fired from his job as part of a large-scale purge of Chechens from the ranks of the Kyrgyz government. The Tsarnaevs then fled to Zubeidat’s native Dagestan, but war followed close behind. In the spring of 2002, Anzor, Zubeidat and Jahar, then eight, arrived in America on a tourist visa and quickly applied for political asylum. The three older children, Ailina, Bella and Tamerlan, stayed behind with relatives.
During their first month in America, Jahar and his parents lived in the Boston-area home of Dr. Khassan Baiev, a Chechen physician and friend of Anzor’s sister, who recalled Anzor speaking of discrimination in Kyrgyzstan that “went as far as beatings.” This abuse would be the premise of the Tsarnaevs’ claim for asylum, which they were granted a year later. In July 2003, the rest of the family joined them in Cambridge, where they’d moved into a small, three-bedroom apartment at 410 Norfolk St.; a weathered building with peeling paint on a block that otherwise screams gentrification.
There are just a handful of Chechen families in the Boston area, and the Tsarnaevs seemed a welcome addition. “They had wonderful children,” recalls Anna Nikeava, a Chechen who befriended the Tsarnaevs shortly after they arrived. “They were very soft, like cuddly kittens, all four kids, always hugging and kissing each other.” And the parents, too, seemed to adore each other, even while Anzor, who spoke broken English, worked as a mechanic, making just $10 an hour. For the first year, the Tsarnaevs received public assistance. But they never seemed to struggle, Anna says. “They were very much in love and enjoying life. They were fun.”
Chechen families are very traditional – Anna, a warm and talkative woman in her late forties, tells me that in her country, “Ladies don’t wear pants, you have to wear a skirt,” and marrying outside the culture is taboo. The Tsarnaevs were atypical in that regard. Zubeidat was a “very open, modern lady” with a taste for stylish jeans, high heels and short skirts. “She had the tattooed eyebrows, permanent makeup, very glamorous,” says Anna. “And her children were always dressed up nicely too.”
Zubeidat adored her children, particularly Tamerlan, a tall, muscular boy she compared to Hercules. Jahar, on the other hand, was the baby, his mother’s “dwog,” or “heart.” “He looked like an angel,” says Anna, and was called “Jo-Jo” or “Ho.”
“He was always like, ‘Mommy, Mommy, yes, Mommy’ – even if his mom was yelling at him,” says Anna’s son Baudy Mazaev, who is a year and a half younger than Jahar. “He was just, like, this nice, calm, compliant, pillow-soft kid. My mom would always say, ‘Why can’t you talk to me the way Dzhokhar talks to his mother?'”
There were five or six Chechen boys of roughly the same age in their circle, but Baudy and Jahar were particularly close. Now a student at Boston University, Baudy remembers family get-togethers in the Tsarnaevs’ cramped, top-floor apartment, where Jahar and Tamerlan shared a small room with a bunk bed; in an even smaller room, their sisters shared just a mattress. There was never room for everyone around the tiny kitchen table, so the boys would engage in epic games of manhunt, or play video games on the giant TV in the living room, while their parents ate and socialized. Anzor was famous for his booming laugh, which Jahar inherited – “It was so loud, the whole room would know if he was laughing,” says Baudy.
Jahar idolized his older brother, Tamerlan – all the children appeared to – and as a child, he followed his brother’s example and learned to box. But it was wrestling that became his primary sport, as was also true for Baudy, a squarely built kid who competed in a higher weight class than the slender, 130-pound Jahar. “It’s a Chechen thing,” says Baudy. “When I went to Chechnya to see my cousins, the first thing they ask is, ‘You want to wrestle?'”
Baudy is fiercely proud of his heritage, and Jahar, who shares a name with Chechnya’s first president, Dzhokhar Dudayev (one of Anzor’s personal heroes), had similar “Chechen pride.” He embraced the national Chechen symbol, the wolf; learned traditional dances; and could speak Chechen as well as Russian. He even talked about marrying a Chechen girl. “He would always talk about how pretty Chechen girls were,” says Baudy, though, to his knowledge, Jahar had never met one, aside from the sisters of some of their friends.
There were many, many Jahars in Cambridge: children of immigrants with only the haziest, if idealized, notions of their ethnic homelands. One of the most liberal and intellectually sophisticated cities in the U.S., Cambridge is also one of the most ethnically and economically diverse. There are at least 50 nationalities represented at the city’s one public high school, Cambridge Rindge and Latin School, whose motto – written on walls, murals and school-course catalogs, and proclaimed over the PA system – is “Opportunity, Diversity, Respect.” About 45 percent of its students live in public or subsidized housing, largely in the city’s densely populated working-class neighborhoods. There are more affluent areas, and in them live the children of professors from nearby Harvard and MIT who also attend Rindge, “but not in tremendous numbers,” says Cambridge schools superintendent Dr. Jeffrey M. Young. “What you do have is some actively engaged political families” – like those of the school’s most famous alumni, Matt Damon and Ben Affleck – “and then there’s the voiceless, who we try to encourage to have more of a voice.”
All of the Tsarnaev children went to Rindge, as the school is known, but it was Jahar who assimilated best. Though he’d arrived in America speaking virtually no English, by high school he was fluent, with only a trace of an accent, and he was also fluent in the local patois. (Among his favorite words, his friends say, was “sherm,” Cambridge slang for “slacker.”) Jahar, or “Jizz,” as his friends also called him, wore grungy Pumas, had a great three-point shot and became a dedicated pot smoker – something a number of Cambridge teens tell me is relatively standard in their permissive community, where you can score weed in the high school bathrooms and smoke on the street without much of a problem. A diligent student, he was nominated to the National Honor Society in his sophomore year, which was also when he joined the wrestling team. “He was one of those kids who’s just a natural,” says Payack, his coach, who recalls Jahar as a supportive teammate who endured grueling workouts and runs without a single complaint. In his junior year, the team made him a captain. By then, everyone knew him as ‘Jahar,’ which his teammates would scream at matches to ensure the refs would never mispronounce his name.
“I could never quite get his name – Dokar? Jokar?” says Larry Aaronson, a retired Rindge history teacher (Jahar, he says, eventually told him to call him “Joe”). Aaronson, a longtime friend of the late historian Howard Zinn, also lives on Norfolk Street, down the block from the Tsarnaevs’ home. “I asked him once where he was from, and he said Chechnya. And I’m like, ‘Chechnya? Are you shitting me?'” says Aaronson. “I said, ‘My God, how did you cope with all that stress?’ And he said, ‘Larry, that’s how come we came to America, and how lucky that we came to Cambridge, of all places!’ He just embraced the city, the school and the whole culture – he gratefully took advantage of it. And that’s what endeared me to him: This was the quintessential kid from the war zone, who made total use of everything we offer so that he could remake his life. And he was gorgeous,” he adds.
J
ahar’s friends were a diverse group of kids from both the wealthier and poorer sections of Cambridge; black, white, Jewish, Catholic, Puerto Rican, Bangladeshi, Cape Verdean. They were, as one Cambridge parent told me, “the good kids” – debate champs, varsity athletes, student-government types, a few brainiacs who’d go off to elite New England colleges. A diligent student, Jahar talked about attending Brandeis or Tufts, recalls a friend I’ll call Sam, one of a tight-knit group of friends, who, using pseudonyms, agreed to speak exclusively to Rolling Stone. “He was one of the realest dudes I’ve ever met in my life,” says Sam, who spent nearly every day with Jahar during their teens, shooting hoops or partying at a spot on the Charles River known as the “Riv.” No matter what, “he was the first person I’d call if I needed a ride or a favor. He’d just go, ‘I got you, dog’ – even if you called him totally wasted at, like, two or three in the morning.”
“He was just superchill,” says another friend, Will, who recalls one New Year’s Eve when Jahar packed eight or nine people – including one in the trunk – into his green Honda Civic. Of course, he adds, the police pulled them over, but Jahar was unfazed. “Even if somebody caught him drinking,” says his buddy Jackson, “he was the calm, collected kid who always knew how to talk to police.”
He had morals, they all agree. “He never picked on anybody,” says Sam, adding that much like his brother, Jahar was a great boxer. “He was better at boxing than wrestling – he was a beast.” But while he could probably knock out anyone he wanted, he never did. “He wasn’t violent, though – that’s the crazy thing. He was never violent,” says Sam.
“He was smooth as fuck,” says his friend Alyssa, who is a year younger than Jahar. Girls went a little crazy over him – though to Jahar’s credit, his friends say, even when he had crushes, he never exploited them. “He’d always be like, ‘Chill, chill, let’s just hang out,'” says Sam, recalling Jahar’s almost physical aversion to any kind of attention. “He was just really humble – that’s the best way to describe him.”
Cara, a vivacious, pretty blonde whom some believe Jahar had a secret crush on, insists they were just friends. “He was so sweet. He was too sweet, you know?” she says sadly. The two had driver’s ed together, which led to lots of time getting high and hanging out. Jahar, she says, had a talent for moving between social groups and always seemed able to empathize with just about anyone’s problems. “He is a golden person, really just a genuine good guy who was cool with everyone,” she says. “It’s hard to really explain Jahar. He was a Cambridge kid.”
Cambridge kids, the group agrees, have a fairly nonchalant attitude about things that might make other people a little uptight. A few years ago, for instance, one of their mutual friends decided to convert to Islam, which some, like Cara, thought was really cool, and others, like Jackson, met with a shrug. “But that’s the kind of high school we went to,” Jackson says. “It’s the type of thing where someone could say, ‘I converted to Islam,’ and you’re like, ‘OK, cool.'” And in fact, a number of kids they knew did convert, he adds. “It was kind of like a thing for a while.”
Jahar never denied he was a Muslim, though he sometimes played it down. He fasted during Ramadan, which included giving up pot – an immense act of self-control, his friends say. “But the most religious thing he ever said was, ‘Don’t take God’s name in vain,'” says Alyssa, who is Jewish. “Yeah,” says Jackson, “he might have been religious, but it was the type of thing where unless he told you, you wouldn’t know.”
A few years ago, one Rindge wrestler, another Muslim, attended an informal lunchtime high school prayer group, where he spotted Jahar. “I didn’t know he was Muslim until I saw him at that Friday prayer group,” he says. “It wasn’t something we ever talked about.”
His friend Theo, who also wrestled with Jahar, thinks somewhat differently. “I actually think he had a real reverence for Islam,” he says. There was one occasion in particular, a few years ago, when Jahar became visibly uncomfortable when James, the friend who’d converted, began speaking casually about the faith. “He didn’t get mad, but he kind of shut him down,” Theo recalls. “And it showed me that he took his religion really seriously. It wasn’t conditional with him.”
Yet he “never raised any red flags,” says one of his history teachers, who, like many, requested anonymity, given the sensitivity of the case. Her class, a perennial favorite among Rindge students, fosters heated debates about contemporary political issues like globalization and the crises in the Middle East, but Jahar, she says, never gave her any sense of his personal politics, “even when he was asked to weigh in.” Alyssa, who loved the class, agrees: “One of the questions we looked at was ‘What is terrorism? How do we define it culturally as Americans? What is the motivation for it – can we ever justify it?’ And I can say that Jahar never expressed to us that he was pro-terrorism at all, ever.”
Except for once.
“He kind of did, one time to me, express that he thought acts of terrorism were justified,” says Will. It was around their junior year; the boys had been eating at a neighborhood joint called Izzy’s and talking about religion. With certain friends – Will and Sam among them – Jahar opened up about Islam, confiding his hatred of people whose “ignorance” equated Islam with terrorism, defending it as a religion of peace and describing jihad as a personal struggle, nothing more. This time, says Will, “I remember telling him I thought certain aspects of religion were harmful, and I brought up the 9/11 attacks.”
At which point Jahar, Will says, told him he didn’t want to talk about it anymore. Will asked why. “He said, ‘Well, you’re not going to like my view.’ So I pressed him on it, and he said he felt some of those acts were justified because of what the U.S. does in other countries, and that they do it so frequently, dropping bombs all the time.”
To be fair, Will and others note, Jahar’s perspective on U.S. foreign policy wasn’t all that dissimilar from a lot of other people they knew. “In terms of politics, I’d say he’s just as anti-American as the next guy in Cambridge,” says Theo. Even so, Will decided not to push it. “I was like, ‘Wow, this dude actually supports that? I can’t have this conversation anymore.'”
They never brought it up again.
I
n retrospect, Jahar’s comment about 9/11 could be seen in the context of what criminal profilers call “leakage”: a tiny crack in an otherwise carefully crafted facade that, if recognized – it’s often not – provides a key into the person’s interior world. “On cases where I’ve interviewed these types of people, the key is looking past their exterior and getting access to that interior, which is very hard,” says Tom Neer, a retired agent from the FBI’s Behavioral Analysis Unit and now a senior associate with the Soufan Group, which advises the government on counterterrorism. “Most people have a public persona as well as a private persona, but for many people, there’s a secret side, too. And the secret side is something that they labor really hard to protect.”
There were many things about Jahar that his friends and teachers didn’t know – something not altogether unusual for immigrant children, who can live highly bifurcated lives, toggling back and forth between their ethnic and American selves. “I never saw the parents, and didn’t even know he had a brother,” says Payack, who wondered why Jahar never had his family rooting for him on the sidelines, as his teammates did. “If you’re a big brother and you love your little brother, why don’t you come and watch him in sports?”
Theo wondered, too. “I asked him about that once, and he told me that he’d boxed when he was younger, and he’d never lost a boxing match, so he didn’t want his dad to see him lose.” It sounded plausible: Jahar had an innate ability as a wrestler, but he never put in the time to be truly great. “It wasn’t really on his list,” says Theo. On the other hand, losing didn’t seem to bother him, either. “Other kids, when they lose they get angry – they think the ref made a bad call, and maybe they’ll throw a chair. Or they’ll cry, or sulk in a corner,” says Payack. Jahar would simply walk off the mat with a shrug. “He’d just kind of have this face like, ‘Oh, well, I tried.'”
On Senior Night, the last home match of the season, every Rindge senior wrestler is asked to bring a parent or relative to walk them onto the gym floor to receive a flower and have their picture taken. Jahar brought no one. “We had one of the coaches walk him out to get his flower,” says Payack. This, too, didn’t seem to bother Jahar – and even if it did, he never mentioned it. “With our friends, you don’t need to confide in them to be close to them,” says Jackson.
Jahar’s family seemed to exist in a wholly separate sphere from the rest of his life. Jackson, who lived nearby, would occasionally see Anzor working on cars; several others knew of Jahar’s sisters from their older siblings. And there were always stories about Tamerlan, who’d been a two-time Golden Gloves champion. But almost nobody met Tamerlan in person, and virtually no one from school ever went to the Tsarnaevs’ house. “I mean never – not once,” says Jackson. One friend of Jahar’s older sister Bella would say that the apartment at 410 Norfolk “had a vibe that outsiders weren’t too common.”
T
here are a number of indications that the troubles in the Tsarnaev family went deeper than normal adjustment to American life. Anzor, who suffered from chronic arthritis, headaches and stomach pain, had an erratic temperament – a residual, he’d say, of the abuse he’d suffered in Kyrgyzstan – and struck one neighbor on Norfolk Street as a “miserable guy,” who’d bark at his neighbors over parking spaces and even grab the snow shovels out of their hands when he felt they weren’t shoveling the walk properly. Despite his demeanor, he was an intensely hard worker. “I remember his hands,” says Baudy. “He’d be working on cars in the Boston cold, no gloves, and he’d have these thick bumps on his knuckles from the arthritis. But he loved it. He saw his role as putting food on the table.”
Zubeidat, an enterprising woman, worked as a home-health aide, then switched to cosmetology, giving facials at a local salon and later opening a business in her home. “She never wanted to commit,” says Baudy, who liked Jahar’s mother but saw her as a typical striver. “She was trying to get rich faster – like, ‘Oh, this is taking too long. We’ll try something else.'”
But the money never came. By 2009, Anzor’s health was deteriorating, and that August, the Tsarnaevs, who hadn’t been on public assistance for the past five years, began receiving benefits again, in the form of food stamps and cash payouts. This inability to fully support his family may have contributed to what some who knew them refer to as Anzor’s essential “weakness” as a father, deferring to Zubeidat, who could be highly controlling.
A doting mother, “she’d never take any advice about her kids,” says Anna. “She thought they were the smartest, the most beautiful children in the world” – Tamerlan most of all. “He was the biggest deal in the family. In a way, he was like the father. Whatever he said, they had to do.”
Tamerlan’s experience in Cambridge was far less happy than Jahar’s. Already a teenager when he arrived in America, Tamerlan spoke with a thick Russian accent, and though he enrolled in the English as a Second Language program at Rindge, he never quite assimilated. He had a unibrow, and found it hard to talk to girls. One former classmate recalls that prior to their senior prom, a few of Tamerlan’s friends tried to find him a date. “He wasn’t even around,” she says, “it was just his friends asking girls to go with him.” But everyone said no, and he attended the prom alone.
After graduating in 2006, he enrolled at Bunker Hill Community College to study accounting, but attended for just three semesters before dropping out. A talented pianist and composer, he harbored a desire to become a musician, but his ultimate dream was to become an Olympic boxer, after which he’d turn pro. This was also his father’s dream – a champion boxer himself back in Russia, Anzor reportedly pushed Tamerlan extremely hard, riding behind him on his bicycle while his son jogged to the local boxing gym. And Tamerlan did very well under his father’s tutelage, rising in the ranks of New England fighters. One of the best in his weight class, Tamerlan once told a fighter to “practice punching a tree at home” if he wanted to be truly great. But his arrogance undermined his ambitions. In 2010, a rival trainer, claiming Tamerlan had broken boxing etiquette by taunting his fighter before a match, lodged a complaint with the national boxing authority that Tamerlan should be disqualified from nationwide competition as he was not an American citizen. The authorities, coincidentally, were just in the process of changing their policy to ban all non-U.S. citizens from competing for a national title.
This dashed any Olympic hopes, as Tamerlan was not yet eligible to become a U.S. citizen. His uncle Ruslan had urged him to join the Army. It would give him structure, he said, and help him perfect his English. “I told him the best way to start your way in a new country – give something,” Ruslan says. But Tamerlan laughed, his uncle recalls, for suggesting he kill “our brother Muslims.”
Tamerlan had discovered religion, a passion that had begun in 2009. In interviews, Zubeidat has suggested it was her idea, a way to encourage Tamerlan, who spent his off-hours partying with his friends at local clubs, to become more serious. “I told Tamerlan that we are Muslim, and we are not practicing our religion, and how can we call ourselves Muslims?” she said. But Anna suspects there was something else factoring into the situation. Once, Anna recalls, Zubeidat hinted that something might be wrong. “Tamerlan told me he feels like there’s two people living in him,” she confided in her friend. “It’s weird, right?”
Anna, who wondered if Tamerlan might be developing a mental illness, suggested Zubeidat take him to a “doctor” (“If I said ‘psychiatrist,’ she’d just flip,” she says), but Zubeidat seems to have believed that Islam would help calm Tamerlan’s demons. Mother and son began reading the Koran – encouraged, Zubeidat said, by a friend of Tamerlan’s named Mikhail Allakhverdov, or “Misha,” a thirtysomething Armenian convert to Islam whom family members believe Tamerlan met at a Boston-area mosque. Allakhverdov has denied any association with the attack. “I wasn’t his teacher,” he told the New York Review of Books. “If I had been his teacher, I would have made sure he never did anything like this.” But family members have said Allakhverdov had a big influence on Tamerlan, coming to the house and often staying late into the night, talking with Tamerlan about Islam and the Koran. Uncle Ruslan would later tell The Daily Mail that Allakhverdov would “give one-on-one sermons to Tamerlan over the kitchen table, during which he claimed he could talk to demons and perform exorcisms.”
Zubeidat was pleased. “Don’t interrupt them,” she told her husband one evening when Anzor questioned why Allakhverdov was still there around midnight. “Misha is teaching him to be good and nice.”
B
efore long, Tamerlan had quit drinking and smoking pot, and started to pray five times a day, even taking his prayer rug to the boxing gym. At home, he spent long hours on the Internet reading Islamic websites, as well as U.S. conspiracy sites, like Alex Jones’ InfoWars. He told a photographer he met that he didn’t understand Americans and complained about a lack of values. He stopped listening to music. “It is not supported by Islam,” Tamerlan said. “Misha says it’s not really good to create or listen to music.” Then, in 2011, he decided to quit boxing, claiming it was not permitted for a Muslim to hit another man.
Zubeidat, too, had become increasingly religious – something that would get in the way of her marriage as well as her job at an upscale Belmont salon, where she broke for daily prayers and refused to work on male clients. She was ultimately fired, after which she turned her living room into a minisalon. One of her former clients recalls her wearing “a head wrap” in the house, and a hijab whenever she went outside. “She started to refuse to see boys who’d gone through puberty,” recalls the client. “A religious figure had told her it was sacrilegious.”
What really struck her client, beyond Zubeidat’s zeal, were her politics. During one facial session, she says, Zubeidat told her she believed 9/11 was a government plot to make Americans hate Muslims. “It’s real,” she said. “My son knows all about it. You can read on the Internet.”
It was during this period that Jahar told his friend Will that he felt terrorism could be justified, a sentiment that Tamerlan apparently shared. Whether or not Jahar truly agreed with his brother, their relationship was one where he couldn’t really question him. In Chechen families, Baudy says, “Your big brother is not quite God, but more than a normal brother.” When they were kids, Baudy recalls, Tamerlan used to turn off the TV and make them do pushups. Now he urged them to study the Koran.
