Ex-FBI agent who disappeared in Iran was on rogue mission for CIA13 december 2013
An American man who disappeared in Iran more than six years ago had been working for the CIA in what U.S. intelligence officials describe as a rogue operation that led to a major shake-up in the spy agency.
Robert Levinson, a retired FBI agent, traveled to the Iranian island of Kish in March 2007 to investigate corruption at a time when he was discussing the renewal of a CIA contract he had held for several years. He also inquired about getting reimbursed for the Iran trip by the agency before he departed, according to former and current U.S. intelligence officials.
After he vanished, CIA officials told Congress in closed hearings as well as the FBI that Levinson did not have a current relationship with the agency and played down its ties with him. Agency officials said Levinson did not go to Iran for the CIA.
But months after Levinson’s abduction, e-mails and other documents surfaced that suggested he had gone to Iran at the direction of certain CIA analysts who had no authority to run operations overseas. That revelation prompted a major internal investigation that had wide-ranging repercussions, the officials said, speaking on the condition of anonymity.
The CIA leadership disciplined 10 employees, including three veteran analysts who were forced out of their jobs, the officials said.
The agency changed the rules outlining how analysts conduct business with contractors, including academics and other subject-matter experts who don’t work at the CIA, making it harder for agency employees to have such relationships.
The CIA ultimately concluded that it was responsible for Levinson while he was in Iran and paid $2.5 million to his wife, Christine, former U.S. intelligence officials said. The agency also paid the family an additional $120,000, the cost of renewing Levinson’s contract.
Levinson’s whereabouts remain unknown. Investigators can’t even say for certain whether he’s still alive. The last proof of life came about three years ago when the Levinson family received a video of him and later pictures of him shackled and dressed in an orange jumpsuit similar to those worn by detainees at the prison at Guantanamo Bay, Cuba.
“I have been held here for 31 / 2 years,” he says in the video. “I am not in good health.”
U.S. intelligence officials concede that if he is alive, Levinson, who would be 65, probably would have told his captors about his work for the CIA, as he was likely subjected to harsh interrogation.
The National Security Council declined to comment on any ties Levinson has to the U.S. government. “The investigation into Mr. Levinson’s disappearance continues, and we all remain committed to finding him and bringing him home safely to his family,” said spokeswoman Caitlin Hayden.
In a statement released Thursday, Levinson’s family said the U.S. government has failed to make saving his life a priority. “It is time for the U.S. government to step up and take care of one of its own. After nearly 7 years, our family should not be struggling to get through each day without this wonderful, caring, man that we love so much,” the statement said.
Levinson joined the FBI’s New York Field Office in 1978 after spending six years with the Drug Enforcement Administration. He was an expert on the New York mob’s five families. Eventually, he moved to the Miami office, where he tracked Russian organized-crime figures and developed a reputation for developing sources.
While in the FBI, Levinson attended a conference where he met a well-respected CIA analyst named Anne Jablonski, one of the agency’s experts on Russia. The two formed a friendship.
When Levinson retired from the FBI in 1998, he went to work as a private investigator.
Jablonski continued at the agency and, among her other duties after the Sept. 11, 2001, attacks on the United States, was to brief FBI Director Robert S. Mueller and Attorney General John D. Ashcroft. By 2005, she was in the Office of Transnational Issues (OTI), the CIA unit that tracks money transfers, weapons smuggling and organized crime.
Jablonski brought Levinson to the CIA for discussions on money laundering with her colleagues. In 2006, Tim Sampson, then the head of the Illicit Finance Group, which was part of OTI, hired Levinson. The unclassified contract was then worth $85,000.
Academic reports
Levinson was supposed to provide academic reports but was operating more like a spy, gathering intelligence for the CIA and producing numerous well-
received reports, officials said. While working for the CIA, he passed on details about the Colombian rebels, then-President Hugo Chávez of Venezuela and Iran’s nuclear program.
Levinson hopscotched the globe. He went to Turkey and Canada, among other countries, to interview potential sources, sometimes using a fake name. But CIA station chiefs in those countries were never notified of Levinson’s activities overseas even though the agency reimbursed him for his travel, a violation of the rules.
On March 8, 2007, Levinson flew from Dubai to the Iranian island of Kish and checked into a hotel. He met with Dawud Salahuddin, a fugitive wanted for the murder of an Iranian dissident and diplomat who was shot at his house in Bethesda, Md. Levinson thought Salahuddin could supply details about the Iranian regime, perhaps ones that could interest the CIA, according to officials who have reconstructed some of his movements.
Levinson spent hours talking to Salahuddin. The next morning, he checked out of his hotel and vanished, officials said. The United States suspected the Iranian security services were behind his abduction, according to a diplomatic cable disclosed by WikiLeaks.
The U.S. government insisted that Levinson was a private citizen making a private trip. The State Department, in a cable to U.S. embassies in May 2007, said much the same thing. “Levinson was not working for the United States government,” Secretary of State Condoleezza Rice wrote.
The CIA told the Senate Intelligence Committee that Levinson had done some minor work for the agency but that his contract had run out and the spy agency had nothing to do with him going to Iran. Agency analysts also spoke with the FBI and said they hadn’t sent him to Iran. The CIA’s involvement seemed to end there. The FBI, which investigates crimes against Americans, did not push the CIA to open its files and take a deeper look at Levinson’s relationship with the agency.
But Levinson’s family and friends refused to accept that he was a lost tourist. A former federal prosecutor in Florida named David McGee, a friend of Levinson’s, and McGee’s paralegal, Sonya Dobbs, thought the government wasn’t being truthful about who employed Levinson.
Dobbs managed to access Levinson’s e-mail accounts. There she found e-mails between Jablonski and Levinson and other material suggesting that he had worked with the CIA in what appeared to be a continuing relationship.
One of the e-mails instructed Levinson not to worry about getting paid for going to Iran shortly before he made the trip. Jablonski said she would take care of it. She advised him not to contact the agency’s contract office. “Keep talk about the additional money among us girls,” she said by e-mail.
The e-mails also suggested that Levinson was operating at Jablonski’s behest, according to officials who have reviewed the communications between the two. Jablonski adamantly denied in an interview that she oversaw what Levinson was doing.
With the newly discovered information, McGee got the attention of Sen. Bill Nelson (D-Fla.), who serves on the intelligence panel and is from Levinson’s home state. At the CIA, agency investigators began to scrutinize Levinson’s relationship with Jablonski and her boss, Sampson, and discovered more problems in the handling of his work.
Instead of mailing reports to the CIA, where they would be properly screened and processed, Jablonski had Levinson send them to her house, according to officials. She said she could review them faster that way.
They used private e-mail accounts to communicate — one reason the CIA was slow to learn of the relationship. The arrangement led CIA investigators to think Jablonski was trying to obscure their ties, according to current and former U.S. officials.
Jablonski never disclosed those details and others to investigators when Levinson disappeared. While the FBI and CIA knew about Levinson’s previous contract, answers she provided “didn’t square with the e-mails,” said a former senior agency official with knowledge of the events.
To CIA officials, it appeared that she was running a source and collecting intelligence, a job for trained operatives in the clandestine service and not analysts. In fact, the CIA’s clandestine arm never knew that Levinson was on the payroll or his activities when he traveled abroad, officials said.
By 2008, the CIA’s deputy director at the time, Stephen Kappes, conceded to Nelson and other senators that there was more to the Levinson story than the agency had acknowledged the previous year. Some on the committee said they had been misled by the CIA.
Jablonski said in an interview that she wasn’t hiding anything from CIA officials and that they knew about the arrangement with Levinson. Jablonksi said she would never put Levinson, a friend, in harm’s way.
Nevertheless, Jablonski and Sampson could face criminal charges, law enforcement officials say. Both veteran analysts resigned from the CIA in 2008 along with a third senior manager. Jablonski now works in the private sector. Sampson took a job with the Department of Homeland Security. He declined to comment for this report.
He told the Associated Press: “I didn’t even know he was working on Iran. As far as I knew he was a Latin America, money-laundering and Russian-organized-crime guy. I would never have directed him to do that.”
A break in 2010
For years, Levinson’s family had no word on the fate of the former FBI agent. A break came in November 2010 when an unknown source sent the family a 54-second video of Levinson, who appeared haggard but otherwise unharmed. They are unsure who sent the video, or why. The FBI is also unsure when the video was made.
“Please help me get home,” he says in the video. “Thirty-three years of service to the United States deserves something. Please help me.”
Levinson spent only 28 years with the Drug Enforcement Administration and the FBI, suggesting that he was including his time on a CIA contract as part of his government service.
A few months later, the family received a series of pictures: Levinson, his hands chained and his hair long and unruly, dressed in an orange jumpsuit. The family received them in April 2011. The FBI determined that they were sent from Afghanistan but was unsure when they were taken.
The photographs and videos turned into a dead end. And a recent FBI media blitz and $1 million reward haven’t revealed his whereabouts. Secret FBI meetings with the Iranians in Europe also have proved fruitless, officials said.
After the video and pictures of Levinson emerged, American officials concocted a story that he was being held in Pakistan or Afghanistan in an effort to provide the Iranians some cover to release him, according to U.S. intelligence officials. Then-Secretary of State Hillary Rodham Clinton put out a statement in March 2011 that Levinson might be in southwest Asia. Officials hoped Levinson would turn up in one of those two countries and give the Iranians plausible deniability, officials said.
The ruse failed.
U.S. intelligence officials say that if there was a moment for his return, it was when they received the video. They can’t explain why Iran has freed other captives, such as a trio of U.S. hikers, but not Levinson. And other U.S. citizens being held by Iran — pastor Saeed Abedini and former Marine Amir Hekmati — are known to be alive, unlike Levinson.
The Iranians have steadfastly denied holding Levinson. Even as the relationship between the United States and Iran has thawed with the recent election of President Hassan Rouhani and a temporary deal that freezes parts of the country’s nuclear program, there has been no progress on securing Levinson or information about his fate.
“We don’t know where he is, who he is,” Rouhani told CNN in September during the United Nations General Assembly. “He is an American who has disappeared. We have no news of him.”
U.S. intelligence officials remain skeptical. They suspect Iran did snatch Levinson, but they can’t prove it. Officials surmise that only a professional intelligence service such as Iran’s Ministry of Intelligence and National Security could have taken Levinson and thwarted American efforts to find him for so many years.
U.S. intelligence officials acknowledge it’s very possible Levinson, who was in poor health, died under questioning at some point. They say there is no upside for the Iranians to admit he died in their custody.
Former officials familiar with the case said releasing the information about his CIA ties won’t make his situation any worse.
Levinson’s family refuses to believe he is dead and remains hopeful he will return home.
In November, Levinson became the longest-held hostage in U.S. history, surpassing the 2,454 days that Terry Anderson spent in captivity in Lebanon in the 1970s.
“No one would have predicted this terrible moment more than 61 / 2 years ago when Bob disappeared,” Christine Levinson said in a statement last month. “Our family will soon gather for our seventh Thanksgiving without Bob, and the pain will be almost impossible to bear. Yet, as we endure this terrible nightmare from which we cannot wake, we know that we must bear it for Bob, the most extraordinary man we have ever known.”
This article was reported beginning in 2010 while Goldman worked at the Associated Press. Goldman, whose byline also appears on an AP story on this subject, is now a Post staff writer.
By Adam Goldman,
Find this story at 13 December 2013
© The Washington Post Company
CIA’s anti-terrorism effort called ‘colossal flop’ (2013)13 december 2013
CIA officers given ‘non-official cover,’ often posing as business executives, tried to collect intelligence on terrorists. The NOC program reportedly has had few successes.
WASHINGTON — Several years ago, a senior officer in the CIA clandestine service attended a closed-door conference for overseas operatives. Speakers included case officers who were working in the manner Hollywood usually portrays spies — out on their own.
Most CIA officers abroad pose as U.S. diplomats. But those given what’s called non-official cover are known as NOCs, pronounced “knocks,” and they typically pose as business executives. At the forum, the NOCs spoke of their cover jobs, their false identities and measures taken to protect them. Few said much about gathering intelligence.
A colleague passed a caustic note to the senior officer. “Lots of business,” it read. “Little espionage.”
Twelve years after the CIA began a major push to get its operatives out of embassy cubicles and into foreign universities, businesses and other local perches to collect intelligence on terrorists and rogue nations, the effort has been a disappointment, current and former U.S. officials say. Along with other parts of the CIA, the budget of the so-called Global Deployment Initiative, which covers the NOC program, is now being cut.
“It was a colossal flop,” a former senior CIA official said in sentiments echoed by a dozen former colleagues, most of whom spoke on condition of anonymity to discuss a classified program.
Spurred by Congress after the attacks of Sept. 11, 2001, the CIA rushed to put its eyes and ears in gritty corners of the globe where Al Qaeda and other adversaries operate or recruit. The risk was considerable: Unlike CIA officers in embassies, NOCs have no diplomatic immunity if caught, and could face imprisonment or worse.
The CIA spent at least $3 billion on the program, and the number of specially trained spies grew from dozens to hundreds. The entire clandestine service is believed to total about 5,000 people.
But because of inexperience, bureaucratic hurdles, lack of language skills and other problems, only a few of the deep-cover officers recruited useful intelligence sources, several former officers said.
Some of the most ambitious efforts were aimed at Iran, former officers said. The CIA created front companies and elaborate fake identities for operatives trying to recruit sources inside Iran’s nuclear and missile procurement networks.
But Iranian authorities were able to expose American operatives, said two former senior CIA officials. They were transferred back to CIA headquarters in Virginia or other U.S. posts.
Sometimes the CIA didn’t send the right people with the right cover, said Joseph Wippl, former chief of the CIA’s Europe division. Others were posted “a zillion miles from where their targets were located,” he said.
CIA leaders also were reluctant to put the special spies in harm’s way.
“There was just a great unwillingness to put NOCs in really, really dangerous places,” said another former case officer. “If you’re a high-grade agency manager, are you going to sign off on a memo that puts Joe Schmuckatelli in Pyongyang? Whether you are a careerist or not, that is a hard decision for anybody to make.”
The program also was tainted by financial irregularities, according to a former senior CIA official. The CIA’s inspector general found that some NOCs billed the agency for unjustified time and expenses, three former officials said, and it forced a few to repay money.
A CIA spokesman, Todd Ebitz, declined to comment about the NOC program, its budget or its problems.
“The agency does not discuss publicly any cover techniques that it may employ,” he wrote in an email. “The CIA does keep the congressional intelligence oversight committees fully informed of its activities, which are constantly evolving to meet the threats to national security. And, while the details of the agency budget remain properly classified, sequestration and budget cutbacks have affected the entire federal government, including CIA.”
The best-known NOC was Valerie Plame. In the mid-1990s, while in Brussels, she posed as an energy analyst for a Boston-based firm, Brewster Jennings & Associates, which the CIA later acknowledged was a front company. Plame maintained her false identity after she moved back to CIA headquarters in 1997, traveling frequently to the Middle East and elsewhere to recruit agents who could spy in Iran and elsewhere.
Her CIA career ended in 2003 after Bush administration officials leaked her name to the press in an effort to discredit her husband, who had claimed the White House had manipulated intelligence on Iraq. A White House aide, I. Lewis “Scooter” Libby, was later convicted of perjury and obstruction of justice. Plame’s best-selling book on the case, “Fair Game,” was turned into a Hollywood film.
Masking spies as engineers, consultants or other professions has long been part of the CIA playbook. But the push took on new urgency after the 2001 terrorist attacks exposed the CIA’s lack of informants inside Al Qaeda and other terrorist networks.
It wasn’t that CIA officers were expected to personally infiltrate Al Qaeda. But working outside the embassy might make it easier to recruit local sources in Pakistan, Yemen and elsewhere who could collect intelligence on terrorist money, aims and intentions.
In 2004, then-CIA Director Porter J. Goss announced a new effort to put more officers under deep cover to gain what he called “close-in access to the plans and intentions” of America’s adversaries. Soon after, Congress passed legislation permitting undercover CIA officers serving overseas to keep salaries from their civilian cover jobs even if it exceeded their federal paychecks.
