The U.S. Has Been Spying on France Since Before the NSA Existed7 november 2013
On Monday, the news broke that the National Security Agency has been actively intercepting French telephone calls and email traffic — collecting over 70 million French calls in a single month, according to Le Monde.
Turns out this is only the latest surveillance operation in a long, long history of America spying on France. A newly declassified intelligence document reveals that the NSA and its antecedents have been intercepting French communications and breaking French codes and ciphers for more than 70 years.
Monday’s Le Monde report may have generated enormous controversy in France, leading the French foreign minister to call in the U.S. ambassador and read him the riot act. But it’s hardly a new development. American eavesdroppers began listening on France during World War II. They continued doing so during the Cold War. The NSA even spied on France during the run-up to the 2003 invasion of Iraq.
A 1947 top-secret code-word NSA document, titled “The General Cryptanalytic Problems,” reveals that in April 1941, eight months before the Japanese attack on Pearl Harbor, a small U.S. Army code-breaking unit, headed by French linguist Herrick F. Bearce, began trying to solve the diplomatic codes and ciphers of the Vichy French regime headed by Marshal Philippe Pétain, which had actively collaborated with Nazi Germany since the fall of France in 1940. A few months earlier, in January 1941, U.S. Army and Navy listening posts had begun intercepting Vichy diplomatic radio traffic between France and its colonies in North and West Africa, Martinique, Madagascar, Indochina, French Guiana, Djibouti, and St. Pierre et Miquelon off the Canadian coast.
Success quickly followed, indicating that the French codes and ciphers were not particularly secure. The report shows that Bearce’s cryptanalysts broke their first Vichy French code, designated FBT, shortly after the Pearl Harbor attack in mid-December 1941. The size of Bearce’s section grew by leaps and bounds as his cryptanalysts, with considerable help from their counterparts in Britain and Canada, solved several dozen Vichy encryption systems with increasing ease. The Army continued to read all of the Vichy French codes and ciphers being used until Pétain’s regime collapsed following the Allied landings in North Africa in November 1942. Within a matter of weeks, Vichy communications traffic disappeared from the airwaves except for occasional cables to the sole French colony controlled by Vichy in French Indochina (in what is now Vietnam, Laos, and Cambodia).
After Pétain’s Vichy government collapsed, in April 1943 the U.S. Army code breakers turned their attention to the diplomatic codes and ciphers then being used by America’s nominal ally, Gen. Charles de Gaulle’s Free French government in exile, which was based in London but maintained embassies in the United States and elsewhere around the world. The report shows that in October 1943, the U.S. Army’s French code-breaking specialists, then headed by Maj. William F. Edgerton, solved the first of de Gaulle’s most important diplomatic cipher systems, designated FMD. In the months that followed, a half dozen other Free French diplomatic ciphers were solved.
With the solutions of these systems, decrypted French diplomatic traffic became the single most important source of intelligence information being produced by the U.S. Army’s code-breaking unit after Germany and Japan. By the time Japan surrendered in August 1945, the U.S. Army’s code breakers had broken or were working on the solution to 60 French diplomatic or military code and cipher systems, including nearly all of the high-level encryption systems used by de Gaulle and his top ministers to communicate with French diplomats and generals around the world.
The amount of intelligence information produced from decrypted French diplomatic traffic was enormous and incredibly valuable. For example, the French FMT diplomatic code, which the U.S. Army broke in February 1945, proved to be an intelligence bonanza for the United States since the messages encrypted in the system contained all of the high-level diplomatic traffic between Paris and the French delegation at an April 1945 conference in San Francisco that led to the establishment of the United Nations. In other words, the State Department officials at the San Francisco conference knew everything about the French negotiating positions even before the conference began.
But that is not the extent of the surprises contained in the newly declassified report. Buried all the way at the back of the document is a nine-page chapter titled simply “Assistance From Espionage,” which describes in some detail how the FBI and the predecessor to the CIA, then known as the Office of Strategic Services (OSS), stole countless foreign code books and cipher materials in order to help the Army’s code breakers at their work.
It turns out that much of the success enjoyed by the Army’s code breakers against the French codes and ciphers during World War II was because FBI and OSS burglars repeatedly broke into French embassies in Washington, D.C., and elsewhere around the world to steal French cryptographic materials. These “black-bag jobs” proved to be enormously useful in allowing the Army to break French codes and ciphers. The report states (p. 302) that “The French Section has been the recipient of more compromised [stolen] material than any other language group [within the Army code-breaking organization],” with the document showing that FBI and OSS burglars surreptitiously copied at least nine French codes and ciphers between 1941 and 1945.
But this is only the beginning of a story that has yet to be told. It might surprise people to learn that the NSA and its partners in Britain, Canada, Australia, and New Zealand have never stopped intercepting French diplomatic and military communications, or trying to break French codes and ciphers, since the day Japan surrendered on Aug. 14, 1945. The NSA’s intercept operators monitored French military communications in Indochina in the 1950s, as well as French military and diplomatic traffic during the Algerian insurgency in the 1960s. Much of what the U.S. intelligence community knew about the Israeli nuclear weapons program in the late 1950s and early 1960s came from intercepted French communications. And when the French government led the fight in the United Nations against the U.S. government’s plans to invade Iraq in 2002 and 2003, the NSA was listening then as well.
France may be a friend and ally of the United States, but that means very little in the U.S. intelligence community, where spying on America’s friends is as much a fact of life as spying on America’s enemies. As senior U.S. intelligence officials are fond of saying, “We have no friends, only targets.”
Matthew M. Aid is the author of Intel Wars: The Secret History of the Fight Against Terror and The Secret Sentry: The Untold History of the National Security Agency.
Posted By Matthew M. Aid
Tuesday, October 22, 2013 – 5:32 PM
Find this story at 22 October 2013
©2013 The Slate Group, LLC.
US National Security Agency ‘spied on French diplomats’7 november 2013
The US National Security Agency has spied on French diplomats in Washington and at the UN, according to the latest claims in Le Monde newspaper.
NSA internal memos obtained by Le Monde detailed the use of a sophisticated surveillance programme, known as Genie.
US spies allegedly hacked foreign networks, introducing the spyware into the software, routers and firewalls of millions of machines.
It comes a day after claims the NSA tapped millions of phones in France.
The details in the latest Le Monde article are based on leaks from ex-intelligence analyst Edward Snowden, through Glen Greenwald, the outgoing Guardian journalist, who is feeding the material from Brazil, says the BBC’s Christian Fraser in Paris.
It comes on the day the US Secretary of State, John Kerry, is in London meeting foreign counterparts to discuss Syria.
‘Spy implants’
The Le Monde report sets out details of Genie, an NSA surveillance programme in which spyware implants were introduced remotely to overseas computers, including foreign embassies.
It claims bugs were introduced to the French Embassy in Washington (under a code name “Wabash”) and to the computers of the French delegation at the UN, codenamed “Blackfoot”.
The article suggests that in 2011, the US allocated $652m (£402m) in funding for the programme, which was spent on “spy implants”. Tens of millions of computers were reported to have been hacked that year.
A document dated August 2010 suggests intelligence stolen from foreign embassy computers ensured the US knew ahead of time the positions of other Security Council members, before a UN vote for a resolution imposing new sanctions on Iran.
The US was worried the French were drifting to the Brazilian side – who were opposed to implementing sanctions – when in truth they were always aligned to the US position, says our correspondent.
The intelligence agency quotes Susan Rice, then-US ambassador to the UN, who praises the work done by the NSA: “It helped me know… the truth, and reveal other [countries’] positions on sanctions, allowing us to keep one step ahead in the negotiations.”
On Monday, Le Monde alleged that the NSA spied on 70.3 million phone calls in France between 10 December 2012 and 8 January 2013.
At a breakfast meeting with the US secretary of state on Tuesday, French Foreign Minister Laurent Fabius demanded a full explanation.
Referring to a telephone call between the French and US presidents, Mr Fabius told reporters: “I said again to John Kerry what Francois Hollande told Barack Obama, that this kind of spying conducted on a large scale by the Americans on its allies is something that is unacceptable.”
Asked if France was considering reprisals against the US, government spokeswoman Najat Vallaud-Belkacem replied: “It is up to Foreign Minister Fabius to decide what line we take but I don’t think there is any need for an escalation.
“We have to have a respectful relationship between partners, between allies. Our confidence in that has been hit but it is after all a very close, individual relationship that we have.”
Both French officials made their comments before the latest revelations appeared in Le Monde.
Mr Snowden, a former NSA worker, went public with revelations about US spying operations in June.
The information he leaked led to claims of systematic spying by the NSA and CIA on a global scale.
Targets included rivals like China and Russia, as well as allies like the EU and Brazil.
The NSA was also forced to admit it had captured email and phone data from millions of Americans.
Mr Snowden is currently in Russia, where he was granted a year-long visa after making an asylum application.
The US wants him extradited to face trial on criminal charges.
22 October 2013 Last updated at 13:36 ET
Find this story at 22 October 2013
© 2013 The BBC
NSA leaks: France summons US ambassador over phone surveillance revealed by Edward Snowden7 november 2013
Latest leaks from Edward Snowden say American agents recorded more than 70 million French phone calls in just 30 days – including those of politicians and businessmen
The French government has summoned the US ambassador in Paris to provide an explanation for fresh Edward Snowden revelations about the NSA.
According to reports this morning in Le Monde, the American National Security Agency recorded more than 70 million phone calls made France over the course of just 30 days.
If accurate, the reports are the latest indicator of the extraordinary reaching of US electronic spying, and come alongside the news that agents also hacked the email account of former Mexican president Felipe Calderon.
The French interior minister, Manuel Valls, told reporters at an EU meet in Luxembourg: “I have immediately summoned the US ambassador and he will be received this morning at the Quai d’Orsay [French Foreign Ministry].”
“Rules are obviously needed when it comes to new communication technologies, and that’s something that concerns every country,” he the Europe-1 radio station. “If a friendly country – an ally – spies on France or other European countries, that is completely unacceptable.”
Le Monde’s story, which included the byline of the outgoing Guardian journalist Glenn Greenwald, said that the communications of prominent businessmen and politicians were spied on alongside those of suspected security threats.
It said the NSA had targeted Orange and Alcatel-Lucent – two of the biggest network operators in France – and that it used keyword technology and lists of certain types of numbers to automatically pick up millions of records a day.
The 70.3 million pieces of data came from 10 December 2012 and 8 January 2013, and it was not made clear whether they included the full content of conversations or just the metadata – the information of who, when and where the call was made.
The programme of surveillance, codenamed US-985D, also reportedly stored millions of intercepted text messages.
The article followed reports in the German weekly Der Spiegel that the NSA accessed the email account of Felipe Calderon, the former Mexican president. Mexico said it would be seeking an explanation from US officials “as soon as possible”.
Mr Snowden, a former contractor with the NSA who first went public about US surveillance techniques in June, warned then that he had gigabytes of data full of other revelations, to be released over time.
He is currently a refugee at an unknown location in Russia, after he was granted one year’s asylum on the condition, president Vladimir Putin said, that he stop leaking US secrets.
It is not known whether today’s revelations come straight from Mr Snowden himself, or if they are part of a large stock of data given in bulk to journalists at an earlier date.
The US has, as with other Snowden stories, refused to comment on what it calls confidential information.
Officials nonetheless referred Le Monde to a statement made in June, in which US director of national intelligence James Clapper defended the NSA’s programmes.
“They are lawful and conducted under authorities widely known and discussed, and fully debated and authorised by Congress,” he said. “Their purpose is to obtain foreign intelligence information, including information necessary to thwart terrorist and cyber-attacks against the United States and its allies.”
Adam Withnall
Monday, 21 October 2013
Find this story at 21 October 2013
© independent.co.uk
France in the NSA’s crosshair : phone networks under surveillance7 november 2013
The future will perhaps tell us one day why France has remained so discreet in comparison with Germany or Brazil, for example, after the first revelations about the extent of the American electronic espionage programmes in the world as revealed by Edward Snowden, the ex-employee of an NSA (National Security Agency) sub-contractor. France was also concerned and today has at its disposition tangible proof that its interests are targeted on a daily basis.
According to the documents retrieved from the NSA database by its ex-analyst, telephone communications of French citizens are intercepted on a massive scale. Le Monde has been able to obtain access to documents which describe the techniques used to violate the secrets or simply the private life of French people. Some elements of information about this espionage have been referred to by Der Speigel and The Guardian, but others are, to date, unpublished.
Amongst the thousands of documents extracted from the NSA by its ex-employee there is a graph which describes the extent of telephone monitoring and tapping (DNR – Dial Number Recognition) carried out in France. It can be seen that over a period of thirty days – from 10 December 2012 to 8 January 2013, 70,3 million recordings of French citizens’ telephone data were made by the NSA. This agency has several methods of data collection. According to the elements obtained by Le Monde, when a telephone number is used in France, it activates a signal which automatically triggers the recording of the call. Apparently this surveillance system also picks up SMS messages and their content using key words. Finally, the NSA apparently stores the history of the connections of each target – or the meta-data.
This espionage is listed under the programme US-985D. The precise explanation of this acronym has not been provided, to date, by the Snowden documents nor by the former members of the NSA. By way of comparison, the acronyms used by the NSA for the same type of interception targeting Germany are US-987LA and US-987LB. According to some sources, this series of numbers corresponds to the circle referred to by the United States as the ’third party’, to which belong France, Germany but also Austria, Poland or again Belgium. ‘The second party’ concerns the English-speaking countries historically close to Washington: the United Kingdom, Canada, Australia and New Zealand – this group is known by the name the ‘five eyes’. ‘The first party’ concerns the sixteen American secret services of which today the NSA has become the most important, according to a senior official from the French Intelligence community.
The techniques used for these interceptions appear under the codenames ‘DRTBOX’ and ‘WHITEBOX’. Their characteristics are not known either. But we do know that, thanks to DRTBOX, 62.5 million data were collected in France and that WHITEBOX enables the recording of 7.8 million elements. The documents which Le Monde has been able to see have not enabled the provision of further details on these methods. But they give sufficient explanation to lead us to think that the NSA targets concerned both people suspected of association with terrorist activities as well as people targeted simply because they belong to the worlds of business, politics or French state administration.