“Jahar found it kind of a nuisance,” says Baudy, and tried to shrug it off as best as he could. But he couldn’t do much. “You’re not going to get mad at your elders or tell them to stop doing something, especially if it’s about being more religious.” During one visit a few years ago, Baudy recalls, Tamerlan interrupted them on the computer to say that if they were going to be surfing the Internet, they should focus on their faith. He gave them a book – Islam 101 – and instructed them to read. He gave the same book to James, the high school convert who, as a new Muslim, was one of the very few of Jahar’s friends who came to the house. Tamerlan also taught James how to pray. “I guess they’d sit there for hours,” says Sam, who would hear about it afterward. Sam couldn’t figure it out. “It was crazy because back a few years ago, Timmy was so like us, a regular dude, boxing, going to school, hanging out, partying all the time. But then he changed and became anti-fun.”
By 2011, all remnants of “Timmy” seemed to be gone. When his close friend and sparring partner Brendan Mess began dating a nonpracticing Muslim, Tamerlan criticized Mess’ girlfriend for her lack of modesty. And he also reportedly criticized Mess for his “lifestyle” – he was a local pot dealer. On September 11th, 2011 – the 10th anniversary of 9/11 – Mess and two of his friends were killed in a grisly triple murder that remains unsolved. Since the bombing, authorities have been vigorously investigating the crime, convinced that Tamerlan had something to do with it, though so far there’s no hard evidence.
“All I know is Jahar was really wary of coming home high because of how his brother would react. He’d get really angry,” says Will. “He was a really intense dude.”
“And if you weren’t Muslim, he was even more intense,” says Sam, who notes that he never met Tamerlan in person, though he heard stories about him all the time from Jahar. “I was fascinated – this dude’s, like, six-three, he’s a boxer – I wanted to meet him,” says Sam. “But Jahar was like, ‘No, you don’t want to meet him.'”
Jahar rarely spoke to his friends about his sisters, Ailina and Bella, who, just a few years older than he, kept to themselves but also had their own struggles. Attractive, dark-haired girls who were “very Americanized,” as friends recall, they worshipped Tamerlan, whom one sister would later refer to as her “hero” – but they were also subject to his role as family policeman. When Bella was a junior in high school, her father, hearing that she’d been seen in the company of an American boy, pulled her out of school and dispatched Tamerlan to beat the boy up. Friends later spotted Bella wearing a hijab; not long afterward, she disappeared from Cambridge entirely. Some time later, Ailina would similarly vanish. Both girls were reportedly set up in arranged marriages.
Anna Nikeava was unaware the girls had even left Boston, and suspects the parents never talked about it for fear of being judged. “Underneath it all, they were a screwed-up family,” she says. “They weren’t Chechen” – they had not come from Chechnya, as she and others had – “and I don’t think the other families accepted them as Chechens. They could not define themselves or where they belonged. And poor Jahar was the silent survivor of all that dysfunction,” she says. “He never said a word. But inside, he was very hurt, his world was crushed by what was going on with his family. He just learned not to show it.”
Anzor, who’d been at first baffled, and later “depressed,” by his wife’s and son’s religiosity, moved back to Russia in 2011, and that summer was granted a divorce. Zubeidat was later arrested for attempting to shoplift $1,600 worth of clothes from a Lord & Taylor. Rather than face prosecution, she skipped bail and also returned to Russia, where she ultimately reconciled with her ex-husband. Jahar’s sisters, both of whom seemed to have escaped their early marriages, were living in New Jersey and hadn’t seen their family in some time.
And Tamerlan was now married, too. His new wife, Katherine Russell, was a Protestant from a well-off family in Rhode Island. After high school, she’d toyed with joining the Peace Corps but instead settled on college at Boston’s Suffolk University. She’d met Tamerlan at a club during her freshman year, in 2007, and found him “tall and handsome and having some measure of worldliness,” one friend would recall. But as their relationship progressed, Katherine’s college roommates began to worry that Tamerlan was “controlling” and “manipulative.” They became increasingly concerned when he demanded that she cover herself and convert to Islam.
Though Katherine has never spoken to the press, what is known is that she did convert to Islam, adopting the name “Karima,” and soon got pregnant and dropped out of college. In June 2010, she and Tamerlan were married; not long afterward, she gave birth to their daughter, Zahira. Around this time, both her friends and family say, she “pulled away.” She was seen in Boston, shopping at Whole Foods, cloaked and wearing a hijab. She rarely spoke around her husband, and when alone, recalls one neighbor, she spoke slowly with an accent. “I didn’t even know she was an American,” he says.
Jahar, meanwhile, was preparing for college. He had won a $2,500 city scholarship, which is awarded each year to about 40 to 50 Cambridge students; he ended up being accepted at a number of schools, including Northeastern University and UMass Amherst. But UMass Dartmouth offered him a scholarship. “He didn’t want to force his parents to pay a lot of money for school,” says Sam, who recalls that Jahar never even bothered to apply to his fantasy schools, Brandeis and Tufts, due to their price tags. A number of his friends would go off to some of the country’s better private colleges, “but Jizz rolled with the punches. He put into his head, ‘I can’t go to school for mad dough, so I’m just going to go wherever gives me the best deal.’ Because, I mean, what’s the point of going to a school that’s going to cost $30,000 a year – for what? Pointless.” His other friends agree.
A middling school an hour and a half south of Boston, UMass Dartmouth had one distinguishing feature – its utter lack of character. “It’s beige,” says Jackson. “It’s, like, the most depressing campus I’ve ever seen.” Annual costs are about $22,000.
Jahar arrived in the fall of 2011 and almost immediately wanted to go home. North Dartmouth, where the university is based, is a working-class community with virtually nothing to boast of except for a rather sad mall and a striking number of fast-food joints. It has a diverse student population, but their level of curiosity seemed to fall far below his friends’ from Rindge. “Using my high-school essays for my english class #itsthateasy,” Jahar tweeted in November 2011. “You know what i like to do? answer my own questions cuz no one else can.”
“He was hating life,” says Sam. “He used to always call and say it’s mad wack and the people were corny.” His one saving grace was that one of his best friends from Rindge had gone to UMass Dartmouth, too – though he would later transfer. “All they would do was sit in the car and get high – it was that boring,” says Sam.
On the weekends, campus would empty out and Jahar came home as often as he could. But home was no longer “home,” as his parents were gone. Many of his closest friends were gone as well. Tamerlan, though, was always around. “Pray,” the older brother told the younger. “You cannot call yourself a Muslim unless you thank Allah five times a day.”
M
uch of what is known about the two years of Jahar’s life leading up to the bombing comes from random press interviews with students at UMass Dartmouth, none of whom seemed to have been particularly close with Jahar; and from Jahar’s tweets, which, like many 18- or 19-year-olds’, were a mishmash of sophomoric jokes, complaints about his roommate, his perpetual lateness, some rap lyrics, the occasional deep thought (“Find your place and your purpose and make a plan for the future”) and, increasingly, some genuinely revealing statements. He was homesick. He suffered from insomnia. He had repeated zombie dreams. And he missed his dad. “I can see my face in my dad’s pictures as a youngin, he even had a ridiculous amount of hair like me,” he tweeted in June 2012.
Jahar had begun his studies to be an engineer, but by last fall had found the courses too difficult. He switched to biology and, to make money, he dealt pot – one friend from his dorm says he always had big Tupperware containers of weed in his fridge.
As he had at Rindge, Jahar drifted between social groups, though he clung to friends from high school who also attended UMass Dartmouth. But he soon gravitated to a group of Kazakh students, wealthy boys with a taste for excellent pot, which Jahar, who spoke Russian with them, often helped to provide. By his sophomore year, even as he gained U.S. citizenship, he abandoned his American Facebook for the Russian version, Vkontakte, or VK, where he listed his world view as “Islam” and his interests as “career and money.” He joined several Chechnya-related groups and posted Russian-language-joke videos. “He was always joking around, and often his jokes had a sarcastic character,” says Diana Valeeva, a Russian student who befriended Jahar on VK. Jahar also told Diana that he missed his homeland and would happily come for a visit. “But he did not want to return forever,” she says.
Tamerlan’s journey the past two years is far easier to trace. Though no more Chechen than his brother, Tamerlan was also – as his resident green card reminded him – not really an American. Islam, or Tamerlan’s interpretation of it, had become his identity. He devoured books on Chechnya’s separatist struggle, a war that had taken on a notably fundamentalist tone since the late 1990s, thanks to a surge of Muslim fighters from outside of the Caucusus who flocked to Chechnya to wage “holy war” against the Russians. It is not uncommon for young Chechen men to romanticize jihad, and for those who are interested in that kind of thing, there are abundant Chechen jihadist videos online that reinforce this view. They tend to feature Caucasian fighters who, far from the lecturing sheikhs often found in Al Qaeda recruitment videos, look like grizzled Navy SEALs, humping through the woods in camouflage and bandannas. Tamerlan would later post several of these videos on his YouTube page, as well as “The Emergence of Prophecy: The Black Flags from Khorasan,” a central part of Al Qaeda and other jihadist mythology, which depicts fierce, supposedly end-times battles against the infidels across a region that includes parts of Afghanistan, Pakistan and Iran.
But Brian Glyn Williams, a professor of Islamic studies at UMass Dartmouth and an expert on terrorism and the politics of Chechnya, believes that Tamerlan’s journey – which he calls “jihadification” – was less a young man’s quest to join Al Qaeda than to discover his own identity. “To me, this is classic diasporic reconstruction of identity: ‘I’m a Chechen, and we’re fighting for jihad, and what am I doing? Nothing.’ It’s not unlike the way some Irish-Americans used to link Ireland and the IRA – they’d never been to Northern Ireland in their lives, but you’d go to certain parts of Southie in Boston, and all you see are donation cans for the IRA.”
For Jahar, identity likely played into the mix as well, says Williams, who, though he never met Jahar at UMass Dartmouth, coincidentally corresponded with him during his senior year of high school. One of Williams’ friends taught English at Rindge, and “he told me he had this Chechen kid in his class who wanted to do his research paper on Chechnya, a country he’d never lived in.” Williams agreed to help Jahar. “The thing that struck me was how little he actually knew,” he says. “He didn’t know anything about Chechnya, and he wanted to know everything.”
Whether Jahar gained much from his studies – or even did much of it – is unknown. Tamerlan, having devoured all the books he could find, was preparing to take the next step. In January 2012, he traveled to Dagestan, where he spent six months. Dagestan has been embroiled in a years-long civil war between Muslim guerrillas and the (also Muslim) police, as well as Russian forces. Bombs go off in the streets regularly, and young men, lured by the romance of the fight, often disappear to “go to the forest,” a euphemism for joining the insurgency. Tamerlan, too, seemed to have wanted to join the rebellion, but he was dissuaded from this pursuit by, among others, a distant cousin named Magomed Kartashov, who also happened to be a Dagestani Islamist. Kartashov’s Western cousin, who came to Dagestan dressed in fancy American clothes and bragging of being a champion boxer, had no place in their country’s civil war, he told Tamerlan. It was an internal struggle – in an interview with TIME magazine, associates of Kartashov’s referred to it as “banditry” – and had only resulted in Muslims killing other Muslims. Kartashov urged Tamerlan to embrace nonviolence and forget about Dagestan’s troubles. By early summer, Tamerlan was talking about holy war “in a global context,” one Dagestani Islamist recalls.
In July 2012, Tamerlan returned to Cambridge. He grew a five-inch beard and began to get in vocal debates about the virtues of Islam. He vociferously criticized U.S. policy in the Middle East. Twice over the next six or eight months, he upset services at a local mosque with a denunciation of Thanksgiving, and also, in January 2013, of Martin Luther King Jr.
The boys’ uncle Ruslan hoped that Jahar, away at school, would avoid Tamerlan’s influence. Instead, Jahar began to echo his older brother’s religious fervor. The Prophet Muhammad, he noted on Twitter, was now his role model. “For me to know that I am FREE from HYPOCRISY is more dear to me than the weight of the ENTIRE world in GOLD,” he posted, quoting an early Islamic scholar. He began following Islamic Twitter accounts. “Never underestimate the rebel with a cause,” he declared.
Though it seems as if Jahar had found a mission, his embrace of Islam also may have been driven by something more basic: a need to belong. “Look, he was totally abandoned,” says Payack, who believes that the divorce of his parents and their subsequent move back to Russia was pivotal, as was the loss of the safety net he had at Rindge.
Theo, who goes to college in Vermont and is one of the few of Jahar’s friends to not have any college loans, can’t imagine the stress Jahar must have felt. “He had all of this stuff piled up on his shoulders, as well as college, which he’s having to pay for himself. That’s not easy. All of that just might make you say ‘Fuck it’ and give up and lose faith.
Wick Sloane, an education advocate and a local community-college professor, sees this as a widespread condition among many young immigrants who pass through his classrooms. “All of these kids are grateful to be in the United States. But it’s the usual thing: Is this the land of opportunity or isn’t it? When I look at what they’ve been through, and how they are screwed by federal policies from the moment they turn around, I don’t understand why all of them aren’t angrier. I’m actually kind of surprised it’s taken so long for one of these kids to set off a bomb.”
“A
decade in America already,” Jahar tweeted in March 2012. “I want out.” He was looking forward to visiting his parents in Dagestan that summer, but then he learned he wouldn’t receive his U.S. passport in time to make the trip. “#Imsad,” he told his followers. Instead, he spent the summer lifeguarding at a Harvard pool. “I didn’t become a lifeguard to just chill and get paid,” Jahar tweeted. “I do it for the people, saving lives brings me joy.” He was living with Tamerlan and his sister-in-law, who were going through their own troubles. Money was increasingly tight, and the family was on welfare. Tamerlan was now a stay-at-home dad; his wife worked night and day as a home-health aide to support the family.
Tamerlan had joined an increasing number of Cambridge’s young adults who were being priced out due to skyrocketing real-estate prices. “It’s really hard to stay in Cambridge because it’s becoming so exclusive,” says Tamerlan’s former Rindge classmate Luis Vasquez, who is running for a seat on the Cambridge City Council. “We feel like we’re being taken over.”
In August, Jahar, acutely aware of the troubles all around him, commented that $15 billion was spent on the Summer Olympics. “Imagine if that money was used to feed those in need all over the world,” he wrote. “The value of human life ain’t shit nowadays that’s #tragic.” In the fall, he returned to North Dartmouth and college, where, with no Tamerlan to catch him, he picked up his life, partying in his dorm and letting his schoolwork slide.
“Idk why it’s hard for many of you to accept that 9/11 was an inside job, I mean I guess fuck the facts y’all are some real #patriots #gethip,” Jahar tweeted. This is not an uncommon belief. Payack, who also teaches writing at the Berklee College of Music, says that a fair amount of his students, notably those born in other countries, believe 9/11 was an “inside job.” Aaronson tells me he’s shocked by the number of kids he knows who believe the Jews were behind 9/11. “The problem with this demographic is that they do not know the basic narratives of their histories – or really any narratives,” he says. “They’re blazed on pot and searching the Internet for any ‘factoids’ that they believe fit their highly de-historicized and decontextualized ideologies. And the adult world totally misunderstands them and dismisses them – and does so at our collective peril,” he adds.
Last December, Jahar came home for Christmas break and stayed for several weeks. His friends noticed nothing different about him, except that he was desperately trying to grow a beard – with little success. In early February, he went back to Rindge to work with the wrestling team, where he confided in Theo, who’d also come back to help, that he wished he’d taken wrestling more seriously. He could have been really good had he applied himself a bit more.
At 410 Norfolk St., Tamerlan, once a flashy dresser, had taken to wearing a bathrobe and ratty sweatpants, day after day, while Jahar continued to explore Islam. “I meet the most amazing people,” he tweeted. “My religion is the truth.”
But he also seemed at times to be struggling, suggesting that even his beloved Cambridge had failed him in some way. “Cambridge got some real, genuinely good people, but at the same time this city can be fake as fuck,” he said on January 15th. Also that day: “I don’t argue with fools who say Islam is terrorism it’s not worth a thing, let an idiot remain an idiot.”
According to a transcript from UMass Dartmouth, reviewed by The New York Times, Jahar was failing many of his classes his sophomore year. He was reportedly more than $20,000 in debt to the university. Also weighing on him was the fact that his family’s welfare benefits had been cut in November 2012, and in January, Tamerlan and his wife reportedly lost the Section 8 housing subsidy that had enabled them to afford their apartment, leaving them with the prospect of a move.
Why a person with an extreme or “radical” ideology may decide to commit violence is an inexact science, but experts agree that there must be a cognitive opening of some sort. “A person is angry, and he needs an explanation for that angst,” explains the Soufan Group’s Tom Neer. “Projecting blame is a defense mechanism. Rather than say, ‘I’m lost, I’ve got a problem,’ it’s much easier to find a convenient enemy or scapegoat. The justification comes later – say, U.S. imperialism, or whatever. It’s the explanation that is key.”
For Tamerlan Tsarnaev, the explanation for his anger was all around him. And so, dissuaded from his quest to wage jihad in Dagestan, he apparently turned his gaze upon America, the country that, in his estimation, had caused so much suffering, most of all his own.
In early February, soon after losing his housing subsidy, Tamerlan drove to New Hampshire, where, according to the indictment, he purchased “48 mortars containing approximately eight pounds of low-explosive powder.” Also during this general period, Jahar began downloading Islamic militant tracts to his computer, like the first issue of the Al Qaeda magazine Inspire, which, in an article titled “Make a Bomb in the Kitchen of Your Mom,” offered detailed instructions on how to construct an IED using a pressure cooker, explosive powder from fireworks, and shrapnel, among other readily available ingredients.
Jahar returned home for spring break in March and spent time hanging out with his regular crew. He brought his friend Dias Kadyrbayev home with him, driving Dias’ flashy black BMW with the joke license plate TERRORISTA. He hung out with a few friends and went to the Riv, where they lit off fireworks; he met other friends at a local basketball court, one of his usual haunts. He looked happy and chill, as he always did, and was wearing a new, brown military-style jacket that his friends thought was “swag.” “And that was the last time I saw him,” says Will.
What went on in the apartment at 410 Norfolk during March and early April remains a mystery. “It’s hard to understand how there could be such disassociation in that child,” says Aaronson, who last saw Jahar in January, presumably before the brothers’ plan was set. “They supposedly had an arsenal in that fucking house! In the house! I mean, he could have blown up my whole fucking block, for God’s sakes.”
According to the indictment, the brothers went to a firing range on March 20th, where Jahar rented two 9mm handguns, purchased 200 rounds of ammunition and engaged in target practice with Tamerlan. On April 5th, Tamerlan went online to order electronic components that could be used in making IEDs. Friends of Jahar’s would later tell the FBI that he’d once mentioned he knew how to build bombs. But no one seemed to really take it all that seriously.
“People come into your life to help you, hurt you, love you and leave you and that shapes your character and the person you were meant to be,” Jahar tweeted on March 18th. Two days later: “Evil triumphs when good men do nothing.”
April 7th: “If you have the knowledge and the inspiration all that’s left is to take action.”
April 11th: “Most of you are conditioned by the media.”
The bombs went off four days later.
O
n the afternoon of April 18th, Robel Phillipos, a friend of Jahar’s from Cambridge as well as from UMass Dartmouth, was watching the news on campus and talking on the phone with Dias. He told Dias, who was in his car, to turn on the TV when he got home. One of the bombers, he said, looked like Jahar. Like most of their friends, Dias thought it was a coincidence and texted Jahar that he looked like one of the suspects on television. “Lol,” Jahar wrote back, casually. He told his friend not to text him anymore. “I’m about to leave,” he wrote. “If you need something in my room, take it.”
According to the FBI, Robel, Dias and their friend Azamat met at Pine Dale Hall, Jahar’s dorm, where his roommate informed them that he’d left campus several hours earlier. So they hung out in his room for a while, watching a movie. Then they spotted Jahar’s backpack, which the boys noticed had some fireworks inside, emptied of powder. Not sure what to do, they grabbed the bag as well as Jahar’s computer, and went back to Dias and Azamat’s off-campus apartment, where they “started to freak out, because it became clear from a CNN report . . . that Jahar was one of the Boston Marathon bombers,” Robel later told the FBI.
But no one wanted Jahar to get in trouble. Dias and Azamat began speaking to each other in Russian. Finally, Dias turned to Robel and asked in English if he should get rid of the stuff. “Do what you have to do,” Robel said. Then he took a nap.
Dias later confessed that he’d grabbed a big black trash bag, filled it with trash and stuffed the backpack and fireworks in there. Then he threw it in a dumpster; the bag was later retrieved from the municipal dump by the FBI. The computer, too, was eventually recovered. Until recently, its contents were unknown.
The contents of Jahar’s closely guarded psyche, meanwhile, may never be fully understood. Nor, most likely, will his motivations – which is quite common with accused terrorists. “There is no single precipitating event or stressor,” says Neer. “Instead, what you see with most of these people is a gradual process of feeling alienated or listless or not connected. But what they all have in common is a whole constellation of things that aren’t working right.”
A month or so after the bombing, I am sitting on Alyssa’s back deck with a group of Jahar’s friends. It’s a lazy Sunday in May, and the media onslaught has died down a bit; the FBI, though, is still searching for the source of the brothers’ “radicalization,” and Al Qaeda in the Arabian Peninsula, capitalizing on the situation, has put Tamerlan, dressed in his crisp, white Saturday Night Fever shirt and aviator shades, in the pages of its most recent Inspire. Jahar has a growing and surprisingly brazen fan club – #FreeJahar – and tens of thousands of new Twitter followers, despite the fact that he hasn’t tweeted since before his arrest.
Like so many of his fans, some of Jahar’s friends have latched onto conspiracy theories about the bombing, if only because “there are too many unanswered questions,” says Cara, who points out that the backpack identified by the FBI was not the same color as Jahar’s backpack. There’s also a photo on the Internet of Jahar walking away from the scene, no pack, though if you look closely, you can see the outline of a black strap. “Photoshopped!” the caption reads.
Mostly, though, his friends are trying to move on. “We’re concerned with not having this tied to us for the rest of our lives,” says Alyssa, explaining why she and Sam and Jackson and Cara and Will and James and Theo have insisted I give them pseudonyms. Even as Jahar was on the run, his friends started hearing from the FBI, whose agents shortly descended upon their campuses – sometimes wearing bulletproof vests – looking for insight and phone numbers.