Members of the Senate Intelligence Committee pressed the CIA to go further. They attached a provision to their 2006 intelligence authorization measure questioning whether the spy service was “committed to doing what is needed to ensure that NOC operations are successful.”
The agency doubled down. A growing number of recruits at the CIA training facility at Camp Peary, Va., known as the Farm — including the class of 2008, the largest in CIA history — was made up of NOCs, former officials said.
Unlike their classmates, they were barred from making cellphone calls or using the Internet in order to hide any ties to the CIA. Later, many would operate in their own names, holding real jobs for multinational companies around the globe.
But when it came to penetrating terrorist networks, NOCs suffered the same shortcomings as other CIA officers — too few spoke Urdu, Pashto, Dari or other necessary languages, or could disappear in local cultures, former CIA officers say.
In 2008, a former CIA operative’s biting memoir, “The Human Factor,” was published, describing his 15 years overseas targeting nuclear networks and terrorist groups. He wrote that the CIA had spent at least $3 billion since 2001 to get deep-cover operatives overseas, but only a few had been successfully deployed.
“There were only a handful of effective NOCs overseas, and that never changed,” the author, who uses the pseudonym Ishmael Jones, said in a telephone interview.
In 2010, then-CIA Director Leon E. Panetta gave a speech promising “new approaches to cover.” But the vast majority of case officers continue to pose as diplomats, U.S. officials say.
John Maguire, who retired from the CIA in 2005, argues that the CIA could help the NOC program by doing more to establish legitimate commerce for the front companies. But that would cause headaches for CIA administrators, he acknowledged.
Maguire said he knew only three successful NOCs in his 23 years as a case officer. “They were absolute nightmares for the administrative bureaucracy of the agency,” he said.
By Ken Dilanian
December 8, 2013, 6:01 a.m.
Find this story at 8 December 2013
Copyright © 2013, Los Angeles Times
The CIA Crosses Over; Even as a Congressional commission investigates the agency’s cold war incompetence, the CIA has expanded a high-risk plan to spy on U.S. economic competitors. our exclusive report exposes this secret program. (1995)13 december 2013
What is a NOC?
For resources on the CIA, see our resource guide.
Robert Dreyfuss’ revelation that the CIA is engaged in economic espionage (“Company Spies,” June 1994) was covered extensively in Japan, but so far no American newspaper or network has touched the story. Now, Dreyfuss offers more proof.
William Casey’s ghost haunts the Central Intelligence Agency.
That ghost, a Central Intelligence Agency program revived by the late director in the 1980s, marries the spy agency to corporate America in order to gather intelligence on economics, trade, and technology. Now that the Cold War is over, agency officials have latched onto the idea of collecting clandestine economic data to justify the CIA’s inflated budget, even as the CIA’s competence–indeed, its very existence–is being questioned.
Advertise on MotherJones.com
And dozens of U.S. corporations–from Fortune 500 companies to small, high-tech firms–are secretly assisting the CIA, allowing the agency to place full-time officers from its operations divisions into corporate offices abroad.
Serving under what is referred to as “nonofficial cover” (NOC), CIA officers pose as American businessmen in friendly countries, from Asia to Central America to Western Europe. There, they recruit agents from the ranks of foreign officials and business leaders, pilfer secrets, and even conduct special operations and paramilitary activities.
The story of the CIA’s NOC (pronounced “knock”) program, revealed here for the first time, raises serious questions about the CIA at a time when the agency is already beset by scandal. Yet the NOC program has grown to its present bloated size without any public scrutiny–and with no open discussion within the companies whose interests could be harmed by a spy scandal.
NOC, NOC! Who’s there?
One hundred and ten CIA officers currently serve as NOCs, according to a recent CIA retiree. Some of the most familiar firms in America’s corporate hierarchy, CIA sources report, have sponsored NOCs overseas: RJR Nabisco, Prentice-Hall, Ford Motor Co., Procter & Gamble, General Electric, IBM, Bank of America, Chase Manhattan Bank, Pan Am, Rockwell International, Campbell Soup, and Sears Roebuck.
In some cases, flamboyant conservative businessmen like Ross Perot and the late Malcolm Forbes have actively cooperated with the CIA in stationing officers worldwide. In other cases, obscure U.S. companies doing business abroad–such as a tiny Texas firm that deals in spare tractor parts in Latin America, cited by a former CIA officer–have taken part in the NOC program. Shipping lines, mineral and oil exploration firms, and construction companies with international operations, like the Bechtel Corp., often house NOCs.
By joining the CIA in clandestine activities, a company tacitly accepts that some of its employees could routinely break the law in another country and, if exposed, embarrass the company and endanger its other overseas employees.
Unlike most CIA officers, who are stationed abroad disguised as State Department employees, military officials, or other U.S. government personnel attached to an American embassy, NOCs operate without any apparent links to the U.S. government. They are able to approach people who would not otherwise come into contact with a U.S. embassy official. The CIA’s operations within terrorist, drug trafficking, and arms dealer networks often involve NOCs, who can move more easily in such circles without raising suspicion.
In recent years, according to several CIA sources, NOCs have increasingly turned their attention to economics. Using their business covers, they seek to recruit agents in foreign government economic ministries or gain intelligence about high-tech firms in computer, electronics, and aerospace industries. They also help track the development of critical technologies, both military and civilian.
NOCs frequently stay 5, 10, or more years in one place. During that time, the NOC is truly “out in the cold.” Their contacts with control officers in the CIA station are strictly limited; they do not have access to embassy files; and they must report through secret communications channels and clandestine meetings.
“As a NOC officer you are truly alone,” says John Quinn, who spent much of the 1980s as a NOC in Tokyo. “The sense of isolation and loneliness is difficult to describe to those who have never experienced it.”
Because NOCs do not have the diplomatic immunity that protects CIA officers operating under embassy cover, if they are exposed they are subject to arrest and imprisonment–and they can be executed as spies.
How did we get here?
The NOC program is one of the CIA’s most sensitive and closely held secrets.
Former CIA Director William Colby refuses to comment on the NOC program. “I better stay off of that. It’s a very complicated subject. In deference to my old colleagues, the less chatter about that, the better.” But, if American corporate executives do lend their overseas offices to the CIA, Colby adds, “They have my strong applause. They only do it because they’re patriots.”
The CIA has used private U.S. companies for cover overseas since its inception in 1947. “When the agency was being put together in the late 1940s, they made pretty extensive use of nonofficial cover,” says Admiral Bobby Ray Inman, a former CIA deputy director.
Since it was cheaper to station spies in the U.S. embassy, cost-cutting led the CIA to scale down the number of NOCs by the 1960s. The program shrank further after ITT’s involvement with the CIA in the 1973 military coup against Salvador Allende’s government in Chile was revealed. “That clearly scared a lot of U.S. corporations,” Inman says.
But events in the 1970s revived the use of NOCs. Investigative journalists and CIA defectors like Philip Agee publicized the fact that a cursory study of the State Department roster could identify CIA officers in any embassy, and publications like Counterspy even named individual CIA personnel.
At the same time, the U.S. government cut the number of embassy personnel worldwide. “With them, they also took out the cover billets for the clandestine services,” Inman says.
When William Casey took over the CIA in 1981, one of his decisions, according to Inman (who served as Casey’s number two), was to beef up the NOC program. Because of the closure of the U.S. embassy in Tehran in 1979, the CIA had virtually no presence in Iran. A NOC program, Casey reasoned, would at least have given the CIA a toehold inside the country.
Richard Kerr, another former deputy director of the CIA, says that in the 1980s Casey was also concerned about economic intelligence, technology, and trade secrets. That gave him another reason to expand the NOCs.
“There was an awful lot of technology theft. Tech transfer was the big thing,” says Kerr. “People, in effect, stealing U.S. technology–either the Soviets or the Iraqis or the Iranians, or in some cases the Japanese.”
According to a former high-ranking CIA operations officer, Casey tripled the number of NOCs in 1986. “Casey believed that economics was going to be more and more a part of the CIA’s mission, including learning about other countries’ economic plans and intentions,” he says. “State Department pinstripers couldn’t do that job. They simply couldn’t associate easily with the commercial people in a country. So Casey ordered the CIA to refocus itself on economic issues. And that meant more NOCs.”
It’s a hard NOC life
Putting aside, for a moment, whether we should engage in economic espionage at all, perhaps the most damaging indictment of the NOC program is that, in the estimation of many of the people who are risking their lives for the program, it has wasted millions of dollars–while producing precious little of real value to decisionmakers.
Interviews with former CIA officers who have served overseas and with midlevel and senior retired CIA officials reveal that the NOC program is beset with bungling, corruption, and poor tradecraft. The program is so badly run that NOCs are resigning from the CIA in droves, many after serious mistakes by the CIA that could have resulted in their exposure, arrest, or worse.
Tom Darcy is a former CIA officer who served for five years as a NOC in Western Europe. Asked whether the CIA’s clumsy management has caused any NOC to land in a prison overseas, Darcy says, “Yes. More than once. Or die.”
“The NOC program is horribly mismanaged,” says John Quinn. Though it costs hundreds of thousands of dollars to set up a NOC in an overseas corporation, CIA officers serving under embassy cover are rarely properly trained to work with NOCs. “There is a lot of suspicion and animosity between inside officers and NOCS,” Quinn adds.
When errors involving the CIA program do come to light, CIA headquarters invariably corrects the problem in a way that favors the inside officers, not the NOCs. A CIA officer says, “Just like the way the Catholic Church protects priests accused of sexual abuse or wrongdoing, headquarters will always cover up for the division chief, the chief of station, or the deputy chief of station–and they will discipline the NOC.”
In South America, for example, large sums of cash destined for a NOC were siphoned off by the CIA’s station chief, who escaped without reprimand.
In that case, the innocent NOC’s career was severely damaged. But Quinn and other former NOCs say that embezzlement is also frequent among NOCs, who often handle large amounts of cash without any real oversight.
Worse, the CIA pressures NOCS to produce intelligence, so their information is often questionable. “One NOC in Tokyo would fabricate intelligence reports based on what he thought the embassy officer wanted to hear,” says Quinn.
A case history
Perhaps the most interesting NOC case history uncovered by this reporter unfolded in the late 1980s in Tokyo.
Japan has been a major theater of CIA operations since the United States’ post-World War II occupation. During the Vietnam War, the CIA expanded its presence in Japan, with additional focus on the country’s trade and political relations with the Soviet Union, China, Cuba, and other communist powers. According to a former CIA officer, the CIA’s Tokyo station was one of the largest in the world.
Casey saw the Japanese threat as an economic one–and the NOC program as his vehicle to penetrate Japan’s scientific, technological, and commercial institutions. Thirteen NOCs were stationed in Japan in the mid-1980s, including John Quinn.
According to him, one CIA target was a leading Japanese high-technology firm. “They wanted to know the structure of the company inside, who were the bigwigs, who were their policymakers, where was their R&D section, what was the R&D section working on, what was their budget, what were the critical technologies they were developing.”
But a series of clumsy CIA mistakes caused the NOC program in Japan to self-destruct in 1988:
The CIA’s Tokyo station chief installed a branch chief who “made it clear that he was not enamored of working with NOCs,” says Quinn. The branch chief questioned expense accounts and ordered one group of NOCs to report another’s petty infractions. Not surprisingly, the NOCs’ morale plummeted.
The CIA’s “glorious ineptitude,” as another CIA officer calls it, alerted Japan’s counterintelligence unit, the Public Security Investigative Agency (PSIA), that the CIA was seeking to penetrate its commercial sector. During a series of regular, friendly liaison meetings between U.S. and Japanese intelligence officers in Tokyo, the PSIA politely suggested “certain businessmen” be reined in. “But we, in our dullness, failed to respond,” says the CIA officer.
The communications and electronics equipment the CIA gave NOCs to allow them to maintain contact with the U.S. embassy was made in Japan. “They didn’t realize that the Japanese had built most of the stuff and knew its operating characteristics, so the systems weren’t secure,” says a senior CIA officer.
CIA embassy officers routinely took taxis to meet NOCs, taking few precautions not to be seen. All of this was duly noticed by Japanese security people, who kept careful records on meetings held by these “businessmen.”
Finally, exasperated, Japanese PSIA officers trashed the homes and offices of several NOCs, stealing communications equipment and wreaking havoc. Their actions, a CIA officer says, were meant to send a message to the CIA that such activity would not be tolerated. The CIA quickly withdrew at least 10 NOCs, a fiasco that cost the agency millions of dollars in investments in NOCs, one of whom had been in place for 15 years.
Let’s get smart about intelligence
Today, the CIA is trying to bridge the chasm between Cold War action and 21st-century diplomacy. Pressure is mounting for a sweeping, “zero-based” review of the entire $28 billion U.S. intelligence community. In response to the scandal after the arrest of CIA spy Aldrich Ames, Congress has appointed a blue-ribbon commission to review the CIA’s operations by 1996.
Though the CIA is being downsized and there are calls to abolish it, there are also calls from CIA insiders, some congressional Republicans, and a few outside conservatives to expand the CIA’s use of spies–known in the trade as “human intelligence” (humint)–at the expense of techint, or intelligence gathered by satellites, listening devices, or other technical means.
Robert Steele, a former CIA officer who has put forward a number of otherwise thoughtful ideas about reforming the CIA, recently called for a doubling of the agency’s clandestine espionage and for placing all of the new spies under “nonofficial cover.”
Steele’s ideas may find a receptive audience on the Hill, following the conservative shift after November’s election. Soon-to-be Speaker of the House Newt Gingrich, the Republican from Georgia, joining the debate over the CIA’s future, cites the “need for stronger human intelligence”–i.e., more spies. And Larry Combest, a Texas Republican who could become the chair of the House Intelligence Committee, has said that he supports suggestions to increase the CIA’s budget.
Critics and CIA loyalists alike contend that the vast bulk of economic information necessary for government decisionmaking can easily be obtained from newspapers, magazines, trade and technical journals, trade shows, and conventions. Most of the CIA’s economic spying produces little or nothing of real value for America’s policymakers.
Yet the spiderlike agency continues to weave tangled webs that ensnare its officers as well as the foreign companies they seek to entrap. It would be an irony indeed if the current wave of CIA reformism results in a decision to maintain–or even expand–the NOC program and its cousins.
Robert Dreyfuss is a Washington, D.C., freelance writer.
Robert Dreyfuss is a longtime MoJo contributor and the author of Devil’s Game: How the US unleashed fundamentalist Islam
—By Robert Dreyfuss
| January/February 1995 Issue
Find this story at January/February 1995
Copyright ©2013 Mother Jones and the Foundation for National Progress.
Revealed: Guantanamo suspects were ’turned’ into double agents at secret facility13 december 2013
CIA paid millions of dollars to small band of inmates who were recruited to spy on al-Qa’ida leaders
The CIA was doing more than just incarcerating and interrogating the hundreds of terror suspects who were rounded up and delivered to the fortified Guantanamo Bay military prison in a remote corner of Cuba in the wake of the 9/11 attacks. In a few cases it was also trying to turn them into double agents.
Click image above to enlarge graphic
The programme, run from a secret facility within Guantanamo Bay which has never been revealed until now, ran from 2002 until 2006 and drew the personal attention of George W Bush who was then in the White House.
A number of terror suspects were successfully turned and sent back to their countries in the hope that they would reconnect with the al-Qa’ida network and feed information back to the CIA to help it locate and kill high-profile targets, according to an investigation by the Associated Press.
Only those believed still to have legitimate contacts with the top hierarchies of terror group were considered for the secret programme. Once identified, they were tempted by an assortment of inducements, most notably large sums of cash as well as promises from the CIA that their safety and that of their families would thereafter be assured, including with new false identities.
The money for the men, which over time came to millions of dollars, was drawn from a secret CIA fund called the “Pledge”. More prosaically, these special recruits were offered equally special privileges while they remained at Guantanamo Bay, including being taken out of the main cell blocks and moved to a group of small, relatively cosy bungalows set several hundred yards away beyond a screen of shrub and cactus.