The NSA graph shows an average of 3 million data intercepts per day with peaks at almost 7 million on 24 December 2012 and 7 January 2013. But between 28 and 31 December no interception seems to have taken place. This apparent stoppage of activity could be explained, in particular, by the time required at the end of December 2012, for the American Congress to renew section 702 of the law dealing with electronic espionage abroad. Similarly nothing appears on the 3, 5 and 6 January 2013; this time we cannot suggest any plausible reason. Many questions are still posed by this diagram – to start with the precise identity of the targets and the justifications for such a large-scale collection of data in a foreign country which is both sovereign and an ally.
When questioned, the American authorities did not wish to comment on these documents which they considered to be ‘classified’. Nevertheless, they do refer to the statement made on 8 June 2013 by the Director of National Intelligence according to which, ’the government cannot target anyone under the court-approved procedures for Section 702 collection unless there is an appropriate, and document foreign intelligence purpose for the acquisition (such as for the prevention of terrorism, hostile cyber activities, or nuclear proliferation) and the foreign target is reasonably believed to be outside the United States. We cannot target even foreign persons overseas without a valid foreign intelligence purpose.
France is not the country in which the NSA intercepts the most digital or telephone connections. The ‘Boundless Informant’ system, revealed in June by Edward Snowden to the British daily The Guardian, enabled an overall vision and in real time of the information gathered throughout the world, by means of the various NSA wire-tapping systems. This system gathers not only telephone data (DNR) but also digital data (DNI Digital Network Intelligence). One of the documents which Le Monde was able to consult notes that between 8 February and 8 March 2013, the NSA collected, throughout the world, 124,8 billion telephone data items and 97,1 billion computer data items. In Europe, only Germany and the United Kingdom exceed France in terms of numbers of interceptions.
Le Monde.fr
21.10.2013 à 06h08
Par Jacques Follorou et Glenn Greenwald (Journaliste)
Find this story at 21 October 2013
© Le Monde.fr
Was ISRAEL behind the hacking of millions of French phones and NOT the U.S.? Extraordinary twist in spying saga revealed7 november 2013
Agents said to have intercepted 70 million calls and text messages a month
France had previously blamed the United States of America
U.S. was first suspected of hacking into Nicolas Sarkozy’s phone in 2012
Americans insisted they have never been behind hacking in France
Comes after it emerged German officials are planning trip to U.S. to discuss allegations Angela Merkel’s phone was hack by the NSA
The German Chancellor said President Obama’s reputation has been shattered on an international scale because of espionage scandal
Israel and not America was behind the hacking of millions of French phones, it was claimed today.
In the latest extraordinary twist in the global eavesdropping scandal, Israeli agents are said to have intercepted more than 70 million calls and text messages a month.
Up until now the French have been blaming the U.S., even summoning the country’s Paris ambassador to provide an explanation.
Scroll down for video
France first suspected the U.S. of hacking into former president Nicolas Sarkozy’s communications network when he was unsuccessfully trying for re-election in 2012
But today’s Le Monde newspaper provides evidence that it was in fact Israeli agents who were listening in.
France first suspected the U.S. of hacking into former president Nicolas Sarkozy’s communications network when he was unsuccessfully trying for re-election in 2012.
Intelligence officials Bernard Barbier and Patrick Pailloux travelled from Paris to Washington to demand an explanation, but the Americans hinted that the Israelis were to blame.
More…
Teenager, 18, sentenced for biting officer while being arrested for wearing a niqab appears in French appeal court…in full burkha
The terrible truth about Gaddafi’s harem: How Libyan dictator kidnapped and raped dozens of women to fulfil his perverted desires
French opposition leader pledges to ban citizenship for children of illegal immigrants born in France
Teenager, 18, sentenced for biting officer while being arrested for wearing a niqab appears in French appeal court…in full burkha
Cameron attacks ‘lah-di-dah, airy-fairy’ ideas about spy agencies, as he reveals his own mobile was NOT targeted by the US
The Americans insisted they have never been behind any hacking in France, and were always keen to get on with the French, whom they viewed as some of their closest allies.
They were so determined to be friends with the French, that U.S. briefing notes included details of how to pronounce the names of the Gallic officials.
A note published in Le Monde shows that the Americans refused to rule out Mossad, Israel’s notoriously uncompromising intelligence agency, or the ISNU, Israel’s cyber-intelligence unit.
Today’s newspaper report was co-written by Glenn Greenwald, whose main contact is NSA whistleblower Edward Snowden (pictured)
Tailored Access Operations (TAO), the branch of the US National Security Agency (NSA) which deals with cyber-attacks, is referred to throughout the note.
It reads: ‘TAO intentionally did not ask either Mossad or ISNU whether they were involved as France is not an approved target for joint discussions.’
Le Monde’s article, co-authored by U.S. journalist Glenn Greenwald, whose main contact is NSA whistleblower Edward Snowden, however, hints that the Israelis were doing the spying.
Both US and French intelligence work closely with Mossad, but there is known to be a great deal of suspicion between all the agencies.
A 2008 NSA note says that the Israelis are ‘excellent partners in terms of sharing information’, but it also says that Mossad is ‘the third most aggressive intelligence service in the world against the United States’.
A spokesman for the Israeli government told Le Monde: ‘Israel is a country which is a friend, ally and partner of France and does not carry out any hostile activity which could pose a threat to its security.’
France has complained in the past about Mossad’s use of its soil to plan so called black operations including the 2010 assassination in Dubai of Mahmoud Al-Mabhouh of the Palestinian movement Hamas.
The revelation comes after senior German officials said they would be travelling to the U.S. ‘shortly’ to talk about allegations the NSA bugged Angela Merkel’s phone.
Obama orders review of surveillance activities
Anger: German Chancellor Angela Merkel (left) and Brazil’s Dilma Rousseff (right) have both voiced concerns over the NSA’s infiltration of the online communications of foreigners
The heads of Germany’s foreign and domestic intelligence agencies will participate in high-level discussions with the White House and National Security Agency, government spokesman Georg Streiter said.
News of the talks signals an escalation in the diplomatic tensions between the U.S. and its allies after it was claimed the NSA had monitored the calls of 35 world leaders.
Brazil and Germany have joined forces in an attempt to pile pressure on the United Nations to rein in the snooping activities. They want a UN General Resolution that promotes the right to online privacy.
This step, the first major international response to the NSA’s infiltration of the online communications of foreigners, comes after German Chancellor Merkel said the recent U.S. espionage scandal has shattered international trust in Barack Obama.
Angela Merkel said the recent espionage scandal has shattered international trust in President Obama
Not hacked: The White House has denied that David Cameron’s communications were ever monitored
A month earlier Brazil’s president Dilma Rousseff branded the NSA’s clandestine activities ‘a breach of international law’ in a speech to the UN General Assembly and demanded steps be made to stop ‘cyberspace from being used as a weapon of war’.
Brazilian and German diplomats met in New York yesterday to thrash out a draft resolution demanding the strengthening of privacy rights in the International Covenant Civil and Political Rights.
While the UN has no real power to reign in the NSA, there are fears among security experts that the effort alone could signal a growing consensus to freeze the US out of future international security dialogues.
By Nabila Ramdani
PUBLISHED: 16:32 GMT, 25 October 2013 | UPDATED: 20:46 GMT, 25 October 2013
Find this story at 25 October 2013
© Associated Newspapers Ltd
France feared US hacked president, was Israel involved?7 november 2013
AFP – France believed the United States attempted to hack into its president’s communications network, a leaked US intelligence document published on Friday suggests.
US agents denied having anything to do with a May 2012 cyber attack on the Elysee Palace, the official residence of French presidents, and appeared to hint at the possible involvement of Mossad, Israel’s intelligence agency, a classified internal note from the US National Security Agency suggests.
Extracts from the document, the latest to emerge from the NSA via former contractor Edward Snowden, were published by Le Monde newspaper alongside an article jointly authored by Glenn Greenwald, the US journalist who has been principally responsible for a still-unravelling scandal over large-scale US snooping on individuals and political leaders all over the world.
The document is a briefing note prepared in April this year for NSA officials who were due to meet two senior figures from France’s external intelligence agency, the DGSE. The French agents had travelled to Washington to demand explanations over their discovery in May 2012 of attempts to compromise the Elysee’s communications systems.
The note says that the branch of the NSA which handles cyber attacks, Tailored Access Operations (TAO), had confirmed that it had not carried out the attack and says that most of its closest allies (Australia, Britain, Canada and New Zealand) had also denied involvement.
It goes on to note: “TAO intentionally did not ask either Mossad or (Israel’s cyber intelligence unit) ISNU whether they were involved as France is not an approved target for joint discussions.”
Le Monde interpreted this sentence as being an ironic reference to a strong likelihood that Mossad had been behind the attack.
The cyber attacks on the Elysee took place in the final weeks of Nicolas Sarkozy’s term, between the two rounds of the presidential election which he ended up losing to Francois Hollande.
The attacks had been previously reported by French media, who have described them as an attempt to insert monitoring devices into the system but it remains unclear whether the presidential networks were compromised for any time.
There was no immediate response from the Elysee on Friday when asked for comment by AFP.
Sarkozy enjoyed warmer relations with the United States than any French president of recent times, to the extent that the media sometimes referred to him as “Sarko the American.”
The revelations about the Elysee attacks followed damaging revelations that the US had tapped the mobile phone of German Chancellor Angela Merkel and spied on other allies.
“Spying between friends, that’s just not done,” Merkel said Thursday at the start of a summit of European Union leaders which has been overshadowed by the issue.
On a lighter note, the leaked document published by Le Monde on Friday underlines that NSA officials were anxious not to cause any further offence to their angry French counterparts.
Along with the technical details, the briefing note contains a phonetic guide to the pronunciation of the names of the French visitors.
They included DGSE technical director Bernard Barbier, who was to be addressed as bear-NAR bur-BYAY, and Patrick Pailloux, or pah-TREEK pie-YOO.
25 OCTOBER 2013 – 12H58
Find this story at 25 October 2013
© 2006 – 2013 Copyright FRANCE 24. All rights reserved
NSA Targeted French Foreign Ministry7 november 2013
Espionage by the US on France has already strained relations between the two countries, threatening a trans-Atlantic trade agreement. Now a document seen by SPIEGEL reveals that the NSA also spied on the French Foreign Ministry.
America’s National Security Agency (NSA) targeted France’s Foreign Ministry for surveillance, according to an internal document seen by SPIEGEL.
Dated June 2010, the “top secret” NSA document reveals that the intelligence agency was particularly interested in the diplomats’ computer network. All of the country’s embassies and consulates are connected with the Paris headquarters via a virtual private network (VPN), technology that is generally considered to be secure.
Accessing the Foreign Ministry’s network was considered a “success story,” and there were a number of incidents of “sensitive access,” the document states.
An overview lists different web addresses tapped into by the NSA, among them “diplomatie.gouv.fr,” which was run from the Foreign Ministry’s server. A list from September 2010 says that French diplomatic offices in Washington and at the United Nations in New York were also targeted, and given the codenames “Wabash” and “Blackfoot,” respectively. NSA technicians installed bugs in both locations and conducted a “collection of computer screens” at the one at the UN.
A priority list also names France as an official target for the intelligence agency. In particular, the NSA was interested in the country’s foreign policy objectives, especially the weapons trade, and economic stability.
US-French relations are being strained by such espionage activities. In early July, French President François Hollande threatened to suspend negotiations for a trans-Atlantic free trade agreement, demanding a guarantee from the US that it would cease spying after it was revealed that the French embassy in Washington had been targeted by the NSA.
“There can be no negotiations or transactions in all areas until we have obtained these guarantees, for France but also for all of the European Union, for all partners of the United States,” he said at the time.
The NSA declined to comment to SPIEGEL on the matter. As details about the scope of the agency’s international spying operations continue to emerge, Washington has come under increasing pressure from its trans-Atlantic partners. Officials in Europe have expressed concern that negotiations for the trade agreement would be poisoned by a lack of trust.
09/01/2013 09:32 AM
Find this story at 1 September 2013
© SPIEGEL ONLINE 2013
For Western Allies, a Long History of Swapping Intelligence16 augustus 2013
BERLIN — When Edward J. Snowden disclosed the extent of the United States data mining operations in Germany, monitoring as many as 60 million of the country’s telephone and Internet connections in one day and bugging its embassy, politicians here, like others in Europe, were by turns appalled and indignant. But like the French before them, this week they found themselves backpedaling.
In an interview released this week Mr. Snowden said that Germany’s intelligence services are “in bed” with the National Security Agency, “the same as with most other Western countries.” The assertion has added to fresh scrutiny in the European news media of Berlin and other European governments that may have benefited from the enormous American snooping program known as Prism, or conducted wide-ranging surveillance operations of their own.
The outrage of European leaders notwithstanding, intelligence experts and historians say the most recent disclosures reflect the complicated nature of the relationship between the intelligence services of the United States and its allies, which have long quietly swapped information on each others’ citizens.
“The other services don’t ask us where our information is from and we don’t ask them,” Mr. Snowden said in the interview, conducted by the documentary filmmaker Laura Poitras and Jacob Appelbaum, a computer security researcher, and published this week in the German magazine Der Spiegel. “This way they can protect their political leaders from backlash, if it should become public how massively the private spheres of people around the globe are being violated.”
Britain, which has the closest intelligence relationship with the United States of any European country, has been implicated in several of the data operations described by Mr. Snowden, including claims that Britain’s agencies had access to the Prism computer network, which monitors data from a range of American Internet companies. Such sharing would have allowed British intelligence agencies to sidestep British legal restrictions on electronic snooping. Prime Minister David Cameron has insisted that its intelligence services operate within the law.
Another allegation, reported by The Guardian newspaper, is that the Government Communications Headquarters, the British surveillance center, tapped fiber-optic cables carrying international telephone and Internet traffic, then shared the information with the N.S.A. This program, known as Tempora, involved attaching intercept probes to trans-Atlantic cables when they land on British shores from North America, the report said.
President François Hollande of France was among the first European leaders to express outrage at the revelations of American spying, and especially at accusations that the Americans had spied on French diplomatic posts in Washington and New York.
There is no evidence to date that French intelligence services were granted access to information from the N.S.A., Le Monde reported last week, however, that France’s external intelligence agency maintains a broad telecommunications data collection system of its own, amassing metadata on most, if not all, telephone calls, e-mails and Internet activity coming in and out of France.
Mr. Hollande and other officials have been notably less vocal regarding the claims advanced by Le Monde, which authorities in France have neither confirmed nor denied.