“You’re so intimidated, and you think if you don’t answer their questions, it looks suspicious,” says Jackson, who admits he gave up a number of friends’ phone numbers after being pressed by the FBI.
Sam says he thinks the feds tapped his phone. All of the kids were interviewed alone, without a lawyer. “I didn’t even know I could have a lawyer,” says Jackson. “And they didn’t tell me that anything I said might be used against me, which was unfair, because, I mean, I’m only 19.”
But the worst, they all agree, is Robel, who was interviewed four times by the FBI, and denied he knew anything until, on the fourth interview, he came clean and told them he’d helped remove the backpack and computer from Jahar’s dorm room. Robel is 19 but looks 12, and is unanimously viewed by his friends as the most innocent and sheltered of the group. He is now facing an eight-year prison sentence for lying to a federal officer.
“So you see why we don’t want our names associated,” says Sam. “It’s not that we’re trying to show that we’re not Jahar’s friends. He was a very good friend of mine.”
J
ahar is, of course, still alive – though it’s tempting for everyone to refer to him in the past tense, as if he, too, were dead. He will likely go to prison for the rest of his life, which may be his best possible fate, given the other option, which is the death penalty. “I can’t wrap my head around that,” says Cara. “Or any of it.”
Nor can anyone else. For all of their city’s collective angst and community processing and resolutions of being “one Cambridge,” the reality is that none of Jahar’s friends had any idea he was unhappy, and they really didn’t know he had any issues in his family other than, perhaps, his parents’ divorce, which was kind of normal.
“I remember he was upset when his dad left the country,” says Jackson. “I remember he was giving me a ride home and he mentioned it.”
“Now that I think about that, it must have added a lot of pressure having both parents be gone,” says Sam.
“But, I mean, that’s the mystery,” says Jackson. “I don’t really know.” It’s weird, they all agree.
“His brother must have brainwashed him,” says Sam. “It’s the only explanation.”
Someone mentions one of the surveillance videos of Jahar, which shows him impassively watching as people begin to run in response to the blast. “I mean, that’s just the face I’d always see chilling, talking, smoking,” says Jackson. He wishes Jahar had looked panicked. “At least then I’d be able to say, ‘OK, something happened.’ But . . . nothing.”
That day’s Boston Globe has run a story about the nurses at Beth Israel Deaconess Hospital who took care of Jahar those first few days after his capture. They were ambivalent, to say the least, about spending too much time with him, for fear of, well, liking him. One nurse said she had to stop herself from calling him “hon.” The friends find this story disgusting. “People just have blood in their eyes,” says Jackson.
One anecdote that wasn’t in the article but that has been quietly making its way around town, via one of his former nurses, is that Jahar cried for two days straight after he woke up in the hospital. No one in the group has heard this yet, and when I mention it, Alyssa gives an anguished sigh of relief. “That’s good to know,” she says.
“I can definitely see him doing that,” says Sam, gratefully. “I hope he’s crying. I’d definitely hope . . .”
“I hope he’d wake up and go, ‘What the fuck did I do the last 48 hours?’ ” says Jackson, who decides, along with the others, that this, the crying detail, sounds like Jahar.
But, then again, no one knows what he was crying about.
by Janet Reitman
JULY 17, 2013
Find this story at 17 July 2013
Copyright ©2013 Rolling Stone
Skandale, Organisation, Geschichte NSA, Mossad und die verräterische Nackttänzerin – so spionieren die Geheimdienste14 augustus 2013
Eine Chronik der Geheimdienstarbeit: Von Meisterspionin Mata Hari bis zur Cyber-Spionage der NSA
Geheimdienste wie NSA, Mossad oder BND scheinen tun zu können, was sie wollen: Überwachen, ausspionieren, töten – ihre Methoden sind dabei nicht immer legal. FOCUS Online zeigt die interessantesten Geheimdienste der Welt, ihre Organisation, ihre Geschichte, ihre Skandale.
Die Enthüllungen des ehemaligen Geheimdienstlers Edward Snowden zeigen, wie zügellos und weit verbreitet heute abgehört wird. Dabei richtet sich die Arbeit der Geheimdienste nicht nur gegen Offizielle und Politiker. Auch ganz normale Bürger werden überwacht. Die Öffentlichkeit ist besorgt, Fragen nach der Kontrolle der Behörden drängen sich auf, die Menschen fordern Konsequenzen.
Dabei galten Geheimdienste schon immer als mysteriös und spannend. Doch die Realität ihrer Arbeit hat oft wenig mit den Meisterspionen a la James Bond oder „Mission Impossible“-Held Ethan Hunt zu tun. Die Behörden sammeln Daten, werten sie aus, informieren, desinformieren, verhandeln und tauschen. Ihr Netz haben sie über die ganze Welt ausgeworfen. Das zeigen nicht erst die Enthüllungen von Prism und Edward Snowden.
Eines der ältesten Gewerbe der Welt
„Spionage ist eines der ältesten Gewerbe der Welt“, erklärt der Historiker und Geheimdienstexperte Siegfried Beer im Gespräch mit FOCUS Online. Beer leitet das österreichische Center für „Intelligence, Propaganda & Security Studies“, kurz ACIPSS, in Graz. Das Wissen um den Feind sei für jeden Staat von entscheidender Bedeutung. Schon Alexander der Große, der makedonische Heeresführer, dessen Reich ungeheure Ausmaße annahm, verließ sich auf Spionage.
Das wurde ihm beinahe zum Verhängnis, wie Wolfgang Krieger in seiner „Geschichte der Geheimdienste“ zeigt: 333 v. Christus, bei Issus „berühmter Keilerei“, wurde Alexander falsch informiert. Seine Agenten sagten ihm, der Perserkönig und sein Heer seien noch weit entfernt – Tatsache war, dass sie aneinander vorbeimarschiert waren. Und Alexander so in umgekehrter Schlachtformation kämpfen musste – doch er siegte.
Eine Folge der Industrialisierung
„Organisierte, moderne Spionage gibt es aber erst seit etwa 130 Jahren“, erklärt der Geheimdienst-Experte Beer vom ACIPSS. „Großbritannien nahm eine Vorreiterrolle ein.“ Die Briten begannen in den 1870er-Jahren mit dem Aufbau eines Nachrichtendienstes: aus Angst vor den unterdrückten und rebellischen Iren. Das brachte die anderen Länder unter Zugzwang: Alle europäischen Großmächte des 19. Jahrhunderts gründeten ihrerseits nach und nach Geheimdienste.
„Die moderne Spionage ist eine Folge der Industrialisierung“, sagt Beer. Wegen der verbesserten Kommunikation, den schnellen Transportwegen und der beginnenden Globalisierung mussten die Regierungen umdenken. In den Weltkriegen und dem Kalten Krieg entwickelten sie neue Methoden, um ihre Feinde besser zu überwachen und sich entscheidende Vorteile zu sichern. Heute hat jedes Land eigene Geheimdienste. Nicht nur zur Spionage und Gegenspionage, sondern auch zur Sicherung eigener Daten. Und, vor allem nach 9/11, zur Terrorismusbekämpfung.
Geschichten aus Hunderten Jahren Spionage
Doch die Prism-Enthüllung ist nur eine in einer langen Reihe vergleichbarer Skandale. Seien es Spione, die überliefen, die gefährlichen Methoden des Mossad oder die Meisterspione des KGB. Seitdem es organisierte Spionage gibt, werden die verborgenen Tätigkeiten in regelmäßigen Abständen enthüllt. Und immer bieten sie genug Stoff für spektakuläre Geschichten. FOCUS Online stellt eine Auswahl der aktivsten und gefährlichsten Geheimdienste der Welt und ihre Methoden vor – und zeigt ihre brisantesten Skandale und berühmtesten Spione.
Deutschland – BND, BfV, MAD
Montage/Panther
In Deutschland sammelt unter anderem der Bundesnachrichtendienst Informationen
Organisation der deutschen Nachrichtendienste
Drei Nachrichtendienste teilen sich in Deutschland den Schutz der Bürger: Das Bundesamt für Verfassungsschutz (BfV) beobachtet das Inland, der Bundesnachrichtendienst das Ausland (BND), der militärische Abschirmdienst (MAD) kümmert sich um den Schutz der Armee. Die drei Behörden arbeiten großteils getrennt.
Geschichte des BND
Die Alliierten gaben 1949 die Struktur des Geheimdienstes in der Bundesrepublik vor. Dabei zogen sie vor allem die Lehren aus dem System des NS-Regiems: Die Geheime Staatspolizei, kurz Gestapo, hatte dort die Möglichkeit, eigenmächtig Verhaftungen durchzuführen. Das darf der Verfassungsschutz in Deutschland nicht. Die Nachrichtendienste haben generell keine polizeilichen Befugnisse.
Der BND ist als deutscher Auslandsgeheimdienst dem Kanzleramt unterstellt und wurde 1956 gegründet. Zu den Aufgabenbereichen gehört die Beobachtung mutmaßlicher Terroristen, der organisierten Kriminalität, illegaler Finanzströme, des Rauschgifthandels, der Weitergabe von ABC-Waffen und Rüstungsgütern sowie von Krisenregionen wie Afghanistan oder Pakistan. Dazu wertet der BND Informationen von menschlichen Quellen, elektronische Kommunikation sowie Satelliten- und Luftbilder aus. Er zählt etwa 6000 Mitarbeiter – vom Fahrer bis zum Nuklearphysiker. Wie viel Geld der BND für Spionage ausgeben darf, hält die Behörde streng geheim.
1950 wurde in der Deutschen Demokratischen Republik wohl einer der bekanntesten Geheimdienste der Welt gegründet: Das Ministerium für Staatssicherheit, kurz Stasi. Angegliedert an die Stasi war der Auslandsgeheimdienst Hauptverwaltung Aufklärung, die sich vor allem mit dem westlichen Bruder beschäftigte. Die Stasi mauserte sich zu einem entscheidenden Machtinstrument der sozialistischen Regierung. Sie unterdrückte Andersdenkende, warb sogenannte Spitzel an, inhaftierte Dissidenten – die Bevölkerung hatte Angst vor der Behörde. Das lag daran, dass die Behörde polizeiliche Befugnisse hatte. Bis heute läuft die Aufarbeitung über das Ausmaß der Stasi-Überwachung.
Spektakuläres über den BND
Deutsche Spione à la James Bond? Falsch. Beim BND sind Fremdsprachenexperten, Informatiker, Juristen, Biologen, Ingenieure und Islamwissenschaftler gefragt, keine Superagenten. Sie werden innerhalb von zwei bis drei Jahren zum Agenten ausgebildet – und dann als Tarifbeschäftigte, Soldaten und Beamten angestellt.
2006 erschütterte ein Bericht über die Arbeit des BND die Bundesrepublik: Im großen Stil hörte der Dienst Journalisten ab. Gerade in den Achtzigern war der Bedarf an Informationen besonders hoch, namhafte Autoren bei Zeitungen wie Stern, Spiegel oder FOCUS standen unter Beobachtung.
Welche Rolle spielte der BND im Irak-Krieg 2003? Hartnäckig halten sich Gerüchte, dass der Dienst einen Informanten hatte, der behauptete, dass der Irak Massenvernichtungswaffen und Biolabore besessen haben soll. Weiterhin haben Agenten des BND, so zeigt Alexandra Sgro in ihrem Buch „Geheimdienste der Welt“, angeblich strategische Informationen über irakische Verteidigungsstellungen und Truppenbewegungen an die USA weitergegeben. Die Bundesregierung hatte offiziell verlauten lassen, dass sich Deutschland aus dem Irak-Krieg heraushält – lässt sich dieser Status nach den Enthüllungen noch halten?
Türkei – MIT
Colourbox/Montage
Die Türkei hat nur einen Nachrichtendienst: den „Millî Istihbarat Teşkilâti“
Organisation türkischen Geheimdienstes
Der Millî Istihbarat Teşkilâti (MIT) ist der einzige Nachrichtendienst der Türkei. Er ist für innere Sicherheit und Spionageabwehr zuständig. Außerdem hat er die Pflicht, für den Schutz der Landesgrenzen zu sorgen. Der Geheimdienst untersteht direkt dem Premierminister und ist dafür verantwortlich, bedrohliche Gruppierungen im In- und Ausland zu beobachten. Dabei gibt es häufig gewaltsame Konflikte mit Anhängern der verbotenen Arbeiterpartei Kurdistans PKK. Denn diese kämpfen für die Autonomie der kurdischen Gebiete der Türkei.
Geschichte des MIT
Schon vor der Gründung der Türkei gab es Geheimdienste. 1913 wurde Teşkilât-I Mahsusa als erster zentralisierter und organisierter türkischer Nachrichtendienst gegründet. Er sollte die Aktivitäten von Separatisten eindämmen. Während des Ersten Weltkrieges erlebte die Behörde ihre Blütezeit und war militärisch und paramilitärisch aktiv. Das Ende des Krieges bedeutete auch das Ende des Geheimdienstes.
Sein Nachfolger war Karakol Cemiyeti, der Zivilpersonen und kleine Gruppierungen ab 1919 im türkischen Unabhängigkeitskrieg mit Waffen ausstattete. So gelang es, die Besatzungsmächte zu besiegen. Als die Briten im Jahr 1920 Istanbul besetzten, lösten sie auch den Nachrichtendienst auf. Danach gab es viele verschiedene Geheimdienste, die nie lange Bestand hatten. Bis 1965 der Millî Istihbarat Teşkilâti gegründet wurde.
Spektakuläres über den MIT
Wie Sgro in ihrem Buch „Geheimdienste der Welt“ schreibt, werden beim türkischen Geheimdienst nur schriftliche Bewerbungen angenommen, die per Post eingesendet werden – eine Vorbereitung auf die Spionagetätigkeit? Die frisch gebackenen Agenten bekommen ihren Arbeitsort dann per Losverfahren zugeteilt.
In den Neunzigern machten Berichte die Runde, der türkische Geheimdienst würde militante Separatisten bekämpfen. Allerdings nicht nur im eigenen Land, sondern auch in Deutschland. Dabei schüchterten die Agenten angeblich Oppositionelle ein, bedrohten Asylbewerber und kündigten Repressalien gegen die in der Türkei lebenden Verwandten an.
Ein anderes Ziel hatte laut Spekulationen sogenannter Experten der türkische Geheimdienst Mitte der 2000er-Jahre: Zu diesem Zeitpunkt war gerade die sogenannte Sauerland-Gruppe verhaftet worden. Sie plante offenbar einen Bombenanschlag in Deutschland, unterstützt von dem Türken Mevlüt K. – laut Medienberichten ein Informant des türkischen Geheimdienstes. Fakt ist: Er ist untergetaucht und wird per internationalem Haftbefehl gesucht.
Frankreich – DGSE
Motage/Panther
Frankreichs Geheimdienst DGSE
Organisation des französischen Geheimdienstes
Der französische Geheimdienst nennt sich „Direction Générale de la Sécurité Extérieure“, kurz DGSE. Spezialoperationen des DGSE müssen von oberster Stelle genehmigt werden: Seit 2009 darf sie nur der französische Präsident bewilligen. Wer eingestellt wird, entscheidet das Verteidigungsministerium. Schwerpunkt des Geheimdienstes mit Sitz in Paris: Terrorismusbekämpfung. Außerdem haben die Geheimdienstler ein Auge auf Länder, in denen Massenvernichtungswaffen hergestellt und vertrieben werden.
Geschichte des DGSE
Die Geschichte des DGSE beginnt mit Charles de Gaulle. Der spätere Ministerpräsident Frankreichs ließ 1940 aus dem Exil einen Geheimdienst zusammenstellen. Er sollte für die Widerstandsbewegung „France Libre“ gegen das NS-Regime spionieren. Nach dem Krieg wurde ein neuer Geheimdienst gegründet, der Service de Documentation Extérieure et de Contre-Espionnage (SDECE). Seine Aufgaben: ausländische Berichterstattung und Gegenspionage. 1982 löste ihn der DGSE ab.
Die Schwerpunkte des DGSE sind stark von Frankreichs Geschichte als Kolonialmacht geprägt. Denn zu seinen ehemaligen Kolonien pflegt Frankreich auch heute noch wirtschaftliche Beziehungen. Die Regierungen sollten also stabil bleiben. Wo Frankreich Fundamentalismus fürchtete, griff der Geheimdienst ein. So wie Ende der 1980er-Jahre in Algerien. Angeblich ermordete der DGSE 1992 den algerischen Präsidenten Muhammad Boudiaf. Und auch in Syrien könnte sich die Behörde 2012 eingemischt haben, Sgro. Agenten sollen dem syrischen General Manaf Tlass bei der Flucht geholfen haben. Der stand einst Machthaber Assad nahe.
Spektakuläres über den DGSE
Die wohl legendärste Doppelspionin überhaupt war für die Franzosen im Einsatz: Mata Hari. Die Nackttänzerin ließ sich zur Zeit des Ersten Weltkriegs von den Deutschen dafür bezahlen, französischen Militärs Geheimnisse zu entlocken. Gleichzeitig spionierte sie für die Franzosen in den von den Deutschen besetzten Gebieten. Die schöne Niederländerin wurde schließlich von den Franzosen zum Tode verurteilt, weil sie auch an Deutschland Geheimnisse verraten haben soll. Was genau sie wem erzählt hat, ist bis heute nicht bekannt. Erst 2017 wird der französische Staat die Akten freigegeben.
In den 1980er-Jahren kämpfte der französische Geheimdienst gegen Greenpeace. Die französische Regierung testete zu dieser Zeit im Mururoa-Atoll im Pazifik Atomwaffen. Greenpeace-Aktivisten wollten dagegen protestieren. Agenten des DGSE gelang es, auf dem Greenpeace-Schiff Sprengsätze anzubringen. Bei der Explosion starb ein Mensch. Bewilligt wurde die Aktion angeblich vom damaligen Präsidenten François Mitterand. Der Verteidigungsminister rechtfertigte das Vorgehen: Anders hätte man den Protest nicht verhindern können.
Großes Aufsehen erregte auch der Vorgänger des DGSE, der SDECE: 1965 verschwand Ben Barka, ein Marokkaner im französischen Exil – bis heute ist nicht geklärt, wer ihn entführt hat. Im Verdacht stehen französische Agenten. Sie hätten damit dem marokkanischen König geholfen und zugleich den Einfluss Frankreichs auf Marokko gesichtert. Bakra war in Marokko wegen Hochverrats verurteilt worden, weil er den König scharf kritisiert hatte. Er soll vom marokkanischen Innenminister getötet worden sein.
Brasilien – Abin
dpa/Montage
Brasiliens Nachrichtendienst heißt „Agência Brasiliera de Inteligência“
Organisation des brasilianischen Geheimdienstes
Der brasilianische Geheimdienst heißt Agência Brasileira de Inteligência (Abin) und ist dem Präsidenten unterstellt. Die Aufgaben umfassen Spionage- und Terror-Abwehr, Informationsbeschaffung und Schutz der Bürger.
Geschichte der Albin
Schon 1927 wurde die militärische Behörde Conselho de Defesa Nacional gegründet, die sich zunächst mit geheimdienstlichen Aufgaben beschäftigte. Nachdem die Folgeorganisation die Arbeit in den Wirren des Militärputsches von 1964 schon wieder einstellte und durch einen regimehörigen Dienst ersetzt wurde, bestand die Behörde bis 1990. Die Abin wurde 1999 gegründet und übernimmt seitdem die Aufgabe des In- und Auslands-Geheimdienstes – im Gegensatz zu seinem Vorgänger als zivile Behörde.
Spektakuläres über die Albin
Nachwuchsarbeit bei Zehn bis 15-Jährigen? Warum nicht, muss sich die Abin gedacht haben. 2005, so beschreibt es Sgro in ihrem Buch, habe eine Informationsveranstaltung stattgefunden, bei der Jugendlichen die Arbeit von Agenten nahegebracht wurde. Dieses Programm soll weitergeführt werden und sich in Zukunft verstärkt an Schüler und Studenten richten.
Es muss eine skurrile Situation gewesen sein: 1983 entdeckte ein Maler im Büro des damaligen Präsidenten eine Wanze mit aktivem Sender. Brasilianische Zeitungen machten schnell den Schuldigen aus: den Geheimdienst. Der habe sich derartige Abhör-Vergehen schon öfters zuschulden kommen lassen, so die Argumentation. Die wahren Hintergründe bleiben unbekannt.
Im Juli diesen Jahres kam im Zuge des weltweiten Abhörskandals heraus, dass auch Brasilien im Fadenkreuz der NSA stand: Millionen Emails und Telefonate seien abgehört worden. Nach Informationen der Zeitung „O Blobo“ ist Brasilien das am meiste ausgespähte Land Lateinamerikas.
Syrien – Abteilung für militärische Aufklärung
AFP
Syriens Geheimdienst ist in der Hand des Machthabers Baschar al-Assad
Organisation des syrischen Geheimdienstes
Etwas unübersichtlich stellt sich die Situation in Syrien dar: Fünf Behörden teilen die Geheimdienst-Aufgaben unter sich auf. Es gibt einen allgemeinen zivilen Nachrichtendienst, einen Nachrichtendienst der Luftwaffe, das Direktorat für Staatssicherheit sowie das Direktorat für politische Sicherheit im Innenministerium – in den Zeiten des Umbruchs ist aber vor allem eine Behörde wichtig: die Abteilung für Aufklärung. Sie unterstützt die militärischen Truppen und soll Dissidentengruppen zerschlagen – und soll dabei an illegalen Aktionen beteiligt gewesen sein.