The cottages, which went by the codename Penny Lane, had their own patios, kitchens and private showers. Perhaps most tempting of all, they featured proper beds with regular mattresses.
The Penny Lane moniker was derived from The Beatles song, in a nod to the fact that the main cell block complex had already become known as “Strawberry Fields”, because of the next word in the chorus – “forever”. More than 10 years later some of the detainees are still incarcerated in them with little prospect of release.
Some also took collectively to calling the hidden cottages the “Marriott”, because of their relative comfort. Allegedly, the Penny Lane residents were even allowed to access pornography if they so requested.
There was no comment today from the CIA. Details of the programme, which came laden with heavy risks, were pieced together by the Associated Press following interviews with numerous current and former US officials who were familiar with it. They, however, spoke on condition of anonymity. Others familiar with Guantanamo Bay did not express particular surprise.
“Of course that would be an objective,” noted Emile Nakhleh, a former top CIA analyst who helped assess detainees, without discussing the programme further. “It’s the job of intelligence to recruit sources.”
“I do see the irony on the surface of letting some really very bad guys go,” David Remes, a lawyer for a group of Yemeni detainees at the facility, told the AP. He too, however, saw what the CIA was hoping to achieve. “The men we were sending back as agents were thought to be able to provide value to us.”
Mr Bush was sufficiently intrigued to speak at the White House directly to one CIA official who was involved in Afghanistan, where the suspects-turned-agents were sent to upon their release from Penny Lane. By contrast, President Barack Obama is said to have raised concerns about any of those who were supposedly still helping the CIA when he took office in 2009 and ordered a review of all such operations.
If the programme remained a heavily guarded secret, it was surely because of the rather obvious risks associated with it, notably that the men, once released would immediately take part in new attacks against the US and publicly reveal their journeys through Penny Lane to embarrass Washington. There was also concern that if any of them identified a target for drone attack they might themselves have been killed even while being in the pay of the CIA.
While sources said that the programme did result in some successful CIA assassinations of high-priority targets, they conceded that in other cases men simply vanished upon release never to be heard from again. They said there is no evidence, however, that any of them turn around again and killed any Americans.
The treatment of inmates by the US at Guantanamo Bay has repeatedly been condemned by human rights groups. The facility remains a political thorn in the side for President Obama, who has failed to fulfil a pledge made when he was first elected to close it down quickly. He was stymied in particular by resistance on Capitol Hill to any notion of terror suspects being moved to US soil for trial in the regular court system.
Public attention will be directed back to Guantanamo Bay next year in particular with the expected start of the trial of Khalid Sheik Mohammed, the alleged mastermind of the 9/11 attacks on America.
David Usborne
Tuesday, 26 November 2013
Find this story at 26 November 2013
© independent.co.uk
Penny Lane: Gitmo’s other secret CIA facility13 december 2013
This Sept. 2, 2010 satellite image provided by TerraServer.com and DigitalGlobe shows a portion of Naval Station Guantanamo Bay, Cuba, including the secret facility known as Penny Lane, upper middle in white. In the early years after 9/11, the CIA turned a handful of prisoners at the secret facility into double agents and released them. Current and former U.S. officials tell The Associated Press that the program helped kill terrorists. The program was carried out in the secret facility, built a few hundred yards from the administrative offices of the prison in Guantanamo Bay, bottom of image. The eight small cottages were hidden behind a ridge covered in thick scrub and cactus. (AP Photo/TerraServer.com and DigitalGlobe)
WASHINGTON (AP) — A few hundred yards from the administrative offices of the Guantanamo Bay prison, hidden behind a ridge covered in thick scrub and cactus, sits a closely held secret.
A dirt road winds its way to a clearing where eight small cottages sit in two rows of four. They have long been abandoned. The special detachment of Marines that once provided security is gone.
But in the early years after 9/11, these cottages were part of a covert CIA program. Its secrecy has outlasted black prisons, waterboarding and rendition.
In these buildings, CIA officers turned terrorists into double agents and sent them home.
It was a risky gamble. If it worked, their agents might help the CIA find terrorist leaders to kill with drones. But officials knew there was a chance that some prisoners might quickly spurn their deal and kill Americans.
For the CIA, that was an acceptable risk in a dangerous business. For the American public, which was never told, it was one of the many secret trade-offs the government made on its behalf. At the same time the government used the threat of terrorism to justify imprisoning people indefinitely, it was releasing dangerous people from prison to work for the CIA.
Nearly a dozen current and former U.S officials described aspects of the program to The Associated Press. All spoke on condition of anonymity because they were not authorized to publicly discuss the secret program, even though it ended in about 2006.
The program and the handful of men who passed through these cottages had various official CIA codenames. But those who were aware of the cluster of cottages knew it best by its sobriquet: Penny Lane.
It was a nod to the classic Beatles song and a riff on the CIA’s other secret facility at Guantanamo Bay, a prison known as Strawberry Fields.
Some of the men who passed through Penny Lane helped the CIA find and kill many top al-Qaida operatives, current and former U.S. officials said. Others stopped providing useful information and the CIA lost touch with them.
When prisoners began streaming into the prison on the U.S. naval base at Guantanamo Bay, Cuba, in January 2002, the CIA recognized it as an unprecedented opportunity to identify sources. That year, 632 detainees arrived at the island. The following year 117 more arrived.
“Of course that would be an objective,” said Emile Nakhleh, a former top CIA analyst who spent time in 2002 assessing detainees but who did not discuss Penny Lane. “It’s the job of intelligence to recruit sources.”
By early 2003, Penny Lane was open for business.
Candidates were ushered from the confines of prison to Penny Lane’s relative hominess, officials said. The cottages had private kitchens, showers and televisions. Each had a small patio.
Some prisoners asked for and received pornography. One official said the biggest luxury in each cottage was the bed, not a military-issued cot but a real bed with a mattress.
The cottages were designed to feel more like hotel rooms than prison cells, and some CIA officials jokingly referred to them collectively as the Marriott.
Current and former officials said dozens of prisoners were evaluated but only a handful, from varying countries, were turned into spies who signed agreements to spy for the CIA.
CIA spokesman Dean Boyd declined to comment.
Sen. Kelly Ayotte, R-N.H., who serves on the Armed Services and Homeland Security oversight committees, said Tuesday that she was still learning more about the program but was concerned about the numbers of prisoners who were released by the Bush and Obama administrations and returned to fight with terrorists against U.S. interests.
“So, when I juxtapose that to the CIA actually thinking that they can convert these people, I think it was very ill-conceived program for them to think that,” Ayotte said on MSNBC’s “Andrea Mitchell Reports. “These are some very hard-core individuals and many whom have been released by both administrations have gotten back in to fight us and our allies, unfortunately.”
Appearing on the program with Ayotte, Sen. Bob Casey, D-Pa., said it was difficult for him to evaluate the CIA program’s effectiveness. “But it has a degree of recklessness to it that I would be very concerned about,” Casey said.
The U.S. government says it has confirmed about 16 percent of former Guantanamo Bay detainees rejoin the fight against America. Officials suspect but have not confirmed that another 12 percent rejoined.
Though the number of double agents recruited through Penny Lane was small, the program was significant enough to draw keen attention from President George W. Bush, one former official said. Bush personally interviewed a junior CIA case officer who had just returned home from Afghanistan, where the agency typically met with the agents.
President Barack Obama took an interest the program for a different reason. Shortly after taking office, he ordered a review of the former detainees working as double agents because they were providing information used in Predator drone strikes, one of the officials said.
Infiltrating al-Qaida has been one of the CIA’s most sought-after but difficult goals, something that other foreign intelligence services have only occasionally accomplished. So candidates for Penny Lane needed legitimate terrorist connections. To be valuable to the CIA, the men had to be able to reconnect with al-Qaida.
From what the Bush administration was saying about Guantanamo Bay prisoners at the time, the CIA would have seemingly had a large pool to draw from.
Vice President Dick Cheney called the prisoners “the worst of a very bad lot.” Defense Secretary Donald Rumsfeld said they were “among the most dangerous, best trained, vicious killers on the face of the Earth.”
In reality, many were held on flimsy evidence and were of little use to the CIA.
While the agency looked for viable candidates, those with no terrorism ties sat in limbo. It would take years before the majority of detainees were set free, having never been charged. Of the 779 people who were taken to Guantanamo Bay, more than three-fourths have been released, mostly during the Bush administration.
Many others remain at Guantanamo Bay, having been cleared for release by the military but with no hope for freedom in sight.
“I do see the irony on the surface of letting some really very bad guys go,” said David Remes, an American lawyer who has represented about a dozen Yemeni detainees at Guantanamo.
But Remes, who was not aware of Penny Lane, said he understands its attraction.
“The men we were sending back as agents were thought to be able to provide value to us,” he said.
Prisoners agreed to cooperate for a variety of reasons, officials said. Some received assurances that the U.S. would resettle their families. Another thought al-Qaida had perverted Islam and believed it was his duty as a Muslim to help the CIA destroy it.
One detainee agreed to cooperate after the CIA insinuated it would harm his children, a former official said, harkening to similar threats interrogators lodged against admitted 9/11 mastermind Khalid Sheikh Mohammed.
All were promised money. Exactly how much each was paid remains unclear. But altogether, the government paid millions of dollars for their services, officials said. The money came from a secret CIA account, codenamed Pledge, that’s used to pay informants, officials said.
The arrangement led to strategic discussions inside the CIA: If the agency’s drones had a shot at Osama bin Laden or his deputy, Ayman al-Zawahri, would officials take the shot if it meant killing a double agent on the American payroll?
It never came to that.
The biggest fear, former officials involved with the program recalled, was that a former detainee would attack Americans, then publicly announce that he’d been on the CIA payroll.
Al-Qaida suspected the CIA would attempt a program like this and its operatives have been very suspicious of former Guantanamo Bay detainees, intelligence officials and experts said.
In one case, a former official recalled, al-Qaida came close to discovering one of the double agents in its midst.
The U.S. government had such high hopes for Penny Lane that one former intelligence official recalled discussion about whether to secretly release a pair of Pakistani men into the United States on student or business visas. The hope was that they would connect with al-Qaida and lead authorities to members of a U.S. cell.
Another former senior intelligence official said that never happened.
Officials said the program ended in 2006, as the flow of detainees to Guantanamo Bay slowed to a trickle. The last prisoner arrived there in 2008.
Penny Lane still stands and can be seen in satellite photos. The complex is surrounded by two fences and hidden among the trees and shrubs of Guantanamo Bay.
___
Associated Press writer Ben Fox contributed to this story from San Juan, P.R.
By ADAM GOLDMAN and MATT APUZZO
— Nov. 26, 2013 3:42 PM EST
Find this story at 26 November 2013
© 2013 Associated Press
Revealed: Australian spy agency offered to share data about ordinary citizens5 december 2013
• Secret 5-Eyes document shows surveillance partners discussing what information they can pool about their citizens
• DSD indicated it could provide material without some privacy restraints imposed by other countries such as Canada
• Medical, legal or religious information ‘not automatically limited’
• Concern that intelligence agency could be ‘operating outside its legal mandate’
The secret document shows the partners discussing whether or not to share citizens’ “medical, legal or religious information”. Photograph: Kacper Pempel/Reuters
Australia’s surveillance agency offered to share information collected about ordinary Australian citizens with its major intelligence partners, according to a secret 2008 document leaked by the US whistleblower Edward Snowden.
The document shows the partners discussing whether or not to share “medical, legal or religious information”, and increases concern that the agency could be operating outside its legal mandate, according to the human rights lawyer Geoffrey Robertson QC.
The Australian intelligence agency, then known as the Defence Signals Directorate (DSD), indicated it could share bulk material without some of the privacy restraints imposed by other countries, such as Canada.
“DSD can share bulk, unselected, unminimised metadata as long as there is no intent to target an Australian national,” notes from an intelligence conference say. “Unintentional collection is not viewed as a significant issue.”
The agency acknowledged that more substantial interrogation of the material would, however, require a warrant.
Metadata is the information we all generate whenever we use technology, from the date and time of a phone call to the location from which an email is sent.
“Bulk, unselected, unminimised metadata” means that this data is in its raw state, and nothing has been deleted or redacted in order to protect the privacy of ordinary citizens who might have been caught in the dragnet. Metadata can present a very complete picture of someone’s life.
The working document, marked secret, sheds new light on the extent to which intelligence agencies at that time were considering sharing information with foreign surveillance partners, and it provides further confirmation that, to some extent at least, there is warrantless surveillance of Australians’ personal metadata.
The DSD joined its four intelligence-sharing partners – the US, Britain, Canada and New Zealand, collectively known as 5-Eyes – to discuss what could and what could not be shared under the different jurisdictions at a meeting hosted by Britain’s GCHQ at its headquarters in Cheltenham on 22-23 April, 2008.
The notes, published today by Guardian Australia, suggest that Australia was open to pooling bulk data that almost certainly includes information about Australian citizens.
Clearly indicating the different attitudes between the intelligence partners, the Canadians insisted that bulk collection could only be shared if information about its citizens was first “minimised”, meaning deleted or removed. The various techniques used in “minimisation” help protect citizens’ privacy.
The GCHQ memo taker, reporting on this, said that “bulk, unselected metadata presents too high a risk to share with second parties at this time because of the requirement to ensure that the identities of Canadians or persons in Canada are minimised, but re-evaluation of this stance is ongoing”.
By contrast, DSD, now renamed the Australian Signals Directorate, offered a broader sweep of material to its partners.
DSD offered to share bulk, unselected, unminimised metadata – although there were specific caveats. The note taker at the meeting writes: “However, if a ‘pattern of life’ search detects an Australian then there would be a need to contact DSD and ask them to obtain a ministerial warrant to continue.”
A “pattern of life” search is more detailed one – joining the dots to build up a portrait of an individual’s daily activities.
It is technically possible to strip out the metadata of Australian nationals from bulk collection methods used by the 5-Eyes countries, such as cable taps – ensuring the information is not stored, and so could not be pulled in to searches and investigations by agents.
The Snowden documents reveal Australia’s intelligence services instead offered to leave the data in its raw state.
Australian politicians have insisted that all surveillance undertaken is in accordance with the law.
But Geoffrey Robertson, writing in the Guardian today, says if what was described in the memo took place, this would be a breach of sections eight and 12 of the Intelligence Services Act 2001. The act sets a strict requirement that ministerial authorisation is required if the data of an Australian citizen is involved, and indicates that the citizen must be a “person of interest”, such as someone involved in terrorism or organised crime.
The Cheltenham gathering, which appears to have been convened to consider the issues around the burgeoning collection of metadata and to reach common positions, resolved to avoid pre-emptive efforts to categorise various materials and “simply focus on what is shareable in bulk”.
The memo flags privacy concerns around the collection of various types of data, but the meeting, according to the record, resolved not to set “automatic limitations” – leaving judgment calls to each country’s own agencies.
“Consideration was given as to whether any types of data were prohibited, for example medical, legal, religious or restricted business information, which may be regarded as an intrusion of privacy,” the memo says.
“Given the nascent state of many of these data types then no, or limited, precedents have been set with respect to proportionality or propriety, or whether different legal considerations applies to the ‘ownership’ of this data compared with the communications data that we were more accustomed to handle.”
“It was agreed that the conference should not seek to set any automatic limitations, but any such difficult cases would have to be considered by ‘owning’ agency on a case-by-case basis.”
The document also shows the agencies considering disclosure to “non-intelligence agencies”. It says: “Asio and the Australian federal police are currently reviewing how Sigint [signals intelligence] information can be used by non-intelligence agencies.”
The record of the Cheltenham meeting does not indicate whether the activities under discussion in April 2008 progressed to final decisions or specific actions. It appears to be a working draft.
Since Snowden leaked the NSA documents to the Guardian and the Washington Post in May, controversy has raged around the world over revelations that surveillance agencies are collecting information in bulk about ordinary citizens’ day-to-day activities, without first getting a warrant.