Given their bad experiences with domestic spying, first under the Nazis and then the former the East German secret police, Germans are touchy when it comes to issues of personal privacy and protection of their personal data. Guarantees ensuring the privacy of mail and all forms of long-distance communications are enshrined in Article 10 of their Constitution.
When the extent of the American spying in Germany came to light the chancellor’s spokesman, Steffen Seibert, decried such behavior as “unacceptable,” insisting that, “We are no longer in the cold war.”
But experts say ties between the intelligence services remain rooted in agreements stemming from that era, when West Germany depended on the United States to protect it from the former Soviet Union and its allies in the East.
“Of course the German government is very deeply entwined with the American intelligence services,” said Josef Foschepoth, a German historian from Freiburg University. Mr. Foschepoth spent several years combing through Germany’s federal archives, including formerly classified documents from the 1950s and 1960s, in an effort to uncover the roots of the trans-Atlantic cooperation.
In 1965, Germany’s foreign intelligence service, known by the initials BND, was created. Three years later, the West Germans signed a cooperation agreement effectively binding the Germans to an intensive exchange of information that continues up to the present day, despite changes to the agreements.
The attacks on Sept. 11, 2001, in the United States saw a fresh commitment by the Germans to cooperate with the Americans in the global war against terror. Using technology developed by the Americans and used by the N.S.A., the BND monitors networks from the Middle East, filtering the information before sending it to Washington, said Erich Schmidt-Eenboom, an expert on secret services who runs the Research Institute for Peace Politics in Bavaria.
In exchange, Washington shares intelligence with Germany that authorities here say has been essential to preventing terror attacks similar to those in Madrid or London. It is a matter of pride among German authorities that they have been able to swoop in and detain suspects, preventing several plots from being carried out.
By focusing the current public debate in Germany on the issue of personal data, experts say Chancellor Angela Merkel is able to steer clear of the stickier questions about Germany’s own surveillance programs and a long history of intelligence sharing with the United States, which still makes many Germans deeply uncomfortable, more than two decades after the end of the cold war.
“Every postwar German government, at some point, has been confronted with this problem,” Mr. Foschepoth said of the surveillance scandal. “The way that the chancellor is handling it shows that she knows very well, she is very well informed and she wants the issue to fade away.”
Reporting contributed by Stephen Castle from London, Scott Sayare from Paris and Eric Schmitt from Washington.
July 9, 2013
By MELISSA EDDY
Find this story at 9 July 2013
© 2013 The New York Times Company
Revelations on the French Big Brother10 juli 2013
If the revelations about the American espionage program Prism set off a chorus of indignation in Europe, France itself protested only weakly. For two excellent reasons: Paris already knew about it – and it”s doing exactly the same thing. Le Monde is able to disclose that the General Directorate of External Security (the DGSE, or special services) systematically collects the electromagnetic signals emitted by computers and telephones in France, and the flow of signals between France and countries abroad: the entirety of our communications are being spied on. All of our email messages, SMS messages, itemised phone bills and connections to FaceBook and Twitter are then stored for years.
If this immense data base was used just by the DGSE, which operates only outside French borders, it would already be illegal. But the six other intelligence services – among them the Central Directorate of Internal Intelligence, the customs service and the Tracfin anti-money-laundering service – delve into this base daily for the data of interest to them. This takes place discreetly, on the margins of legality and and beyond any serious control. Politicians are perfectly aware of it, but secrecy is the rule.
A CLANDESTINE SYSTEM
This French Big Brother, a little brother of the American services, is clandestine. Yet its existence appears discreetly in parliamentary documents. In a report issued on April 30, the eight deputies and senators in the parliamentary intelligence delegation note that “progress has been made since 2008 in the mutualisation of capabilities, notably regarding intelligence of electromagnetic origin, effected by the DGSE for the benefit of the entire intelligence community.”
The parliamentarians propose to go still further, to “reinforce the capabilities exploited by the DGSE” and to “consolidate the access of other services to the capabilities mutualised by the DGSE.”
THE TARGET: “METADATA”
The intelligence services are not looking for the content of the messages, but rather their context. It is more interesting to know who is speaking to whom than to record what they are saying. More than phone tapping, it”s the technical data – the “metadata” – that is being combed through.
The DGSE thus collects the itemised telephone bills of millions of subscribers – the names of the callers and the called, the place, the date, the duration, the weight of the message. The same goes for email (with the possibility of reading the title of the message), SMS messages, faxes… And all activity on the Internet that takes place via Google, Facebook, Microsoft, Apple, Yahoo… It’s what the parliamentary intelligence delegation very aptly calls “intelligence of electromagnetic origin”, the equivalent of the NSA’s SigInt (signals intelligence).
This metadata may be used to draw huge graphs of links among people based on their digital activity, and it’s been going on for years. The idea is to sketch out a kind of diary of each person’s activity on both telephone and computer. When an interesting group has been identified, it then becomes the responsibility of the intelligence services to use more intrusive techniques, like wire-tapping or police tails.
A SUPERCOMPUTER ON BOULEVARD MORTIER IN PARIS
This system is obviously of great value in the fight against terrorism. But it allows spying on anyone, any time. The DGSE collects billions of billions of units of data, which are compressed and stored on three floors in the basement of the DGSE headquarters on Boulevard Mortier in Paris.
Bernard Barbier, technical director of the DGSE since 2006, has spoken publicly about this system on two occasions – in 2010 at a symposium on the security of information and communications technology, and to the Association of Reservists in Encryption and Information Security (Arsci). His comments were reported on a few specialised sites, including Bug Brother, a blog by Jean-Marc Manach on lemonde.fr. Mr. Barbier spoke of “the development of a calculator based on FPGA” – Field Programmable Gate Array, or an integrated circuit that may be programmed for logical functions – that is “probably the biggest data processing center in Europe after the English”, capable of managing dozens of petaoctets of data, in other words dozens of millions of gigaoctets. The heat emitted by the computers is sufficient to heat all the buildings of the DGSE…
France is said to be among the Top 5 in computing capacity, after the United States, Britain, Israel and China. Mr. Barbier estimated the number of connections picked up by the system at 4 billion in 2013, with a flow of about 1 billion simultaneous communications. “Today, our targets are the networks of the public at large,” the director said at the time, “because they are used by terrorists.”
The DGSE heads “the strongest team of crypto-mathematicians” in France, penetrates computer systems – and of course collects millions of units of personal data.
“MUTUALISED” INTELLIGENCE
The other French intelligence services have access to this gigantic data base, which is soberly called the “mutualisation infrastructure”. They include the DGSE of course, but also the Directorate of Military Intelligence (DRM); the Directorate of Protection and Security of Defense (DPSD); the Central Directorate of Internal Security (DCRI); the Directorate of National Intelligence and Customs Investigations (DNRED); Tracfin, the anti-money-laundering unit; and even the small intelligence service of the police headquarters in Paris.
According to Senate reports, 80% of the resources of the technical management of the DGSE are used by these other intelligence services. Each supplies the name of the target of their investigation to the DGSE, which replies “hit” or “no hit” according to whether the target appears in the data base or not. Then the services of the DGSE make the metadata intelligible with the addition of classical intelligence.
Requests for consultation go far beyond just terrorism and the defence of France’s economic property. The very vague wording – protection of national security – makes it possible notably to identify the entourage of politicians at the highest level of the state, whatever their position and the nature of the links under surveillance.
ABSENCE OF MONITORING
The system is perfectly illegal – or “a-legal”, as the chief of one of the intelligence agencies puts it. According to the National Commission for Information Technology and Freedom (CNIL), the French agency in charge of protecting personal data, “The legal system governing security interceptions forbids the establishment by the intelligence services of a procedure like Prism.” It adds : “Each request for the requisition or interception of data must be targeted and may not be carried out massively in terms of the quantity or the time period. Such practices thus have no legal foundation.” The CNIL can neither confirm or deny the existence of the French system – it moveover does not have access to the files of the DGSE or the DCRI.
To be sure, there is a strict legal framework for security interceptions, which are to be authorised by the prime minister, on the recommendation of the National Consultative Commission for Security Interceptions, but this framework did not forecess the massive stocking of technical data by the secret services. “We’ve been operating is a zone of virtual autorisation for years”, confided a former chief of one of the services. “And each agency is quite content with this freedom, which is possible thanks to the legal vagueness surrounding metadata.” A parliamentarian confirmed that “a large portion of the electronic connections in France are effectively intercepted and stocked by the DGSE.” But, officially, the “mutualisation infrastructure” does not exist.
(Translated by Meg Bortin)
LE MONDE | 04.07.2013 à 17h06 • Mis à jour le 04.07.2013 à 17h24 |
Par Jacques Follorou et Franck Johannès
Find this story at 4 July 2013
© Le Monde.fr
Auch Frankreichs Geheimdienst zapft massenhaft Daten ab10 juli 2013
Die Briten tun es, die Amerikaner sowieso – und jetzt stellt sich heraus: Auch die Franzosen greifen laut “Le Monde” massenhaft Kommunikationsdaten ab. Der Auslandsgeheimdienst späht systematisch Telefonate, Mails und soziale Netzwerke aus.
Paris – Frankreich hat womöglich seit Donnerstag seinen eigenen Datenskandal: Die Tageszeitung “Le Monde” berichtet auf ihrer Website, der französische Auslandsgeheimdienst DGSE greife in ähnlicher Art und Weise Kommunikationsdaten ab wie der US-Geheimdienst NSA. “Enthüllungen über den französischen Big Brother”, hat das Blatt seine Geschichte überschrieben.
Der DGSE fange Signale von Computern und Telefonen in Frankreich ab, betroffen seien auch Verbindungen zwischen Frankreich und dem Ausland. Zwar würden nicht die Inhalte von Gesprächen ausgeforscht, heißt es in dem Bericht. Es gehe vielmehr darum, eine Übersicht, eine Art Karte zu erstellen, wer mit wem kommuniziere.
Laut der Zeitung, die sich auf namentlich nicht genannte Geheimdienstquellen sowie offizielle Äußerungen von Geheimdienstmitarbeitern beruft, handelt es sich um illegale Eingriffe. E-Mails, SMS, Verbindungsdaten und die Nutzung von Facebook und Twitter etwa würden über Jahre gespeichert.
Das Vorgehen ähnelt dem der NSA, das der SPIEGEL enthüllt hatte. Demnach überwacht die NSA in Deutschland monatlich rund eine halbe Milliarde Telefonate, E-Mails oder SMS – systematisch wird ein Großteil der Telefon- und Internetverbindungsdaten kontrolliert und gespeichert. Außerdem überwachen die Amerikaner offenbar gezielt EU-Vertretungen. Auch in Großbritannien sorgte ein ähnlicher Abhörskandal für Aufsehen.
Eine Stellungnahme der DGSE gibt es bisher nicht. Laut “Le Monde” zweifelt die für die Kontrolle solcher Spionagemaßnahmen zuständige Kommission den Bericht allerdings an und versicherte, der Geheimdienst arbeite im Einklang mit den Gesetzen. Die einzige Einrichtung, die Kommunikationsdaten sammle, sei eine Regierungsstelle, die dem Premierminister unterstellt sei und deren Aufgabe es sei, Sicherheitslücken aufzuspüren.
Die Vorwürfe in dem Zeitungsbericht sind allerdings sehr konkret. Der Dienst DGSE horte die Daten im Keller seines Hauptquartiers in Paris, schreibt “Le Monde”. Die Wärme, die das Rechenzentrum ausstrahle, reiche aus, um das gesamte Gebäude zu heizen.
Die übrigen sieben französischen Geheimdienste, darunter Inlandsdienste, Experten für Geldwäsche und Zollfahnder, hätten Zugriff auf die Daten. Diesen anderen Diensten sei es dann freigestellt, sich in als verdächtig aufgefallene Kommunikation einzuklinken und etwa Gespräche abzuhören.
ffr/Reuters/Mitarbeit: Valérie Wagner
04. Juli 2013, 18:25 Uhr
Find this story at 4 July 2013
© SPIEGEL ONLINE 2013
France ‘has vast data surveillance’ – Le Monde report10 juli 2013
France’s foreign intelligence service intercepts computer and telephone data on a vast scale, like the controversial US Prism programme, according to the French daily Le Monde.
The data is stored on a supercomputer at the headquarters of the DGSE intelligence service, the paper says.
The operation is “outside the law, and beyond any proper supervision”, Le Monde says.
Other French intelligence agencies allegedly access the data secretly.
It is not clear however whether the DGSE surveillance goes as far as Prism. So far French officials have not commented on Le Monde’s allegations.
The DGSE allegedly analyses the “metadata” – not the contents of e-mails and other communications, but the data revealing who is speaking to whom, when and where.
Connections inside France and between France and other countries are all monitored, Le Monde reports.
The paper alleges the data is being stored on three basement floors of the DGSE building in Paris. The secret service is the French equivalent of Britain’s MI6.
The operation is designed, say experts, to uncover terrorist cells. But the scale of it means that “anyone can be spied on, any time”, Le Monde says.
There is a continuing international furore over revelations that the US has been systematically seizing vast amounts of phone and web data.
The French government has sharply criticised the US spying, which allegedly included eavesdropping on official EU communications.
The scale of surveillance by America’s National Security Agency (NSA) emerged from classified intelligence documents leaked by whistleblower Edward Snowden.
The UK spy agency GCHQ is reported to run a similarly vast data collection operation, co-operating closely with the NSA.
4 July 2013 Last updated at 14:11 GMT
Find this story at 4 July 2013
BBC © 2013 The BBC is not responsible for the content of external sites. Read more.
Trade Secrets : Is the U.S.’s most advanced surveillance system feeding economic intelligence to American businesses? 199913 juni 2013
No one is surprised that the United States uses sophisticated electronic spying techniques against its enemies. But Europeans are increasingly worried about allegations that the U.S. uses those same techniques to gather economic intelligence about its allies.
The most extensive claims yet came this spring in a report written for the European Parliament. The report says that the U.S.
National Security Agency, through an electronic surveillance system called Echelon, routinely tracks telephone, fax, and e-mail transmissions from around the world and passes on useful corporate intelligence to American companies.