Geschichte der Abteilung für Militärische Aufklärung
Die Gründung der Abteilung für Militärische Aufklärung datiert auf das Jahr 1969. In der westlichen Welt wurde der Geheimdienst allerdings erst in den 2000er-Jahren bekannt. Im Kampf gegen die Auswirkungen des arabischen Frühlings in Syrien koordinierte die Abteilung ab 2010 die Niederschlagung von Demonstrationen und die Diskreditierung der Rebellen.
Doch auch in westliche Staaten entsendete der Geheimdienst seine Agenten: So soll ein Deutsch-Libanese über mehrere Jahre hinweg Informationen über syrische Oppositionelle in der Bundesrepublik gesammelt und an den syrischen Geheimdienst weitergegeben haben. Und auch der BND hat offenbar gute Kontakte nach Syrien: Die Tagesschau berichtete im Mai, dass der BND-Präsident an einem Treffen mit syrischen Geheimdienstlern teilgenommen haben soll.
Spektakuläres über die Abteilung für Militärische Aufklärung
Wenig ist über die Arbeit des syrischen Geheimdienstes bekannt. Doch ein Name steht wohl in direktem Zusammenhang mit einer Aktion syrischer Agenten im Jahr 2011: Oberstleutnant Hussein Harmusch. Er rief in einem Internetvideo dazu auf, sich gegen die syrische Regierung zu stellen und setzte sich in die Türkei ab. Kurze Zeit später verschwand er spurlos. Was war passiert? Sgro schildert die Geschichte folgendermaßen: Am Tag seines Verschwindens traf sich Harmusch mit einem türkischen Agenten, der ihn mit dem Auto abholte, aber nach Eigenaussage wenige Minuten später wieder absetzte.
Mehr als zwei Wochen nach dieser Episode strahlte das syrische Staatsfernsehen ein Video aus, in dem Harmusch seinen Aufruf zum Widerstand widerrief. Experten erkennen einen tiefverängstigten Mann, sie gehen davon aus, dass er gezwungen wurde. Harmusch verschwindet daraufhin von der Bildfläche, bis heute weiß niemand, wo er ist. Nur die türkische Regierung äußerte sich noch einmal zu dem Fall: Sie ließ verlauten, dass der angebliche türkische Agent tatsächlich aus Syrien stammte.
Mit welcher Grausamkeit der syrische Geheimdienst beispielsweise gegen Dissidenten vorgeht, zeigen Berichte aus dem Jahr 2012: Menschenrechtsorganisationen sprechen bei den Geheimdienstzentren in Damaskus von der „Hölle auf Erden“. „Human Rights Watch“ erfasste zahlreiche Fälle, in denen Familien ihre vermissten Angehörigen nur noch tot finden konnten: Mit Brandflecken und Blutergüssen übersät. Überlebende berichten von Methoden, die man aus dem europäischen Mittelalter kennt: Sie wurden an den Händen aufgehangen, dann wurden sie geschlagen und geschnitten. Oder sie wurden auf Kreuz-ähnliche Holzbretter geschnallt und von Häschern auf die Fußsohlen geschlagen. Andere berichten von Stromschocks im Genitalbereich und weiteren Foltermethoden.
Die Beobachtergruppe „Violations Documentation Center“ spricht von über 25 000 Syrern, die seit 2011 verhaftet worden sind. Weniger als ein Fünftel sei bislang freigelassen worden. Experten gehen allerdings von weiter höheren Zahlen aus: Sie sprechen von Hunderttausenden Inhaftierten.
Russland – KGB, FSB, SWR, GRU
Colourbox/Montage
Der FSB ist nur einer von Russlands Geheimdiensten
Organisation des russischen Geheimdienstes
Russland verlässt sich seit dem Zerfall der Sowjetunion auf diese Geheimdienst-Behörden: Den Inlandsgeheimdienst FSB, den Auslandsnachrichtendienst SWR, den Schutzdienst FSO und den Militärnachrichtendienst GRU. Die Aufgaben des SWR umfassen dabei Gegenspionage und Fernaufklärung, der Dienst umfasst rund 13 000 Mitarbeiter. Spannend ist aber vor allem der Inlandsgeheimdienst FSB, da er als Nachfolger des berüchtigten KGB gilt.
Geschichte des russischen Geheimdienstes
Die Wirren um die Abdankung des Zaren Nikolaus II. in der Februarrevolution 1917 forderten ein ganzes Land heraus: Eine provisorische Regierung wurde gebildet, die Oktoberrevolution brach aus, schon bald übernahmen kommunistische Bolschewiken die Macht. Der starke Mann Lenin regte die Gründung eines neuen Geheimdienstes an, um die Konterrevolution und Klassenfeinde zu bekämpfen.
Nach einigen Umstrukturierungen und dem Zweiten Weltkrieg entstand 1954 der KGB als eigenständiges Ministerium. Erst 1991, mit dem Ende der Sowjetunion, hörte er auf zu existieren – wobei der Geheimdienst in Weißrussland noch immer KGB heißt. Der sowjetische KGB arbeitete dabei sowohl nach innen als auch nach außen, dazu gehörten Gegenspionage, Auslandsspionage, Bekämpfung von Regimegegnern, Sicherung der Parteimitglieder. SWR und FSB wurden in den 1990-Jahren gegründet und teilen sich wiederum in eigene Büros und Organe auf.
Spektakuläres über den russischen Geheimdienst
Normalerweise sind es Geschichtsbegeisterte, die Geheimdiensten Verschwörungstheorien andichten. In den 80er-Jahren, so schreibt Sgro in ihrem Buch, war es allerdings der KGB selbst, der für Furore sorgte: Tüchtige Sowjet-Agenten setzten das Gerücht in Umlauf, dass die US-Amerikaner den HI-Virus hergestellt und aus Versehen freigesetzt hätten. Der Plan: die USA damit zu diskreditieren. Selbst die deutsche Zeitung „taz“ griff die These auf. 1987 entschuldigte sich der Staatschef Gorbatschow bei US-Diplomaten, die Zeitung brauchte 20 Jahre länger und entschuldigte sich 2010.
Unabhängig davon unterstanden dem KGB einige der berühmtesten Spione des 20. Jahrhunderts: Beispielsweise sorgte der Journalist Richard Sorge dafür, dass sich die Sowjets auf die deutschen und japanischen Angriffspläne einstellen konnten – weil der überzeugte Kommunist Dokumente weitergab. Aldrich Ames dagegen arbeitete eigentlich beim CIA, dort leitete der die Abteilung „Gegenspionage UDSSR“. Was niemand wusste: Ames spionierte für Russland. Er bekam Geld, die Sowjets die Namen von US-Spitzeln. Und dann wären da noch das Spionage-Ehepaar Rosenberg, der Doppel-Agent Heinz Felfe, der Atomwaffen-Physiker Klaus Fuchs und und und.
Wie im Kalten Krieg: Erst im Juli stand ein russisches Agenten-Ehepaar vor dem Gericht in Stuttgart. Das Ehepaar firmierte unter den Decknamen Andreas und Heidrun Anschlag. Auch wenn die beiden nicht als klassische Spione gearbeitet haben sollen, hatten sie wohl als eine Art Briefkasten gedient. Das Paar wurde 2011 von Beamten des BKA und der GSG9 aufgespürt und festgenommen, nachdem sie 20 Jahre lang unentdeckt geblieben waren. Derzeit verhandeln russische und deutsche Behörden über einen Austausch der beiden Russen gegen einen deutschen Agenten.
Dass auch der moderne russische Geheimdienst an traditionellen Methoden festhält, zeigt eine Meldung der russischen Zeitung „Iswestija“. Zum Schutz streng geheimer Informationen schreiben russische Geheimdienste auf Schreibmaschinen, nicht digital, auch handschriftliche Aufzeichnungen seien üblich. Besonders beliebt: das deutsche Modell Triumph-Adler Twen 180. Dabei hat jede Schreibmaschine eine eigene Signatur, so dass jedes Dokument der Maschine zugeordnet werden kann, auf der es geschrieben wurde.
Neuseeland – GCSB
Colourbox/Montage
„Government Communications Security Bureau“ heißt der Geheimdienst Neuseelands
Organisation des neuseeländischen Geheimdienstes
Neuseeland hat zwei Geheimdienstbehörden: Den Security Intelligence Service und das nachgeordnete Government Communications Security Bureau (GCSB). Das GCSB kümmert sich um die nationale Sicherheit, überwacht ausländische Datenströme, stellt Sicherheitssysteme für die Regierung zusammen – Einheimische und Zugezogene mit ständigem Wohnsitz dürfen dabei nicht überwacht werden. Die Behörde ist dem Premierminister unterstellt.
Geschichte des GCSB
Im Jahr 1977 wünschte sich der neuseeländische Premierminister einen Geheimdienst – vergleichsweise spät im Vergleich zu anderen Staaten. Schnell wurden Anlagen für die Überwachung in Waihopai und in Tangimoana gebaut. Bis dahin arbeiteten Angestellte des Auslands- und Verteidigungsministeriums an der Nachrichtenbeschaffung. Um besser reagieren zu können, baute die Regierung das GCSB auf.
Vor den Augen der Öffentlichkeit im Verteidigungsministerium versteckt, wurde die Behörde in den Anfang der 80er-Jahren zunächst nur der Politik vorgestellt. 1984 erfuhr die neuseeländische Öffentlichkeit von der Existenz des Geheimdienstes.Bis das GCSB aber eine eigene Behörde wurde, sollten noch mehrere Jahrzehnte vergehen: 2003, durch einen Erlass, wurde das GCSB als öffentliche Dienstleistungsabteilung eingerichtet.
Spektakuläres über das GCSB
Ausgerechnet ein Deutscher mit doppelter Staatsbürgerschaft – er hat auch einen finnischen Pass – wurde zum Politikum in Neuseeland: Kim Schmitz, auch bekannt als Kim Dotcom, geriet aufgrund zwielichtiger Online-Geschäfte in das Fadenkreuz des GCSB. Schmitz wurde im Januar 2012 aufgrund des Verdachts auf Urheberrechtsverletzungen sowie Geldwäsche verhaftet, doch bereits zuvor hörten neuseeländische Agenten Mr Dotcom ab – ohne Einverständnis der Regierung, allerdings im Auftrag der Polizei.
Die Auswertung von Emails und Telefonaten, so zeichnet Sgro in ihrem Buch „Geheimdienste der Welt“ nach, brachte die Behörde auf die Spur der meisten Mitangeklagten. Das Problem: langjährige Bewohner Neuseelands dürfen nicht bespitzelt werden. Das Ergebnis: Die gesammelten Daten waren illegal erworben, der Premierminister entschuldigte sich bei Schmitz und dem neuseeländischen Volk.
Österreich – HNA, HAA, BVT
Motage/Panther
Einer der österreichischen Geheimdienste, das Abwehramt
Organisation des österreichischen Geheimdienstes
In Österreich gibt es drei Geheimdienste: Der Auslandsnachrichtendienst ist das Heeresnachrichtenamt (HNaA oder HNA). Sein Gegenstück ist das Heeres-Abwehramt (HAA oder HabwA) als militärischer Inlandsnachrichtendienst. Beide unterstehen dem Bundesministerium für Landesverteidigung und Sport. Das Bundesamt für Verfassungsschutz und Terrorismusbekämpfung (BVT) ist die dritte Behörde.
Geschichte der österreichischen Geheimdienste
Militärische Nachrichtendienste gibt es in Österreich seit den Napoleonischen Kriegen. Napoleon veränderte damals mit seiner „Grande Armée“ die Kriegsführung, die Truppen waren beweglicher und agierten schneller. Die österreichische Monarchie musste darauf reagieren und begann, ein strukturiertes „militärisches Nachrichtenwesen“ aufzubauen. 1850 wurde der erste offizielle Nachrichtendienst in der österreichischen Monarchie eingerichtet: das Evidenzbüro. Ende des 19. Jahrhunderts überwachten dann die ersten „Geheimen Polizeiagenten“ hauptsächlich die öffentliche Sittlichkeit.
Diese Struktur änderte sich bis zum Anschluss Österreichs an das Deutsche Reich im Jahr 1938 kaum. Danach spionierte die Gestapo im Inland, der Sicherheitsdienst war für das Ausland zuständig und die Abwehr für militärische Spionage. Sie galten auch in Österreich als mächtiges Instrument der Nationalsozialisten. Eine der ersten Amtshandlungen nach dem Zweiten Weltkrieg war die Gründung einer österreichischen Staatspolizei. Erst 1955 gründete das Bundesheer einen militärischen Geheimdienst.
1972 wurde dieser in das heutige Heeres-Nachrichtenamt (HNaA) umgebaut. Zunächst beschäftigte sich dieses sowohl mit Auslandsaufklärung als auch mit Abwehr. 1985 wurde vom HNaA das Abwehramt abgespalten, weil das Heeresnachrichtenamt zu mächtig geworden war. Heute ist das Heeresnachrichtenamt vor allem im Einsatz gegen Terrorismus, Organisierte Kriminalität und irreguläre Migration.
Spektakuläres über die österreichischen Geheimdienste
Im Parlament ist ein ständiger Unterausschuss des Landesverteidigungsausschuss für die Kontrolle des Heeresnachrichtenamtes zuständig, die Parlamentarier sind aber auf strenge Verschwiegenheit vereidigt. Das HNaA soll eng mit US-amerikanischen Geheimdiensten zusammenarbeiten und vor allem in der Zeit des Kalten Krieges wichtige Informationen über Vorgänge in den Balkanstaaten an die USA weitergegeben haben. 1968 waren es österreichische Agenten des Heeresnachrichtenamtes, die als erste über den Einmarsch der Truppen des Warschauer Pakts in die Tschechoslowakei Bescheid wussten.
Das Stillschweigen rund um die Arbeit des Heeresnachrichtenamtes verlieh dem Nachrichtendienst zwischenzeitlich große Macht. Das ging so weit, dass sogar Verteidigungsminister ausspioniert worden sein sollen. Als Verteidigungsminister Friedhelm Frischenschlager das zufällig erfuhr, soll er so erbost gewesen sein, dass er im Jahr 1985 das Heeresnachrichtenamt reformieren und das Heeres-Abwehramt davon abspalten ließ. Die beiden Nachrichtendienste sind bis heute politisch verfeindet: Das HNaA wird der Österreichischen Volkspartei zugeordnet, das HAA den österreichischen Sozialdemokraten. Diese sollen sich seit ihrem Bestehen immer wieder gegenseitig ausspionieren.
USA – CIA, FBI, NSA, DEA
Montage/Colourbox
Zwei der US-Geheimdienste: FBI und CIA
Organisation des US-amerikanischen Geheimdienstes
Über keinen Geheimdienst gibt es derart viele Informationen wie über den US-amerikanischen. Der Auslandsgeheimdienst CIA, die inländische Spionageabwehr FBI, die weltweit operierende NSA, die amerikanische Bundespolizei, die Drogenbehörde DEA und elf weitere Dienste bilden die sogenannte United States Intelligence Community (IC). Insgesamt sollen dort etwa 200 000 Menschen arbeiten mit einem Gesamtbudget von 30 Milliarden Euro.
Geschichte des CIA und der NSA
Mit Gründung des Amts der Marineaufklärung begann 1882 die offizielle geheimdienstliche Aufklärung der USA. Doch schon unter George Washington hatten Agenten in geheimen Operationen, Aufklärung und Spionage gearbeitet. Die bekannteste Einrichtung, die Central Intelligence Agency, wurde 1947 ins Leben gerufen. Sie ist die Folgeorganisation des Office of Strategic Services, das im Laufe des Zweiten Weltkriegs aufgebaut wurde. Das Ziel: Die Sammlung strategisch wertvoller Informationen, aber auch Sabotage und Spionageabwehr. Mit dem National Security Act übernahm die Behörde Aufgaben, die FBI-Chef J. Edgar Hoover zunächst für seine Agenten vorgesehen hatte. ACIPSS-Experte Siegfried Beer erklärt, dass die USA zwar sehr spät mit der Errichtung eines Auslandsgeheimdienstes begonnen haben, dieser heute aber zu den effizientesten weltweit gehört.
Doch eine andere Behörde macht derzeit Schlagzeilen: Die National Security Agency (NSA). Ihr Aufgabengebiet ist die weltweite, nachrichtliche Aufklärung. Die Wurzeln der Behörde reichen bis in die 40er-Jahre zurück, die offizielle Gründung datiert auf das Jahr 1952. Seitdem hält die NSA mit den technologischen Entwicklungen von Satellit bis Internet Schritt. In den Mittelpunkt einer weltweiten Diskussion über Datenschutz rückte die NSA, weil der Geheimdienstler Edward Snowden brisante Informationen über die weltweite Überwachung und die Kenntnisnahme europäischer Politiker von den Abhör-Programmen der Behörde veröffentlichte.
Spektakuläres über die CIA
„Bis in die frühen Siebziger hinein hatte die CIA weitgehend freie Hand“, sagt Beer. Und das nutzte die Agency voll aus: Waren CIA-Agenten am Attentat an John F. Kennedy beteiligt? Welche Rolle spielte die CIA bei den Anschlägen von 2001? Verdient die Behörde an weltweiten Drogen- und Geldwäschegeschäften? Für Verschwörungstheoretiker ist der US-Geheimdienst eine wahre Pandora-Kiste hanebüchener Geschichten. Dabei gibt es zahlreiche verbriefte Operationen: 1961 war die CIA beispielsweise an der Invasion in der Schweinebucht beteiligt, bei der Exilkubaner auf Kuba landen und die Regierung Castros stürzen wollten – und scheiterte spektakulär.
Viele weitere Operationen mit dem Ziel, Machthaber zu stürzen, wurden von der CIA angeleiert. In Afghanistan warben CIA-Agenten ab 1979 bis zu 100 000 Einheimische an, trainierten sie, unterstützten sie mit Waffen und Geld und schickten sie in den Kampf gegen sowjetische Truppen. Wohl einer der Hauptgründe für die gegenwärtige Stärke der Taliban in dem befreiten Land. Nicht immer nutzt die Agency bei ihren Operationen legale Mittel, Menschenrechtsorganisationen werfen der Behörde Verletzung internationalen Rechts und Folter vor.
Großbritannien – MI5, MI6
Motage/Panther
Großbritanniens MI5 und MI6
Organisation des englischen Geheimdienstes
Neun Behörden kümmern sich in Großbritannien um die Geheimdienstarbeit, organisiert im Secret Service Bureau. Am bekanntesten sind sicherlich der Security Service und der Secret Intelligence Service, kurz: MI5 und SIS oder MI6. Während sich der Blick des MI5 in das eigene Land richtet, kümmert sich der MI6 um das Ausland. Hinlänglich bekannt wurde der MI6 durch die Arbeit des wohl berühmtesten Spions James Bond, auch wenn dieser natürlich nur ein Roman- und Filmheld und kein echter Agent ist.
Geschichte des MI6
Ursprünglich war der MI6 für die Marine zuständig, als er 1909 gegründet wurde. Zunehmend spezialisierte sich der Dienst aber auf das Ausland, im Ersten Weltkrieg sammelten Agenten Informationen über das Deutsche Reich und kämpften gegen den Kommunismus in Russland. Nach der Machtübernahme durch die Nationalsozialisten arbeitete der SIS unter anderem an der Entschlüsselung der Geheim-Codes der Nazis.
Im Kalten Krieg versuchte sich die Behörde in der Anwerbung sowjetischer Offizieller oder an Staatsstreichen, über die Erfolgsrate schweigt sie sich bis heute aus. Seit 1994 sind die Zuständigkeiten im Intelligence Services Act geregelt. Auch die Überwachung von Telefonaten und Internetaktivitäten Verdächtiger gehört zur Aufgabe der Behörde. Könnten Sie ein MI6-Agent sein?
Spektakuläres über den MI6
Eine der bekanntesten und schillerndsten Personen in der Geschichte der Geheimdienste ist Thomas Edward Lawrence, auch bekannt als Lawrence von Arabien. Der studierte Archäologe begab sich 1914 offiziell zur Kartographierung in den Nahen Osten, unter der Hand ging es um militärisches Auskundschaften. Aufgrund seiner Erfolge und Fähigkeiten wurde er schnell vom britischen Geheimdienst angeworben – und integrierte sich derart gut in die einheimischen Beduinenvölker, dass er sie zum Aufstand gegen die Fremdherrschaft durch die Türken führte. Ganz im Sinne seines Heimatlandes. Noch zu Lebzeiten wurde Lawrence zum Mythos – und zu einem beliebten Gesprächsgegenstand der englischen Aristokratie.
Eine spektakuläre Mordtheorie geistert seit dem 3. August 1997 durch Großbritannien: Wurde Prinzessin Diana, die Ex-Frau des britischen Thronfolgers Prinz Charles, vom MI6 beseitigt? Sgro schreibt dazu, dass das britische Königshaus Angst vor einem muslimischen Schwiegervater des zukünftigen Königs gehabt hatte und Lady Di zu allem Überfluss auch noch schwanger gewesen sein soll. Diana war seit kurzem mit Dodi Al-Fayed zusammen, dem Sohn des Harrod-Geschäftsführers Mohamed Al-Fayed. Bis heute ist der Fall nicht aufgeklärt, Gerüchte über vertauschte Blutproben, eine überschnelle Einbalsamierung zur Vertuschung der Schwangerschaft und den Einsatz einer Stroboskop-Lichtkanone zur Blendung des Limousinen-Fahrers machen noch immer die Runde.
Spanien – CNI
panther/Montage
CNI, das Kürzel des spanischen Geheimdienstes, steht für „Centro Nacional de Inteligencia“
Organisation des spanischen Geheimdienstes
In Spanien kümmert sich der Centro Nacional de Inteligencia (CNI) um Spionage-Dinge. Der Geheimdienst ist Teil des spanischen Verteidigungsministeriums. Seine Aufgaben umfassen die Informationsbeschaffung und Abwehr, aber auch wirtschaftliche Analysen und politische Risikobewertungen. Der spanische Ministerrat fungiert einerseits als Kontrollorgan, andererseits bestimmt er jährlich die Ziele der Behörde neu. Der CNI umfasst etwa 600 Mitarbeiter.