In Australia, the Greens party and the South Australian independent senator Nick Xenophon have been pursuing questions about the extent to which Australian citizens have been caught up in the dragnet, and the extent of Australian intelligence agencies’ involvement.
So far, those questions have largely met with stonewalling, both under the previous Labor government and the new Abbott administration.
Ewen MacAskill, James Ball and Katharine Murphy
The Guardian, Monday 2 December 2013 00.20 GMT
Find this story at 2 December 2013
© 2013 Guardian News and Media Limited or its affiliated companies. All rights reserved.
Singapore, South Korea revealed as Five Eyes spying partners5 december 2013
Singapore and South Korea are playing key roles helping the United States and Australia tap undersea telecommunications links across Asia, according to top secret documents leaked by former US intelligence contractor Edward Snowden. New details have also been revealed about the involvement of Australia and New Zealand in the interception of global satellite communications.
A top secret United States National Security Agency map shows that the US and its “Five Eyes” intelligence partners tap high speed fibre optic cables at 20 locations worldwide. The interception operation involves cooperation with local governments and telecommunications companies or else through “covert, clandestine” operations.
The undersea cable interception operations are part of a global web that in the words of another leaked NSA planning document enables the “Five Eyes” partners – the US, United Kingdom, Australia, Canada and New Zealand – to trace “anyone, anywhere, anytime” in what is described as “the golden age” signals intelligence.
The NSA map, published by Dutch newspaper NRC Handelsblad overnight, shows that the United States maintains a stranglehold on trans-Pacific communications channels with interception facilities on the West coast of the United States and at Hawaii and Guam, tapping all cable traffic across the Pacific Ocean as well as links between Australia and Japan.
The map confirms that Singapore, one of the world’s most significant telecommunications hubs, is a key “third party” working with the “Five Eyes” intelligence partners.
In August Fairfax Media reported that Australia’s electronic espionage agency, the Defence Signals Directorate, is in a partnership with Singaporean intelligence to tap the SEA-ME-WE-3 cable that runs from Japan, via Singapore, Djibouti, Suez and the Straits of Gibraltar to Northern Germany.
Australian intelligence sources told Fairfax that the highly secretive Security and Intelligence Division of Singapore’s Ministry of Defence co-operates with DSD in accessing and sharing communications carried by the SEA-ME-WE-3 cable as well as the SEA-ME-WE-4 cable that runs from Singapore to the south of France.
Access to this major international telecommunications channel, facilitated by Singapore’s government-owned operator SingTel, has been a key element in an expansion of Australian-Singaporean intelligence and defence ties over the past 15 years.
Majority owned by Temask Holdings, the investment arm of the Singapore Government, SingTel has close relations with Singapore’s intelligence agencies. The Singapore Government is represented on the company’s board by the head of Singapore’s civil service, Peter Ong, who was previously responsible for national security and intelligence co-ordination in the Singapore Prime Minister’s office.
Australian intelligence expert, Australian National University Professor Des Ball has described Singapore’s signal’s intelligence capability as “probably the most advanced” in South East Asia, having first been developed in cooperation with Australia in the mid-1970s and subsequently leveraging Singapore’s position as a regional telecommunications hub.
Indonesia and Malaysia have been key targets for Australian and Singaporean intelligence collaboration since the 1970s. Much of Indonesia’s telecommunications and Internet traffic is routed through Singapore.
The leaked NSA map also shows South Korea is another key interception point with cable landings at Pusan providing access to the external communications of China, Hong Kong and Taiwan.
South Korea’s National Intelligence Service has long been a close collaborator with the US Central Intelligence Agency and the NSA, as well as the Australian intelligence agencies. The Australian Security Intelligence Organisation recently engaged in legal action in an unsuccessful effort to prevent publication of details of South Korean espionage in Australia. ASIO Director-General David Irvine told the Federal Court that Australian and South Korean intelligence agencies had been cooperating for “over 30 years” and that any public disclose of NIS activities would be “detrimental” to Australia’s national security.
The NSA map and other documents leaked by Mr Snowden and published by the Brazilian O Globo newspaper also reveal new detail on the integration of Australian and New Zealand signals intelligence facilities in the interception of satellite communications traffic by the “Five Eyes” partners.
For the first time it is revealed that the DSD satellite interception facility at Kojarena near Geraldton in Western Australia is codenamed “STELLAR”. The New Zealand Government Communications Security Bureau facility at Waihopai on New Zealand’s South Island is codenamed “IRONSAND”. The codename for DSD’s facility at Shoal Bay near Darwin is not identified. However all three facilities are listed by the NSA as “primary FORNSAT (foreign satellite communications) collection operations”.
Coverage of satellite communications across Asia and the Middle East is also supported by NSA facilities at the United States Air Force base at Misawa in Japan, US diplomatic premises in Thailand and India, and British Government Communications Headquarters facilities in Oman, Nairobi in Kenya and at the British military base in Cyprus.
The leaked NSA map also shows that undersea cables are accessed by the NSA and the British GCHQ through military facilities in Djibouti and Oman, thereby ensuring maximum coverage of Middle East and South Asian communications.
November 25, 2013
Philip Dorling
Find this story at 25 November 2013
Copyright © 2013 Fairfax Media
New Snowden leaks reveal US, Australia’s Asian allies5 december 2013
Singapore and South Korea are playing key roles helping the United States and Australia tap undersea telecommunications links across Asia, according to top secret documents leaked by former US intelligence contractor Edward Snowden. New details have also been revealed about the involvement of Australia and New Zealand in the interception of global satellite communications.
A top secret United States National Security Agency map shows that the US and its “Five Eyes” intelligence partners tap high speed fibre optic cables at 20 locations worldwide. The interception operation involves cooperation with local governments and telecommunications companies or else through “covert, clandestine” operations.
The undersea cable interception operations are part of a global web that in the words of another leaked NSA planning document enables the “Five Eyes” partners – the US, United Kingdom, Australia, Canada and New Zealand – to trace “anyone, anywhere, anytime” in what is described as “the golden age” signals intelligence.
The NSA map, published by Dutch newspaper NRC Handelsblad overnight, shows that the United States maintains a stranglehold on trans-Pacific communications channels with interception facilities on the West coast of the United States and at Hawaii and Guam, tapping all cable traffic across the Pacific Ocean as well as links between Australia and Japan.
The map confirms that Singapore, one of the world’s most significant telecommunications hubs, is a key “third party” working with the “Five Eyes” intelligence partners.
In August Fairfax Media reported that Australia’s electronic espionage agency, the Defence Signals Directorate, is in a partnership with Singaporean intelligence to tap the SEA-ME-WE-3 cable that runs from Japan, via Singapore, Djibouti, Suez and the Straits of Gibraltar to Northern Germany.
Australian intelligence sources told Fairfax that the highly secretive Security and Intelligence Division of Singapore’s Ministry of Defence co-operates with DSD in accessing and sharing communications carried by the SEA-ME-WE-3 cable as well as the SEA-ME-WE-4 cable that runs from Singapore to the south of France.
Access to this major international telecommunications channel, facilitated by Singapore’s government-owned operator SingTel, has been a key element in an expansion of Australian-Singaporean intelligence and defence ties over the past 15 years.
Majority owned by Temask Holdings, the investment arm of the Singapore Government, SingTel has close relations with Singapore’s intelligence agencies. The Singapore Government is represented on the company’s board by the head of Singapore’s civil service, Peter Ong, who was previously responsible for national security and intelligence co-ordination in the Singapore Prime Minister’s office.
Australian intelligence expert, Australian National University Professor Des Ball has described Singapore’s signal’s intelligence capability as “probably the most advanced” in South East Asia, having first been developed in cooperation with Australia in the mid-1970s and subsequently leveraging Singapore’s position as a regional telecommunications hub.
Indonesia and Malaysia have been key targets for Australian and Singaporean intelligence collaboration since the 1970s. Much of Indonesia’s telecommunications and Internet traffic is routed through Singapore.
The leaked NSA map also shows South Korea is another key interception point with cable landings at Pusan providing access to the external communications of China, Hong Kong and Taiwan.
South Korea’s National Intelligence Service has long been a close collaborator with the US Central Intelligence Agency and the NSA, as well as the Australian intelligence agencies. The Australian Security Intelligence Organisation recently engaged in legal action in an unsuccessful effort to prevent publication of details of South Korean espionage in Australia. ASIO Director-General David Irvine told the Federal Court that Australian and South Korean intelligence agencies had been cooperating for “over 30 years” and that any public disclose of NIS activities would be “detrimental” to Australia’s national security.
The NSA map and other documents leaked by Mr Snowden and published by the Brazilian O Globo newspaper also reveal new detail on the integration of Australian and New Zealand signals intelligence facilities in the interception of satellite communications traffic by the “Five Eyes” partners.
For the first time it is revealed that the DSD satellite interception facility at Kojarena near Geraldton in Western Australia is codenamed “STELLAR”. The New Zealand Government Communications Security Bureau facility at Waihopai on New Zealand’s South Island is codenamed “IRONSAND”. The codename for DSD’s facility at Shoal Bay near Darwin is not identified. However all three facilities are listed by the NSA as “primary FORNSAT (foreign satellite communications) collection operations”.
Coverage of satellite communications across Asia and the Middle East is also supported by NSA facilities at the United States Air Force base at Misawa in Japan, US diplomatic premises in Thailand and India, and British Government Communications Headquarters facilities in Oman, Nairobi in Kenya and at the British military base in Cyprus.
The leaked NSA map also shows that undersea cables are accessed by the NSA and the British GCHQ through military facilities in Djibouti and Oman, thereby ensuring maximum coverage of Middle East and South Asian communications.
November 24, 2013
Philip Dorling
Find this story at 24 November 2013
Copyright © 2013 Fairfax Media
How we spied on the Indonesians and how expats are targeted overseas5 december 2013
THEIR clandestine activities may be directly in the spotlight, but Australian spies have for decades been listening in on our neighbours.
Modern spooks have two main methods of tapping the mobile phones of people of interest in cities such as Jakarta. The first option is to install a physical bugging device in the actual handset, to forward calls to a third number – but this requires access to the handset.
For high-security targets, Australian agents use electronic scanners and very powerful computers to monitor phone numbers of interest via microwave towers (small metal towers that look like venetian blinds) located on top of buildings across Jakarta and all modern cities.
The latter was employed to tap the phones of Indonesian President Susilo Bambang Yudhoyono, his wife and key ministers.
Getting hold of a handset is a tricky business so the preferred method for the spooks employed by the Australian Signals Directorate (formerly Defence Signals Directorate) is to monitor microwave phone towers located on top of most buildings in Jakarta and indeed any other major city.
The material, known at this point as “first echelon”, is captured by computers located in secure rooms at the Australian Embassy where information is filtered before it is forwarded by secure means to super computers located at ASD headquarters. They are located inside the maximum security building ‘M’, protected by high voltage electric fences, at Defence’s Russell Office complex in Canberra. Here it is processed and analysed as “second echelon” product.
In less busy locations, or where the target phone number is known, an off-the-shelf scanner can be programmed to intercept mobile phone calls.
In cities such as Jakarta enterprising business people now offer a mobile bugging service where for a fee of between $300 and $1000 they will arrange to “borrow” a mobile phone, insert a bugging device and then return it to a relieved owner. Whenever the phone rings or is used to access a network the call is diverted to another handset or recording device.
Government staff understand that if their phone goes missing and then turns up they should dispose of it and get a new one.
But for the average citizen, say a teacher at an English speaking school in Jakarta whose phone was bugged by an angry ex-girlfriend, phone tapping is a serious matter. And it is more common than many expatriates might think.
There is a thriving business in phone tapping for private or industrial or state espionage reasons in cities such as Jakarta, Singapore and Bangkok. Industrial espionage is widespread in cities around the world including Sydney, Melbourne and Canberra.
Compared to the operations of ASD and its powerful scanners, super computers and army of analysts these operations are small beer.
Prime Minister Tony Abbott was quick to point out in the wake of the phone tapping scandal that every country spied and he was right.
However Indonesia has nowhere near the capacity for espionage that Australia and our close “five eyes” allies – the US, UK, Canada and New Zealand – posses.
After the 2002 Bali bombings the DSD, Australian Federal Police and Telstra went to Indonesia and showed Indonesian intelligence agencies how to tap into the networks of the terrorist group Jemaah Islamiah (JI).
Unlike Australia much of Indonesia’s electronic surveillance capacity is directed at internal problems such as the insurgencies in Aceh and West Papua.
According to one of Australia’s leading experts on electronic spying, Professor Des Ball from the Australian National University, there is really no point in conducting such intercept operations unless a country has the whole picture. That is satellite communications, cable communications and radio communications.
“Microwave mobile phone calls are very hit and miss,” he said.
Australia owns the big picture thanks to an expensive and extensive network of listening posts in Jakarta, Bangkok and Port Moresby and powerful satellite ground stations at HMAS Harman in Canberra, Shoal Bay near Darwin, Morundah near Wagga in NSW, Cabarlah near Toowoomba in Qld and Geraldton in WA.
This interception network is monitoring communications from Singapore to the Pacific Islands including Indonesia’s Palapa satellite.
Professor Ball said there had been huge growth in Australia’s eavesdropping capacity in recent years. For example the number of dishes at Shoal Bay has gone from six to 15 and Geraldton has more than doubled its capacity including six American dishes for the exclusive use of the National Security Agency (NSA) whose lax security allowed Edward Snowden to abscond with top-secret information that is now being leaked.
Unfortunately Australian taxpayers have no way of knowing how much is spent on these facilities or even how many staff are employed by the top-secret ASD. The numbers used to appear in the Defence annual report, but not anymore.
Professor Ball said successive governments had allowed the electronic spooks to have a virtual free rein.
“When briefings about the phone intercepts from SBY and his wife came in the government should have ordered the tapping to stop,” Professor Ball said.
“It is important to have the capacity but you only use it when there is a conflict. Put it in, test it and keep it up to date, but don’t use it because unless you have to because it will come out.”
Professor Ball also slammed Mr Abbott for saying that other countries (Indonesia) were doing exactly what Australia did, because they weren’t and they can’t.
“They are not doing what we are doing and Abbott should have apologised or done what Bob Hawke did with Papua New Guinea in 1983.”
Prime Minister Hawke went to Port Moresby after it was revealed that Australia spied on politicians there, but before he left he ordered the spooks switch to all monitoring equipment off for 48 hours. He was then able to say that Australia wasn’t doing it although as journalist Laurie Oakes pointed out he had to be “very careful with his tenses”.
Tapping a friendly foreign leader’s phone is fraught enough. Recording the fact on clear power point slides and handing them to another country is just plain dumb.
IAN MCPHEDRAN NATIONAL DEFENCE WRITER
NEWS LIMITED NETWORK
NOVEMBER 21, 2013 6:34PM
Find this story at 21 November 2013
News Ltd 2013 Copyright
Spying rocks Indonesia-Australia relations5 december 2013
Indonesia has officially downgraded the relationship, after Australia refused to apologise for espionage.
A spy scandal involving an Australian attempt to tap the phone of Indonesia’s president has jeopardised crucial people smuggling and counter-terrorism co-operation between the two countries, officials have said.
President Susilo Bambang Yudhoyono has temporarily suspended co-coordinated military operations with Australia, including those which target people-smuggling, after significant public outcry in Indonesia over the reports.
“I find it personally hard to comprehend why the tapping was done. We are not in a cold war era,” President Yudhoyono said.
Find out more with our exclusive interactive feature
“I know Indonesians are upset and angry over what Australia has done to Indonesia. Our reactions will determine the future of the relationship and friendship between Indonesia and Australia – which actually have been going well.”
Angry crowds mobbed Australia’s embassy in Jakarta, burning Australian and American flags on Thursday. Indonesia has officially downgraded its relationship with Australia and recalled its ambassador from Canberra.
‘Reasonable’ surveillance
The country’s prime minister, Tony Abbott, has refused to apologise for what he calls “reasonable” surveillance, but promised to respond to the president’s request for an explanation “swiftly and courteously”.