Among the allegations: that the NSA fed information to Boeing and McDonnell Douglas enabling the companies to beat out European Airbus Industrie for a $ 6 billion contract; and that Raytheon received information that helped it win a $ 1.3 billion contract to provide radar to Brazil, edging out the French company Thomson-CSF. These claims follow previous allegations that the NSA supplied U.S. automakers with information that helped improve their competitiveness with the Japanese (see “Company Spies,” May/June 1994).
Is there truth to these allegations? The NSA is among the most secretive of U.S. intelligence agencies and won’t say much beyond the fact that its mission is “foreign signals intelligence.” The companies involved all refused to comment.
“Since the NSA’s collection capabilities are so grotesquely powerful, it’s difficult to know what’s going on over there,” says John Pike, an analyst at the watchdog group Federation of American Scientists, who has tracked the NSA for years.
This much is known: The NSA owns one of the largest collections of supercomputers in the world, and it’s an open secret–as documented in the European Parliament report–that Echelon vacuums up massive amounts of data from communications satellites and the Internet and then uses its computers to winnow it down. The system scans communications for keywords–“bomb,” for instance–that might tip off analysts to an interesting topic.
Fueling allegations of corporate espionage is the fact that defense contractors and U.S. intelligence agencies are linked extensively through business relationships. Raytheon, for instance, has large contracts to service NSA equipment, according to the European report.
Englishman Glyn Ford, the European Parliament member who initiated the study, wants the NSA to come clean about its activities in Europe. And the Europeans have some leverage on this issue, if they decide to use it. In a drive to improve surveillance, the United States is pressuring European governments to make telephone companies build eavesdropping capabilities into their new systems. But if that’s what the U.S. wants, says Ford, it’s going to have to be open about what information it’s collecting: “If we are going to leave the keys under the doormat for the United States, we want a guarantee that they’re not going to steal the family silver,” he says.
In the meantime, congressional critics have started to wonder if all that high-powered eavesdropping is limited to overseas snooping. In April, Bob Barr (R-Ga.), a member of the House Government Reform Committee, said he was worried by reports that the NSA was engaged in illicit domestic spying.
“We don’t have any direct evidence from the NSA, since they’ve refused to provide any reports, even when asked by the House Intelligence Committee,” Barr says. “But if in fact the NSA is pulling two million transmissions an hour off of these satellites, I don’t think there’s any way they have of limiting them to non-U.S. citizens.”
Last May, after the NSA stonewalled requests to discuss the issue, Congress amended the intelligence appropriations bill to require the agency to submit a report to Congress. (The bill is still in a conference committee.) And the NSA will face more questions when the Government Reform Committee holds hearings on Echelon and other surveillance programs.
“We ought to prevent any agency from the dragnet approach–where they throw out a net and drag anything in,” Barr says.
Kurt Kleiner
Mother Jones November 1, 1999
Find this story at 1 November 1999
Copyright © 2013 Mother Jones and the Foundation for National Progress.
Scotland Yard ‘eco-spy’ Mark Kennedy dragged into French anarchist plot15 februari 2013
A former Scotland Yard officer who infiltrated groups of environmental “terrorists” has been dragged into a high-profile investigation in France over claims he provided “fantasist” information leading to 10 activists’ arrest.
Mark Kennedy, 42, who spent seven years posing as “ecowarrior” Mark Stone, was exposed as a police spy in Britain last year following the collapse of a prosecution against environmental activists.
During his undercover life, he visited 11 countries on more than 40 occasions, fielding information to the UK’s National Public Order Intelligence Unit, now the National Domestic Extremism Unit.
Since he was unmasked, 20 convictions in cases he was involved in against activists have been quashed in the court of appeal. He was also sued by three female eco-activists for being “duped” into having sexual relations with a policeman.
Now his name has cropped up in the investigation into French activists over an alleged anarchist plot to overthrow the state.
Their lawyers insist that the investigation is unfairly based on information Mr Kennedy allegedly provided to his UK police unit, including claims the activists discussed and “practised” building improvised explosive devices.
Related Articles
Undercover police must be allowed to have sex with activists, says minister 14 Jun 2012
‘Undercover cop left firebomb in Debenhams’ 13 Jun 2012
Undercover police can have sex with suspects 13 Jun 2012
Mark Kennedy ‘showed undercover police rules were inadequate’ 02 Feb 2012
The French leftists are under formal investigation for allegedly sabotaging high-speed train lines – seen as a high-profile symbol of the French state – in November 2008, causing massive delays but no injuries. They deny any wrongdoing.
Mr Kennedy’s role in the inquiry could see the case quashed.
The so-called “Tarnac affair” erupted in November 2008 when 100 French police raided the tiny rural village of Tarnac, arresting anti-capitalists running a communal farm and village shop.
The government of then President Nicolas Sarkozy alleged they were dangerous “anarcho-terrorists” hoping to overthrow the state.
French sociology graduate Julien Coupat was accused of being the group’s “ringleader” and author of a seminal work, The Coming Insurrection.
It has now emerged that British police helped French prosecutors build a case against the campaigners by confirming Mr Coupat’s presence at two activists’ meetings in France and one in New York. In one of them, it said, “the making of improvised explosive devices (IEDs) was both discussed and practised”.
…
By Henry Samuel, Paris
7:17PM GMT 08 Nov 2012
Find this story at 8 November 2012
© Copyright of Telegraph Media Group Limited 2013
[Le Procès du Forgeron] « Qui vole un œuf, viole un bœuf » Procès du forgeron de Tarnac : « On incrimine ma volonté »15 februari 2013
Pour avoir refusé de donner son ADN aux officiers de l’anti-terrorisme, Charles Torres, « le forgeron de l’affaire Tarnac », lavé de tous soupçons depuis, est passé devant la justice. Le délibéré sera rendu par le tribunal de grande instance de Rouen le 6 mars 2013.
Mercredi 6 janvier 2013, Charles Torres était jugé pour refus de se soumettre au prélèvement d’ADN. Prélèvement demandé par la cellule anti-terroriste lors d’une garde-à-vue justifiée par sa possible appartenance à l’affaire Tarnac. Au moment de cette garde-à-vue, le 23 février 2012, Charles Torres, forgeron de profession, est soupçonné d’être l’artisan des crochets qui auront servi en 2008 à saboter des caténaires de la SNCF.
Le palais de justice de Rouen accueille donc le jour de l’audience du « Forgeron de Tarnac », tous ses soutiens, sa famille et une bonne dizaine de journalistes alléchés par cette audience connexe à l’affaire Tarnac. Quelques policiers, arnaché de gilets pare-balles et de talkie-walkies. Normal, c’est le procès d’une personne qui soupçonnée début 2012 d’association de malfaiteurs dans une entreprise terroriste.
La juge aura dû, en début d’audience faire taire le public venu en nombre pour soutenir Charles Torres. Celui-ci a souhaité lire devant le tribunal « sa plaidoirie » car il n’est « pas très à l’aise à l’oral ». L’homme de 28 ans, spécialisé dans la forge médiévale, a commencé son diatribe timidement, posant la question qui le taraude : « Pourquoi suis-je ici devant vous aujourd’hui ? Je ne le sais pas, personne ne le sait. À part peut-être, l’officier de la DCRI que j’ai vu arpenter ce tribunal aujourd’hui, avec une veste de moto. »
Le forgeron a eu à cœur de pousser les traits d’ironie, malgré sa gêne à parler publiquement. Il s’est même retourné une fois vers l’assemblée pour chercher du regard un soutien. « Adressez-vous au tribunal », le reprendra la juge. Après avoir raconté sa garde à vue, Charles Torres, cultivé et aux mots littéraires, donne ses hypothèses sur les raisons de sa présence devant le tribunal, s’appuyant sur sa connaissance du droit, de l’histoire et sa culture politique. « Dans refus de se soumettre au prélèvement biologique, il y a refus de se soumettre », commence-t-il, « On incrimine ici ma volonté. »
Le forgeron de Roncherolles-sur-le-Vivier explique ensuite pourquoi il s’est refusé à ce prélèvement d’ADN : « Je m’oppose au fichage génétique. » Il rappelle l’historique du Fichier national automatisé des empreintes génétiques (Fnaeg) initialement mis en place en 1998 pour ficher les délinquants sexuels, donc les personnes jugées coupables par la justice. Voulant prouver le ridicule de sa présence au tribunal, il se joue de l’adage « Qui vole un œuf, vole un bœuf » : « Qui vole un œuf, viole un bœuf. »
Sans désarmer, Charles Torres continue de justifier son refus de se soumettre, rappelant l’affaire Élodie Kulik, violée puis assassinée (2002). En 2011, les gendarmes parviennent à confondre l’un de ses agresseurs grâce à l’ADN de son père déjà fiché. Le forgeron s’appuiera sur ce détournement du Fnaeg : « Aujourd’hui, donner mon ADN, c’est donner celui de mon frère jumeau, mes parents et mes descendants ». Il conclut : « L’ADN est un instrument de contrôle. » Ce quart d’heure de discours est applaudi par l’assemblée.
Contre Charles Torres, le procureur a requis une peine « d’avertissement » : un mois de prison avec sursis. Ce qui ne suffit évidemment pas à Me William Bourdon et Me Marie Dosé, avocats de la défense. Ils s’appuient sur la pauvreté du dossier entre les mains du tribunal de Rouen. « Le tribunal de grande instance de Nanterre vous a confié un dossier de misère. Ce que vous savez, c’est ce que la presse vous a dit et ce nous vous disons », argumente Me Dosé.
Au dossier, quelques procès-verbaux, parfois non datés, ou des notifications de mise en garde à vue de Charles Torres. Le tribunal n’a pas accès au dossier de l’affaire Tarnac dans lequel figurent les raisons pour lesquelles le forgeron a été soumis à une garde à vue. « On vous empêche de vérifier s’il y avait des raisons plausibles pour le détenir » et donc pour lui demander son ADN.
Et Me Dosé d’avancer : « Dans la procédure Tarnac, Charles Torres n’est rien sauf les conséquences de son refus » de se soumettre au prélèvement biologique. Dans leur plaidoirie, les deux avocats du forgeron frôlent la violation de l’instruction judiciaire, sans jamais vraiment tomber dedans. « Les policiers mentent au tribunal, il n’y avait aucune raison pour le mettre en garde à vue, vous devez sanctionner cette manipulation judiciaire », reprend Me Bourdon qui considère le dossier Charles Torres comme « un vide intersidéral ».
Le tribunal rendra son délibéré le 6 mars 2013.
L’affaire du Forgeron soulève une question de constitutionnalité
Charles Torrès est jugé pour avoir refusé de donner son ADN aux policiers de l’anti-terrorisme dans le cadre de l’affaire Tarnac. Pour aller plus loin, ses avocats ont tenté de mettre en doute la constitutionnalité du prélèvement ADN à répétition et du fichage de tout un chacun. Le délibéré sera rendu le 6 mars 2013.
Le procès de Charles Torres, s’est ouvert ce mercredi 6 janvier 2013, au tribunal de grande instance de Rouen. Il est jugé pour avoir refusé de donner son ADN lors d’une garde à vue dans le cadre de l’affaire Tarnac. Ses avocats, Me William Bourdon et Me Marie Dosé, tous les deux au dossier de l’affaire Tarnac, essaieront de poser une question prioritaire de constitutionnalité (QPC).
Entrée en vigueur en 2010, la QPC permet de mettre en doute la constitutionnalité d’une loi déjà promulguée. Elle peut être posée par n’importe quel citoyen. On la pose devant un tribunal qui décide ou non de la transmettre à la cour de cassation.
Dans l’affaire de Charles Torres, ses avocats mettent en doute la constitutionnalité de l’article 706-56 du code de procédure pénal. Cet article encadre le prélèvement de l’empreinte biologique. Pour Me Bourdon, le dossier de Charles Torres, si petit et si peu extraordinaire soit-il, permettrait « d’envoyer un message puissant aux législateurs ». L’avocat remet en question l’alinéa 4 de l’article. Cet alinéa qui permet qu’en cas de refus de prélèvement, les officiers de police judiciaire peuvent récupérer l’ADN s’il est détaché du corps. « Lorsque Charles Torres refuse de se soumettre, il ne sait pas, que dans son dos, ou plutôt dans ses cheveux, on prélèvera la particule magique », plaide Me Bourdon, « S’il avait su que les policiers de la Sdat pouvaient faire cela, il aurait pu ajuster son comportement ». Ici, l’avocat pointe du doigt la faille de la loi qui peut conduire un citoyen à s’auto-incriminer sans être en mesure de se défendre.
L’avocat parle aussi « d’un cambriolage de l’enveloppe corporelle« , qui porte atteinte au droit de chaque citoyen de disposer de son corps. Enfin, pour plaider le dépôt de cette QPC, Me Bourdon pointe le « laisser-aller, la paresse » des policiers qui ne prennent pas le temps de vérifier si la personne concernée est déjà fichée qui peuvent conduire à une succession de prélèvements ADN sur un même citoyen.
Sans compter que le tribunal de Nanterre qui s’est dessaisi en 2012 de cette affaire, a omis de prévenir le tribunal de Rouen que la justice était bien en possession de l’ADN de Charles Torres… jugé pour avoir refusé de le donner.
La procureur refuse la QPC au motif que l’article 706-56 du code de procédure pénale aura déjà été jugé constitutionnel, dans sa globalité, par la cour de cassation. Le tribunal est allé dans ce sens et a refusé de transmettre la question prioritaire de constitutionnalité. Le procès de Charles Torres a donc bien eu lieu mercredi 6 février et les débats se sont donc poursuivis pour celui qui risque 15’000 euros d’amende et un an de prison ferme.
Publié par des larbins de la maison Poulaga (Zoé Lauwereys, Grand-Rouen.com, 7 février 2013)
Rencontre avec le « Forgeron » de Tarnac
Charles Torres a été « enlevé » par la police début 2012 dans le cadre de l’affaire Tarnac. Il est soupçonné, à ce moment là, d’être complice du sabotage de caténaires en 2008. Aucun fait n’aura été retenu contre lui. Pourtant, il est jugé mercredi 6 février 2013 au tribunal de grande instance de Rouen pour avoir refusé son ADN au moment de la perquisition.
Nous l’avons rencontré la veille de son procès pour refus de prélèvement génétique du 6 février 2013 au tribunal d’instance de Rouen. Avec son pull marin, ses cheveux en bataille, sa moustache et sa chevalière rehaussée d’une pierre blanche, il nous rejoint à la Conjuration des Fourneaux au 149 rue Saint-Hilaire. Le restaurant soutient Charles dans ses déboires judiciaires. Il nous raconte ces trente heures de garde à vue pendant lesquelles il a refusé de parler.