Geschichte des CNI
Die Wurzeln der Behörde liegen in der Zeit des spanischen Bürgerkriegs: 1935 gründete die Zweite Republik einen Geheimdienst, der – überrascht vom Beginn des Krieges – allerdings nie seine Arbeit aufnahm. Bis zu acht verschiedene Dienste arbeiteten bis in die 70er-Jahre gleichzeitig, zum Teil beschafften sie sogar dieselben Informationen.
Erst 1972 gründete sich der erste offizielle Geheimdienst in Spanien, der sogenannte Zentrale Dokumentationsdienst – noch unter der Diktatur des Generals Francisco Franco. Hauptzweck war der Schutz der Diktatur und die Aufdeckung von Umsturzplänen. 1977, zwei Jahre nach dem Tod des Diktators, wurde der Geheimdienst reformiert und dem Verteidigungsministerium angegliedert.
Spektakuläres über das CNI
„Sieben spanische Agenten im Irak getötet“ – diese Nachricht ging 2003 um die Welt. Mit einem Schlag verlor der spanische Geheimdienst praktisch alle Experten in dem Land. Und alles nur, weil die Agenten offenbar einem irakischen Doppelagenten zum Opfer fielen. An einem Samstag im November trafen sich vier dort stationierte CNI-Agenten mit ihren Kollegen, die sie ablösen sollten. Mit dabei: ihre Kontaktperson und Informanten – und ein Maulwurf, der die Spanier an Saddams Truppen verriet. Ein tödlich verwundeter Agent rief offenbar noch während des Hinterhalts bei der CNI-Zentrale an und flehte mit letzter Kraft: „Sie bringen uns um. Schickt Hubschrauber herbei!“.
Ein schwieriges Verhältnis hat der CNI zum spanischen Königshaus: Als sich König Juan Carlos in den 2000ern eine Geliebte leistete, musste Spaniens Geheimdienstchef vor dem Parlament antanzen und Auskunft geben – offiziell zum Schutz der Monarchie und des Wohl des Königs. Doch eigentlich ging es um die Frage, ob die „enge Freundin“ des Königs auf Staatskosten ausgehalten wurde. Die Befragung verlief allerdings hinter verschlossenen Türen und ergab nichts Erhellendes. Erst ein Mitarbeiter der Polizeigewerkschaft erhärtete die Gerüchte und so wurde das Verhältnis zum Politikum – ohne Beteiligung des CNI.
Israel – Mossad
AFP/Montage
Israels berüchtigter Geheimdienst Mossad
Organisation des israelischen Geheimdienstes
In Israel gibt es vier Behörden, die sich um nachrichtendienstliche Belange kümmern: Den militärischen Geheimdienst Aman, den wissenschaftlichen Nachrichtendienst Lakam, den Inlandsgeheimdienst Schin Bet und den – sicherlich am bekanntesten – Auslandsgeheimdienst Mossad. Das Hauptquartier des Mossad befindet sich in Tel Aviv, laut Schätzungen arbeiten in der Behörde etwa 1200 Geheimdienstler. Darunter aktive Agenten, die sogenannten Katsas, und freiwillige Helfer, die sogenannten Sjanim – organisiert in einem weltweiten Netz israelischer Spione. Der Mossad kümmert sich um die Sicherheit des Landes und des Militärs, gilt aber auch als operativer Arm der Regierung – Geschichten über Liquidierungen und Entführungen durch Mossad-Agenten gibt es seit jeher.
Geschichte des Mossad
Israel ist ein vergleichsweise junger Staat: 1947 teilte die UN Palästina in einen jüdischen und einen arabischen Staat – um einen Lebensraum für die Überlebenden des Holocausts zu schaffen. Für die arabische Bevölkerung stellten die Pläne jedoch eine Provokation dar: Einer der zentralen Konflikte des 20. Jahrhunderts war geschaffen. Kriegerische Auseinandersetzungen folgten, gleichzeitig arbeiteten inoffizielle Organisationen daran, arabische Aufstände zu vermeiden. 1949 gründete der damalige Premierminister David Ben-Gurion dann den ersten offiziellen Geheimdienst, zunächst dem Außenministerium zugeordnet, später Teil des Büros des Premierministers.
Spektakuläres über den Mossad
Wie Alexandra Sgro in ihrem Buch „Geheimdienste der Welt“ beschreibt, wählte der Mossad seine Bewerber besonders streng aus: Angehende Agenten mussten ihre Geschicklichkeit unter Beweis stellen, indem sie an gut einsehbaren Stellen Bomben platzieren sollten – ohne, dass sie dabei gesehen werden. Wer geschickt genug war, wurde Agent. Heute steht am Beginn lediglich ein medizinischer und psychologischer Check, die Ausbildung dauert drei Jahre – mit einem Stundenplan aus Ausfragen, Leeren toter Briefkästen, Durchführung von Anschlägen und die spezielle israelische Kampfkunst Krav Maga.
Doch das sollte nicht darüber hinwegtäuschen, dass der Mossad einer der effizientesten Geheimdienste weltweit ist, erklärt der Experte Beer. Eine der spektakulärsten – und ersten großen – Operationen des Mossads war die Gefangennahme des nach Argentinien geflohenen Nazis Adolf Eichmann. Er war als Mitglied des Reichsicherheitshauptamtes maßgeblich an der Deportation und Ermordung der Juden im „Dritten Reich“ beteiligt. Er tauchte in Südamerika unter, wurde allerdings vom Mossad aufgespürt und 1960 verhaftet. Nach einem neunmonatigen Prozess wurde er zum Tode verurteilt und 1962 hingerichtet.
Zehn Jahre später kam es bei den Olympischen Spiele in München zur Katastrophe: Eine palästinensische Terror-Gruppe ermordete elf israelische Sportler – die israelische Führung schwor Rache. Die Sonderheinheit „Caesarea“ jagte die acht Mörder über den gesamten Globus und vollendete die Hatz mit dem Mord an dem letzten Attentäter im Jahr 1979. Die Operation „Zorn Gottes“ ging in die Geschichte ein – wohl auch deshalb, weil ein Unschuldiger sterben musste. Mossad-Agenten töteten den Marokkaner Ahmed Bouchiki. Sie verwechselten ihn mit einem der palästinensischen Attentäter.
Und auch heute noch scheint der Mossad sehr aktiv zu sein. 2012 machte ein Medienbericht die Runde, wonach sich israelische Agenten Mitte der 2000er als CIA-Spione ausgegeben haben sollen, um eine Rebellen-Organisation zu Anschlägen im Iran anzustiften. Es war eine der „besonderen“ Methoden im geheimen Atomkrieg. Von 2010 bis 2012 wurden vier iranische Atom-Wissenschaftler ermordet – von Israel, so Beobachter.
China – Ministerium für Staatssicherheit
Colourbox
In China ist das Ministerium für Staatssicherheit als Geheimpolizei tätig
Organisation des chinesischen Geheimdienstes
Der Geheimdienst in der Volksrepublik China teilt sich in das Ministerium für Staatssicherheit und den Militärnachrichtendienst auf. Das Ministerium kümmert sich dabei um in- wie ausländische Belange und gilt als einer der größten Geheimdienste weltweit. Die Methoden wie Netzzensur, Verletzung von Menschenrechten und zum Teil gewalttätige Überwachung von Dissidenten zeigt, dass das Ministerium ein Dienst mit polizeilichen Befugnissen zu sein scheint.
Geschichte des Ministeriums für Staatssicherheit
Dass Geheimdienste nicht erst ein Phänomen der Moderne sind, zeigt das riesige Netzwerk von Geheimdiensten in der Ming-Dynastie. Die Agenten wurden von Eunuchen angeführt, zumeist einfache Männer aus dem Volk. Die Ming-Herrscher sahen sich im 16. Jahrhundert zunehmend bedroht durch die Macht der Geheimtruppen und ihren Führern. Alle Maßnahmen kamen schließlich zu spät, die große Ming-Dynastie zerbrach. Unter anderem wegen des Konflikts zwischen hohen Beamten und den aus niedriger Herkunft stammenden Eunuchen.
Im Jahr 1949 gründete die Kommunistische Partei den Vorläufer des Sicherheitsministeriums. Die Behörde sollte die Granden der Partei über weltweite Vorkommnisse unterrichten, basierend auf Nachrichten der Presseagenturen und einer limitierten Zahl Zeitungen und Bücher. Mit der Konsolidierung der Macht der Kommunistischen Partei wuchs auch die Aufgabe des Geheimdienstes, die jäh durch die Kulturrevolution unterbrochen wurde. In den Siebziger Jahren wurde die Arbeit wieder aufgenommen und die Behörde in kurzer Zeit massiv erweitert, bis sie 1983 in das Ministerium für Staatssicherheit überformt wurde – um alles abzuwehren, was dem sozialistischen System Chinas gefährlich werden könnte.
Spektakuläres über das Ministerium für Staatssicherheit
Die größte Bedrohung geht von Chinas Cyberspionage aus: Erst im Mai hatte eine US-Expertenkommission eine Liste von militärischen Projekten veröffentlicht, die vom chinesischen Geheimdienst über das Internet ausspioniert wurde. Darunter derart wichtige strategische Objekte wie das Patriot-Raketenabwehrsystem, Flugzeuge und Kriegsschiffe. Aber auch das Videosystem für Drohnen, Nanotechnologie, Nachrichtenverbindungen – der Schaden sei kaum absehbar, so die Kommission. Der Hintergrund sind offenbar die Modernisierungsbemühungen der chinesischen Armee.
Doch auch vor Ort scheinen chinesische Spione ihrer subversiven Tätigkeit nachzugehen: Etwa 120 Agenten arbeiten in den USA, Kanada, Japan, West-, Ost- und Nord-Europa als Geschäftsleute, Industrie-Arbeiter, Banker, Wissenschaftler, Journalisten.
Finnland – Supo
Motage/Panther
Der „Supo“, der zivile Nachrichtendienst, ist nur einer von Finnlands Geheimdiensten
Organisation des finnischen Geheimdienstes
In Finnland gibt es zwei offizielle Nachrichtendienste: Zum einen die „Suojelupoliisi“ (Supo), den zivilen Nachrichtendienst, und das „Pääesikunnan tiedusteluosasto“, den militärischen Nachrichtendienst. Die Supo ist ein Teil der finnischen Polizei und untersteht dem Innenminister, ihr Hauptquartier steht in Helsinki. Etwa 220 Geheimdienstler arbeiten dort an Terrorismus-Bekämpfung, Gegenspionage und allgemein der Bekämpfung von Verbrechen, die sich gegen die Regierung und die Politik richten.
Das „Pääesikunnan tiedusteluosasto“ dagegen untersteht dem finnischen Verteidigungsminister. Die Behörde ist mit dem Schutz des finnischen Hoheitsgebiets beauftragt. Ein zentrales Mittel für die Überwachung ist die Funkaufklärung: Sie sitzt in der zentralfinnischen Kleinstadt Tikkakoski.
Geschichte der Supo
Finnland litt schon immer unter seiner exponierten Lage: Über Jahrhunderte hinweg führten Schweden und Russland ihre kriegerischen Konflikte auf dem finnischen Festland aus, erst im 19. Jahrhundert konnten die Finnen die Fremdherrschaft abschütteln und zu einem eigenständigen Staat werden, obgleich eine starke Abhängigkeit zu Russland auch weiterhin bestand. 1917 rief Finnland seine Unabhängigkeit aus, eine tiefe Kluft zwischen rechten und linken politischen Kräften durchzog jedoch das Land.
Darin fußt die Geschichte der Geheimdienste: Rechte Kräfte gründeten eine Vorläufer-Organisation der Supo, um die „Roten“ zu überwachen. Nach dem Ende der Konflikte 1919 wurde die Geheimdienstarbeit dem Innenministerium unterstellt. Ab da lässt sich eine durchgehende Spionage-Tätigkeit bis in die Gegenwart verfolgen. Doch die politische Entzweiung brodelte weiter: 1949 wurde die Supo gegründet, um die mit Kommunisten besetzte Staatspolizei abzulösen. Die Organisation hat kein eigenes Einsatzkommando. Sie kann allerdings auf das „Karhu“-Team zurückgreifen, ähnlich dem amerikanischen Swat-Team.
Spektakuläres über die Supo
Eine der spektakulärsten Einsätze ist sicherlich Operation Stella Polaris: Im Zweiten Weltkrieg wurde Finnland erneut Dreh- und Angelpunkt östlicher und westlicher Machtinteressen. Einerseits verbündete sich Finnland zwar mit Nazi-Deutschland, andererseits fürchtete die Führung sowohl eine Invasion der Wehrmacht als auch der sowjetischen Truppen. Die Lösung war eine geheime Operation mit den Vereinigten Staaten: Mehrere finnische Spione setzten sich in das benachbarte Schweden ab und verkauften Informationen über das „Dritte Reich“ und die Sowjetunion an die USA.
1942, bei einem Besuch Heinrich Himmlers, spionierte der finnische Geheimdienst den damaligen Reichsführer SS aus – und rettete so wohl 2000 Juden das Leben, wie die Historikerin Janne Könönen 2002 herausfand. Die heimlich abfotografierte Liste mit den Namen einheimischer Juden wurde dem damaligen Staatspräsidenten ausgehändigt – dieser sprach sich vehement gegen eine Auslieferung der Juden aus und bewahrte sie so vor der sicheren Deputation in deutsche Lager.
Die schwierige Quellenlage
Das Internet ist voll brisanter Informationen über die Geheimdienste der Welt. Teilweise ist die Quellenlage mysteriös – und oft falsch. Behörden, die im Geheimen agieren, haben es natürlich an sich, zu den wildesten Verschwörungstheorien einzuladen, die Grenzen zwischen Wahrheit und Fiktion verwischen gerne. Doch es gibt auch seriöse und wissenschaftliche Ansätze – eine Übersicht:
Einen pragmatischen und sehr überblicksreichen Ansatz bietet das Buch „Geheimdienste der Welt“ von Alexandra Sgro, 2013 erschienen im Compact Verlag. Sgro fasst die wichtigsten Informationen zu bekannten Geheimdiensten wie MI6, BND, CIA aber auch unbekannteren Behörden wie Schwedens Säkerhetspolisen oder Griechenlands Ethniki Ypiresia Pliroforion zusammen und reichert die Berichte mit Geschichten zu den größten Skandalen und bekanntesten Spionen an.
Auf der wissenschaftlichen Seite schreibt der emeritierte Professor Dr. Wolfgang Krieger in seiner Monographie „Geschichte der Geheimdienste. Von den Pharaonen bis zur CIA“, 2010 in der zweiten Auflage bei C.H. Beck erschienen. Wie der Titel vermuten lässt, beginnt Krieger seine historische Suche nach den Wurzeln der Spionage in der Antike und verfolgt sie bis in die Gegenwart. Die aktuellsten Entwicklungen zu Snowden und der NSA fanden dabei aufgrund des Veröffentlichungszeitpunktes nicht in das Buch. Spannend: Trotz allem schreibt Krieger über Bürgerrechtsverletzungen, versteckte Kooperationen der internationalen Geheimdienste und „Whistleblower“.
Das „Austrian Center for Intelligence, Propaganda & Security Studies“ (ACIPSS) ist eine wissenschaftliche Plattform unter der Ägide von Professor Dr. Siegfried Beer. Das ACIPSS bietet Tagungsberichte, wissenschaftliche Studien und Interviews zu aktuellen Phänomenen – wie beispielsweise zum Abhör-Skandal. Außerdem beschäftigt sich das Center mit der Geschichte der Geheimdienste im europäischen Westen sowie den USA.
Von FOCUS-Online-Redakteur Julian Rohrer , FOCUS-Online-Autor Johannes Ruprecht und FOCUS-Online-Autorin Lisa Kohn
Find this story at Augustus 2013
© FOCUS Online 1996-2013
C.I.A. Report Finds Concerns With Ties to New York Police18 juli 2013
WASHINGTON — Four Central Intelligence Agency officers were embedded with the New York Police Department in the decade after Sept. 11, 2001, including one official who helped conduct surveillance operations in the United States, according to a newly disclosed C.I.A. inspector general’s report.
That officer believed there were “no limitations” on his activities, the report said, because he was on an unpaid leave of absence, and thus exempt from the prohibition against domestic spying by members of the C.I.A.
Another embedded C.I.A. analyst — who was on its payroll — said he was given “unfiltered” police reports that included information unrelated to foreign intelligence, the C.I.A. report said.
The once-classified review, completed by the C.I.A. inspector general in December 2011, found that the four agency analysts — more than had previously been known — were assigned at various times to “provide direct assistance” to the local police. The report also raised a series of concerns about the relationship between the two organizations.
The C.I.A. inspector general, David B. Buckley, found that the collaboration was fraught with “irregular personnel practices,” that it lacked “formal documentation in some important instances,” and that “there was inadequate direction and control” by agency supervisors.
“While negative public perception is to be expected from the revelation of the agency’s close and direct collaboration with any local domestic police department, a perception that the agency has exceeded its authorities diminishes the trust placed in the organization,” Mr. Buckley wrote in a cover memo to David H. Petraeus, then the C.I.A. director.
The declassification of the executive summary, in response to a Freedom of Information Act suit, comes at a time of intense interest in domestic spying after leaks by a former contractor for the National Security Agency.
It also comes amid lawsuits against the Police Department alleging unconstitutional surveillance of Muslim communities and mosques in New Jersey and New York. And a group of plaintiffs from a 1971 lawsuit over harassment of political groups by the Police Department’s so-called Red Squad has asked a judge to tighten guidelines stemming from that case on police investigations involving political or religious activity.
Paul J. Browne, a police spokesman, said that the lawsuits were without merit. He also said that the inspector general had found nothing illegal and that the last embedded C.I.A. official left the police in 2012.
“We’re proud of our relationship with C.I.A. and its training,” he said, saying it was partly responsible for the absence of casualties from a terror attack in New York in the years since Sept. 11 and the anthrax attacks. He added that the terrorists “keep coming and we keep pushing back.”
The C.I.A.-Police Department partnership dates from 2002, when David Cohen, a former C.I.A. officer who became deputy commissioner for intelligence at the Police Department after the Sept. 11 attacks, reached out to his former agency in building up its counterterrorism abilities.
The inspector general’s office began the investigation in August 2011 after The Associated Press published an article about the C.I.A.’s relationship with the Police Department’s intelligence division. It was part of a series about New York police surveillance of Muslims that was later awarded a Pulitzer Prize for investigative reporting.
When the classified report was completed in 2011, spokesmen for the C.I.A. and the Police Department said it had concluded that the C.I.A. had not violated a law and an executive order that prohibited it from domestic spying or performance of law-enforcement powers. But the document shows that that conclusion was not the whole story. The inspector general warned in his cover letter that the collaboration raised “considerable and multifaceted” risks for the agency.
This week, it released an executive summary and cover memo in response to a Freedom of Information Act lawsuit filed by the Electronic Privacy Information Center, a nonprofit civil-liberties group, which provided it to The New York Times.
“The C.I.A. is not permitted to engage in domestic surveillance,” said Ginger McCall, the director of the group’s Open Government Project. “Despite the assurances of the C.I.A.’s press office, the activities documented in this report cross the line and highlight the need for more oversight.”
Dean Boyd, a C.I.A. spokesman, said the inspector general found no legal violations or evidence that the agency’s support to the Police Department constituted “domestic spying.”
“It should come as no surprise that, after 9/11, the C.I.A. stepped up its cooperation with law enforcement on counterterrorism issues or that some of that increased cooperation was in New York,” he said in an e-mail. “The agency’s operational focus, however, is overseas, and none of the support we have provided to N.Y.P.D. can rightly be characterized as ‘domestic spying’ by the C.I.A. Any suggestion along those lines is simply wrong.”
The report shows that the first of the four embedded agency officers began as an adviser in 2002 and went on an unpaid leave from the agency from 2004 to 2009. During that latter period, it said, he participated in — and directed — “N.Y.P.D. investigations, operations, and surveillance activities directed at U.S. persons and non-U.S. persons.”
The official received a Police Department paycheck. He told the inspector general that he “did not consider himself an agency officer and believed he had ‘no limitations’ as far as what he could or could not do.” C.I.A. lawyers said that officials on unpaid leave who are “acting in a personal capacity and not subject to C.I.A. direction” are not constrained by the law barring the agency from domestic security functions, the report said.
Another C.I.A. analyst was detailed to the Police Department in early 2008 and remained on the agency’s payroll. From about February to April 2008, he told the inspector general he had received daily files, including the police intelligence division’s investigative reports “that he believed were unfiltered.”
That meant they had not been prescreened to remove information unrelated to foreign intelligence information, like evidence of domestic criminal activity. Later, the report says, the system was changed and police analysts gave him printouts of only those reports deemed to have potential foreign-intelligence information — about 10 to 12 a day.
Still, a former Police Department intelligence analyst who now works for the C.I.A.’s National Clandestine Service maintained that the embedded C.I.A. official had not had “unrestricted or unfiltered access” to the reports. The inspector general did not clear up the discrepancy.
Meanwhile, the Police Department sent a detective to the C.I.A. from October 2008 to November 2009 to “receive agency operational training to enhance the capability” of its intelligence division’s counterterrorism efforts in the metropolitan area.
Two other agency officials also worked for a period at the Police Department. One “spent considerable time and effort trying to help N.Y.P.D. improve its volatile relationship with the local F.B.I.,” and the report said senior agency officials expressed concern that the arrangement had “placed the agency in the middle of a contentious relationship.”
“The revelation of these issues,” Mr. Buckley wrote, “leads me to conclude that the risks associated with the Agency’s relationship with the N.Y.P.D. were not fully considered and that there was inadequate direction and control by the agency managers responsible for the relationship.”