“I want to express … my deep and sincere regret about the embarrassment to the president and to Indonesia that’s been caused by recent media reporting,” Abbott told parliament.
“As always, I am absolutely committed to building the closest possible relationship with Indonesia because that is overwhelmingly in the interests of both our countries.”
I don’t believe Australia should be expected to apologise for reasonable intelligence-gathering activities
Tony Abbott, Australian Prime Minister
The situation erupted after documents leaked by former US National Security Agency contractor Edward Snowden, showed Australia’s Defence Signal’s Directorate recorded personal communications of President Yudhoyono, his wife, Ani Yudhoyono, and senior officials in 2009.
The surveillance is understood to be part of a longstanding spying arrangement with the UK, USA, Canada and New Zealand, known as the “five eyes” intelligence partners.
“I don’t believe Australia should be expected to apologise for reasonable intelligence-gathering activities,” Abbott told Australia’s parliament on Tuesday.
“Importantly, in Australia’s case, we use all our resources including information to help our friends and allies, not to harm them,” Abbott said.
The document leaked by Snowden was dated November 2009 and was published jointly by Guardian Australia and the Australian Broadcasting Corporation state television network.
It details the attempted interception of various targets’ mobile phones and lists their specific phone models with slides marked “top secret” and the Australian Signals Directorate’s slogan: “Reveal their secrets, protect our own.”
This leak came after previous documents released by Snowden revealed Australian embassies had participated in
widespread US surveillance across Asia, including in Cambodia, China, Indonesia, Malaysia, Myanmar and Thailand.
Strained relations
The combined revelations have strained a bilateral relationship already under pressure over the Abbott government’s hardline asylum seeker policy to “turn back” boats coming to Australia, a controversial and highly emotive issue in the country.
Professor Greg Fealy is an Indonesian politics specialist at the Australian National University. He told Al Jazeera the situation was becoming increasingly serious.
“Every new day brings new sanctions from the Indonesian side and so far the Abbott government hasn’t responded well to it,” Fealy said.
He believes relations between the two countries have not been this strained since the East Timor crisis in 1999, when Australia’s military went into East Timor during its transition from an Indonesian territory to independence.
“It has the potential to get worse, with the Indonesians withdrawing further cooperation [with Australia] in many fields,” Fealy said.
“If there is a sufficiently wide range of retaliation then this could possibly be worse than the crisis of 15 years ago.”
Prime Minister Abbott has been encouraged to reassure President Yudhoyono that no further surveillance is taking place – similar to the conversation between US President Barack Obama and German Chancellor Angela Merkel after
revelations her phone was also tapped.
John McCarthy, a former Australian ambassador to Indonesia, said Abbott must contact Yudhoyono to make amends.
“There is nothing, frankly, to prevent the prime minister saying to the president that it’s not happening and it’s not going to happen in the future. That’s what Obama did with Angela Merkel and I don’t see a problem with that,”
McCarthy said.
“It can’t be allowed just to fester. If it festers it will get worse and it will be much harder to deal with, particularly as the politics get hotter in Indonesia.”
US blame
Australian officials would also be expressing their frustration with the United States over this situation, according to Michael Wesley, professor of national security at the Australian National University.
“There are a number of reasons Australian officials can legitimately be very irritated with the Americans. We’re in this mess because of an American security lapse,” Wesley told Al Jazeera.
“I’m actually gobsmacked at both Snowden and Bradley Manning, at their ability to get highly classified documents and download them. It would be absolutely impossible for people of their level of access to do that in Australia.”
“There should be real questions asked in the American intelligence community how this could have happened,” Professor Wesley said.
Former NSA senior executive Thomas Drake said the “five eyes” utilise each other’s services for information on other nations.
“Much of it is legit, but increasingly since 9/11 because of the sheer power of technology and access to the world’s communication systems … [agencies have] extraordinary access to even more data on just about anything and anybody,” Drake told ABC.
Indonesia’s minister for religious affairs, Suryadharma Ali, also cancelled a planned visit to Australia following the response from Yudhoyono.
Author and Indonesian political expert Professor Damien Kingsbury was due to host Ali at an event in Melbourne, and
told Al Jazeera the snub was a concerning sign of the deterioration in relations.
“It is still quite significant that a senior minister felt he couldn’t come to Australia at this time,” Kingsbury said.
“It’s pretty disastrous, the issue has effectively ended ongoing diplomatic engagement between Australia and Indonesia.”
“We’ve seen the cancellation and suspension of a number of points of engagement and that has quite distinct implications for Australian government policy in some areas. There is the possibility this matter could continue to escalate if it’s not adequately resolved,” Kingsbury said.
‘Uncomfortable’
The bilateral relationship between the two nations will be “uncomfortable” but it will pass, according to former US assistant secretary of state for East Asia, Kurt Campbell.
“The relationship will be strong again, but there is a ritual quality that I’m afraid you [Australia] will have to go through, and very little you can say now or do is going to ease the next couple of months,” Campbell told ABC.
He said the practice of phone-tapping was an acceptable part of international relations.
“I can tell you that some of the most sensitive spying is done by allies and friends.”
“Some of the most difficult foreign policy challenges – terrorist attacks – actually emanated in Indonesia. Australia has good cause to understand the delicate dynamics that play out behind the scenes with regard to how Indonesia’s thinking about some of those movements and some of the actors inside its country,” Campbell said.
Australian opposition leader Bill Shorten said the “vital” relationship between the two countries must be repaired.
“No-one should underestimate what is at stake in maintaining this critical relationship on the best possible terms.
“Co-operation between our countries is fundamental to our national interest – working together on people smuggling, terrorism, trade,” Shorten wrote in an opinion piece for The Guardian.
Prime Minister Abbott is expected to respond to Indonesia’s request for a full written explanation into the phone tapping in the coming days.
Geraldine Nordfeldt Last updated: 22 Nov 2013 15:00
Find this story at 22 November 2013
Indonesia voices anger at Australia alleged spying5 december 2013
(CNN) — Indonesia summoned the Australian ambassador Monday to voice its anger at allegations that Australia tried to listen into the phone calls of Indonesian President Susilo Bambang Yudhoyono.
Greg Moriarty. Australia’s ambassador to Indonesia, “took careful note of the issues raised and will report back to the Australian Government,” the Australian embassy in Jakarta said.
Indonesia’s objections stem from reports in the Australian Broadcasting Corporation (ABC) and Guardian Australia that said Australian intelligence tracked Yudhoyono’s mobile phone for 15 days in August 2009, monitoring the calls he made and received.
‘We live in a post-Snowden age’
Stone: ‘We’ve bugged the whole world’
Fareed’s Take: Spying on allies
The intelligence agency also tried to listen in on what was said on at least one occasion. But the call was less than a minute long and could not be successfully tapped, ABC reported.
The two media outlets cited documents provided by Edward Snowden, the U.S. national security contractor turned leaker.
“The Australian Government urgently needs to clarify on this news, to avoid further damage,” Indonesian presidential spokesman Teuku Faizasyah tweeted.
“The damage has been done and now trust must be rebuilt,” he said in another tweet.
Asked in parliament to comment on the reports, Australian Prime Minister Tony Abbott said, “all governments gather information and all governments know that every other government gathers information.”
“The Australian Government never comments on specific intelligence matters,” he added. “This has been the long tradition of governments of both political persuasions and I don’t intend to change that today.”
By the CNN Staff
November 18, 2013 — Updated 1033 GMT (1833 HKT)
Find this story at 18 November 2013
© 2013 Cable News Network. Turner Broadcasting System, Inc.
Australia spied on Indonesian president Susilo Bambang Yudhoyono, leaked Edward Snowden documents reveal5 december 2013
Video: Watch: Michael Brissenden on how leaked documents prove Australia spied on SBY (ABC News)
Photo: The documents show the DSD tracked activity on Susilo Bambang Yudhoyono’s mobile phone. (Reuters: Supri)
Related Story: Live: Follow the unfolding reaction to this story
Map: Australia
Australian intelligence tried to listen in to Indonesian president Susilo Bambang Yudhoyono’s mobile phone, material leaked by NSA whistleblower Edward Snowden reveals.
Documents obtained by the ABC and Guardian Australia, from material leaked by the former contractor at the US National Security Agency, show Australian intelligence attempted to listen in to Mr Yudhoyono’s telephone conversations on at least one occasion and tracked activity on his mobile phone for 15 days in August 2009.
Spy games explained
Australia’s role in the NSA spy program, including what it means for Indonesian relations.
The top-secret documents are from Australia’s electronic intelligence agency, the Defence Signals Directorate (now called the Australian Signals Directorate), and show for the first time how far Australian spying on Indonesia has reached.
The DSD motto stamped on the bottom of each page reads: “Reveal their secrets – protect our own.”
The documents show that Australian intelligence actively sought a long-term strategy to continue to monitor the president’s mobile phone activity.
The surveillance targets also included senior figures in his inner circle and even the president’s wife Kristiani Herawati (also known as Ani Yudhoyono).
Also on the list of targets is the vice president Boediono, the former vice president Yussuf Kalla, the foreign affairs spokesman, the security minister, and the information minister.
Mr Yudhoyono’s spokesman Teuku Faizasyah has responded to the revelations, saying: “The Australian Government needs to clarify this news, to avoid further damage … [but] the damage has been done.”
Asked about the spying in Question Time today, Prime Minister Tony Abbott said: “First of all, all governments gather information and all governments know that every other government gathers information… the Australian government never comments on specific intelligence matters. This has been the long tradition of governments of both political persuasions and I don’t intend to change that today.”
Documents list ‘who’s who’ of Indonesian government
One page in the documentation lists the names and the 3G handsets the surveillance targets were using at the time.
A number of the people on the list are lining up as potential candidates for the presidential election to replace Mr Yudhoyono next year.
The documents are titled “3G impact and update” and appear to chart the attempts by Australian intelligence to keep pace with the rollout of 3G technology in Indonesia and across South-East Asia.
A number of intercept options are listed and a recommendation is made to choose one of them and to apply it to a target – in this case the Indonesian leadership.
The document shows how DSD monitored the call activity on Mr Yudhoyono’s Nokia handset for 15 days in August 2009.
One page is titled “Indonesian President voice events” and provides what is called a CDR view. CDR are call data records; it can monitor who is called and who is calling but not necessarily what was said.
Another page shows that on at least one occasion Australian intelligence did attempt to listen in to one of Mr Yudhoyono’s conversations.
But according to the notes on the bottom of the page, the call was less than one minute long and therefore did not last long enough to be successfully tapped.
Factbox: Indonesia and Australia
Indonesia is one of Australia’s most important bilateral relationships.
Indonesia was Australia’s 12th largest trade partner in 2012.
Prime Minister Tony Abbott has pledged to increase two-way trade and investment flows.
President Yudhoyono has visited Australia four times during his presidency, more than any predecessor.
Asylum seekers remain a sticking point in relations; Australia seeks active cooperation.
In 2012-13, Australia’s aid assistance to Indonesia was worth an estimated $541.6 million.
Source: http://www.dfat.gov.au/geo/indonesia/indonesia_brief.html
Given the diplomatic furore that has already surrounded the claims that the Australian embassy in Jakarta was involved in general spying on Indonesia, these revelations of specific and targetted surveillance activity at the highest level are sure to increase the tension with our nearest and most important neighbour significantly.
On an official visit to Canberra last week, the Indonesian vice president publicly expressed Indonesia’s concern.
“Yes, the public in Indonesia is concerned about this,” Boediono said.
“I think we must look to come to some arrangement that guarantees intelligence information from each side is not used against the other.”
Last week Prime Minister Tony Abbott was keen to play down the significance of the spying allegations, saying that he was very pleased “we have such a close, cooperative and constructive relationship with the Indonesian government”.
That may be a little harder to say today.
By national defence correspondent Michael Brissenden
Updated Mon 18 Nov 2013, 8:11pm AEDT
Find this story at 18 November 2013
© 2013 ABC
Australia’s spy agencies targeted Indonesian president’s mobile phone5 december 2013
Secret documents revealed by Edward Snowden show Australia tried to monitor the mobile calls of Susilo Bambang Yudhoyono and his wife
Susilo Bambang Yudhoyono, accompanied by his first lady, Kristiani Herawati, speaks to his Democratic party supporters during a rally in Banda Aceh, Aceh province, in March 2009. Photograph: Supri/Reuters
Australia’s spy agencies have attempted to listen in on the personal phone calls of the Indonesian president, Susilo Bambang Yudhoyono, and have targeted the mobile phones of his wife, senior ministers and confidants, a top-secret document from whistleblower Edward Snowden reveals.
The document, dated November 2009, names the president and nine of his inner circle as targets of the surveillance, including the vice-president, Boediono, who last week visited Australia. Other named targets include ministers from the time who are now possible candidates in next year’s Indonesian presidential election, and the first lady, Kristiani Herawati, better known as Ani Yudhoyono.
When a separate document from Snowden, a former contractor to the US’s National Security Agency (NSA), showed Australia had spied on Indonesia and other countries from its embassies, the Indonesian foreign minister, Marty Natalegawa, reacted angrily and threatened to review co-operation on issues crucial to Australia such as people smuggling and terrorism.
The revelation strained a bilateral relationship already under pressure over the Abbott government’s policy to “turn back” boats of asylum seekers coming to Australia. The new leak, published jointly by Guardian Australia and the Australian Broadcasting Corporation, reveals the specific top-level targets and is likely to seriously escalate those tensions.
The leaked material is a slide presentation, marked top secret, from the Australian Department of Defence and the Defence Signals Directorate, or DSD, (now called the Australian Signals Directorate), dealing with the interception of mobile phones as 3G technology was introduced in Asia. It includes a slide titled Indonesian President Voice Intercept, dated August 2009 and another slide, titled IA Leadership Targets + Handsets, listing the president and the first lady as having Nokia E90-1s, Boediono as having a BlackBerry Bold 9000, as well as the type and make of the mobile phones held by the other targets.
Also named as targets for the surveillance are Dino Patti Djalal, at the time the president’s foreign affairs spokesman, who recently resigned as Indonesia’s ambassador to the US and is seeking the candidacy in next year’s presidential election for the president’s embattled Democratic party, and Hatta Rajasa, now minister for economic affairs and possible presidential candidate for the National Mandate party. Hatta was at the time minister for transport and his daughter is married to the president’s youngest son.
A slide entitled Indonesian President Voice Intercept (August ’09), shows a call from an unknown number in Thailand to Yudhoyono. But the call did not last long enough for the DSD to fulfil its aims. “Nil further info at this time (didn’t make the dev threshold – only a sub-1minute call),” a note at the bottom says.
Another slide, titled Indonesian President Voice Events, has a graphic of calls on Yudhoyono’s Nokia handset over 15 days in August 2009. It plots CDRs – call data records – which record the numbers called and calling a phone, the duration of calls, and whether it was a voice call or SMS. The agency, in what is standard procedure for surveillance, appears to have expanded its operations to include the calls of those who had been in touch with the president. Another slide, entitled Way Forward, states an imperative: “Must have content.”
Also on the list of “IA Leadership Targets” are:
• Jusuf Kalla, the former vice-president who ran as the Golkar party presidential candidate in 2009.
• Sri Mulyani Indrawati, then a powerful and reforming finance minister and since 2010 one of the managing directors of the World Bank Group.
• Andi Mallarangeng, a former commentator and television host who was at the time the president’s spokesman, and who was later minister for youth and sports before resigning amid corruption allegations.
• Sofyan Djalil, described on the slide as a “confidant”, who until October 2009 was minister for state-owned enterprises.
• Widodo Adi Sucipto, a former head of the Indonesian military who was until October 2009 security minister.
Asked about the previous revelations about the embassies, Tony Abbott emphasised that they occurred during the administration of the former Labor government, that Australia’s activities were not so much “spying” as “research” and that its intention would always be to use any information “for good”. The prime minister has repeatedly insisted Australia’s relationship with Indonesia is “good and getting better”.