Ce matin du 23 février 2012, Charles Torres dort dans sa chambre, chez ses parents, à Roncherolles-sur-le-Vivier, près de Darnétal. À 28 ans, il y revient de temps en temps pour travailler. Son père, monteur en bronze, lui a installé dans son atelier, une forge pour qu’il puisse exercer son activité d’auto-entrepreneur forgeron. Il est 8 heures du matin quand une trentaine de policier de la sous-direction de l’anti-terrorisme (Sdat) frappe à la porte. « On a eu de la chance, il n’était pas 6 heures du matin et ils n’ont pas défoncé la porte », ironise celui que la presse surnommera le Forgeron dans l’affaire dite « de Tarnac ». Ce matin-là, les policiers de l’anti-terrorisme viennent perquisitionner. Ils pensent avoir trouvé celui qui a fabriqué les crochets en fer à béton responsables du sabotage de caténaires de la SNCF en 2008.
Pour ces faits, qui deviennent très vite l’affaire de Tarnac, dix personnes ont été mises en examen, pour « association de malfaiteurs en relation avec une entreprise terroriste » et « dégradations en réunion en relation avec une entreprise terroriste ». Les principaux accusés dans cette affaire sont Julien Coupat et sa compagne Yldune Lévy. Le rapport entre Tarnac et Charles Torres ? Ce dernier se l’explique facilement. « Je suis colocataire dans une maison, rue de Constantine, à Rouen, où plusieurs habitants, ont été mis en examen en 2008. Mais je n’étais même pas un des potes de Julien Coupat. Tarnac ce n’est même pas une bande de copains. Concrètement, on me soupçonnait d’avoir un comportement plus ou moins subversif d’un point de vue politique. » Charles avoue même ne pas connaître vraiment le dossier Tarnac, seulement ce que les mis en examen lui auront dit et ce qu’il aura lu dans les journaux. Il délivre son analyse : « Tarnac est devenu un groupe suite aux accusations. Il a fallu donner un cadre, d’où le nom. Ce qui fait que tu es dans le dossier ou pas, c’est ta place dans le scénario de la police. »
Quatre ans après le début de l’affaire de Tarnac, devenu au fil des années un bourbier judiciaire, la Sdat pense donc avoir trouvé un nouveau complice du sabotage. Ce 23 février 2012, « des flics de haut-vol » fouillent donc la maison des parents du forgeron après lui avoir signifié sa mise en garde à vue. Une garde à vue qui durera 35 heures. La perquisition aura fait beaucoup rire Charles qui avoue avoir eu « envie de plaisanter » mais s’être retenu par « peur qu’ils me prennent au premier degré ». « Ils ont fouillé toute la maison, ont retourné ma chambre, ont scruté mes bouquins, mon bureau, mes affaires de fac. Mais ils n’ont rien saisi dans ma chambre », se rappelle-t-il. « Pour prouver l’association de malfaiteurs et me lier aux mis en examen de Tarnac, ils ont saisi de vieux téléphones portables. » Rien non plus n’aura été saisi dans la forgerie, pourtant l’endroit le plus à même de receler des indices du sabotage. Et pourquoi pas quatre ans plus tard ? Charles se rappelle d’un détail qu’il raconte goguenard. « Dans la chambre de mon frère, ils ont trouvé deux cagoules trois trous. Elles avaient été utilisées pour l’enterrement de vie de garçon d’un copain », rit-il encore.
Charles Torres préférait ne pas être pris en photo.
La perquisition terminée, les policiers le menottent et l’emmènent « à 200 kilomètres/heure » à Levallois-Perret, dans les Hauts-de-Seine. Avant d’atteindre le siège de la Sdat, il rapporte avoir eu les yeux cachés par un masque de sommeil. « Là, j’ai senti que l’on descendait de cinq étages sous terre. Arrivés dans les locaux, on est passés de sas de sécurité en sas de sécurité »… jusqu’à la salle de garde à vue. Pendant ces 30 heures de garde à vue, Charles refusera de répondre aux questions : « J’ai décliné mon état-civil, sinon j’ai répondu des blagues ». La meilleure solution pour quelqu’un qui ne sait pas ce qu’on lui reproche, mis à part la vague « association de malfaiteurs ». « Ils n’avaient rien pour me mettre en garde-à-vue, il n’était pas question pour moi de leur donner de quoi me mettre en examen ». L’ancien étudiant en histoire se rappelle de quelques questions posées par la police. « Ils m’ont demandé ce que je pensais de la société capitaliste marchande ou quelles étaient mes opinions politiques », évoque-t-il. En lui présentant des photos des crochets utilisés pour saboter les caténaires, on lui aura même demandé s’il les avait fabriqués. Charles répondra avec l’ironie qui lui semble chère : « Vous m’amenez le modèle et je vous fais un devis ».
En fin de garde à vue, on lui demandera de donner son ADN, justifié par « des motifs graves ou concordants » dans l’affaire pour laquelle il était entendu. Chose qu’il refusera. Par conviction. « Je n’ai pas envie de faire partie d’un fichier ADN des catégories politiques », affirme-t-il. Pour lutter contre le « flicage », il refuse aussi d’avoir un téléphone ou une carte bancaire. Ce qu’il ne sait pas, à ce moment-là, c’est que la police a pris soin de nettoyer de fond en comble la salle de garde à vue, revèle Laurent Borredon, dans Le Monde du mardi 5 février 2013 : « Ce matin-là, les policiers ont nettoyé à fond les locaux de garde à vue, à l’aide d’une solution hydroalcoolique. Le bureau et le sol. Dans quelques instants, Charles Torrès va être entendu pour la quatrième fois. Les policiers souhaitent récupérer son ADN et il faut que tout soit immaculé. » Selon Le Monde qui s’est procuré le procès-verbal de la garde à vue, Charles fait bien en sorte ce jour-là de consommer « sa brique de jus d’orange sans en utiliser la paille » puis d’en « laver soigneusement l’extérieur, de sorte à n’y laisser aucune trace biologique. » Charles aura aussi mangé sans utiliser de couverts, « directement au moyen de ses doigts », pour être sûr de ne laisser aucune trace. Les policiers récupèrent tout de même quelques cheveux sur le sol du local où il était interrogé.
L’absurde du procès du mercredi 6 février 2013 ? La justice est en possession de l’ADN de Charles Torres mais on lui reproche de ne pas avoir voulu le donner. Il risque 15’000 euros d’amende et un an de prison ferme. Sur son blog, il appelle ses soutiens à « venir rire » au TGI de Rouen à 13h30, « parce qu’on ne peut que se réjouir de chaque humiliation que l’antiterrorisme s’inflige à lui-même ».
Publié par des larbins de la maison Poulaga (Zoé Lauwereys, Grand-Rouen.com, 6 février 2013)
Tarnac : un homme jugé pour refus de donner son ADN, déjà prélevé à son insu
Les policiers de la sous-direction antiterroriste (SDAT) de la police judiciaire n’ont pas peur de la contradiction. Le 24 février 2012, à 11h15, ils ont recueilli l’ADN de Charles Torrès, 28 ans, à son insu. Puis, à 11h35, ils ont lancé une procédure contre le jeune homme gardé à vue dans le cadre de l’affaire de Tarnac pour… refus de prélèvement génétique. Charles Torrès doit être jugé, mercredi 6 février, par le tribunal correctionnel de Rouen. Il risque, au maximum, un an de prison et 15’000 euros d’amende. À la suite de sa garde à vue, il avait été relâché sans charge, mais cela n’empêche pas d’être dans l’obligation de laisser son ADN. Il suffit qu’existent des “indices graves ou concordants” contre la personne entendue, indique le code de procédure pénale.
Ce matin-là, les policiers ont nettoyé à fond les locaux de garde à vue, à l’aide d’une solution hydroalcoolique. Le bureau et le sol. Dans quelques instants, Charles Torrès va être entendu pour la quatrième fois. Les policiers souhaitent récupérer son ADN et il faut que tout soit immaculé. Les enquêteurs veulent vérifier si le jeune homme, interpellé la veille près de Rouen, n’a pas forgé les crochets qui ont servi à saboter des lignes de TGV, à l’automne 2008.
“DÉLOYAUTÉ”
Charles Torrès est aussi prudent que les policiers sont méticuleux : il a “consommé sa brique de jus d’orange sans en utiliser la paille, puis en [a] soigneusement lavé l’extérieur, de sorte à n’y laisser aucune trace biologique (…). À l’heure du déjeuner, il a été constaté qu’il mangeait sans utiliser de couverts, directement au moyen de ses doigts”, note le lieutenant de la SDAT, dans son procès-verbal, que Le Monde a pu consulter.
Mais le stratagème réussit : les hommes de la police technique et scientifique parviennent à récupérer “les prélèvements de traces de contact” là où il “a apposé ses mains”. Encore mieux, “à l’aplomb du siège où [il] s’est assis, des cheveux jonchent le sol”. Précis, le policier indique “que la présence de ces cheveux au sol résulte de la propension qu’a manifestée Charles Torrès à se passer (nerveusement) les mains dans les cheveux”. Trente heures de garde à vue dans les locaux de la SDAT, c’est un peu stressant…
Comment justifier une procédure pour refus de prélèvement d’ADN quand on vient de le recueillir ? En faisant comme si de rien n’était : le procureur qui poursuit puis les magistrats qui vont juger le dossier “ADN” n’ont accès qu’aux pièces du dossier Tarnac que la SDAT veut bien leur transmettre. Le PV de recueil de traces génétiques a été opportunément exclu. Au contraire, une enquêtrice justifie la procédure en assurant que le prélèvement demandé à Charles Torrès “aurait utilement permis de déterminer le profil génétique de l’intéressé aux fins de comparaison avec les empreintes génétiques à ce jour non identifiées”.
“Il s’agit d’un symptôme de plus de la déloyauté qui contamine tout le dossier”, estime Me William Bourdon, l’un des avocats de Charles Torrès. Il souhaite déposer une question prioritaire de constitutionnalité, mercredi. Pour lui, les articles de loi sur les prélèvements d’ADN sont “défaillants” face au principe de libre disposition de son corps : l’officier de police judiciaire n’a pas d’obligation d’informer qu’il peut y avoir un prélèvement clandestin, puis que ce prélèvement a eu lieu — ce qui interdit tout recours — et, enfin, il n’est pas obligé de vérifier que le gardé à vue est déjà fiché, avec le risque d’une multiplication des prélèvements.
Et la comparaison des empreintes génétiques ? Au final, elle n’a rien donné.
Publié par des larbins de la maison Poulaga (Laurent Borredon, LeMonde.fr, 5-6 février 2013)
Pourquoi j’ai refusé de livrer mon ADN
Le 6 février 2013, Charles Torres comparaît au tribunal de Rouen pour avoir refusé le prélèvement de son ADN lors d’une garde à vue de 35 heures début 2012. Forgeron, on le soupçonnait de complicité dans l’affaire de Tarnac et d’avoir fabriqué les crochets qui servirent à bloquer des TGV en 2008.
Le 23 février 2012, je fis bien malgré moi une entrée fracassante dans l’affaire dite « de Tarnac ». Une escouade de policiers de la Sous-Direction antiterroriste (SDAT), avec à leur tête le médiatique juge Fragnoli, vint me sortir du lit de bon matin. Bien qu’habitant la Seine-Maritime, je devins ce jour-là « le forgeron de Tarnac ». À défaut de pouvoir établir le moindre lien entre les mis en examen et les fameux crochets, le juge voulait à toute force insinuer un lien entre eux et quelqu’un qui aurait pu les fabriquer. Je fus donc, avec mon père de 86 ans, soupçonné le temps d’une garde à vue d’avoir confectionné les crochets qui servirent à bloquer des TGV une nuit de novembre 2008.
On sait que le storytelling antiterroriste ne s’embarrasse guère de la vraisemblance, et les différents articles parus dans la presse lors de mon arrestation le reproduisirent fidèlement. Il n’y eut d’ailleurs à peu près personne pour mentionner le fait que je fus libéré au bout de 35 heures sans la moindre charge ; et ni le juge ni les policiers ne me présentèrent leurs excuses pour m’avoir ainsi kidnappé sans raison valable. Faute d’excuses, je pensais qu’ils auraient à cœur de se faire oublier pour ces 35 heures de séquestration légale. Sur ce point, c’est bien moi qui me suis trompé.
Comme je le précisais plus haut, des amis harcelés par l’antiterrorisme, j’en ai quelques-uns, à Rouen comme à Tarnac. Je lis la presse aussi. De ce fait, je sais comme tout un chacun que tout ce que l’on peut déclarer dans une garde à vue a vocation à être déformé et utilisé contre vous. Je réservais donc mes réponses aux questions des policiers sur mes idées politiques au juge en charge de l’enquête. Malheureusement, il ne crut pas bon de me recevoir. Quelques jours plus tard, je fis tout de même l’effort de lui écrire afin de ne laisser aucun doute quant à l’erreur manifeste que représentait mon arrestation. Le jour même où cette missive devait paraître, le juge, qui allait être dessaisi, la recouvrit de l’annonce de son autodessaisissement. Il fit ainsi d’une pierre deux coups, et la missive ne parut jamais.
Pas plus que je n’avais de raison d’être en garde à vue à Levallois-Perret, n’avais-je de raison de livrer mon ADN à la police, qui de toute façon alla le récupérer lamentablement sous la forme d’un cheveu laissé sur le sol d’une salle d’interrogatoire. Je refusai donc. Faut pas pousser.
Mais refuser de donner son ADN est un délit, en soi. C’est-à-dire que même lorsque l’on vous l’a pris malgré vous, qu’on l’a analysé, qu’il vous a dédouané et que vous êtes à l’évidence lavé des soupçons qui avaient justifié qu’on vous le demande, vous êtes encore et toujours coupable d’avoir refusé. C’est cela la loi sur l’ADN, et c’est pour cela que je comparaîtrai au tribunal de Rouen ce mercredi 6 février.
De prime abord, on pourrait penser que je suis, ici, victime de l’un des effets pervers d’une loi mal formulée et qu’il suffirait d’un peu de bon sens pour que tout rentre dans l’ordre. C’est tout le contraire que mon procès révèle.