June 26, 2013
By CHARLIE SAVAGE
Find this story at 26 June 2013
© 2013 The New York Times Company
Former Black Panther Assata Shakur Added to FBI’s Most Wanted Terrorist List18 juli 2013
Update: Watch our interview on Assata Shakur with her attorney Lennox Hines & scholar Angela Davis.
The FBI added Assata Shakur to its Most Wanted Terrorist List today. In addition, the state of New Jersey announced it was adding $1 million to the FBI’s $1 million reward for her capture. Shakur becomes the first woman ever to make the list and only the second domestic terrorist to be added to the list.
Assata Shakur, the former Joanne Chesimard, was a member of the Black Panther Party and Black Liberation Army. She was convicted in the May 2, 1973 killing of a New Jersey police officer during a shoot-out that left one of her fellow activists dead. She was shot twice by police during the incident. In 1979, she managed to escape from jail. Shakur fled to Cuba where she received political asylum. She once wrote, “I am a 20th century escaped slave. Because of government persecution, I was left with no other choice than to flee from the political repression, racism and violence that dominate the U.S. government’s policy towards people of color.”
In 1998, Democracy Now! aired Shakur reading an open letter to Pope John Paul II during his trip to Cuba. She wrote the message after New Jersey state troopers sent the Pope a letter asking him to call for her extradition.
RUSH TRANSCRIPT
I hope this letter finds you in good health, in good disposition, and enveloped with the spirit of goodness. I must confess that it had never occurred to me before to write you, and I find myself overwhelmed and moved to have this opportunity.
Although circumstances have compelled me to reach out to you, I am glad to have this occasion to try and cross the boundaries that would otherwise tend to separate us.
I understand that the New Jersey State Police have written to you and asked you to intervene and to help facilitate my extradition back to the United States. I believe that their request is unprecedented in history. Since they have refused to make their letter to you public, although they have not hesitated to publicize their request, I am completely uninformed as to the accusations they are making against me. Why, I wonder, do I warrant such attention? What do I represent that is such a threat?
Please let me take a moment to tell you about myself. My name is Assata Shakur and I was born and raised in the United States. I am a descendant of Africans who were kidnapped and brought to the Americas as slaves. I spent my early childhood in the racist segregated South. I later moved to the northern part of the country, where I realized that Black people were equally victimized by racism and oppression.
I grew up and became a political activist, participating in student struggles, the anti-war movement, and, most of all, in the movement for the liberation of African Americans in the United States. I later joined the Black Panther Party, an organization that was targeted by the COINTELPRO program, a program that was set up by the Federal Bureau of Investigation to eliminate all political opposition to the U.S. government’s policies, to destroy the Black Liberation Movement in the United States, to discredit activists and to eliminate potential leaders.
Under the COINTELPRO program, many political activists were harassed, imprisoned, murdered or otherwise neutralized. As a result of being targeted by COINTELPRO, I, like many other young people, was faced with the threat of prison, underground, exile or death. The FBI, with the help of local police agencies, systematically fed false accusations and fake news articles to the press accusing me and other activists of crimes we did not commit. Although in my case the charges were eventually dropped or I was eventually acquitted, the national and local police agencies created a situation where, based on their false accusations against me, any police officer could shoot me on sight. It was not until the Freedom of Information Act was passed in the mid-’70s that we began to see the scope of the United States government’s persecution of political activists.
At this point, I think that it is important to make one thing very clear. I have advocated and I still advocate revolutionary changes in the structure and in the principles that govern the United States. I advocate self-determination for my people and for all oppressed inside the United States. I advocate an end to capitalist exploitation, the abolition of racist policies, the eradication of sexism, and the elimination of political repression. If that is a crime, then I am totally guilty.
To make a long story short, I was captured in New Jersey in 1973, after being shot with both arms held in the air, and then shot again from the back. I was left on the ground to die and when I did not, I was taken to a local hospital where I was threatened, beaten and tortured. In 1977 I was convicted in a trial that can only be described as a legal lynching.
In 1979 I was able to escape with the aid of some of my fellow comrades. I saw this as a necessary step, not only because I was innocent of the charges against me, but because I knew that in the racist legal system in the United States I would receive no justice. I was also afraid that I would be murdered in prison. I later arrived in Cuba where I am currently living in exile as a political refugee.
The New Jersey State Police and other law enforcement officials say they want to see me brought to “justice.” But I would like to know what they mean by “justice.” Is torture justice? I was kept in solitary confinement for more than two years, mostly in men’s prisons. Is that justice? My lawyers were threatened with imprisonment and imprisoned. Is that justice? I was tried by an all-white jury, without even the pretext of impartiality, and then sentenced to life in prison plus 33 years. Is that justice?
Let me emphasize that justice for me is not the issue I am addressing here; it is justice for my people that is at stake. When my people receive justice, I am sure that I will receive it, too. I know that Your Holiness will reach your own conclusions, but I feel compelled to present the circumstances surrounding the application of so-called “justice” in New Jersey. I am not the first or the last person to be victimized by the New Jersey system of “justice.” The New Jersey State Police are infamous for their racism and brutality. Many legal actions have been filed against them and just recently, in a class action legal proceeding, the New Jersey State Police were found guilty of having an, quote, “officially sanctioned, de facto policy of targeting minorities for investigation and arrest,” unquote.
Although New Jersey’s population is more than 78 percent white, more than 75 percent of the prison population is made up of Blacks and Latinos. Eighty percent of women in New Jersey prisons are women of color. There are 15 people on death row in the state and seven of them are Black. A 1987 study found that New Jersey prosecutors sought the death penalty in 50 percent of cases involving a Black defendant and a white victim, but only 28 percent of cases involving a Black defendant and a Black victim.
Unfortunately, the situation in New Jersey is not unique, but reflects the racism that permeates the entire country. The United States has the highest rate of incarceration in the world. There are more than 1.7 million people in U.S. prisons. This number does not include the more than 500,000 people in city and county jails, nor does it include the alarming number of children in juvenile institutions. The vast majority of those behind bars are people of color and virtually all of those behind bars are poor. The result of this reality is devastating. One third of Black men between the ages of 20 and 29 are either in prison or under the jurisdiction of the criminal justice system.
Prisons are big business in the United States, and the building, running, and supplying of prisons has become the fastest growing industry in the country. Factories are being moved into the prisons and prisoners are being forced to work for slave wages. This super-exploitation of human beings has meant the institutionalization of a new form of slavery. Those who cannot find work on the streets are forced to work in prison.
Not only are the prisons used as instruments of economic exploitation, they also serve as instruments of political repression. There are more than 100 political prisoners in the United States. They are African Americans, Puerto Ricans, Chicanos, Native Americans, Asians, and progressive white people who oppose the policies of the United States government. Many of those targeted by the COINTELPRO program have been in prison since the early 1970s.
Although the situation in the prisons is an indication of human rights violations inside the United States, there are other, more deadly indicators.
There are currently 3,365 people now on death row, and more than 50 percent of those awaiting death are people of color. Black people make up only 13 percent of the population, but we make up 41.01 percent of persons who have received the death penalty. The number of state assassinations has increased drastically. In 1997 alone, 71 people were executed.
A special rapporteur appointed by the United Nations organization found serious human rights violations in the United States, especially those related to the death penalty. According to his findings, people who were mentally ill were sentenced to death, people with severe mental and learning disabilities, as well as minors under 18. Serious racial bias was found on the part of judges and prosecutors. Specifically mentioned in the report was the case of Mumia Abu-Jamal, the only political prisoner on death row, who was sentenced to death because of his political beliefs and because of his work as a journalist, exposing police brutality in the city of Philadelphia.
I believe that some people spell God with one “O” while others spell it with two. What we call God is unimportant, as long as we do God’s work. There are those who want to see God’s wrath fall on the oppressed and not on the oppressors. I believe that the time has ended when slavery, colonialism, and oppression can be carried out in the name of religion. It was in the dungeons of prison that I felt the presence of God up close, and it has been my belief in God, and in the goodness of human beings that has helped me to survive. I am not ashamed of having been in prison, and I am certainly not ashamed of having been a political prisoner. I believe that Jesus was a political prisoner who was executed because he fought against the evils of the Roman Empire, because he fought against the greed of the money changers in the temple, because he fought against the sins and injustices of his time. As a true child of God, Jesus spoke up for the poor, for the meek, for the sick, and the oppressed. The early Christians were thrown into lions’ dens. I will try and follow the example of so many who have stood up in the face of overwhelming oppression.
I am not writing to ask you to intercede on my behalf. I ask nothing for myself. I only ask you to examine the social reality of the United States and to speak out against the human rights violations that are taking place.
On this day, the birthday of Martin Luther King, I am reminded of all those who gave their lives for freedom. Most of the people who live on this planet are still not free. I ask only that you continue to work and pray to end oppression and political repression. It is my heartfelt belief that all the people on this earth deserve justice: social justice, political justice, and economic justice. I believe it is the only way we will ever achieve peace and prosperity on this earth. I hope that you enjoy your visit to Cuba. This is not a country that is rich in material wealth, but it is a country that is rich in human wealth, spiritual wealth and moral wealth.
Respectfully yours,
Assata Shakur
Havana, Cuba
Find this story at 2 May 2013
Former Black Panther Assata Shakur Becomes First Woman On FBI’s Most Wanted Terrorist List18 juli 2013
Assata Shakur, an ex member of the Black Panthers who escaped from prison and fled to Cuba in 1979, has officially been added to the FBI’s Most Wanted Terrorist list, making her the first woman ever. Shakur — born JoAnne Byron (married name Chesimard) — was a member of the Black Panthers and the Black Liberation Army when she was convicted of killing a New Jersey police officer in 1973. In 1979, she managed to escape from prison and fled to Cuba, where she was granted political asylum and has been ever since. Since 2005, the FBI has classified her as a domestic terrorist and has offered a $1 million reward for her capture. Yesterday, the 40-year anniversary of the New Jersey Turnpike shootout, they upgraded her to the 10 Most Wanted List.
There’s a lot to read and sift through in regards to Shakur’s involvement in that incident and the various other crimes of which she was accused and convicted. Shakur has long maintained her innocence in regards to the death of New Jersey State Trooper Werner Foerster on May 2, 1973, and during her trial, her defense team presented testimony from medical experts that asserted the wounds Shakur obtained during the shootout — she was shot in both arms and the shoulder — would have made it impossible for her to fire upon Foerster. Additionally, during the trial, one of the prosecution’s primary witnesses, the other officer present (and wounded) at the shootout, Trooper James Harper, admitted he’d lied in all three of his initial statements when he said Shakur shot and killed Foerster and also shot at him. He admitted on the stand that he had in fact never seen Shakur with a gun and that she did not shoot at him. There was also no gunpowder found on Shakur’s fingers. (Shakur testified that after she was shot by Foerster, she took cover for the duration of the gunfight.) In the end, the all-white, 15-person jury, five of whom had personal ties to state troopers, convicted Shakur of all eight counts (two murder charges and six assault charges). She was sentenced to 26 to 33 years in prison.
Of her conviction and eventual escape to Cuba, Shakur once wrote, ”I am a 20th century escaped slave. Because of government persecution, I was left with no other choice than to flee from the political repression, racism and violence that dominate the U.S. government’s policy towards people of color.” There have been numerous attempts to have her extradited, including an appeal to Pope John Paul II in 1998. In response, Shakur wrote a letter to the Pope which you can read here.
Amelia McDonell-ParryMay 3, 2013
Find this story at 3 May 2013
© The Frisky is a member of Spin Entertainment, a division of SpinMedia
Anti-War Activists Targeted as ‘Domestic Terrorists’; Shocking new revelations come as activists prepare to sue the U.S. military for unlawful spying1 juli 2013
Anti-war activists who were infiltrated and spied on by the military for years have now been placed on the domestic terrorist list, they announced Monday. The shocking revelation comes as the activists prepare to sue the U.S. military for unlawful spying.
“The fact that a peaceful activist such as myself is on this domestic terrorist list should be cause for concern for other people in the US,” declared Brendan Maslauskas Dunn, plaintiff in the lawsuit. “We’ve seen an increase in the buildup of a mass surveillance state under the Obama and Bush Administrations.”
The discovery is the latest development in a stunning saga that exposes vast post-9/11 spying networks in which military, police, and federal agencies appear to be in cahoots.
Documents declassified in 2009 reveal that military informant John Towery, going by the name ‘John Jacob,’ spent over two years infiltrating and spying on Olympia, Washington anti-war and social justice groups, including Port Militarization Resistance, Students for a Democratic Society, the Industrial Workers of the World, and Iraq Veterans Against the War.
Towery admitted to the spying and revealed that he shared information with not only the military, but also the police and federal agencies. He claimed that he was not the only spy.
The activists, who blast the snooping as a violation of their First and Fourth Amendment rights, levied a lawsuit against the military in 2009.
“The spying resulted in plaintiffs and others being targeted for repeated harassment, preemptive and false arrest, excessive use of force, and malicious prosecution,” reads a statement by the plaintiffs.
The Obama Administration attempted to throw out the litigation, but in December 2012 the 9th Circuit Court ruled that the case could continue.
When the plaintiffs were preparing their deposition for the courts two weeks ago, they were shocked to discover that several Olympia anti-war activists were listed on the domestic terrorist list, including at least two plaintiffs in the case.
The revelations prompted them to amend their lawsuit to include charges that the nonviolent activists were unlawfully targeted as domestic terrorists.
“The breadth and intensity of the spying by U.S. Army officials and other law enforcement agents is staggering,” said Larry Hildes, National Lawyers Guild attorney who filed the lawsuit in 2009. “If nonviolent protest is now labeled and treated as terrorism, then democracy and the First Amendment are in critical danger.”
Plaintiffs say this case takes on a new revelevance as vast NSA dragnet spying sparks widespread outrage.
“I think that there is a huge potential for the case to set precedent,” declared plaintiff Julianne Panagacos. “This could have a big impact on how the U.S. military and police are able to work together.”
She added, “I am hopeful we will win.”
Published on Monday, June 24, 2013 by Common Dreams
– Sarah Lazare, staff writer
Find this story at 24 June 2013
This work is licensed under a Creative Commons Attribution-Share Alike 3.0 License
Revealed: The Story Behind the “NATO 3” Domestic Terrorism Arrests1 juli 2013
(Image: Jared Rodriguez / Truthout)Accused of domestic terrorism in the course of the Chicago NATO summit,
Brian Church, Brent Betterly and Jared Chase were arguably victims of police entrapment and the use of “Red Squad” tactics the Chicago police were formerly enjoined from employing.
When local and federal police conducted a no-knock, midnight search warrant raid in May 2012 at an apartment in Chicago’s Bridgeport neighborhood, it looked at first like a failed mission.
Yes, police seized a group of 11 political activists in Chicago to protest an international summit of the North Atlantic Treaty Organization (NATO). But most of the arrestees were released without charge, and rumors soon began to swirl.
Police chained protesters to benches for 18 hours, one television station reported. Chicago Police Department (CPD) sources told Truthout the raid would unearth Molotov cocktails – homemade firebombs made of breakable glass bottles and gasoline. But they found beer brewing equipment instead.
“If anybody would like some,” one Bridgeport tenant told Truthout, “I would like to offer them a sip of my beer.”
Then things turned.
Of the 11 Bridgeport arrestees, it turned out, two were undercover cops. And beer-brewing equipment wasn’t the only thing the authorities found.
Mo and Nadia at Woodlawn (Photo Courtesy of Occupy Chicago)
They found four dark beer bottles “containing a clear liquid” implied to be gasoline. They found a pint can containing four presumably gas-soaked cloths. They found another pint can containing four glass vials each containing saturated cotton, along with four gas-soaked pieces of cloth, an empty gas can, a black tactical vest and a black gas mask. They found a compound bow and nine arrows.
They found two knives in sheaths, two swords in sheaths, and a set of handcuffs. They found a metal throwing star (a sharp, hand-held blade). They found a PVC pipe with a black flag attached. Authorities also found a printed photo of the female undercover officer who led SWAT teams to Bridgeport in the first place.
This litany of materials, police told Truthout, belonged to three men visiting Chicago from Florida to protest the NATO Summit – and, allegedly, to set parts of the Windy City aflame.
Dubbed the “NATO 3” in media reports, they face maximum sentences of 85 years in prison apiece if convicted, under a decade-old Illinois law that had never been used before. And that was without ever carrying out an attack.
Mug shots taken of the “NATO 3” after their arrests (From Left to Right: Brian Church, Brent Betterly, Jared Chase)
Their arrests may paint a picture of what federal authorities wish they had done to stop the bombings in Boston, or the Fort Hood shootings, or any actual terrorist attack carried out by suspects who had aroused suspicion from authorities.
Unlike the Boston bombers, the NATO 3 hadn’t set off any bombs prior to their arrests. Unlike the Fort Hood shooter, they hadn’t shot anyone. They hadn’t thrown molotov cocktails. They hadn’t even pressed dummy detonators, as was the case with five Cleveland activists in a similar domestic terrorism investigation last year.
They just ran their mouths. They just talked about revolution. And they went far enough into a conspiracy to elicit major charges.
To this day, more than a year after their arrest in Bridgeport, the NATO 3 are still sitting in Chicago’s Cook County Jail, awaiting their trial, which is set to begin on September 16, one day before the two-year anniversary of the Sept. 17, 2011, launch of Occupy Wall Street.
Their case is a big one. It’s the new face of US counterterrorism investigations – a template for pre-crime arrests, performed through entrapment by police – to stop supposedly dangerous political acts before they happen.
And if the “3” are convicted in September, it could set a troubling precedent far beyond the borders of Illinois.
Who are the NATO 3?
While Occupy Wall Street helped to ramp up the possibility for major protest action in cities such as Chicago, it also brought together young activists who would’ve never met otherwise. Case in point: Chase and Betterly.
The duo met in Washington DC at an Occupy protest. They were arrested, arm in arm, in front of the White House, while protesting the National Defense Authorization Act.
It wasn’t the first arrest for either man.
Years ago, when Chase was 18 and living with his folks in Keene, N.H., he was charged with “attempt to commit an assault and reckless endangerment after allegedly pulling a knife on another man,” according to the New Hampshire Union-Leader.
A month later, Chase received more charges, this time for first-degree assault and conduct after an accident, which earned him nine months in jail.
“In that incident, Chase was found guilty of hitting a man with a car after the two had a fist fight,” said the Union-Leader article. “The victim’s impact with the car damaged the windshield, but the man was not seriously injured. . . .The conduct after an accident charge was added because Chase drove off after striking the man.”
He spent six months in jail. He had trouble with drugs when he got out. He violated his probation three times and then eventually moved to Boston, where he stayed for years and worked as a cook at a P.F. Chang’s.
A photo from Jared Chase’s Facebook
Late last year, Chase left his life in Boston. A drifter, he headed to Rhode Island briefly and then to Washington, D.C.
After Chase and Betterly were arrested outside the White House, they headed toward Oakland Park, Florida, just north of Fort Lauderdale, where Betterly’s from, before heading to Miami.
Chase was arrested again as part of a group during Occupy Miami before heading off to Chicago. That group was found with bolt cutters, a baseball bat and a sledgehammer, but they were not charged.
The Miami New Times described Betterly, “with his good looks and dreadlocks,” as “a hippie who attended rainbow gatherings.” He had a criminal record in Florida, but nothing violent: Last September, he and a friend were drunk when they broke into a high school, did some after-hours swimming and broke a cafeteria window. Police picked them up. Betterly was released, but he still faces a pending burglary charge.
A photo from Brent Bettery’s Facebook
New Times reported that Betterly was known among those at Occupy Miami “for his creativity and commitment to fighting foreclosures,” while Chase was seen as more “enigmatic”: “The chain-smoker was a computer whiz who . . . spent days wandering around downtown and talking to homeless people.”
On March 14, 2012, Occupy Miami was raided by police, and Chase was there when it happened. It was depicted on Chase’s Facebook page, in fact, underneath a picture of a SWAT team outside an apartment complex housing members of Occupy Miami.
Church (aka “Sum Wun”) joked – ominously with the benefit of hindsight – that the raid was the result of a “terrorist meeting.”
Occupy’s Open Door for Infiltration: Enter “Mo” and “Nadia”
When it comes to protecting itself from prosecution, one of the Occupy movement’s truest merits – the inclusion of “the 99 percent” and acceptance of anyone willing to lend a hand – is also its fatal flaw.
CPD undercover officers began their investigation in February 2012 as part of a temporary 90-day assignment to monitor NATO protests. Undercover officers soon entered Occupy Chicago posing as activists and did so with ease.
Occupy Chicago organizer Matthew McLoughlin explained the hectic nature of preparations in the months leading up to the NATO Summit protests.
“Every day of the week . . . we had an action going on. So we were making sure that went off without a hitch,” he told us. “And then we had out-of-towners pouring in, so we had to take care of that
“We weren’t really prepared” to deal with undercover police officers, he continued.
That’s how two undercover officers, going by the names “Mo” and “Nadia,” would soon become the NATO 3’s downfall.
In early March, an undercover officer – a big man, a little over 6 feet tall, bearded and dark-featured, in his mid-30s with broad shoulders, wearing jeans, a black hoodie and a black winter cap – was first spotted by central organizers of the NATO Summit protests at a planning meeting.
He went by “Mo.”
A photo of “Mo,” the pseudonym for the undercover informant agent responsible for the entrapment-created arrests of the “NATO 3” and now two others taken by an activist and submitted to the National Lawyer’s Guild Chicago. (Photo Courtesy: National Lawyers Guild)
During small group introductions, Mo said he became an activist because he had been laid off from a job. “Shit blew up,” he said, and Occupy Chicago started. No further explanation was needed.
Mo would show up at a public Occupy event later in March with a woman who would always be by his side: a young woman who went by “Nadia Youkhana.”
Nadia was tall, with tanned skin. Some Occupy sources told Truthout she claimed to be Syrian. Many activists said she was charming and bubbly. They were attracted to her seeming genuine excitement to get involved with activism. If “Mo” was the brawn of the two-person team, “Nadia” was the brains.