Boediono said during his visit to Australia – before being revealed as an intended target of Australia’s surveillance – that the Indonesian public was “concerned” about the spying allegations.
“I think we must look forward to come to some arrangement which guarantees that intelligence information from each side is not used against the other,” he said. “There must be a system.”
At the bottom of each slide in the 2009 presentation is the DSD slogan: “Reveal their secrets – protect our own.” The DSD is credited with supplying the information.
Yudhoyono now joins his German, Brazilian and Mexican counterparts as leaders who have been monitored by a member of Five Eyes, the collective name for the surveillance agencies of the US, Britain, Australia, New Zealand and Canada, who share information.
Germany, Brazil and Mexico have all protested to the US over the infringement of privacy by a country they regarded as friendly. The German chancellor, Angela Merkel, reacted with outrage to the revelation that her personal mobile phone had been tapped by the US, calling President Barack Obama to demand an explanation. The US eventually assured the chancellor that her phone was “not currently being tapped and will not be in the future”.
The Australian slide presentation, dated November 2009, deals with the interception of 3G mobile phones, saying the introduction of 3G in south-east Asia was nearly complete and providing dates for 3G rollout in Cambodia, Malaysia, the Philippines, Singapore and Thailand.
Talking about future plans, the Australian surveillance service says it “must have content” and be able to read encrypted messages, which would require acquiring the keys that would unlock them. Other documents from Snowden show the intelligence agencies have made huge inroads in recent years in finding ways into encrypted messages.
One of the slides, entitled DSD Way Forward, acknowledges that the spy agency’s resources are limited compared with its US and British counterparts. It says there is a “need to capitalise on UKUSA and industry capability”, apparently a reference to the help provided – willingly or under pressure – from telecom and internet companies. The slides canvass “options” for continued surveillance and the final slide advises: “Choose an option and apply it to a target (like Indonesian leadership).”
The tension between Australia and Indonesia began in October when documents revealed by the German newspaper Der Spiegel and published by Fairfax newspapers revealed that Australian diplomatic posts across Asia were being used to intercept phone calls and data. The Guardian then revealed that the DSD worked alongside America’s NSA to mount a massive surveillance operation in Indonesia during a UN climate change conference in Bali in 2007.
But these earlier stories did not directly involve the president or his entourage. Abbott made his first international trip as prime minister to Indonesia and has repeatedly emphasised the crucial importance of the bilateral relationship.
Speaking after his meeting with Boediono last week, Abbott said: “All countries, all governments gather information. That’s hardly a surprise. It’s hardly a shock.
“We use the information that we gather for good, including to build a stronger relationship with Indonesia and one of the things that I have offered to do today in my discussions with the Indonesian vice-president is to elevate our level of information-sharing because I want the people of Indonesia to know that everything, everything that we do is to help Indonesia as well as to help Australia. Indonesia is a country for which I have a great deal of respect and personal affection based on my own time in Indonesia.”
Asked about the spying revelations in a separate interview, Abbott said: “To use the term spying, it’s kind of loaded language … researching maybe. Talking to people. Understanding what’s going on.”
On Monday a spokesman for Abbott said: “Consistent with the long-standing practice of Australian governments, and in the interest of national security, we do not comment on intelligence matters.”
It remains unclear exactly who will contest next year’s Indonesian presidential election, in which Yudhoyono, having already served two terms, is not eligible to stand. Based on recent polling, the popular governor of Jakarta, Joko Widodo, known as Jokowi, and former general Prabowo Subianto would be frontrunners.
Ewen MacAskill in New York and Lenore Taylor in Canberra
theguardian.com, Monday 18 November 2013 00.58 GMT
Find this story at 18 November 2013
Find the documents at
© 2013 Guardian News and Media Limited or its affiliated companies. All rights reserved.
In the shadows of international law4 december 2013
German intelligence services collect data from asylum seekers that could have security relevance and turn it over to the US. In some instances this could be a breach of international law.
In its ongoing “war on terror,” the United States, for years, has been carrying out so-called targeted killings of suspected terrorists with the help of unmanned drone aircraft. Information about possible targets is also passed on to the US intelligence services by their German counterparts, who have gleaned that information from asylum seekers.
Germany’s Central Survey Office (HBW) regularly conducts background checks on asylum seekers. The agency, like the Federal Intelligence Service (BND), answers directly to the chancellor, and is particularly interested in information about suspected terrorists in the asylum seeker’s country of origin.
Theoretically, as German media have pointed out, the transfer of this information could lead to the targeted killing of a person by the United States, making Germany an indirect participant in that action – and that could be a violation of international law, according to Robert Frau, an expert on the subject at Viadrina University in Frankfurt/Oder.
“If Germany were to hand over data to the Americans, which were then used for illegal actions, then Germany would be abetting a breach of international law,” said Frau.
Interpretations of international law
There is no consensus among law experts, however, whether or not drone attacks and targeted killings are a violation of international law, and as such, whether Germany, in passing on information, would be abetting a breach of the law.
This MQ-9 Reaper is one of the main drones used by the US for clandestine air operations
In armed conflicts, persons participating directly in combat operations are legitimate targets. “In such cases, a drone attack is no different than using a missile, or having soldiers fire their weapons,” said Frau.
A targeted killing in that scenario would not be a violation of international law. Both the United States and Germany, for example, are involved in an armed conflict in Afghanistan. Therefore, if Germany passes information to the US on German citizens in Afghanistan and the US uses that information for a targeted killing, that is not a breach of international law, Frau explained.
The situation would be different in Somalia, however. “Germany is not involved in armed conflict there and outside of an armed conflict there are other rules. That means, as a matter of principle, such killings are not legal,” Frau stressed.
No German collusion is known
Hans-Christian Ströbele admits that no German participation is known
It is next to impossible to prove whether or not Germany in the past ever provided information that led to a targeted killing. When asked, the German government points to the necessity of keeping sensitive information secret.
Even the highly critical Green politician, Hans-Christian Ströbele, who is a member of the Parliamentary Control Committee that oversees the intelligence services and has access to secret government files, has said that he has no knowledge of any such cases.
Ströbele did say, however, that there was also no way to totally exclude it either. Germany, he said, had no way of knowing what the US did with the information it received from Berlin.
Once data is passed on, one can assume the US intelligence services will use it as they see fit, agrees law expert Frau. Germany “cannot pass on data with the explicit request that they not be used for illegal acts,” he said.
Date 26.11.2013
Author Sven Pöhle / gb
Editor John Blau
Find this story at 26 November 2013
© 2013 Deutsche Welle |
German spies keep tabs on asylum-seekers4 december 2013
German law promises refuge to those persecuted in their home countries. Now it has been revealed that German intelligence uses the asylum process to find out more about those coming here – and those who stay behind.
When refugees apply for asylum in Germany they have to go through a long process before their stay is approved. Employees of the Federal Office for Migration and Refugees ask them questions about the situation in their home country and whether they face political persecution.
They agency is also interested in finding out how refugees arrived in Germany, whether criminal smugglers helped them and whether applicants entered other European countries before arriving in Germany. If they did, international law says they must return to the country of entry.
Victor Pfaff says the HBW are not mysterious
But unknown to the public, there is another authority that can take charge of the process. The Berlin-based Office for Interrogation (HBW) is officially part of the chancellor’s office. Since 1958 if has gathered information to help Germany’s domestic Federal Intelligence Service (BND). Many observers believe it is in reality part of the BND.
Journalists from the daily “Süddeutsche Zeitung” and public broadcaster NDR reported that HBW employees ask whether asylum-seekers know specific people in their home countries who might belong to a terrorist organization or have information about weapons caches. In theory, this information could be used by intelligence services to find or kill terrorists.
A dangerous game?
Lawyers who advise asylum-seekers about their rights frequently encounter the HBW. Victor Pfaff has been working in Frankfurt as an asylum-rights lawyer for more than 40 years. He has met many HBW employees, finding them always to be very polite and happy to hand out their business cards. “We shouldn’t enshroud them in a fog of mystery,” he said.
Pfaff said the agency denies being part of the BND, even though both organizations report directly to the chancellor.
Asylum-seekers had never complained to him that this questioning caused them problems, Pfaff said. On the contrary, he sometimes approached the HBW for help in speeding up difficult asylum cases. He said if his clients are able to provide useful information, their residence permits can be issued in a matter of days.
But deals like this only happen rarely, Pfaff said, warning that information can also be gathered without consent. “It is problem if German intelligence is secretly present at a an asylum hearing and provides this information to foreign intelligence.” If this happened, asylum-seekers might feel they were being used. Pfaff said he had heard of such cases, and believed they posed a danger, because terrorists could take revenge and kill alleged traitors.
Refugees can spend years in camps such as this one in Friedland, Lower Saxony
Warnings for attempted spying
Claus-Ulrich Prössl heads the Cologne Refugee Council, an organization that assists asylum-seekers throughout the procedure. Prössl said he believes the BND and the HBW are closely connected, and had even heard of cases where people were questioned by BND employees. “A few refugees were hoping that their asylum process would go more quickly, while other refugees did not understand what was going on and were worried.”
Prössl warns asylum-seekers to be careful: “Unfortunately, after the NSA affair, we have to assume that all information will be passed on.” He said he did not see any data protection or confidentiality and worried that the information thus gathered would not stay within the borders of Germany. There must be a reason, he said, why the state of North Rhine-Westphalia had given up on its own security questioning.
Cologne-based lawyer Zaza Koschuaschwili also warns applicants about questions that have nothing to do with the actual asylum process. Sometimes the quality of the available simultaneous translators is poor:”It often happens that interpreters is add their own interpretations or opinions to a statement.” His clients would often complain that they had been musunderstood, he added.
As a lawyer and a native of Georgia, Koschuaschwili can speak both languages and knows his clients’ rights. But whenever the HBW gets involved, attorneys are frequently excluded from interviews.
Refugees give information to the HBW in the hope of gaining residency
Participation is not meant to have drawbacks
DW asked the HBW for an interview to shed light on the relationship between itself and the BND. Its director promised to provide the desired information once a series of questions had been discussed with the chancellor’s office. That process is still ongoing.
Six months ago, Sharmila H. came to Germany from Afganistan. Although she is still waiting for her interview, she says one thing is already clear to her: “I will not answer just any questions,” if intelligence agencies speak to her – just who she is and why she came here.
Pfaff and Koschuaschwili wish to reassure those who are unwilling to cooperate with German intelligence that they should have no fear about the regular procedure for granting asylum.
Sharmila H. hopes they are right.
Date 22.11.2013
Author Wolfgang Dick / ns
Editor Simon Bone
Find this story at 22 November 2013
© 2013 Deutsche Welle
Asylum Seekers in Germany Unwittingly Used As Intelligence Sources3 december 2013
In Somalia, Yusuf A. owned two houses and several cars. He had money and power as a politician with a seat in parliament and occasionally even in the cabinet. Now he lives in a shabby apartment in a small industrial park in Munich. Yusuf hasn’t yet found work and frequently falls ill. He’s lost his wealth, but at least he’s safe. In Somalia, he was under threat from al-Shabaab Islamists. Then it went beyond threats. One day a grenade landed in his house, killing a colleague of his. Yusuf fled to Germany.
He was granted permanent residency with amazing swiftness and was allowed to send for his wife and seven children to join him. The German authorities—and they probably weren’t alone—showed great interest in Yusuf. In the span on seven weeks authorities called him in for questioning five times. The meetings lasted hours. Hearings conducted by the Federal Office for Migration and Refugees usually aren’t that involved. But in the case of Yusuf A., another authority came into play: the Main Office for Questioning (the Hauptstelle für Befragungswesen, HBW for short), which was established in during Cold War times to interview refugees and immigrants.
The mysterious agency specializes in drawing on information it teases out of refugees. Just like the Federal Intelligence Service (Bundesnachrichtendienst, the BND, the counterpart to the U.S.’s Central Intelligence Agency), it falls under the purview of the Chancellor’s office. Even the federal government is tight-lipped about the intelligence operations conducted within the HBW. This is about secret intelligence, after all.
Old records at Berlin’s administrative court show, however, that the HBW (first created by Germany’s Western allies) has been under the control of the BND since the 1950s. One BND report from 1983 calls witnesses in the HBW asylum process an “opening in the shadows.” That would make the HBW an institution built on a shadow world.
The refugees are expected to give extensive testimony. Testimony about conditions back home, preferably about politicians, terrorists and their networks.
Yusuf won’t say exactly what he told the officers at the HBW. But he will give us one detail; during a meeting he gave up the telephone number of an al-Shabaab leader. He knew a woman who came from the same town and, at the urging of the German officers, coaxed the al-Shabaab leader’s number out of her. He also found out that the Islamist leader seldom used his cellphone and even then used it only briefly. He mostly let his associates speak for him, switching their phones often.
Yusuf now wonders if it was right to pass on the number to the Germans. Cellphone numbers help to locate people, and if the German authorities get a hold of important numbers, the BND can hand them over to the U.S.
The United States is leading a drone war in Somalia that is legally questionable and continually claims the lives of people who have nothing to do with terrorist groups such as al-Shabaab or Al-Qaida. Yusuf knows that.
He says, “You have to attack al-Shabaab. They are evil people.” But he doesn’t want innocent civilians to die in the name of shutting down al-Shabaab.
Refugees like Yusuf who are interviewed by the HBW aren’t told later what was done with the information they provided.
Immigrant as informant
Asylum seekers in Germany are unwittingly being used as intelligence sources. Not every immigrant is called for questioning, but some receive letters from the HBW. They read; “the security situation worldwide” makes it necessary that the government of the Federal Republic of Germany gain information “about the political and social issues in your home country.” The HBW is charged with “collecting reliable information.”
An HBW questionnaire for Afghanis reads: “The people in my hometown openly support the Taliban”—”yes” and “no”. The HBW wants to know how the supply of doctors and drinking water is, how foreign soldiers are perceived, and whether people believe that Afghanistan’s government can stabilize the situation. The questions are written in Afghanistan’s official language, Dari.
Once you’ve filled out the questionnaire, it’s not over. Sometimes two women from the HBW, accompanied by a translator, arrive for a more personal chat. One lawyer from northern Germany says her client was allowed to stay in Germany because of his work helping the U.S. Army in his home country of Afghanistan. Later she learned her client had been questioned by the HBW in a refugee camp. She calls the cooperation between refugees and the HBW a “balancing act”. It’s not yet clear, lawyers say, what’s done with the information from these surveys and interviews or what effect participation—or nonparticipation—has on the refugees’ fate.
The Germany government says participation in the surveys is voluntary and has no influence on the duration or success of the asylum process. But it’s striking how quickly refugees are taken in when they pique the interest of the HBW. Attorneys argue that their clients are especially vulnerable after such an HBW interview session if they are subsequently sent back to their home countries. In many of these refugees’ homelands, it’s not exactly seen as a good thing to be talking to a western intelligence agency.
The German government talks about “post-refuge rationale” that occurs after leaving one’s homeland. If such a “post-refuge rationale” is apparent during the HBW questioning, it will be considered as part of the asylum application. That sounds complicated, especially since the government says there’s no reward system at play.
In off-the-record interviews, several attorneys said clearly: refugees who cooperate with the HBW can expect a speedy process and permanent residency in Germany. Lawyers are mostly shut out of these interview sessions. The authorities explicitly advise the asylum seekers to come without legal representation.
One Somali interpreter who has translated for asylum seekers for many years is convinced that there’s a rewards system at play: “It’s made clear to these people that if they cooperate they will be accepted quicker.” The interpreter came to Germany more than 20 years ago and has assisted many asylum seekers over the years. He fears giving his name would put his work and himself at risk. He says sometimes strange people come to hearings at the Federal Office for Migration and Refugees calling themselves interns. “The intern doesn’t come to simply any hearing, but rather just when he thinks someone knows something.” Then the refugee is asked about Islamist groups in great detail. Many refugees come from regions where the U.S. has dropped bombs using unmanned predator drones. Drones are a weapon against which you can’t protect yourself, says the interpreter. “People live in fear.”