On peut ainsi remettre en question l’efficacité de l’ADN, et la mystification qui consiste à corréler une trace souvent partielle avec un acte. On peut évoquer ce professeur d’EPS récemment accusé d’avoir tiré sur la police à Amiens car son ADN avait été retrouvé sur une arme : il avait eu le malheur de revendre sa voiture à quelqu’un du quartier insurgé longtemps auparavant. Coup de chance, il put prouver qu’il était en Bretagne la nuit des tirs. On peut avancer le cas de cette chimiste assermentée de Boston, Annie Dookhan, qui par zèle a bidonné, des années durant, ses « expertises », ce qui aboutit à la remise en cause de dizaines de milliers de condamnations dans le Massachusetts. On peut faire valoir que les traces génétiques que partout nous déposons se mêlent et s’entrelacent avec toutes celles de tous ceux que nous croisons, que nous aimons. Que l’existence est toujours collective et qu’aucune analyse génétique ne permettra jamais de décrypter le monde tel qu’il est vécu.
On peut tout autant s’indigner du fait que ce qui fut initialement vendu comme le « fichier des violeurs » comporte aujourd’hui plus de 2 millions d’identifications. On peut même tomber des nues en lisant dans Le Monde du 21 février 2012 que désormais la police, grâce à un « vide juridique », détourne les garde-fous du FNAEG pour retrouver des gens grâce à l’ADN de leurs parents (ce qui fait évidemment exploser le nombre de personnes effectivement fichées à des dizaines de millions).
…
Les invités de Mediapart, 5 février 2013
Posted on 9 février 2013 by juralib
Find this story at 9 February 2013
Did US spies hack French government computers using Facebook?24 januari 2013
A sophisticated computer virus discovered at the center of the French government’s secure computer network was planted there by the United States, according to unnamed sources inside France’s intelligence community. Paris-based magazine L’Express, France’s version of Time magazine, says in its current issue that the alleged American cyberattack took place shortly before last April’s Presidential elections in France. It resulted in the infection of the entire computer system in the Palais de l’Élysée, which is the official residence of the President of France. The French magazine cites unnamed sources inside the French Network and Information Security Agency (ANSSI), which is responsible for cybersecurity throughout France. The sources claim that the snooping virus allowed its handlers to gain access to the computers of most senior French Presidential aides and advisers during the final weeks of the administration of French President Nicolas Sarkozy, including his Chief of Staff, Xavier Musca. The article claims that the virus used a source code nearly identical to that of Flame, a super-sophisticated version of Stuxnet, the virus unleashed a few years ago against the computer infrastructure of the Iranian nuclear energy program. Many cybersecurity analysts believe that the US and Israel were instrumental in designing both Stuxnet and Flame. IntelNews understands that the alleged virus was initially directed at employees of the Palais de l’Élysée through Facebook. The targets were allegedly befriended by fake Facebook profile accounts handled by the team that operated the virus. The targets were then sent phishing emails that contained links to phony copies of the login page for the Palais de l’Élysée intranet website. Though that bogus website the hackers acquired username and password data of several Palais de l’Élysée staffers, which they subsequently used to gain access to the Presidential Palace’s computer system. Assuming that the virus planted on the Palais de l’Élysée intranet was similar to Flame in method and scope, it can be inferred that its handlers were able to spy on conversations taking place at the Palais using the infected computers’ audiovisual peripherals, as well as log keystrokes and acquire screen shots at regular intervals. The collected data was then routed through a host of different servers on five continents before reaching the hackers.
…
November 22, 2012 by Joseph Fitsanakis 6 Comments
By JOSEPH FITSANAKIS | intelNews.org |
Find this story at 22 November 2012
Cyberguerre: comment les Américains ont piraté l’Élysée24 januari 2013
EXCLUSIF. En mai, l’équipe de Nicolas Sarkozy a été victime d’une opération d’espionnage informatique hypersophistiquée. Les sources de L’Express concordent : le coup vient de… l’ami américain. Révélations sur une attaque qui s’inscrit dans une bataille planétaire.
CYBERGUERRE – Les intrus qui se sont introduits dans les réseaux informatiques de l’Elysée en mai dernier ont subtilisé des notes secrètes et des plans stratégiques à partir des ordinateurs de proches conseillers de Nicolas Sarkozy.
DR
C’est l’un des hold-up les plus audacieux réalisés contre l’Etat français. En mai dernier, quelques jours avant le second tour de l’élection présidentielle, des pirates ont réussi à s’introduire dans les réseaux informatiques de l’Elysée. Révélée par le quotidien régional Le Télégramme, cette intrusion avait alors été soigneusement étouffée par le Château. Une omerta qui, jusqu’à présent, n’avait pas été brisée. Aucune information n’avait filtré sur la nature des agresseurs, ou même sur le préjudice subi. Pourtant, l’affaire est grave, d’autant qu’elle constituerait une cyberattaque sans précédent entre pays alliés.
L’Express peut révéler que les intrus ont non seulement réussi à pénétrer au coeur même du pouvoir politique français, mais qu’ils ont pu fouiller les ordinateurs des proches conseillers de Nicolas Sarkozy. Des notes secrètes ont été récupérées sur des disques durs, mais aussi des plans stratégiques. Du vrai travail de pro, digne du dernier James Bond, Skyfall. Et, comme souvent dans ce type d’attaque, une négligence humaine est à l’origine de la catastrophe.
L’ordinateur du secrétaire général de l’Elysée pillé
Tout a commencé sur Facebook. Les assaillants ont d’abord identifié, sur le réseau social, le profil de personnes travaillant au palais présidentiel. Se faisant passer pour des amis, ils les ont ensuite invitées, par un message électronique, à se connecter sur l’intranet du Château. Sauf que ce lien menait à une fausse page Web – une réplique de celle de l’Elysée. Les victimes n’y ont vu que du feu ; et lorsque est apparu, à l’écran, un message leur demandant leur identifiant et leur mot de passe, elles les ont donnés en toute bonne foi. Une technique bien connue des hackers, qui leur a permis de récupérer les clefs numériques pour s’inviter en toute quiétude dans le saint des saints.
Une fois à l’intérieur, les pirates ont installé un logiciel espion qui s’est propagé d’un ordinateur à l’autre. Très élaboré, ce “ver” n’a infecté que quelques machines. Et pas n’importe lesquelles : celles des conseillers les plus influents du gouvernement… et du secrétaire général, Xavier Musca. Nicolas Sarkozy y a, lui, échappé. Et pour cause, il ne possédait pas de PC. Malheureusement pour les assaillants, le code malveillant a laissé des empreintes. “Telles des marionnettes actionnées par des fils invisibles, les machines infectées communiquent avec leur maître pour prendre leurs ordres, décrypte un expert, Olivier Caleff, responsable sécurité du Cert-Devoteam, une société de sécurité informatique. Lorsque l’on essaie de remonter ces fils sur Internet, on arrive souvent sur des serveurs situés à l’étranger.”
C’est ce travail de fourmi qu’ont mené les enquêteurs français. Le degré de sophistication de l’attaque était tel que les suspects se limitaient, d’emblée, à une poignée de pays. Pour preuve, le cyberpompier de l’Etat, l’Agence nationale de la sécurité des systèmes d’information (Anssi), a mis plusieurs jours pour restaurer le réseau de l’Elysée. Difficile de trouver l’origine de l’offensive. Souvent, les assaillants brouillent les pistes en passant par des pays tiers. Autant de rebonds, sur des serveurs situés sur les cinq continents, qui rendent ce fil d’Ariane très compliqué à suivre, même pour les “cyberdétectives” de l’Etat mobilisés pour l’occasion. Mais, selon les informations recueillies par L’Express auprès de plusieurs sources, leurs conclusions, fondées sur un faisceau de présomptions, convergent vers le plus vieil allié de la France : les Etats-Unis.
Le virus porte la marque de son auteur
Le code malveillant utilisé affiche, en effet, les mêmes fonctionnalités qu’un ver informatique extrêmement puissant, baptisé Flame, identifié à la fin du mois de mai par une grande société russe d’antivirus, Kaspersky. “Très perfectionné, il peut collecter les fichiers présents sur une ma-chine, réaliser des captures d’écran et même activer le microphone d’un PC pour enregistrer les conversations, expli-que Vitaly Kamluk, spécialiste du sujet chez cet éditeur. Sa conception a demandé beaucoup d’argent et des moyens humains que seul un grand pays est en mesure de mobiliser.” Ou même deux : selon la presse anglo-saxonne, le ver aurait été créé par une équipe américano-israélienne, car il devait viser initialement des pays du Moyen-Orient (Iran, Egypte). Autre élément à charge : tel un peintre reconnaissable à son trait, un virus porte les marques du savoir-faire de son auteur. Janet Napolitano, secrétaire d’Etat à la Sécurité intérieure de l’administration Obama, n’a ni confirmé ni démenti nos informations.
Contactés à ce sujet, ni l’Anssi ni l’Elysée n’ont souhaité faire de commentaires. Reste une question. Pourquoi un allié de la France lancerait-il une telle opération ? “Vous pouvez être en très bons termes avec un “pays ami” et vouloir, en même temps, vous assurer de son soutien indéfectible, surtout dans une période de transition politique”, note un proche du dossier, sous le couvert de l’anonymat. Sans compter que l’Elysée joue un rôle clef dans la signature de grands contrats avec des pays étrangers, notamment au Moyen-Orient. “C’était encore plus vrai à l’époque de Nicolas Sarkozy”, rappelle Nicolas Arpagian, directeur scientifique du cycle sécurité numérique à l’Institut national des hautes études de la sécurité et de la justice.
Un instantané des cyberattaques en cours…
HoneyMap réalisé par Honeynet Project
Quitte à être espionné, sans doute vaut-il mieux l’être par un allié… “Nous avons de grands partenaires avec lesquels nous collaborons et entretenons des relations de confiance, et d’autres avec qui nous ne partageons pas les mêmes valeurs”, rappelle le contre-amiral Arnaud Coustillière, responsable du volet militaire de la cyberdéfense française. Il n’empêche, l’attitude de l’administration Obama suscite de nombreuses interrogations.
Vers des attaques “pires que le 11 Septembre” ?
Dans une version du livre blanc sur la défense, actuellement en cours de rédaction, des auteurs ont soulevé les ambiguïtés de Washington. “Face à la difficulté d’utiliser les voies de droit, [les Etats-Unis] ont recours de plus en plus à l’action clandestine, ce qui peut poser une question de contrôle démocratique.”
Ironie du sort, le Congrès américain vient, le 14 novembre, de publier un rapport accablant sur l'”acteur le plus menaçant du cyberespace”, à savoir… la Chine. Leon Panetta, secrétaire d’Etat à la Défense, a même déclaré récemment que, par leur puissance numérique, “certains pays” seraient, d’ores et déjà, capables de provoquer un “cyber-Pearl Harbor” : “Ce serait pire que le 11 Septembre ! Des assaillants pourraient faire dérailler un train de voyageurs ou un convoi de produits chimiques dangereux. Ou, encore, contaminer les systèmes d’eau des grandes villes ou éteindre une grande partie du réseau électrique.” Le tout en se cachant derrière des écrans d’ordinateurs situés à des milliers de kilomètres…
Dans le monde virtuel, tous les coups sont permis
Leon Panetta sait de quoi il parle. L’Oncle Sam a déjà utilisé ces moyens. C’était en 2010, lors de l’opération “Jeux olympiques”, lancée conjointement avec Israël contre l’Iran. Leur logiciel Stuxnet aurait endommagé un grand nombre des centrifugeuses utilisées par Téhéran pour enrichir de l’uranium. Spectaculaire, cette opération ne doit pas faire oublier que d’autres nations oeuvrent dans l’ombre. Dans le plus grand secret, de nombreux pays, démocratiques ou non, fourbissent leurs armes numériques. Des forces secrètes se constituent, des mercenaires vendent leurs services aux plus offrants. Sans foi ni loi. La Toile n’est pas un champ de bataille comme les autres. Oubliez les codes de l’honneur, les conventions internationales ou les alliances. Tous les coups sont permis. Et mieux vaut avoir les moyens de se battre. Dans le cyberespace, personne ne vous entendra crier.
Pour s’en convaincre, il suffit de se rendre au quartier général de l’Otan, à Bruxelles. Tou-tes les nuits, vers 1 heure, c’est le même rituel, explique l’un des responsables européens de la sécurité au sein de l’organisation. “Sur une carte, à l’écran, on voit des dizaines de lumières s’allumer en Chine, explique-t-il. Ce sont les hackers qui, le matin, lancent des attaques lorsqu’ils arrivent au boulot. Et, le soir, elles s’éteignent quand ils rentrent chez eux.” Même constat d’un proche de la NSA, l’agence de renseignement des Etats-Unis : “Parfois, nous enregistrons une baisse sensible des tentatives d’intrusion sur nos sites, témoigne-t-il. Invariablement, cela correspond à des jours fériés en Chine.” Mais l’image d’une “superagence” où des armées de pirates travailleraient en batterie pour ravir les secrets de l’Occident ne reflète pas la réalité. Selon ce même agent, “leur capacité offensive est beaucoup moins centralisée qu’on pourrait l’imaginer. De nombreuses régions ont mis en place leur propre dispositif, qui dépend du bureau politique local. Et il n’est pas rare que ces factions se combattent entre elles.”
Coût d’une attaque : quelques centaines de milliers d’euros
Un hacker, qui souhaite rester anonyme, pense, lui aussi, que l’on surestime un peu le “cyberpéril jaune”. “J’ai eu l’occasion de voir travailler les Chinois, ce ne sont pas les plus affûtés, dit-il. Leurs techniques sont assez rudimentaires par rapport à celles des Américains ou des Israéliens…”
REUTERS/Minoru Iwasaki/Pool
“Les questions de sécurité alimentaire, d’énergie et de cybersécurité deviennent plus aiguës”
Hu Jintao, secrétaire général du Parti communiste chinois, novembre 2012.