Photo of “Nadia” released by Occupy Chicago
Nadia showed up alongside Mo at an Occupy General Assembly – a completely open meeting for anyone new to the movement – to introduce themselves, saying they were cousins. She talked with an Occupy Chicago organizer who oversaw a number of list-serves and who generally passed information about meetings to anyone who needed it.
Nadia seemingly saw this organizer as un-dangerous and useful; she kept in touch with him to monitor when various meetings were taking place and rallies were being planned, as well as to get email addresses of everyone involved in Occupy Chicago.
Mo and Nadia were on a 90-day temporary duty undercover assignment as part of CPD Field Intelligence Team 7150 (FIT 7150). The team was tasked with “attend[ing] Occupy Chicago and anarchist movement events for the purpose of observing and listening to reports of any planned criminal activity” in the run-up to the NATO Summit, according to pre-trial court documents.
Truthout visited the apartments of both Mo and Gloves, but both denied comment.
Woodlawn
The Woodlawn Mental Health Clinic on Chicago’s south side was one of six city-operated facilities scheduled for closure in April 2012. Occupy Chicago activists planned to protest on a daily basis.
Occupy Chicago activists link arms to form a human chain outside the occupied Woodlawn Clinic on the night of Thursday, April 12 2012. (Photo: Marcus Demery / Flickr)
At one of these protests in early April, 23 were arrested. Mo and Nadia thought a second protest – and an inevitable series of arrests – might cause some protesters to plan something violent, according to sources.
So when 10 protesters were arrested on April 23, Mo and Nadia were there.
“At the time, I couldn’t figure out why we were under such close surveillance this particular night,” recalled Rachel Unterman, press liaison for Occupy Chicago. “I thought they were overreacting to a few tents and a handful of expected arrests. Now I know that they had undercover officers in the field, which raised the stakes.”
The 10 spent the night in a Cook County Jail facility together. Some of them found “Mo” and “Nadia” to be a bit odd.
“When she walked into the police van was the first time I had ever seen her,” Christina Pillsbury told Truthout, a University of Chicago student who was arrested with Nadia that day. “It didn’t really make sense because I had seen everyone else arrested with me that day before, but I didn’t really have time to think about it at the time, either.”
Pillsbury recalls her being “really funny” and “really liking her at first.” Nadia also told Pillsbury and her fellow arrested activists “really intense stories about her sister’s mental illness.”
But she also recalls Nadia trying to rile up her and the other women arrested that day in jail. Pillsbury says Nadia started to “freak out” when the police were giving her stuff back to her and they only gave her one of her two cell phones – in hindsight, the two phones being another telltale sign that something was off, she noted.
“It seemed as if she was trying to get us in the whole ‘fuck the police’ mentality, but she was barking up the wrong tree,” noted Pillsbury. “We didn’t even do anything violent to be in jail in the first place; we just stood our ground across the street from Woodlawn in an act of nonviolent civil disobedience.”
Mo had told a story paralleling Nadia’s at Woodlawn Clinic prayer vigil earlier that day, shared by Mental Health Clinic activist Matt Ginsberg-Jaeckle. Mo said he had a “cousin struggling with mental health issues” and that was why he felt strongly about the events unfolding at Woodlawn, compelling him to take part in them.
Mo also played the violence game. While in lockup, he approached one of the arrested activists. “What’s our next step?” he asked Ginsberg-Jaeckle. “We need to step this up a notch.”
Another Woodlawn activist, James Arentz, locked up with Mo, recalled him saying he was once arrested for “violence,” as if to gauge if his compatriots in jail were also interested in participating in illegal violent acts.
Arentz said he showed little interest in taking this route, and it was a route he had never gone down before as a veteran, middle-aged activist and father. Mo soon lost interest in him after a round of intrusive questioning.
Roger Shuy, an emeritus professor of linguistics at Georgetown University, refers to tactics utilized in jail by Mo and Nadia as the “hit-and-run” strategy for undercover cops.
“If the target does not say anything that seems to point to his guilt, many undercover operators begin to ‘drop in’ hints about illegality, sometimes clear and sometimes not,” he writes in his book Creating Language Crimes: How Law Enforcement Uses (and Misuses) Language. “It is commonplace that when they drop these hints into the conversation and are unsure how their targets might react, they often quickly change the subject to something benign before they give up their turn.”
May Day, May Day
If anyone at the Chicago NATO Summit was going to “step this up a notch,” it was Jared Chase, Brent Betterly and Brian Church – the NATO 3.
In south Florida, Betterly and Church – court records reveal – made plans over Facebook, in private messages, to visit Chicago for NATO. That was April 19, the date the “conspiracy to commit an act of domestic terrorism” began, according to Illinois state prosecutors.
In those messages, Church said he wanted to “get on the front lines” of the protests. Betterly agreed, writing that the Chicago NATO “protests are gonna get ugly.” During that same interaction, Betterly asked if Chase would also make the trip to Chicago.
On April 24, Betterly discussed molotov cocktails with a female acquaintance on Facebook after asking that acquaintance to come to Chicago and then typing, “riot!!” Betterly responded: “u cant apologize after throwing a molotov cocktail.” Betterly wrote that he might “catch some charges” in Chicago.
Official accounts suggest the “NATO 3” domestic terrorism plot began on May 1, known by leftist activists as “May Day.” Chase, Betterly and Church were part of the “black bloc” for a large march planned for that day.
Betterly in blue jeans and blonde hair with bandana over his face, Chase on far right in all black and black bandana over face (Photo Courtesy of Occupy Chicago)
Black bloc is a protest tactic in which activists dress in all black, often wearing bandanas, ski masks and other clothing to conceal their faces and identities and to appear as one group in solidarity. On May Day, Nadia and Mo were there, posing as members of the bloc.
Photo obtained from video of May Day rally shot by member of Occupy Chicago. “Nadia” in white shoes, Church in red bandana, Chase to his right and Betterly to far right.
Occupy sources said Nadia was pushing for militant violence within the black bloc, which can be seen on a YouTube video, as well.
Church in red bandana, Nadia in white shoes and Mo to the right with anarchist black flag (Photo Courtesy of Occupy Chicago)
Later that night, Church told “Mo” and “Nadia” that he wanted to find “targets” for the NATO Summit. Occupy sources said Nadia actively attempted to provoke violence that night, asking people if they wanted to go out into the streets and light dumpsters on fire. That never panned out.
On May 2, Church met up with Mo and Nadia in Chicago’s financial district. According to court records, “Church immediately told the undercover officers to remove the batteries from their [cellphones] so that the conversations could not be subject to government eavesdropping.”
Church had come there with an assault vest he told Mo and Nadia he would like to fill with foam for more cushioning. On that day, he also allegedly asked Mo and Nadia where he could purchase a filter from an Army Plus store (aka a gas mask) and where he could buy three assault rifles, plus a long rifle.
Mo and Nadia said Church told them, “If a cop is going to be pointing an AR at me, I’ll be pointing one back at them.” He also said he wanted to make smoke bombs to throw during the NATO Summit and that he owned a bow and arrow that could shatter a window.
Church allegedly formulated a grand plan that day with Mo and Nadia to attack four police districts and destroy as many police vehicles as possible. He’d do the latter by bringing together groups to destroy police vehicles days before the NATO Summit. Church also said he wanted to “hit” a Chase Bank and shoot an arrow through Mayor Emanuel’s window.
“If everything goes according to plans, I am leaving right after NATO,” he allegedly told Mo and Nadia during this meeting. “The city doesn’t know what it’s in for, and after NATO, the city will never be the same,” he reportedly told Mo and Nadia.
On May 4, Brian Church and Jared Chase met with Mo and Nadia at a park in Chicago’s Bridgeport neighborhood. At this meeting, according CPD search warrant documents, they discussed destroying police vehicles parked in police parking lots during the NATO Summit to damage and disrupt their response to protesters.
Two days later, Mo and Nadia met with Chase and Church again to discuss using sling shots to destroy the windows of President Obama’s campaign headquarters. Church allegedly asked the two undercover officers where he could go to buy metal pipes to break windows.
On May 8, Mo and Nadia were invited into the Bridgeport apartment for the very first time.
While there, CPD search warrant documents allege, Brian Church invited them into a bedroom and showed them a bow and arrow with 10 arrows, two metal swords, one silver Chinese throwing star, two knives with brass knuckle handles, a black gas mask, knee/shin pads and arm pads. He also told Mo and Nadia he had a homemade mortar.
Chase allegedly asked the two undercover officers where he could buy cocaine or heroin.
On May 14, the use of molotov cocktails during the NATO Summit was first mentioned by Church to Mo and Nadia. According to CPD search warrant documents, Church also said at the May 14 meeting that he had built a mortar gun with PVC pipe and a piece of wood and that he had filled the mortar gun with bottle rockets, further noting that it was operational.
Church also told Mo and Nadia that they seemed like two “anarchists in a pod,” and he would like for them to travel with him to other states during his activist journey. Church allegedly offered them the opportunity to travel with him if they were willing to shoot a rifle, point it, and shoot someone with it.
On May 16, the day of the raid, Mo and Nadia met the “NATO 3” for a protest and convened at the Bridgeport apartment later that night, according to CPD search warrant documents.
Once inside, they discussed how to make and then constructed four molotov cocktails for use at the NATO Summit. Mo and Jared left for BP to buy the gasoline for the molotovs, the last necessary ingredient for the cocktails.
Truthout has obtained the video of Jared Chase purchasing the gasoline from the BP Station, published here from multiple angles for the first time.
“Church handed one of the officers a knife and advised him to cut a bandana in strips for use as fuses for the molotov cocktails,” a Feb. 15, 2013, court document states. “Betterly cautioned that gasoline should not be poured directly on the cloth; the cloth should be soaked in the bottles. Chase poured the gasoline into the bottles and then turned the bottles over so the strips could be soaked.”
While making the cocktails, Church allegedly asked Nadia if she were “ready to see a police officer on fire.” That’s when the police decided to act. That night, officers from the CPD and the FBI raided the Bridgeport apartment.
Nowhere in the search warrant – or in any of the hundreds of pages of discovery documents later made public – does the prosecution mention one pivotal point: Two aggressive undercover cops helped along – and possibly even incited – the plot.
Mapping the Chicago Activist Community’s “Human Terrain”
It should go without saying that the NATO 3 are not being represented by high-priced attorneys. They are, however, being represented at no charge by attorneys at the People’s Law Office of Chicago (PLO), which specializes in high-profile civil rights cases involving law enforcement.
On April 30, the office filed court papers arguing that under a recent consent decree – an agreement dissolved in 2009 that limited undercover police activities by the City’s notorious Red Squad, a unit that spied on the political and social activities of Chicagoans during the 1950s and 1960s – CPD’s undercover operation in the NATO 3 case would have been illegal.
“At its heart, the consent decree prohibited precisely the type of undercover activities that CPD engaged in here,” PLO argued. “[It] appears to be the broadest foray into undercover activities implicating the First Amendment.”
PLO also argued that the spying and entrapment attempts were motivated by the ideology of the activists, not an imminent threat to public safety.
“The state has acknowledged a . . . broader investigation of Occupy Chicago . . . and political organizing surrounding the NATO Summit,” the PLO stated in a court motion. “This large, overarching operation began by March 2012 and was . . . based in part by political affiliations and beliefs.”
The Booz Allen Hamilton Connection
Court records also show that members of the FBI’s Chicago Regional Computer Forensic Laboratory (RCFL) may be called to testify if the case goes to trial.
A domain name search for Chicago RCFL’s web site shows that it was registered by military and intelligence contractor Booz Allen Hamilton (BAH).
BAH is a major US Central Intelligence Agency (CIA) and US National Security Agency (NSA) contractor abroad. Former CIA Director R. James Woosley once served as BAH Vice President, while Director of National Intelligence James Clapper once served as a BAH executive and current BAH Vice Chairman John “Mike” McConnell held Clapper’s position under former President George W. Bush.
Edward Snowden – the NSA whistleblower who revealed classified NSA spy program to The Guardian and The Washington Post – was a contractor for BAH at the time of the leak.
Michael Hayden, the former head of the NSA and CIA, as well as the deputy director of National Intelligence has referred to BAH as a “Digital Blackwater,” a reference to Blackwater USA – now known as Academi – the “world’s most powerful mercenary army.”
“[BAH] is one of the NSA’s most important and trusted contractors. It’s involved in virtually every aspect of intelligence and surveillance,” writes investigative journalist Tim Shorrock in a recent article. “Among other secret projects, Booz was deeply involved in ‘Total Information Awareness,’ the controversial data-mining project run for the Bush administration.”
Photo Credit: Wikimedia Commons
Missed in Shorrock’s analysis: BAH also provides IT and logistical support for the Pentagon’s Human Terrain System and its Human Terrain Teams, which “map the human terrain” of communities abroad for the military and CIA.
A career New York cop, Chicago Police Department (CPD) superintendent Garry McCarthy is no stranger to the Human Terrain System.
It wasn’t long he after formally assumed the mantle of CPD superintendent in 2011 that McCarthy drew fire for having allowed a spy ring tasked to “map the human terrain” of Newark, N.J.,’s Islamic community to operate there, where he served as police chief before taking the position as CPD’s top dog.
McCarthy also served as an NYPD commander when the police set up spy rings before the 2004 Republican National Convention in New York City and during “CIA on the Hudson,” the joint NYPD/CIA project that was set up and run by former CIA Deputy Director for Operations David Cohen to “map the human terrain” of New York City’s Islamic community.
Shortcomings of “Mapping Human Terrain”
The problem with “mapping the human terrain”: It relies on overly-simplistic stereotypes. Case in point: FBI Special Agent Maureen Mazzola.
Mazzola is designated in court records as one of the people the state of Illinois may call to testify if the “NATO 3” case goes to trial. She’s also infamous for an incident based on stereotypes that unfolded before the 2008 Republican National Convention (RNC).
In a nutshell, Mazzola attempted to recruit a University of Minnesota (U of M) student in spring 2008 to join the FBI’s ranks as an informant. Conned into the meeting by U of M’s police sergeant, the student was displeased and came to the press to tell his story.
“She told me that I had the perfect ‘look,'” recalled the student after the incident. “And that I had the perfect personality – they kept saying I was friendly and personable – for what they were looking for.”
Stereotypes were the name of the game for the FBI and Mazzola, as an account in the Minneapolis/St. Paul’s City Pages said.
“What they were looking for [was] someone to show up at ‘vegan potlucks’ throughout the Twin Cities and rub shoulders with RNC protesters, schmoozing his way into their inner circles, then reporting back to the FBI’s Joint Terrorism Task Force, a partnership between multiple federal agencies and state and local law enforcement,” reads City Pages’ rare inside look into the recruitment of an informant.
The days leading up to the 2008 RNC saw the arrest of Scott DeMuth, an animal rights activist and member of the Animal Liberation Front (ALF). His charges: an “animal enterprise terrorism” plot that took place in a University of Iowa lab dating back to 2004.
This fishing expedition was lead by Mazzola and ended with DeMuth pleading guilty and serving six months in jail.
“As Special Agent Maureen Mazzola testified to on the stand in Scott’s pre-trial hearing, the FBI used the pretext of this raid as a fishing expedition, searching Scott’s room for anything linking him to ‘criminal activities’ that fell well outside of the scope of the search warrant being executed,” his support committee explained. “In this process, Mazzola came across a journal that she mistakenly believed linked him to the 2004 ALF raid at the University of Iowa.”
Court documents for that case show that Mazzola – unsurprisingly, given the backdrop – was working with an informant leading up to DeMuth’s eventual arrest. Mazzola was one of the people the US government called to testify as a witness during the DeMuth trial.
One Man’s Terrorist, Another Man’s Language Criminal
Digging deeper, there’s also the question of “Why ’terrorism’?” Why not just leave the NATO 3’s charges at the several felony counts?
PLO tackled the issue of terrorism head-on.
PLO made the legal argument in Jan. 2013 that the language in Illinois’ terrorism statute may be overly broad and unconstitutional. Judge Wilson, though, denied this constitutional challenge two months later, saying the law under which the three were charged is constitutional on its face and as applied.
It all boils down to politics, and a May 2012 Chicago Tribune story demonstrates the political nature of the charges, which were decided on at the proverbial 11th hour the night before the May 19, 2012, bail bond proffer hearing.
“[Cook County Attorney General Anita] Alvarez and seven of her prosecutors spent Friday evening analyzing the statute and weighing whether their case rose to the level of domestic terrorism,” reported the Tribune. “It was a marathon meeting with lawyers reading the statute out loud at times. Others ran in and out of the room to look up case law on other potential charges, such as conspiracy to commit arson. After four hours of debate, Alvarez polled those in the room and had a clear consensus that the terrorism statutes offered the toughest penalties and sent the strongest message.”
As an important parallel, a 2009 Neo-Nazi and right-wing terrorism threat report done by the US Dept. of Homeland Security (DHS) went unpublished and censored, showing the truly political nature of “terrorism” charges. The author of the report, a former DHS analyst, has asserted that he warned of the right-wing “terrorist” elements that fueled the 2012 attack on a Sikh temple in Wisconsin – and that his warnings were ignored.
Another example: In Boston, local police in conjunction with federal law enforcement, focused attention on the political activism of local Occupy activists at the same time they missed the actual threat posed by the Boston Marathon bombers.
Contentious political events are, in many ways, a trap set to capture those who even insinuate the wrong kind of political language – “creating language crimes” – as Shuy put it in his eponymous book.
“The persons wearing the undercover mike . . . begin their work with a distinct power advantage over those they talk with,” Shuy writes in his book. “In undercover conversations, when the targets think they are simply engaged in everyday conversations, they are less on alert and are frequently less careful about how they say things. The persons doing the taping, in contrast, have the power to decide when to tape, who to tape, when to start the taping, when to stop, and even how to slant the conversation to serve their own ends.”
Shuy refers to this as “manipulative seduction.”
“When being seduced,” Shuy adds, “the listener does not understand the hidden intent of the seducer.”
The overall message is clear: Whatever your political stripe in the United States, the authorities are watching. That’s no longer a conspiracy theory. It’s policy and now just a question of what the authorities do with that intelligence.
And that decision is by-and-large a political one.
If any case in the last decade has shown that reality, it’s the case of the NATO 3.
Their case revealed authorities watching anarchists and the Occupy movement – specifically designated as the reason for the creation of Field Intelligence Team 7150 – with an all-seeing eye.
These young men fit the stereotypical profile of what a homegrown terrorist is “supposed” to look like. They’re politically active and angry with their country’s direction, burdened with nothing to lose but their freedom, and maybe, their lives.
The CPD and state of Illinois would like you to believe that makes them dangerous – unhinged and ready to strike out and hurt people with impunity, at any moment.
But perhaps they weren’t. The burden of proof falls on the prosecutors to make the case that they were.
Steve Horn
Steve Horn is a freelance investigative journalist, and a researcher and writer at DeSmogBlog.
Matt Stroud
Matt Stroud is a contributing writer at tech website TheVerge.com, where he writes about policy and law. Follow him on Twitter@ssttrroouudd.
Friday, 21 June 2013 00:00
By Matt Stroud and Steve Horn, Truthout | Report
Find this story at 21 June 2013
© 2013 Truthout
‘NATO 3’ Near Trial: South Florida Men To Face Terrorism Charges In Chicago1 juli 2013
After Brian Church completed a course in emergency medicine at Broward College, he told his mother he was headed to Chicago for hands-on experience he hoped would boost his chances of becoming a paramedic.
“He was very proud of the fact that he was helping set up the first-aid tents,” said Elizabeth Ennis of her son’s participation in the NATO summit protest movement.
It has been a year since Church and two others from South Florida arrived in the Windy City and were arrested in a raid of an apartment just before the May 2012 summit.
Prosecutors allege the trio — now known by a cadre of supporters as the “Nato 3” — planned to use Molotov cocktails to blow up political targets, including Chicago Mayor Rahm Emanuel’s home and President Barack Obama’s downtown re-election campaign headquarters last year.
Yet, with the terrorism trial set to begin Sept. 16, defense attorneys for the men, along with Church’s mother, are calling the charges absurd.
“The whole terrorism thing just blows my mind,” said Ennis, a physician’s assistant and former Pembroke Pines resident who now lives in Central Florida. “This is a kid who made sandwiches to hand out to the homeless.”
Church, 21, Brent Betterly, 25, of Oakland Park, and Jared Chase, 29, a New Hampshire man who had been living in Miami, each are charged in an 11-count indictment with conspiracy to commit terrorism, possession of explosives and attempted arson.
In Illinois, they remain in custody on $1.5 million bond.
Church’s lawyer, Michael Deutsch, tried to get the charges thrown out, arguing that the law passed by the Illinois Legislature in the wake of 911 and used only once before is unconstitutional and being used politically.
“This is an attempt to take the acts of young people who are talking about criminal vandalism and convert it into terrorism in order to chill all militant activity in protest,” Deutsch said.
In a March 27 ruling, County Judge Thaddeus Wilson upheld the statute, saying, “The concept of domestic terrorism is not any more remote in contemporary society than the ‘international terrorism’ U.S. citizens were exposed to in September 2001.”
Church, Betterly and Chase were active in South Florida’s Occupy movement. Betterly was a familiar face around Fort Lauderdale City Hall during a brief encampment that took place there in late 2011 and early 2012.
But when the local Occupy movement began to sputter, all three looked for action elsewhere, friends said.
“He had specifically gone up there [to Chicago] to be a participant,” Ennis said of her son. “He wanted to be part of a bigger cause. At 20 years old, we all want to be part of a bigger cause.”
In the months before he left for Chicago, Church dated Danielle Hiller, then a West Park High School senior. “He always told me he wanted to peacefully protest,” said Hiller, 19. “He never seemed violent. He was really into helping people.”