Victor Pfaff, a lawyer from Frankfurt, witnessed in the 1970s how asylum seekers had to move through three rooms during an application procedure. One room where the German officials sat, one where representatives from the U.S. intelligence agencies awaited them. The sign read “Liaison Officer “. It was only later that Pfaff learned of the HBW. He considers the agency to be legitimate and thinks it’s in Germany’s interest to make sure no one who poses a security risk should be allowed to remain in the country. That’s one possible outcome of the HBW surveys. But when it comes to cooperation with foreign intelligence agencies, “it could be problematic,” Pfaff says.
The 1980s it came out that the information Turkish refugees had given the HBW/BND somehow landed at the Turkish intelligence agency. A BND officer at the time testified that it be “grave misconduct” if the authorities had been responsible for such a huge slip-up. But the agencies do work together with Turkish intelligence agencies on projects including those in the area of anti-terrorism.
The methods, explanation and assertions from that case sound oddly similar. Three years ago, an insider published an essay under the pseudonym Jack Dawson in the Journal for Intelligence, Propaganda and Security Studies. He wrote that the HBW was a part of a larger interrogation program in Germany, the United Kingdom and the U.S. called the Tripartite Debriefing Programme. France is said to have taken part earlier in its existence.
British and U.S. intelligence officials celebrated the 50th anniversary of the HBW along with their German counterparts in Berlin in 2008.
After Dawson’s revelations British and American intelligence officers began questioning asylum seekers in Germany sometimes even without their German colleagues. Asked in late October, Dawson said that, to the best of his knowledge, the Tripartite program still runs strong. The goal remains the same: gain intelligence from the refugee questioning sessions.
You could even say: whoever wants German protection isn’t safe from American intelligence agencies.
Confronted with Dawson’s information, the German government seems struck by a telling silence. In stilted language, officials refer to rules of confidentiality. “An in-depth answer to the question would reveal details about methods, jeopardizing the future ability and performance of the HBW and BND.” Questions put to U.S. officials about HBW still remains unanswered.
It’s not very easy to pay a visit the HBW headquarters at 150 Hohenzollerndamm in Berlin’s Wilmersdorf district. Surely, that’s by design. In front of the building lies a well-maintained yard. The HBW offices are housed on the fourth floor, where officers can look down from a bay window. But getting up there isn’t simple. There are no stairs that lead to the HBW offices—only an elevator, which requires a key.
There are other HBW offices in Nuremberg, Maiz and Hanover and six refugee reception centers. The German government won’t say anything on the topic. It merely confirms that there is a duty station at the border transit camp in Friedland, in central Germany. In total, just 40 people work at the HBW.
Meanwhile the interviewers have switched their focus towards Afghanistan, Somalia, Iraq and Syria. At the end of 2012, in response to questions posed by the Green Party, the German government said that since 2000, some 500 to 1,000 “briefings” with refugees and emigrants were conducted, each applicant enduring two to five question sessions each.
But not every asylum seeker is telling the truth. In 1999, the Iraqi Rafed Ahmed Alwan came to the refugee reception center in Zirndorf, near Nuremberg and was questioned there. He provided the BND with information about purported biochemical weapon laboratories in Iraq, which was forwarded to American officials. The C.I.A. gave him the codename Curveball. His statements were later used by the U.S. government to justify the invasion into Iraq.
But the alleged facts were wrong. There were no labs. Alwan, AKA Curveball, got a Germany passport and a contract at some sham offices at, of all places, the BND.
Coincidentally, the BND currently seeks “freelancers” who speak Somali. Applicants are asked to discreetly submit their letters of interest.
November 20, 2013 02:54 pm CET
By Christian Fuchs, John Goetz, Hans Leyendecker, Klaus Ott, Niklas Schenck, Tanjev Schultz
Find this story at 20 November 2013
© Süddeutsche Zeitung Digitale Medien GmbH / Süddeutsche Zeitung GmbH
Misleidende methode (NL 2003)3 december 2013
Ahmed was in Irak advocaat van iemand uit de `inner cicle’ van Saddam Hoessein. De CIA en de BVD waren zeer geïnteresseerd in zijn ervaringen en spraken hem meerdere malen na zijn aankomst in 1999 in Nederland. Ahmed vertelt: `”Natuurlijk”, zei meneer Bert van de BVD, “krijg je een verblijfsvergunning voor bewezen diensten.”‘ Eerst moest Ahmed echter alles wat hij wist netjes aan de geheime dienst vertellen. Zijn advocaat, mr. Schoorl uit Alkmaar, moest hem duidelijk maken dat de bvdgeen verblijfsvergunningen verstrekt.
Dit boek is een vervolg op De vluchteling achtervolgd, het in 1990 door Buro Jansen & Janssen uitgevoerde onderzoek naar de bemoeienissen van de BVD met vluchtelingen en asielzoekers. De belangrijkste conclusie van dat onderzoek was toen dat het voor de betrokken asielzoekers en vluchtelingen vaak erg onduidelijk en verwarrend was dat de bvdook via de politie opereert. Het onderscheid tussen de vreemdelingendienst van de politie (destijds verantwoordelijk voor procedures rond verblijfsvergunningen) en de inlichtingendienst (die mensen werft als informant) was niet altijd duidelijk. Omdat die twee functies in de praktijk vaak ook nog werden gecombineerd door een en dezelfde persoon, was het voor nieuwkomers extra moeilijk om erachter te komen waar ze aan toe waren.
Voor de betrokken asielzoeker betekende dit systeem van `dubbele petten’ dat er weinig overeind bleef van het officiële recht om medewerking aan het werk van inlichtingendiensten te weigeren. Helemaal omdat, zoals uit dat onderzoek bleek, middelen als intimidatie, bedreiging en misleiding (`Als je niet meewerkt, waarom zouden we je dan een asielstatus verstrekken?’) niet werden geschuwd.
De vluchteling achtervolgd deed bij verschijning in 1991 behoorlijk wat stof opwaaien. Er was veel media-aandacht voor het onderzoek en het leidde tot Kamervragen. Het boekje zorgde voor verspreiding van kennis over de risico’s van samenwerking met inlichtingendiensten.
Nieuw onderzoek
Tien jaar later is er veel veranderd, maar de pogingen om asielzoekers en migranten te werven als informant gaan door. De politieke verhoudingen in de wereld hebben zich gewijzigd: het zijn nu andere landen waar vluchtelingen vandaan komen, en ze komen deels om andere redenen. Tegelijkertijd staan terrorisme en mensensmokkel hoog op de politieke agenda. De asielprocedures zijn aangescherpt en het is nu niet langer de Vreemdelingendienst maar de Immigratie- en Naturalisatiedienst IND, van het ministerie van Justitie) die verantwoordelijk is voor de toelatingsprocedure. De IND heeft haar eigen Bureau Bijzondere Zaken voor onderzoek naar asielzoekers die van een misdrijf worden verdacht, en om de inlichtingendiensten van interessante informatie te kunnen voorzien.
In dezelfde periode is het werk van inlichtingendiensten en het opsporingsonderzoek van politie en justitie naar elkaar toe geschoven, deels overlapt het elkaar zelfs. Dit levert onduidelijke situaties op waar ook asielzoekers en migranten mee te maken kunnen krijgen. Zo let de AIVD niet langer alleen op de politieke achtergrond van asielzoekers en migranten (een inlichtingentaak), de dienst doet ook onderzoek naar mensensmokkel en georganiseerde misdaad (meer opsporingswerk). Dit alles in nauwe samenwerking met gespecialiseerde politiediensten binnen heel Europa.
De afgelopen jaren zijn de procedures voor een verblijfsvergunning in Nederland strenger geworden, en de mogelijkheden er een te krijgen kleiner. Voor asielzoekers, die toch al in een kwetsbare positie verkeren, werd de afhankelijkheid van Nederlandse instanties daardoor versterkt. Tegen deze achtergrond waren wij benieuwd hoe het nu toegaat bij het benaderen van asielzoekers.
Openlijke controle
Dit hernieuwd onderzoek naar de bemoeienissen van inlichtingendiensten met asielzoekers en migranten vond plaats vanuit de doelstelling die Buro Jansen & Janssen al jarenlang nastreeft: meer openheid over en controle op politie, justitie en inlichtingendiensten. Zonder publicatie van praktijken die anders geheim zouden blijven, is geen openbare controle mogelijk.
Daarnaast streven we naar de versterking van de positie van asielzoekers, die zich tijdens de procedure voor een verblijfsvergunning in een onzekere positie bevinden. Voor hen moet duidelijk zijn wanneer ze met de IND te maken hebben inzake hun eigen asielverzoek, en wanneer het belang van inlichtingendiensten vooropstaat. Met deze publicatie in de hand kunnen advocaten, vluchtelingenorganisaties en andere belangenbehartigers een asielzoeker die benaderd is beter bijstaan of, zo mogelijk, voorkomen dat het zover komt.
Dit boek Misleidende Methode begint met enige achtergrondinformatie over de positie van asielzoekers in Nederland en de procedures waarmee ze te maken krijgen. Hoofdstuk 2 gaat over de Immigratie- en Naturalisatiedienst. De IND speelt een centrale rol in de asielprocedure en het horen van asielzoekers. Wat gebeurt er met de informatie uit de vertrouwelijke gehoren van asielzoekers? Welk onderzoek doet de IND zelf? En wat is hierbij de rol van het Bureau Bijzondere Zaken van de IND? Voor welke asielzoekers bestaat bijzondere belangstelling?
Centraal in hoofdstuk 3 staat de BVD(tegenwoordig AIVD)en de manier waarop deze dienst informatie verzamelt onder vluchtelingen. Wie benadert de BVD, en waarom juist deze mensen? Op welke manier gebeurt dat, en zijn degenen die benaderd worden om informatie te leveren gezien hun (kwetsbare) positie in staat om medewerking te weigeren? Is het voor hen mogelijk een inschatting te maken van de gevolgen van het praten met de BVD?
In hoofdstuk 4 onderzoeken we de samenwerking tussen de verschillende diensten die zich bezighouden met het verzamelen van informatie over asielzoekers en migranten. De IND, haar afdeling Bureau Bijzondere Zaken, de BVD, de Vreemdelingendienst en buitenlandse inlichtingendiensten azen allemaal op bepaalde informatie. Hoe werken zij samen? In hoeverre hebben zij toegang tot elkaars informatie, en is er overleg? Is deze samenwerking inzichtelijk en controleerbaar, of kunnen asielzoekers en migranten alleen maar hopen dat informatie over hen niet bij de inlichtingendienst van hun land van herkomst terechtkomt?
In de conclusies komen de lijnen uit de voorgaande hoofdstukken samen en kijken we naar de ontwikkelingen op dit gebied die plaatsvonden in de onderzoeksperiode, van de publicatie van De vluchteling achtervolgd (begin jaren negentig) tot in het begin van de nieuwe eeuw. Wat is er in die tijd veranderd? En waar gaat het naartoe?
Verantwoording
Tot slot een verantwoording over de gebezigde onderzoeksmethoden en bronnen. We hebben gebruikgemaakt van informatie die openbaar was en informatie die we met een beroep op de Wet Openbaarheid van Bestuur openbaar hebben gemaakt (zie literatuurlijst).
Daarnaast hebben we voor dit onderzoek honderden telefoontjes gepleegd: met asielzoekers, vluchtelingen en migranten, met advocaten, vluchtelingen- en migrantenorganisaties, met deskundigen van universiteiten en met journalisten. In enkele tientallen gevallen leidde dit tot gesprekken met de asielzoeker en/of migrant zelf of zijn belangenbehartiger. Sommigen van hen zijn met naam en toenaam terug te vinden in de voorbeelden die dit boek illustreren, anderen bleven om begrijpelijke redenen liever anoniem.
Het was niet makkelijk om met asielzoekers te spreken over hun ervaringen met inlichtingendiensten. Sommigen waren bang dat dit gevolgen voor hun procedure voor verblijfsrecht in Nederland zou hebben. Anderen waren bang voor repercussies uit de eigen gemeenschap als ze te boek kwamen staan als iemand die contacten met inlichtingendiensten had gehad. Vaak wilden mensen maar liever niet herinnerd worden aan die gesprekken.
We hebben ook veel migrantenorganisaties aangeschreven en gesproken. Politieke organisaties van bijvoorbeeld Turkse, Koerdische of Iraanse migranten hadden wel ervaringen met informanten, maar verkozen om daarmee niet in de openbaarheid te treden. Anders dan tien jaar geleden hadden ze er nu ieder hun eigen reden voor om de zaken in eigen kring af te handelen.
Degenen die wel met ons spraken, deden dat omdat ze het belangrijk vonden hun teleurstelling en frustratie over de werkwijze van inlichtingendiensten met andere vluchtelingen(organisaties) te delen. Sommige verhalen mochten we slechts als achtergrondinformatie gebruiken, andere konden wemet of zonder de naam van degene die het betrof publiceren. Instemming van de betrokkenen stond voor ons voorop bij het maken van dit boek.
Een van onze informatiebronnen vraagt om wat nadere toelichting, en dat is Hilbrand Nawijn. Het is van belang te weten dat wij voor dit onderzoek met hem spraken in augustus 2001. Hij was toen vreemdelingenadvocaat; daarvoor was hij jarenlang directeur van de IND. Na het gesprek is hij een paar maanden minister van Vreemdelingenzaken en Integratie geweest voor de Lijst Pim Fortuyn, de [kk]lpf[kx]. Nawijn gaf ons achtergrondinformatie over het functioneren van Bureau Bijzondere Zaken van de IND.
Opvallend is dat we vooral met mannen gesproken hebben. Onduidelijk is of de inlichtingendiensten vooral mannen benaderen, bijvoorbeeld omdat die vaker `interessante’ functies in het leger hebben, en wij dus bij navraag naar deze gesprekken automatisch bij mannen terechtkwamen. Het kan ook zijn dat vrouwen die benaderd zijn hierover geen contact hebben gezocht met bijvoorbeeld hun advocaat, waardoor hun verhaal onbekend bleef.
Hoofdstuk 1
De procedure
Hoofdstuk 2
Het hemd van het lijf gevraagd: de IND op het inlichtingenpad
Hoofdstuk 3
Asielzoekers bespied
Hoofdstuk 4
Samen weten we nog net iets meer
Conclusie
Nawoord
Tips
Find misleidende methode
Find vluchteling achtervolgd
Find a report of the CTIVD
Geheimer Krieg BND will umstrittene Befragungsstelle auflösen3 december 2013
Die sogenannte Hauptstelle für Befragungswesen ist wenig bekannt, aber sehr umstritten: Asylbewerber werden dort von deutschen und ausländischen Geheimdienstlern ausgehorcht. Die Bundesregierung bestätigt nun diese Praxis. Lange soll es die Stelle aber nicht mehr geben.
Die umstrittene “Hauptstelle für Befragungswesen”, die dem Bundesnachrichtendienst zugeordnet ist, soll aufgelöst werden. Das geht aus einer schriftlichen Antwort der Bundesregierung auf eine Frage von Linksfraktionsvize Jan Korte hervor, die der Nachrichtenagentur dpa vorliegt. Die personelle Ausstattung der Dienststelle sei bereits schrittweise reduziert worden, heißt es darin.
In der Antwort räumt die Regierung ein, dass in der Einrichtung Asylbewerber auch durch Vertreter “der alliierten Partnerdienste ohne deutsche Begleiter” befragt wurden. Es könne außerdem nicht ausgeschlossen werden, dass Informationen aus den Befragungen “auch zum militärischen Lagebild” der Partnerdienste beitragen könnten. Korte kritisierte die Praxis scharf.
500 bis 800 “Vorgespräche”
Nach Recherchen von NDR und Süddeutscher Zeitung im Rahmen des Projekts Geheimer Krieg horchten deutsche Geheimdienstler in der Hauptstelle für Befragungswesen Asylbewerber systematisch aus und gaben Hinweise aus diesen Befragungen an die USA weiter. Diese wiederum nutzen solche Informationen auch für den Einsatz von Kampfdrohnen. Es gibt zudem Hinweise, dass auch britische und amerikanische Nachrichtendienstler in Deutschland Asylbewerber befragen.