A chaque pays sa spécificité. En Russie, le dispositif d’attaque est opaque. De nombreux spécialistes occidentaux du renseignement soupçonnent l’existence d’une relation triangulaire entre l’Etat, la mafia et certaines sociétés de conseil informatique qui seraient le bras armé du Kremlin. “Avez-vous déjà vu, en Russie, un hacker avoir des problèmes avec la police ? questionne Garry Kasparov, ancien champion du monde d’échecs, aujourd’hui l’un des opposants au président Poutine. Non, parce que l’on sait qui se trouve aux manettes, dans l’ombre…”
Contrairement à ce que l’on pourrait croire, les Européens ne sont pas en reste. La France, c’est une surprise, dispose d’une force de frappe numérique. Mais on trouve aussi, sur l’échiquier mondial, des Etats moins avancés sur le plan technique, tels l’Iran et la Corée du Nord. Nul besoin, en effet, d’investir dans des infrastructures coûteuses. Il suffit d’un ordinateur, d’un accès à Internet et de quelques centaines de milliers d’euros pour monter une attaque. Car sur la Toile, comme dans la vraie guerre, on trouve toutes sortes d’armes sur le marché. Il suffit de frapper aux bonnes portes. Au lieu d’une kalachnikov, on repartira avec un logiciel malveillant (malware, dans le jargon) qui permettra de prendre le contrôle d’un système ennemi. La première motivation : “Faire du business !”
“C’est un enjeu de domination. En maîtrisant l’information, on contrôle tout”, résume Jonathan Brossard. Ce hacker français renommé intervient aujourd’hui dans des groupes internationaux.
Son job consiste à s’introduire dans les systèmes informatiques pour en révéler les failles – et trouver des parades. Pour lui, les risques d’un cyberconflit existent, mais ils masquent une autre motivation, bien plus puissante : “Faire du business ! Etre capable de griller un réseau électrique, c’est bien, mais le véritable enjeu, c’est surtout de gagner des parts de marché.” Connaître, dans le détail, la proposition d’un concurrent, lors d’un gros appel d’offres, donne un avantage décisif. Pour l’avoir négligé, certaines sociétés ont péri. Des pirates – chinois semble-t-il – ont pillé les secrets du géant canadien des télécoms Nortel pendant près de dix ans, au point de l’acculer à la faillite. De tels exemples abondent.
Et la France n’est, malheureusement, pas épargnée. Les grandes entreprises du CAC 40 compteraient même parmi les plus vulnérables d’Europe. Sur ce nouveau champ de bataille invisible, on ne compte pas les morts, mais les points de PIB perdus. Et, derrière, sans doute des emplois par milliers.
Batailles de virus
STUXNET
Découverte : juin 2010.
Cible : ce logiciel a détruit des milliers de centrifugeuses nucléaires, en Iran.
Origine supposée : opération “Jeux olympiques”, menée par les Etats-Unis et Israël.
DUQU
Découverte : septembre 2011.
Cible : lié à Stuxnet, ce ver informatique a servi à espionner le programme nucléaire iranien.
Origine supposée : Etats-Unis et Israël.
MAHDI
Découverte : février 2012.
Cible : capable d’enregistrer les frappes sur un clavier et les photos et textes d’un ordinateur, Mahdi a été retrouvé en Iran, en Afghanistan et en Israël.
Origine supposée : inconnue.
WIPER
Découverte : avril 2012.Cible : ce virus fait disparaître les données des disques durs des ordinateurs infectés. Il a touché des compagnies pétrolières iraniennes.
Origine supposée : inconnue.
FLAME
Découverte : mai 2012.
Cible : ce logiciel très sophistiqué aurait espionné depuis 2007 plusieurs pays, dont l’Iran, la Syrie, le Soudan, ou encore l’Arabie saoudite.
Origine supposée : opération des Etats-Unis et d’Israël.
GAUSS
Découverte : juin 2012.
Cible : capable d’espionner les transactions financières et messages électroniques, ce virus s’est répandu au Liban, en Israël et en Palestine.
Origine supposée : inconnue.
SHAMOON
Découverte : août 2012.
Cible : les ordinateurs des compagnies pétrolières saoudiennes Aramco et RasGas au Qatar ont été attaqués par ce virus.
Origine revendiquée : groupe de hackers appelé “Glaive tranchant de la justice”, peut-être d’origine iranienne.
La réaction de l’ambassade des Etats-Unis à Paris
Nous réfutons catégoriquement les allégations de sources non-identifiées, parues dans un article de l’Express, selon lesquelles le gouvernement des Etats-Unis d’Amérique aurait participé à une cyberattaque contre le gouvernement français. La France est l’un de nos meilleurs alliés. Notre coopération est remarquable dans les domaines du renseignement, du maintien de l’ordre et de la cyberdéfense. Elle n’a jamais été aussi bonne et demeure essentielle pour mener à bien notre lutte commune contre la menace extrémiste.
Mitchell Moss, porte-parole de l’ambassade des Etats-Unis à Paris
REUTERS/Larry Downing
“La cybermenace est l’un des plus sérieux défis auxquels nous soyons confrontés en tant que nation”
Barack Obama, président des Etats-Unis, mai 2009.
REUTERS/Neil Hall
“Nous consacrerons un budget de plus d’un demi-milliard de livres [626 millions d’euros] à la cybersécurité”
David Cameron, Premier ministre britannique, octobre 2010.
REUTERS/Thomas Peter
“Les attaques cybernétiques sont aussi dangereuses que la guerre conventionnelle”
Angela Merkel, chancelière allemande, avril 2011.
Par Charles Haquet et Emmanuel Paquette (L’Express) – publié le 20/11/2012 à 15:31
Find this story at 20 November 2012
© Groupe Express-Roularta
Israeli arms companies forced to pull out of major aerospace convention in France16 december 2012
Elbit Systems and , two Israeli arms companies thatassist Israel with the construction of its apartheid wall and supply drones to the Israeli military, have pulled out of a major international aerospace industry convention in Toulouse, in southern France, following a campaign led by BDS Sud-Ouest.
The two military companies participated in the 2010 Aeromart Business Convention and had been listed as participant’s in this year’s convention, which started on 4 December. But in the wake of a 60-strong demonstration outside the convention center on its opening morning, event organizers announced that Elbit Systems and IAI had “at the last moment decided not to participate in the event.” The companies were worried about the damage to their reputation and further demonstrations taking place during the convention, according to information recieved by campaigners.
The campaign against the appearance of Israeli companies at the convention began in February, originally targetting local government bodies involved in the convention, and recieved radio and TV coverage.
In its report Precisely Wrong, Human Rights Watch detailed the use of drones provided by Elbit Systems and IAI in the killing of civilians during the 2008-09 Gaza massacre. Armaments provided by the two companies were surely used during Israel’s latest assault on Gaza. In its promotional materials, Elbit Systems boasts that its drones are “field tested,” by which it means that their deadly power has been demonstrated on Palestinian civilians.
Several European financial institutions including the Norwegian state pension fund, Danske Bank and ABP have divested from Elbit Systems. Slowly but surely, theboycott, divestment and sanctions (BDS) movement is showing that there is a price to pay for being part of Israel’s military machine.
52 public figures including Nobel prize winners, artists, writers and academics issued a call for a military embargo on Israel in the wake of the attack on Gaza last month (full text here). The Palestinian BDS National Committee launched a campaign for a military embargo on Israel on 9 July 2011.
Posted on December 11, 2012 by Michael Deas at Electronic Intifada
Find this story at 11 December 2012
Renault prepared for staff suicides over spying scandal7 december 2012
More than a year after French carmaker Renault found itself embroiled in an industrial espionage scandal, new documents show that the company had prepared statements in the event that the three employees blamed in the case committed suicide.
More than one year ago, French carmaker Renault found itself embroiled in a high-profile industrial espionage scandal. Three executives were fired, but the case turned out to be bogus, and in a desperate attempt to put the whole sordid affair behind them, the company issued a public apology to its former employees.
It appears, however, that the story is far from over. New documents have emerged showing that Renault had prepared statements in the event that the scandal drove the three employees concerned to kill themselves.
Executives Michel Balthazard, Bertrand Rochette and Mathieu Tenenbaum were dismissed from Renault in January of last year on suspicions that they had leaked information on the company’s electric cars to rivals. Although wrongly accused, the three found themselves at the heart of a very public scandal, with little recourse to defend themselves.Renault espionage scandal
AUTO INDUSTRY
Renault loses No. 2 man over industrial spying scandal
AUTO INDUSTRY
Renault apologises over spying claim
France
Renault braces for backlash in industrial spying case
Apparently aware of the possible consequences, Renault’s communications director took action. Two statements were prepared in the event of the “inevitable” – one for a botched suicide attempt, the other for a successful one.
Strain on executives
The documents, which French radio station France Info published on their website Friday, showed that Renault was not only fully aware that the strain of the situation might drive its employees to suicide, but also its apparent acceptance of what it saw as a certainty.
Written in dry, clinical terms, the two statements varied little in their content. The first, which was to be issued in the event of “option 1”, in other words a failed suicide attempt, read: “One of the three executives laid off on January 3, 2011, attempted to end his life on (date).”
The second, or “option 2”, was only slightly modified: “One of the three executives laid off on January 3, 2011, ended his life on (date).”
The statement then went on to convey the company’s regret over the tragic incident.
…
Latest update: 13/10/2012
By Luke BROWN (video)
FRANCE 24 (text)
Find this Story at 13 October 2012
© 2006 – 2012 Copyright FRANCE 24. All rights reserved – FRANCE 24 is not responsible for the content of external websites.
Toulouse gunman: French ‘stopped tracking’ Mohamed Merah26 oktober 2012
French secret services stopped tracking Toulouse gunman Mohamed Merah, despite evidence of his extensive links to jihadists, including in the UK, leaked documents suggest.
Le Monde newspaper says it has seen notes from the domestic intelligence agency DCRI describing his successful efforts to conceal his movements.
The judge investigating the case said he was perplexed by the DCRI decision.
Merah killed seven people in March before being shot dead by police.
The victims included three soldiers and four Jewish people.
The leaked papers suggest there was more than just suspicion on the part of the French intelligence services, says the BBC’s Christian Fraser in Paris.
Merah had been tracked by the security services since 2006.
Profile issue
The report prepared for the French government and leaked to Le Monde cites a DCRI officer raising concerns about the man in March 2011.
The officer said Merah rarely left his home and was paranoid and suspicious. He had no internet in his flat, did not appear to have a mobile phone and always used public telephone booths.
Another note, on 26 April 2011, reported that Merah was violent to women for having shown disrespect to a Muslim.
The note said he glorified the murder of “Western infidels” in songs he composed, and he was photographed with a knife and Koran. He travelled frequently to the Middle East.
He had a long list of contacts to Islamist movements in the UK, the same leaked document says.
According to Le Monde, Merah was last questioned in November 2011 and had great difficulty explaining a visit to Pakistan where he had been training with militants.
Abel Chennouf was one of Merah’s victims
Just a week later, the DCRI suddenly stopped monitoring him.
Judge Christophe Teissier said he was surprised by the move.
The judge said Merah’s profile was typical of a home-grown threat – he was independent, radicalised quickly, and did everything possible to conceal the support and training he was receiving.
In August, Le Monde said other documents it had seen showed Merah had made more than 1,800 calls to over 180 contacts in 20 different countries.
Merah was shot dead on 22 March after a huge manhunt culminated in a 32-hour stand-off with police at an apartment in Toulouse.
The Jewish victims included three children murdered at a school.
Merah’s rampage, from 11 to 19 March, terrorised the region.
19 October 2012 Last updated at 11:50 GMT
Find this story at 19 October 2012
BBC © 2012 The BBC is not responsible for the content of external sites. Read more.
Scooter terrorist Mohamed Merah ‘was not a lone wolf’: Secret files reveal killer’s sister had been watched by the French security services since 200826 oktober 2012
The older sister of the Toulouse scooter killer, Mohamed Merah, had been under surveillance as a possible Islamist activist since 2008, it emerged yesterday. Souad Merah, 34, provided money, mobile phones and internet addresses to her brother in the months before his murderous attacks in the Toulouse area in March, the French radio station RTL reported.
Security files, made available to prosecutors last month, also reveal that Ms Merah had been under surveillance long before the killer was, RTL said. She was identified by French internal security services as a possible threat in 2008 – at the same time as another brother, Abdelkader, who has been in custody for six months.
Families of Merah’s seven victims called yesterday for Souad Merah to be arrested and questioned. Although she was briefly interviewed after the murders, the inquiry has concentrated on the possible role of Abdelkader, Merah’s older brother, in inspiring and assisting the killings.
Mohamed Merah, 23, died when police stormed his flat in Toulouse on 22 March after a 32-hour siege. In previous days, he had murdered three off-duty French paratroopers and three children and a teacher outside a Jewish school.
Merah, who filmed his murders, claimed to be working on behalf of al-Qa’ida. Security services believe he was a “lone wolf”, inspired by extremist Islamist teaching but acting independently or with the help of his brother. According to the files of the French internal security service, the DCRI, seen by RTL, his sister may have played, at the very least, a role in his conversion to radical Islam.
Souad Merah was under surveillance from 2008 as a follower of an extremist Salafist Islamic movement in Toulouse. She also visited Koranic schools in Cairo. She appears in French security service files in 2008 as a “follower of radical Islam” and in June 2011 she is listed as being “known for her links” to radical Salafists. In the months before the Toulouse killings, she provided Mohamed Merah with cash, mobile phones and the use of her internet address on several occasions, according to the files seen by RTL.
…
John Lichfield
Tuesday, 4 September 2012
Find This story at 4 September 2012
© independent.co.uk
Mohamed Merah, un loup pas si solitaire26 oktober 2012
Mohamed Merah n’avait pas de téléphone à son nom. Pour échapper aux surveillances de la police, l’auteur des tueries perpétrées les 11, 15 et 19 mars à Toulouse et à Montauban s’en était procuré un à celui de sa mère, Mme Aziri. La liste des appels fait partie des documents confidentiels de la Direction centrale du renseignement intérieur (DCRI) transmis le 3 août aux trois juges de Paris chargés d’instruire le dossier.
Ces notes permettent de se faire une idée des liens que le djihadiste de 24 ans avait tissés à travers le monde, et elles mettent à mal l’argument avancé par l’ex-patron de la DCRI, Bernard Squarcini, selon lequel Mohamed Merah se serait “radicalisé seul” et qu’il n’appartenait “à aucun réseau” (Le Monde du 24 mars). Il semble que la police française n’ignorait quasiment rien du parcours du jeune djihadiste toulousain.