The government case relies on two informants, undercover police officers nicknamed Mo and Nadia, who infiltrated the group and recorded the men talking about the plots and making four Molotov cocktails that were recovered inside the apartment during the raid. According to prosecutors, police also found swords, a bow and arrows, a slingshot and knives.
In a filing in March, prosecutors said the three allegedly obtained or planned to obtain “other improvised explosive devices, napalm, instructions for producing a pipe bomb, instructions for making potassium nitrate, a mortar … assault rifles and a long rifle.”
The three also constructed a wooden shield with sharp metal screws protruding from its front and hid it in an alley, “where they intended to violently confront police officers” during the summit protests, the filing alleged.
Deutsch acknowledges that Molotov cocktails were found in the apartment. But, he said, they were made at the urging of the police agents.
“When [police] didn’t get them to do anything, they got them to make these Molotov cocktails, with their money and expertise, and created a crime that never would have occurred,” he said.
Ellis said she has visited her son in jail, and talks to him regularly.
“It is starting to sink in, the magnitude of this,” she said. “He wants to be a flight medic, but the FAA has revoked his student’s pilot’s license. Even if these charges get thrown out, he has fears of never getting a job as an EMT.”
Ennis said her son, who is housed apart from the general jail population in semi-isolation, spends his time reading.
“He has his good days and bad,” she said. “He tries not to let the gloom set in.”
Sun Sentinel | By Mike Clary Posted: 06/16/2013 10:11 am EDT | Updated: 06/17/2013 9:11 am EDT
Find this story at 17 June 2013
© 2013 the Sun Sentinel (Fort Lauderdale, Fla.)
FBI admits to using surveillance drones over US soil20 juni 2013
Robert Mueller tells Congress bureau uses drones in a ‘very, very minimal way’ as senators describe ‘burgeoning concern’
The FBI has admitted it sometimes uses aerial surveillance drones over US soil, and suggested further political debate and legislation to govern their domestic use may be necessary.
Speaking in a hearing mainly about telephone data collection, the bureau’s director, Robert Mueller, said it used drones to aid its investigations in a “very, very minimal way, very seldom”.
However, the potential for growing drone use either in the US, or involving US citizens abroad, is an increasingly charged issue in Congress, and the FBI acknowleged there may need to be legal restrictions placed on their use to protect privacy.
“It is still in nascent stages but it is worthy of debate and legislation down the road,” said Mueller, in response to questions from Hawaii senator Mazie Hirono.
Hirono said: “I think this is a burgeoning concern for many of us.”
Dianne Feinstein, who is also chair of the Senate intelligence committee, said the issue of drones worried her far more than telephone and internet surveillance, which she believes are subject to sufficient legal oversight.
“Our footprint is very small,” Mueller told the Senate judiciary committee. “We have very few and have limited use.”
He said the FBI was in “the initial stages” of developing privacy guidelines to balance security threats with civil liberty concerns.
It is known that drones are used by border control officials and have been used by some local law enforcement authorities and Department of Homeland Security in criminal cases.
Mueller said he wasn’t sure if there were official agreements with these other agencies.
“To the extent that it relates to the air space there would be some communication back and forth [between agencies],” Mueller said.
A Senate intelligence committee member, Mark Udall, Democrat of Colorado, later questioned whehter such use of drones was constitutional. “Unmanned aerial systems have the potential to more efficiently and effectively perform law enforcement duties, but the American people expect the FBI and other government agencies to first and foremost protect their constitutional rights,” Udall said in a prepared statement.
“I am concerned the FBI is deploying drone technology while only being in the ‘initial stages’ of developing guidelines to protect Americans’ privacy rights. I look forward to learning more about this program and will do everything in my power to hold the FBI accountable and ensure its actions respect the US constitution.”
Another senator, Chuck Grassley, Republican of Iowa, also expressed concern. Asked whether the FBI drones were known about before the Mueller hearing, Grassley told CNN “absolutely not.” Grassley added the FBI was asked last year whether agents were using drones but the bureau never got back with an answer.
At the same hearing, Mueller urged Congress to move carefully before making any changes that might restrict the National Security Agency programs for mass collection of people’s phone records and information from the internet.
“If we are to prevent terrorist attacks, we have to know and be in their communications,” said Mueller. “Having the ability to identify a person in the United States, one telephone number with a telephone that the intelligence community is on in Yemen or Somalia or Pakistan … may prevent that one attack, that Boston or that 9/11.”
The FBI director argued for the continued use of the NSA programs. “Are you going to take the dots off the table, make it unavailable to you when you’re trying to prevent the next terrorist attack? That’s a question for Congress,” said Mueller.
The Associated Press contributed to this report
20 Jun 2013
Robert Mueller says the use of unmanned drones for surveillance purposes in the US is ‘minimal’
19 Jun 2013
Immigration reform bill would boost economy and cut deficit, report says
16 Jun 2013
Blocking immigration bill would doom 2016 hopes, says leading Republican
13 Jun 2013
NSA to release more information on surveillance programs – as it happened
Dan Roberts in Washington
guardian.co.uk, Wednesday 19 June 2013 21.20 BST
Find this story at 19 June 2013
© 2013 Guardian News and Media Limited or its affiliated companies. All rights reserved.
Spies Like Them; How Robert Mueller transformed — for better and for worse — the FBI into a counterterrorism agency.20 juni 2013
With the announcement that James B. Comey will be nominated by President Barack Obama to replace Robert W. Mueller III as the director of the FBI, a modern era will soon come to an end. Mueller has served longer (12 years) as FBI director than anyone since J. Edgar Hoover. He is the first person to complete a full term as director since Hoover’s tumultuous and controversial 48-year reign, and the imposition of a 10-year term limit by Congress in 1976. While the public and the press generally laud Mueller for his achievements at the FBI, his own agency has a more conflicted view.
Mueller was appointed by President George W. Bush to replace Louis Freeh just days before 9/11, and was a bit like a raw recruit the first time he witnessed combat in the stressful period that followed the attack. He was little heard or seen in the field as he allowed Deputy Director Tom Pickard to lead the daily all-office conference calls and manage the initial stages of the TRADEBOM and PENTBOM cases, as the investigations into the World Trade Center and Pentagon attacks were known. Mueller soon found his voice, however, and set about ensuring that the FBI was protected from the wolves that were circling the bureau, sniffing the blood of blame and recrimination for the 2,977 innocent victims. The wolves were bent on dismantling and destroying the organization that allowed 19 Saudi terrorists to live among us for so long, essentially unnoticed. The FBI was described as having precipitated an intelligence failure of epic proportions.
Mueller eventually prevailed over his detractors, and he satisfied the FBI’s numerous 9/11 critics by creating the National Security Branch, an Intelligence Division, a Cyber Division, and reprogramming thousands of FBI agents from criminal work into counterterrorism and intelligence analysis. He personally initiated one of those grand paradigm shifts in government that academics and historians build careers around analyzing and evaluating. There is no doubt that Director Mueller is held in the highest esteem by local law enforcement, Congress, and the general public; he will go down in history as one of the FBI’s greatest directors.
Within the FBI, however, there are at least two divergent views of Mueller’s legacy. The first is that Mueller saved the FBI from being broken up into its component parts amid the 9/11 Commission’s call to create a new domestic intelligence agency to address counterterrorism. For that political feat he is a hero to a great many current and former agents — certainly to the more than 50 percent of FBI agents who have joined the bureau since 2001, many specifically to fight terrorism. Most of them have spent their entire careers working counterterrorism or intelligence matters, however, and they have no experience with the criminal investigative organization that was the pre-9/11 FBI. Theirs is a world of terrorism leads, assessments, preliminary investigations, national security letters, FISA intercepts, and the occasional undercover operation targeting a self-directed domestic terrorist.
Much like the way the FBI shifted in the 1940s from fighting bank robbery and gangster crime to fighting Nazis and catching Communist spies during the Cold War, the modern FBI became all counterterrorism, all intelligence, all the time, after the 9/11 attacks. Mueller effectively transformed the FBI into the intelligence agency that his critics always wanted it to be
To effect this great change, Mueller mandated that the FBI would leave no counterterrorism leads unaddressed, at a time when the amount of unaddressed work in FBI files was a standard by which field office manpower needs were documented. At the direction of President Bush, Mueller ordered this focus on prevention — at the expense, if need be, of prosecution. He shifted the internal and external legacy of the FBI agent from that of a hard-nosed, cigar-smoking, tough-guy criminal investigator, to one of desk-bound, egghead intelligence collector, perusing open and classified sources for leads and tips — an FBI agent whose job it was to collate and analyze information about terrorism, not just to investigate federal crimes.
But there is another view of Mueller’s legacy. The shift to an intelligence agency was dramatic and disheartening to those who had joined the bureau under other former directors, particularly Louis Freeh, to investigate gangs, organized crime, and international cartels — and actually put people in jail. It was now clear to them that being part of an intelligence agency was not the same as being a member of the world’s premier law enforcement agency.
Many senior agents view the changes with a jaundiced eye. In a nutshell, here’s what a lot of current agents think: The focus on intelligence for intelligence’s sake has been detrimental to the FBI, particularly within the criminal program. You can gather all the intelligence you want and “know your domain,” but if you don’t have the agents to act on the intelligence, or don’t want to act on criminal intelligence, it’s useless. Many outside the FBI do not understand that, unlike within the national security and intelligence communities, there is no system to easily disseminate criminal intelligence to other law enforcement agencies. So criminal evidence is often collected, reported, analyzed, and then filed away.
Senior agents complain about the increase in the administrative burden that accompanied the shift to intelligence gathering: Intelligence reporting requirements often take away from the time necessary to build a case for prosecution. Instead, agents now spend their valuable investigative time entering evidence into computer systems, making their own copies, logging vehicle mileage, running records checks, and in general doing their own administrative support with no clerical assistance. “Support” positions have given way to intelligence analysis positions to track an al Qaeda threat that President Obama says is severely diminished and may no longer exist domestically. As one senior agent said to me, “If they want to pay a 20-year agent with an advanced degree and national criminal expertise to move file boxes and make copies of case files, who am I to complain?” All of this, however, makes the FBI far less efficient.
Others noted the shift away from the law enforcement model to a corporate model. Internal FBI directives now come out as corporate policy. Outsiders like McKinsey Consulting and its 23-year-old Harvard MBAs were brought in to tell senior FBI agents how to transform themselves and work more efficiently. Learning Lean Six Sigma and earning your business black belt became more important than catching bad guys. The FBI’s own Domestic Investigations and Operations Guide and other policy implementation guides (PIGs) have become overly burdensome to follow and impossible to commit to memory. For example, the PIG regarding the use of bureau vehicles is over 40 pages long, when all it really needs to say is, “Bureau vehicles are for official use only.”
In addition to the corporate transition, current street agents complain that the shift to intelligence work has made senior FBI officials perceive the bureau’s analytical model as superior to the investigative model. Analysts are given more respect, particularly at FBI headquarters, where the influx of senior staff from within the U.S. intelligence community are given deference over those who carry guns, take risks (both with their lives and liability), are injured on duty, and ultimately collect the intelligence that the analysts regurgitate into reports for field agents. These are the views of the agents in the streets and are based on conversations with them about the direction of the FBI.
As I write these words, I can already hear the disagreement from my colleagues and friends within the intelligence community, who will argue that my comments re-enforce the need for a separate agency to conduct domestic intelligence collection. But my argument is not about the need for analysts, but rather about how they are used in the bureau to the detriment of investigators, particularly within the criminal programs. When you try and create an animal by committee, you end up with a camel. That is what the FBI has become under Mueller … a law-enforcement camel.
Currently, the FBI’s top investigative priorities, in order, are:
Protect the United States from terrorist attacks;
Protect the United States against foreign intelligence operations and espionage;
Protect the United States against cyber-based attacks and high-technology crimes;
Combat public corruption at all levels;
Protect civil rights;
Combat transnational/national criminal organizations and enterprises;
Combat major white-collar crime;
Combat significant violent crime.
As you can see from this list, combating major white-collar and significant violent crime is now the FBI’s lowest investigative priority.
In my personal opinion, one of Mueller’s major failings during his 12-year tenure has been ignoring the threat to national security that systemic mortgage fraud by banking insiders posed to the United States. The FBI basically ignored systemic financial institution fraud of major proportions. While many threats are often bandied about as a danger to national security, the near collapse of the housing industry through sub-prime lending and the securitization of mortgages almost resulted in a total failure of the banking industry. Without the intervention by Congress and the bailout of numerous banks “too big to fail,” the United States — and possibly the world — would have experienced catastrophic consequences.
According to a report by the Seattle Post Intelligencer in 2007, this occured because the FBI “dramatically cut its number of white-collar crime investigations, including mortgage fraud, after shifting about 2,400 agents from traditional crime-fighting squads to counterterrorism units in the wake of the 2001 terrorist attacks.” The Post Intelligencer further reported that “the FBI was aware for years of ‘pervasive and growing’ fraud in the mortgage industry that eventually contributed to America’s financial meltdown, but it did not take definitive action to stop it.” The Bush administration later rejected FBI pleas for more agents to investigate mortgage fraud. “We have to prevent another 9/11-type surprise attack,” agents were told by Bureau officials. Transfers to counterterrorism prevented the FBI from understanding how bad mortgages were packaged into bad securities, creating a widespread impact that weakened the greater economy.
What then occurred was that FBI staffing issues after 9/11 led to white-collar criminals escaping prosecution and punishment in financial institution fraud cases involving billions of dollars. For example, the collapse of Washington Mutual Bank, which was the largest savings and loan institution in the United States until its collapse in 2008, due to horribly flawed sub-prime lending practices, resulted in no one in bank executive management (who had pledged to make WaMu “the Walmart of banking”) going to jail. Not one!
FBI officials knew what was going on because they had good criminal intelligence on the mortgage-fraud schemes, on the corrupt attorneys and appraisers, and on the insider schemes. But no action was taken on the intelligence. Had the violators been terrorists whose crime resulted in deaths of innocent civilians — instead of homes lost to foreclosure while the corporations reaped billions of dollars in profits — the FBI would have been excoriated. But it was alleged that when Mueller was briefed on mortgage fraud, “his eyes would glaze over. It was not something that he would consider a high priority. It was not on his radar screen,” according to a retired FBI official cited in the press.
It wasn’t just the FBI’s white-collar crime program that lacked the resources and political will to do its job. Organized crime, complex international drug investigations, and domestic police cooperation suffered as well. There were simply not enough experienced agents working criminal cases nor enough federal prosecutors to prosecute the complex cases that could result from criminal investigations. As former FBI Deputy Director Mark Felt, speaking as the source Deep Throat, allegedly told Watergate reporter Bob Woodward in a basement parking garage, “You got to follow the money.” Unfortunately, today, according to current and past FBI agents, there are few people left with the expertise to follow the money.
The next director of the bureau will face significant criminal investigative and counterterrorism challenges. James Comey, like the previous two FBI directors, was a career federal prosecutor and an attorney at the Department of Justice for the majority of his career. This experience will serve him well, but only if he embraces a new paradigm that takes a hard look at the functionality of the counterterrorism and intelligence programs vis-a-vis the criminal programs and does not succumb to political pressure to only commit resources to what is politically expedient.
Among the current and former agents with whom I have spoken, Comey is highly regarded for his stand, along with Mueller, against then White House aides Andrew H. Card and Alberto R. Gonzales during their attempt to get ailing Attorney General John Ashcroft to reauthorize the warrantless wiretapping of American citizens then being conducted by the National Security Agency. Integrity goes a long way with rank-and-file FBI agents, as do the stones to stand up to your boss and tell him he is wrong. The threat to resign was real and would have had tremendous political impact had both Comey and Mueller left in protest of that policy. It is my personal hope that the president chose Comey based on a belief that a willingness to stand on principle is the single most important characteristic that an FBI director can have.
Will Comey continue to maintain that political independence, or will he succumb and follow Mueller’s policies regarding the prioritization of national security programs within the FBI over the needs of the criminal branches, particularly as the war in Afghanistan ends, and the president proclaims al Qaeda defeated? Does Comey represent a new hope or a continuation of the status quo? Only time will tell.
BY DAVID GOMEZ | MAY 31, 2013
Find this story at 31 May 2013
©2013 The Foreign Policy Group, LLC.
Obama and His Allies Say the Govt Doesn’t Listen to Your Phone Calls — But the FBI Begs to Differ20 juni 2013
Today, House Intelligence Committee Chairman Mike Rogers (R-Michigan) insisted [3] the NSA has not been recording Americans’ phone calls under any surveillance program, and that any claim to the contrary was “misinformation.” Rogers’ comments countered remarks from Rep. Jerrold Nadler (D-NY), who said he was told in a House Judiciary Committee briefing [4] by FBI Director Robert Mueller that private firms contracted by the NSA could listen to phone calls made by American citizens.
Since Nadler’s comments were reported by CNET [4], he has issued a subsequent statement backtracking [5] on his original remarks: “I am pleased that the administration has reiterated that, as I have always believed, the NSA cannot listen to the content of Americans’ phone calls without a specific warrant.”
The full transcript of Nadler’s exchange with Mueller shows the FBI director claiming that “a particularized order from the FISA court directed at that particular phone and that particular individual” is required for the FBI to retrieve the content of any American’s call.
However, in a May 1 interview with CNN’s Erin Burnett– well before the scandal over NSA spying sent the White House and its allies into damage control mode – a former FBI agent named Tim Clemente made a startling revelation. According to Clemente, an April 18 phone call between Boston bombing perpetrator Tamerlan Tsarnaev and his wife was retrieved by the FBI as part of its surveillance of bulk US telecom data.
Here is the relevant section of Burnett and Clemente’s exchange [6]:
BURNETT: Tim, is there any way, obviously, there is a voice mail they can try to get the phone companies to give that up at this point. It’s not a voice mail. It’s just a conversation. There’s no way they actually can find out what happened, right, unless she tells them?
CLEMENTE: No, there is a way. We certainly have ways in national security investigations to find out exactly what was said in that conversation. It’s not necessarily something that the FBI is going to want to present in court, but it may help lead the investigation and/or lead to questioning of her. We certainly can find that out.
BURNETT: So they can actually get that? People are saying, look, that is incredible.
CLEMENTE: No, welcome to America. All of that stuff is being captured as we speak whether we know it or like it or not.
Clemente’s comments completely undermine Rep. Rogers’ claim that the government is not recording Americans’ phone calls, and seem to contradict Mueller’s claim that any surveillance that exists is “particularized” according to court orders. Unfortunately, the remarkable statement was buried under the Boston bombings media frenzy, and seems to have been forgotten amidst the latest revelations of NSA domestic spying.
During a March 11, 2011 briefing [7] to the Senate Judiciary Committee, the FBI’s Mueller offered another clue that his bureau was seeking broad access to American phone records. Towards the end of his testimony, Mueller complained that, “our investigations can be stymied by the records preservations practices of private communications providers. Current law does not require telephone companies and Internet service providers to retain customer subscriber information and source and destination data for any set period of time.”
A year later, the FBI formally requested that Congress expand the 1994 Communications for Law Enforcement Assistance Act (CLEA) to ensure that instant messaging, VoIP, and email servers were “wiretap friendly [8].” FBI general counsel Andrew Weissman began the process by drafting legislation requiring online servers to add extra coding to their programs providing the FBI a backdoor into consumer data, including emails and online chats.
This April, at a luncheon for the American Bar Association, the FBI’s Weissman declared [9] that the bureau’s “top priority this year” was to enhance its ability to monitor web based services like Gmail, Google Voice, and Dropbox.
According to Bill Binney, a former high-ranking NSA official who resigned in protest of the agency’s domestic surveillance operations, the FBI depends on the NSA for data on Americans’ phone calls and online communications.
“The FBI is asking for data on Americans – just look at the Verizon court order [10] – and FISA [Foreign Intelligence Surveillance Act special court] is ordering data to be sent to the NSA,” Binney told me. “So the NSA is becoming the central processor and storage facility for government surveillance. That means they are going into emails and chats. They are absolutely involved in collecting data the FBI uses to spy on Americans.”
Given open FBI acknowledgment that it monitors American phone calls on a massive scale, and that it almost certainly relies on the NSA to do so, it is hard to understand the denials by the White House and its allies. Perhaps, like Groucho Marx, they hope we will believe them instead of our own two lying eyes.
See more stories tagged with:
fbi [11],
nsa [12],
surveillance [13]
Source URL: http://www.alternet.org/news-amp-politics/obama-and-his-allies-say-govt-doesnt-listen-your-phone-calls-fbi-begs-differ
Links:
[1] http://www.alternet.org
[2] http://www.alternet.org/authors/max-blumenthal
[3] http://politicalticker.blogs.cnn.com/2013/06/16/rogers-nsa-is-not-listening-to-americans-phone-calls/
[4] http://news.cnet.com/8301-13578_3-57589495-38/nsa-spying-flap-extends-to-contents-of-u.s-phone-calls/
[5] http://news.yahoo.com/jerrold-nadler-does-not-think-nsa-listen-u-163036644.html
[6] http://transcripts.cnn.com/TRANSCRIPTS/1305/01/ebo.01.html
[7] http://www.judiciary.senate.gov/pdf/11-3-30%20Mueller%20Testimony.pdf
[8] http://news.cnet.com/8301-1009_3-57428067-83/fbi-we-need-wiretap-ready-web-sites-now/
[9] http://www.huffingtonpost.com/2013/03/28/fbi-surveillance_n_2970691.html
[10] http://www.guardian.co.uk/world/interactive/2013/jun/06/verizon-telephone-data-court-order
[11] http://www.alternet.org/tags/fbi-0
[12] http://www.alternet.org/tags/nsa
[13] http://www.alternet.org/tags/surveillance
[14] http://www.alternet.org/%2Bnew_src%2B
Published on Alternet (http://www.alternet.org)
June 16, 2013
Find this story at 16 June 2013
<< oudere artikelen nieuwere artikelen >>