DES CORRESPONDANTS AU KENYA, EN CROATIE, EN BOLIVIE, AU BHOUTAN
Ainsi, l’une des 23 notes partiellement déclassifiées et dont Le Monde a eu connaissance, datée du 26 avril 2011, fait état de “1 863 communications relevées entre le 1er septembre 2010 et le 20 février 2011”. Durant cette période, celui qui n’est encore qu’un apprenti terroriste effectue un voyage dans plusieurs pays du Moyen-Orient et en Afghanistan. Il passe notamment 186 appels à des correspondants installés hors de France, dans 20 pays différents.
Le détail montre que Mohamed Merah a joint vocalement ou par SMS 94 numéros de téléphones localisés en Egypte, où se trouvait son frère Abdelkader, en Algérie, où demeurent son père et une partie de sa famille, mais aussi au Maroc, en Grande-Bretagne, en Espagne, en Côte d’Ivoire, au Kenya, en Croatie, en Roumanie, en Bolivie, en Thaïlande, en Russie, au Kazhastan, au Laos, à Taïwan, en Turquie, en Arabie saoudite, aux Emirats arabes unis, en Israël, et pour finir au Bhoutan, minuscule royaume enclavé en plein cœur du massif himalayen, où Mohamed Merah appelle neuf numéros.
Avec qui le petit voyou de la cité des Izards de Toulouse correspond-il à travers ces nombreux appels dans ces multiples pays ? Les enquêteurs de la DCRI ont sûrement identifié quelques-uns de ces interlocuteurs, mais les pièces transmises aux magistrats instructeurs, qui n’ont été que très partiellement déclassifiées par le ministre de l’intérieur, Manuel Valls, n’en disent rien.
UN “COMPORTEMENT INQUIÉTANT”
Ces notes attestent également que le renseignement intérieur connaissait Mohamed Merah au moins depuis 2009, après s’être intéressé à son frère Abdelkader dès 2008. Abdelkader, 29 ans, mis en examen pour “complicité” et en détention provisoire à Fresnes depuis le 25 mars, mais aussi sa sœur Souad, 34 ans, étaient surveillés par les services. Les déplacements du premier en Egypte, où il suit des cours dans les écoles coraniques d’obédience salafistes, sont suivis à la trace. Ainsi, le 23 février 2011, les services allemands alertent leurs collègues français de son passage à l’aéroport de Francfort, en provenance du Caire et à destination de Toulouse. Même chose pour Souad, dont le départ pour Le Caire prévu le 30 novembre 2010 de l’aéroport Charles-de-Gaulle à Roissy est signalé à la DCRI.
Et, à cette occasion, Mohamed apparaît aussi sur les radars du renseignement intérieur. Mais ce n’est qu’en mars 2011, après son long voyage jusqu’en Afghanistan, qu’un dispositif plus serré est mis en place autour du jeune homme. Un fonctionnaire fait état d’une “surveillance au domicile de Mohamed Merah, 17, rue du Sergent-Vigné, appartement numéro 2, volets toujours fermés”. Dans son compte rendu, le policier souligne que la mission a réussi : “Il a été possible d’identifier formellement la présence de l’objectif.”
Durant cette période, les policiers ne lâchent pas leur “objectif”. Ils le prennent en filature et prêtent une attention soutenue à sa téléphonie. Mohamed Merah a un “comportement inquiétant”, estime l’un d’eux. “Le changement fréquent de boîtiers et de cartes SIM attribués à Mme Aziri (…) laisse supposer que la famille Merah souhaite brouiller les pistes”, suggère un autre.
Visiblement, les fonctionnaires de police qui se sont collés aux basques de Mohamed Merah pendant plusieurs semaines ne doutent guère des orientations de leur client. “Le comportement prudent et suspicieux de Mohamed Merah influe sur sa famille”, écrivent-ils, avant de préciser : “Le dispositif de surveillance dynamique engagé sur Mohamed Merah démontre qu’après une période de latence et d’observation, l’objectif amorce un rapprochement avec la mouvance salafiste toulousaine, en particulier avec [ici le nom est noirci pour préserver sa confidentialité] mais également et plus intéressant encore avec [là, deux noms sont noircis pour les mêmes raisons] tous deux partis récemment en Mauritanie.” Cet extrait d’une note d’avril 2011 nuance la thèse défendue par la DCRI et son ex-directeur Bernard Squarcini au lendemain de l’assaut contre le terroriste, selon laquelle Mohamed Merah se serait “autoradicalisé en prison [en 2009], tout seul, en lisant le Coran” (Le Monde du 24 mars).
…
LE MONDE | 23.08.2012 à 10h55 • Mis à jour le 23.08.2012 à 16h57
Par Yves Bordenave
Find this story at 23 August 2012
© Le Monde.fr
Toulouse gunman Mohamed Merah ‘no lone wolf’26 oktober 2012
France’s Le Monde newspaper says it has seen confidential documents of the police investigation into Toulouse gunman Mohamed Merah that suggest he was not working alone.
The papers showed he had made more than 1,800 calls to over 180 contacts in 20 different countries, Le Monde said.
Merah had also made several trips to the Middle East and Afghanistan.
Merah, 24, killed three soldiers and four Jewish people in March before being shot dead by police.
SIM cards
Le Monde’s article cites confidential papers from the DCRI intelligence agency.
The BBC’s Christian Fraser in Paris says the papers obtained by Le Monde cast light on a young man who was much more than an angry petty criminal that had “radicalised himself” – as suggested by the DCRI earlier in the investigation.
Between September 2010 and February 2011 the former garage mechanic made hundreds of calls to countries including Egypt, Morocco, Kenya, Kazhakstan, Saudi Arabia, Bhutan and the UK.
Merah had become known to the intelligence services as early as 2009, after they had been following his sister, Souad, and his brother, Abdelkhadar, who are now both in police custody.
The papers show that intelligence services recorded a trip to a Salafist, or ultraconservative Sunni Islamist, school of obedience in Egypt.
In February 2011, German officials alerted French colleagues that Merah had travelled from Cairo, via Frankfurt, to Toulouse.
It was only in March 2011, after a long trip to Afghanistan, that Merah was placed under tighter surveillance.
One official quoted in the papers said Merah changed SIM cards, registered under his mother’s name, frequently, and suggested the family was trying to protect him.
Merah, who himself claimed to have al-Qaeda affiliation, was also reported to have contacted one known Salafist in Toulouse and two others who recently left for Mauritania.
Merah was shot dead on 22 March after a huge manhunt culminated in a 32-hour stand-off with police at an apartment in Toulouse.
The Jewish victims included three children murdered at a school.
23 August 2012 Last updated at 16:12 GMT
Find this story at 23 August 2012
BBC © 2012 The BBC is not responsible for the content of external sites. Read more.
‘Everything we could have missed, we missed’26 oktober 2012
“Everything that we could have missed, we missed”. A former French intelligence agent admits they should have caught Mohamed Merah before his Toulouse shooting spree which left seven people dead, including three children. Merah was killed after a bloody stand-off with police. His older brother Abdelkader is in custody facing charges of complicity to murder. But two months on and with no official documentation from authorities, many questions remain unanswered.
Latest update: 08/06/2012
Find this story at 08 June 2012
© 2006 – 2012 Copyright FRANCE 24. All rights reserved – FRANCE 24 is not responsible for the content of external websites.
Mohamed Merah: secret service informant?26 oktober 2012
Was Mohamed Merah a French secret service informant? So says a former head of an intelligence agency here in France. Also, an Italian paper says Merah travelled to Israel in 2010 – with the support of French spy agencies.
MEDIAWATCH FRANCE, Tues. 27/3/2012:
Latest update: 28/03/2012
By James CREEDON
Find this story at 28 Marz 2012
© 2006 – 2012 Copyright FRANCE 24. All rights reserved – FRANCE 24 is not responsible for the content of external websites.
Un agente francese dietro la morte di Gheddafi11 oktober 2012
Il merito della cattura del rais sarebbe stato dei servizi di Parigi. Il Colonnello «venduto» all’Occidente da Assad
TRIPOLI – Sarebbe stato un «agente straniero», e non le brigate rivoluzionarie libiche, a sparare il colpo di pistola alla testa che avrebbe ucciso Moammar Gheddafi il 20 ottobre dell’anno scorso alla periferia di Sirte. Non è la prima volta che in Libia viene messa in dubbio la versione ufficiale e più diffusa sulla fine del Colonnello. Ma ora è lo stesso Mahmoud Jibril, ex premier del governo transitorio e al momento in lizza per la guida del Paese dopo le elezioni parlamentari del 7 luglio, a rilanciare la versione del complotto ordito da un servizio segreto estero. «Fu un agente straniero mischiato alle brigate rivoluzionarie a uccidere Gheddafi», ha dichiarato due giorni fa durante un’intervista con l’emittente egiziana «Sogno Tv» al Cairo, dove si trova per partecipare ad un dibattito sulle Primavere arabe.
PISTA FRANCESE – Tra gli ambienti diplomatici occidentali nella capitale libica il commento ufficioso più diffuso è che, se davvero ci fu la mano di un sicario al servizio degli 007 stranieri, questa «quasi certamente era francese». Il ragionamento è noto. Fin dall’inizio del sostegno Nato alla rivoluzione, fortemente voluto dal governo di Nicolas Sarkozy, Gheddafi minacciò apertamente di rivelare i dettagli dei suoi rapporti con l’ex presidente francese, compresi i milioni di dollari versati per finanziare la sua candidatura e la campagna alle elezioni del 2007. «Sarkozy aveva tutti i motivi per cercare di far tacere il Colonnello e il più rapidamente possibile», ci hanno ripetuto ieri fonti diplomatiche europee a Tripoli.
RIVELAZIONI – Questa tesi è rafforzata dalle rivelazioni raccolte dal «Corriere» tre giorni fa a Bengasi. Qui Rami El Obeidi, ex responsabile per i rapporti con le agenzie di informazioni straniere per conto del Consiglio Nazionale Transitorio (l’ex organismo di autogoverno dei rivoluzionari libici) sino alle metà del 2011, ci ha raccontato le sue conoscenze sulle modalità che permisero alla Nato di individuare il luogo dove si era nascosto il Colonnello dopo la liberazione di Tripoli per mano dei rivoluzionari tra il 20 e 23 agosto 2011. «Allora si riteneva che Gheddafi fosse fuggito nel deserto e verso il confine meridionale della Libia assieme ad un manipolo di seguaci con l’intenzione di riorganizzare la resistenza», spiega El Obeidi. La notizia era ripetuta di continuo dagli stessi rivoluzionari, che avevano intensificato gli attacchi sulla regione a sud di Bani Walid e verso le oasi meridionali. In realtà Gheddafi aveva trovato rifugio nella città lealista di Sirte. Aggiunge El Obeidi: «Qui il rais cercò di comunicare tramite il suo satellitare Iridium con una serie di fedelissimi fuggiti in Siria sotto la protezione di Bashar Assad. Tra loro c’era anche il suo delfino per la propaganda televisiva, Yusuf Shakir (oggi sarebbe sano e salvo in incognito a Praga).
…
Dal nostro inviato LORENZO CREMONESI
Dal nostro inviato LORENZO CREMONESI
Find this story at 1 October 2012
Copyright 2012 © RCS Mediagroup S.p.a. Tutti i diritti sono riservati
Gaddafi was killed by French secret serviceman on orders of Nicolas Sarkozy, sources claim11 oktober 2012
A French secret serviceman acting on the express orders of Nicolas Sarkozy is suspected of murdering Colonel Gaddafi, it was sensationally claimed today.
He is said to have infiltrated a violent mob mutilating the captured Libyan dictator last year and shot him in the head.
The motive, according to well-placed sources in the North African country, was to stop Gaddafi being interrogated about his highly suspicious links with Sarkozy, who was President of France at the time.
Nicolas Sarkozy, France’s former president, allegedly ordered the murder of former Libyan dictator Colonel Gaddafi
Other former western leaders, including ex British Prime Minister Tony Blair, were also extremely close to Gaddafi, visiting him regularly and helping to facilitate multi-million pounds business deals.
Sarkozy, who once welcomed Gaddafi as a ‘brother leader’ during a state visit to Paris, was said to have received millions from the Libyan despot to fund his election campaign in 2007.
The conspiracy theory will be of huge concern to Britain which sent RAF jet to bomb Libya last year with the sole intention of ‘saving civilian lives’.
A United Nations mandate which sanctioned the attack expressly stated that the western allies could not interfere in the internal politics of the country.
Instead the almost daily bombing runs ended with Gaddafi’s overthrow, while both French and British military ‘advisors’ were said to have assisted on the ground.
Now Mahmoud Jibril, who served as interim Prime Minister following Gaddafi’s overthrow, told Egyptian TV: ‘It was a foreign agent who mixed with the revolutionary brigades to kill Gaddafi.’
Gaddafi was killed on October 20 in a final assault on his hometown Sirte by fighters of the new regime, who said they had cornered the ousted despot in a sewage pipe waving a golden gun. The moment was captured on video
Former Libyan leader Muammar Gaddafi, covered in blood, is pulled from a truck by NTC fighters in Sirte before he was killed
Revolutionary Libyan fighters inspect a storm drain where Muammar Gaddafi was found wounded in Sirte, Libya, last year
Diplomatic sources in Tripoli, the Libyan capital, meanwhile suggested to the Italian newspaper Corriere della Serra that a foreign assassin was likely to have been French.
The paper writes: ‘Since the beginning of NATO support for the revolution, strongly backed by the government of Nicolas Sarkozy, Gaddafi openly threatened to reveal details of his relationship with the former president of France, including the millions of dollars paid to finance his candidacy at the 2007 elections.’
One Tripoli source said: ‘Sarkozy had every reason to try to silence the Colonel and as quickly as possible.’
The view is supported by information gathered by investigaters in Benghazi, Libya’s second city and the place where the ‘Arab Spring’ revolution against Gaddafi started in early 2011.
Rami El Obeidi, the former head of foreign relations for the Libyan transitional council, said he knew that Gaddafi had been tracked through his satellite telecommunications system as he talked to Bashar Al-Assad, the Syrian dictator.
…
By Peter Allen
PUBLISHED: 11:43 GMT, 30 September 2012 | UPDATED: 06:56 GMT, 1 October 2012
Find this story at 30 September 2012
Published by Associated Newspapers Ltd
Part of the Daily Mail, The Mail on Sunday & Metro Media Group
© Associated Newspapers Ltd
nieuwere artikelen >>