Bilder
Geheime Außenstellen des BND Sie sind mitten unter uns
Anzeige
In der Antwort der Regierung heißt es, in den vergangenen zwei bis drei Jahren hätten durchschnittlich 500 bis 800 “Vorgespräche” pro Jahr stattgefunden. Im Anschluss seien etwa 200 bis 300 Personen befragt worden. Seit der Gründung der Dienststelle 1958 seien an den Befragungen alliierte Nachrichtendienste beteiligt.
Wenn ausländische Geheimdienstler alleine mit Asylbewerbern sprächen, habe der BND “im Vor- und Nachgang” die Aufsicht. Die Ergebnisse der Gespräche würden außerdem im “Meldungssystem” des BND erfasst, bei Bedarf “bereinigt” – etwa im Hinblick auf Datenschutz – und erst dann an die ausländischen Partner weitergegeben. 60 Prozent der erhobenen Informationen der Dienststelle gingen auf diesem Wege an ausländische Geheimdienste.
Korte bezeichnete dies als “absurd”. “Wir sollen mal wieder für dumm verkauft werden”, sagte er der dpa. “Befragungen finden auch durch US-Geheimdienstler statt, aber die Befragungsergebnisse werden angeblich nur nach Prüfung und Freigabe an die USA weitergereicht – und die Befrager haben natürlich alles sofort wieder vergessen und erzählen ihren Dienststellen nichts.”
Zur Nutzung der Informationen aus den Gesprächen mit Asylbewerbern schreibt die Regierung: “Zielsetzung der Befragungen war und ist zu keiner Zeit die Gewinnung von Informationen zur Vorbereitung von Drohneneinsätzen.” Es sei aber nicht auszuschließen, dass die Erkenntnisse auch zum militärischen Lagebild der ausländischen Partner beitragen könnten.
Geheimer Krieg Deutschlands Rolle im “Kampf gegen den Terror”
Eine Serie der Süddeutschen Zeitung und des NDR +++ Panorama-Film “Geheimer Krieg” +++ interaktive Datenbank: Spionen auf der Spur +++ Sonderseite zum Projekt: geheimerkrieg.de +++ alle Artikel finden Sie hier: sz.de/GeheimerKrieg +++ englische Version hier +++
Personal soll reduziert werden
Korte reagierte empört: “Erschreckend ist, dass die Regierung die Berichterstattung der letzten Wochen komplett bestätigen muss, aber scheinbar keinerlei Problem erkennen kann”, sagte er. Niemand könne ausschließen, dass Erkenntnisse aus den Befragungen auch für das gezielte Töten durch Drohnen benutzt würden. “Das ohnehin fragwürdige geheimdienstliche Abschöpfen von Asylsuchenden muss sofort ersatzlos beendet werden”, forderte er.
Die geplante Auflösung der Hauptstelle zeige, dass die derzeitige Praxis offenbar ohnehin entbehrlich sei. Der BND habe die Dienststelle “seit längerem einer Effizienzkontrolle unterzogen” und das Personal dort reduziert, heißt es weiter in der Antwort der Regierung. Ziel sei, die Befragungen direkt in den Krisenregionen im Ausland zu verstärken.
29. November 2013 20:24
Find this story at 29 November 2013
© Süddeutsche Zeitung Digitale Medien GmbH / Süddeutsche Zeitung GmbH
Geheimer Krieg Deutsche Behörde horcht Asylbewerber aus3 december 2013
Wer Informationen über mutmaßliche islamistische Terrorgruppen hat, soll schneller als Asylbewerber anerkannt werden: Die geheime “Hauptstelle für Befragungswesen” befragt Flüchtlinge – das Wissen könnten die USA beim Einsatz von Kampf-Drohnen nutzen.
Beim Einsatz von Kampf-Drohnen greifen US-Geheimdienste auch auf Informationen zurück, die von Asylbewerbern in Deutschland stammen. Nach Angaben eines früheren hochrangigen Pentagon-Mitarbeiters fließen solche Erkenntnisse in das “Zielerfassungssystem” der US-Dienste ein. Selbst scheinbar banale Informationen könnten manchmal reichen, “ein Ziel zu bestätigen – und vielleicht auch dafür, einen Tötungsbefehl auszulösen”. Deutsche Behörden würden angeblich die USA systematisch mit Hinweisen versorgen, die von Flüchtlingen stammen. Dazu können auch die Handydaten von Terrorverdächtigen gehören.
Nach Recherchen der Süddeutschen Zeitung und des Norddeutschen Rundfunks spielt dabei die geheimnisumwitterte “Hauptstelle für Befragungswesen” (HBW), die dem Kanzleramt untersteht, eine zentrale Rolle. Die Bundesregierung macht über die Struktur des HBW selbst bei Anfragen im Parlament keine genauen Angaben. Die Behörde war ursprünglich von den Westalliierten eingerichtet und dann 1958 von der damaligen Bundesregierung übernommen worden. Sie wurde dem Bundesnachrichtendienst zugeordnet.
Geheimer Krieg
Wie Geheimdienste Asylbewerber benutzen
Yusuf A. war in Somalia ein Mann mit Macht, ein Politiker mit Geld und mehreren Autos. Dann muss er nach Deutschland fliehen. Bei Gesprächen über seinen Asylantrag sind nicht nur Beamte vom Bundesamt für Flüchtlinge anwesend. geheimerkrieg.de
Es gibt Hinweise, dass auch britische und amerikanische Nachrichtendienstler in Deutschland Asylbewerber befragen. Manchmal angeblich sogar allein, ohne deutsche Kollegen. In einer internationalen Fachzeitschrift berichtete ein Insider, die Hauptstelle sei Teil eines gemeinsamen Befragungsprogramms von Deutschland, Großbritannien und den USA.
Die HBW führt heute nach amtlichen Angaben jährlich 500 bis 1000 Vorgespräche mit Flüchtlingen und befragt anschließend 50 bis 100 von ihnen intensiv. Ein Schwerpunkt der Befragungen liegt derzeit offenbar bei Flüchtlingen aus Somalia, Afghanistan und Syrien.
Das Bundesinnenministerium teilte jüngst auf eine Anfrage der Linken zur Aufnahme von Syrern mit, dass derzeit jeden Monat etwa zehn Flüchtlinge von der HBW “kontaktiert” würden.
Dolmetschern und Anwälten zufolge, die Asylbewerber betreuen, interessiert sich die Hauptstelle vor allem für Flüchtlinge, die Angaben über mutmaßliche islamistische Terrorgruppen machen können. Wer mit der Hauptstelle kooperiere, werde oft mit einer schnellen Anerkennung als Asylbewerber belohnt und dürfe in der Bundesrepublik bleiben.
Die Bundesregierung bestreitet, dass es solche Belohnungen gibt und betont, zudem seien die Befragungen freiwillig. Über eine Zusammenarbeit von HBW und BND äußert sich die Regierung nicht. Sie ließ eine umfassende Anfrage zu der Behörde weitgehend unbeantwortet. Detaillierte Angaben würden die “weitere Arbeitsfähigkeit und Aufgabenerfüllung von HBW und BND gefährden”, erklärte die Regierung.
Die HBW, die im Kalten Krieg viele Hundert Mitarbeiter hatte, soll heute nur noch knapp vierzig Mitarbeiter beschäftigen. Die Zentrale der Behörde liegt in Berlin. Weitere Büros soll sie in insgesamt sechs Aufnahmelagern für Flüchtlinge haben.
19. November 2013 18:59
Von John Goetz und Hans Leyendecker
Find this story at 19 November 2013
© Süddeutsche Zeitung Digitale Medien GmbH / Süddeutsche Zeitung GmbH
Die Operationen der US-Dienste in Deutschland3 december 2013
Drohnen kommen heute immer häufiger zum Einsatz – auch, um damit Menschen zu töten.
Alles begann mit einem Anruf aus Somalia: Ein Mann aus Mogadischu berichtete dem Panorama Team von einem amerikanischen Drohnenangriff. Das Ziel war ein Terrorist der Terrorgruppe al-Shabaab. Aber wie so häufig in diesem Krieg starb nicht nur der Terrorist, sondern auch Zivilisten. An einem Tag im Oktober vor zwei Jahren wurde der Vater des Anrufers durch US-Kampfdrohnen getötet. Er war ein unschuldiger Kamelbauer, der zur falschen Zeit am falschen Ort war.
Der Film “Geheimer Krieg”, für den Panorama Reporter zwei Jahre recherchiert haben, erzählt die Geschichte des Mannes, der sterben musste, weil die USA ihren Krieg gegen den Terror fast weltweit führen. Im Jemen, in Pakistan und in Afrika bringen sie Verdächtige aus der Luft um – ohne Anklage, ohne Anwalt, ohne Gerichtsurteil.
Panorama: Geheimer Krieg
Sehen Sie hier das gesamte Video der Panorama Sendung von 28. November 2013.
Systematische Einbindung Deutschlands
John Goetz vor der amerikanischen Botschaft in Berlin: Wird von hier das Regierungsviertel abgehört?
John Goetz und sein Team zeigen, wie vor allem Deutschland in diesen leisen und versteckten Krieg eingebunden ist: Der Bundesnachrichtendienst (BND) befragt systematisch Flüchtlinge aus Krisenregionen, um deren Informationen – auch über mögliche Ziele – an die Amerikaner weiterzugeben.
Das Afrika-Kommando der US-Streitkräfte sitzt in Stuttgart. Von hier kommen die Befehle für Drohnenangriffe auf Menschen in Afrika. Über die Airbase in Ramstein läuft die Kommunikation der Drohnenpiloten mit den fliegenden Kampfrobotern über Somalia. Und eine Firma, die Terrorverdächtige für die CIA entführt hat, bekommt seit Jahren Millionenaufträge von der Bundesregierung in sensiblen Bereichen.
Bundesregierung und US-Botschaft wiegeln ab
Auf Anfrage wiegelt die Bundesregierung ab: Es würden nur Informationen an US-Dienste weitergegeben, mit denen keine Drohnenangriffe geplant werden könnten. Außerdem lägen “der Bundesregierung keine eigenen gesicherten Erkenntnisse zu von US-Streitkräften in der Bundesrepublik Deutschland angeblich geplanten oder geführten Einsätzen vor”. Auch die amerikanische Botschaft in Berlin widerspricht den Rechercheergebnissen. Es seien “Halbwahrheiten, Spekulationen und Unterstellungen”, sowie “ungeheuerliche Behauptungen”.
Weltweite Recherchen
Am Beispiel des ermordeten Kamelbauern aus Somalia und anderen konkreten Fällen zeigt die Dokumentation erstmals, wie deutsche Dienste und US-Einrichtungen in Deutschland an der Ermordung von unschuldigen Zivilisten durch Drohnen in Afrika beteiligt sind. Dafür haben die Reporter in Afrika, den USA, in der Türkei, Deutschland und in Moskau bei Edward Snowden recherchiert.
Die Ausstrahlung des Films ist der Höhepunkt der Serie “Geheimer Krieg”, in der der Norddeutsche Rundfunk und die “Süddeutsche Zeitung” seit gut zwei Wochen darüber berichten, wie das US-Militär und die amerikanischen und britischen Geheimdienste den Kampf gegen den Terrorismus aus Deutschland steuern und kontrollieren.
28.11.13 | 21:45 Uhr
von John Goetz & Niklas Schenck
Find this story at 28 November 2013
© Norddeutscher Rundfunk
It’s outrageous to accuse the Guardian of aiding terrorism by publishing Snowden’s revelations3 december 2013
Alan Rusbridger is being grilled by MPs – but he has published nothing that could be a threat to national security
The Guardian’s editor, Alan Rusbridger, is due to appear before the House of Commons home affairs select committee on Tuesday to answer questions about his newspaper’s publication of intelligence files leaked by Edward Snowden. Unlike the directors of MI5, MI6 and GCHQ, who gave evidence recently before the intelligence and security committee, Rusbridger will not be provided with a list of questions in advance.
There are at least five legal and political issues arising out of Snowden’s revelations on which reasonable opinion is divided. These include whether Snowden should enjoy the legal protection accorded a whistleblower who reveals wrongdoing; whether his revelations have weakened the counter-terrorism apparatus of the US or the UK; whether, conversely, they show the need for an overhaul of surveillance powers on both sides of the Atlantic (and even an international agreement to protect partners like Germany); whether parliament has been misled by the services about the extent of intrusive surveillance; and whether the current system for parliamentary oversight of the intelligence and security services is sufficiently robust to meet the international standards laid down by my predecessor at the UN, Martin Scheinin.
These questions are too important for the UN to ignore, and so on Tuesday I am launching an investigation that will culminate in a series of recommendations to the UN general assembly next autumn. As in the case of Chelsea Manning, there are also serious questions about sensitive information being freely available to so many people. The information Snowden had access to, which included top-secret UK intelligence documents, was available to more than 850,000 people, including Snowden – a contractor not even employed by the US government.
There is, however, one issue on which I do not think reasonable people can differ, and that is the importance of the role of responsible media in exposing questions of public interest. I have studied all the published stories that explain how new technology is leading to the mass collection and analysis of phone, email, social media and text message data; how the relationship between intelligence services and technology and telecoms companies is open to abuse; and how technological capabilities have moved ahead of the law. These issues are at the apex of public interest concerns. They are even more important – dare I say it – than whether Hugh Grant’s mobile was hacked by a tabloid.
The astonishing suggestion that this sort of journalism can be equated with aiding and abetting terrorism needs to be scotched decisively. Attacking the Guardian is an attempt to do the bidding of the services themselves, by distracting attention from the real issues. It is the role of a free press to hold governments to account, and yet there have even been outrageous suggestions from some Conservative MPs that the Guardian should face a criminal investigation.
It is disheartening to see some tabloids give prominence to this nonsense. When the Mail on Sunday took the decision to publish the revelations of the former MI5 officer David Shayler, no one suggested that the paper should face prosecution. Indeed, when the police later tried to seize the Guardian’s notes of its own interviews with Shayler, Lord Judge, the former lord chief justice, refused to allow it to happen – saying, rightly, that it would interfere with the vital role played by the media to expose public wrongdoing.
When it comes to damaging national security, comparisons between the two cases are telling. The Guardian has revealed that there is an extensive programme of mass surveillance that potentially affects every one of us, while being assiduous in avoiding the revelation of any name or detail that could put sources at risk. Rusbridger himself has made most of these decisions, as befits their importance. The Mail on Sunday, on the other hand, published material that was of less obvious public interest.
An even closer example is Katharine Gunn, the GCHQ whistleblower who revealed in 2003 that the US and UK were spying on the missions of Mexico and five other countries at the UN, in order to manipulate a vote in the security council in favour of military intervention in Iraq. Like Snowden, her defence was that she was acting to prevent a greater wrong – the attempt to twist the security council to the bellicose will of the US and UK. She was charged under the Official Secrets Act, but the case was dropped because the director of public prosecutions and attorney general rightly concluded that no jury would convict Gunn.
There can be no doubt that the Guardian’s revelations concern matters of international public interest. There is already an intense debate that has drawn interventions from some of the UK’s most senior political figures. Wholesale reviews have been mooted by President Obama, Chancellor Merkel and Nick Clegg, Britain’s deputy prime minister. Current and former privy councillors and at least one former law officer have weighed in.
In the US, a number of the revelations have already resulted in legislation. Senior members of Congress have informed the Guardian that they consider the legislation to have been misused, and the chair of the US Senate intelligence committee has said that as a result of the revelations it is now “abundantly clear that a total review of all intelligence programmes is necessary”.
In Europe, and particularly in Germany (which has a long and unhappy history of abusive state surveillance) the political class is incandescant. In November the Council of Europe parliamentary assembly endorsed the Tshwane International Principles on National Security and the Right to Information, which provide the strongest protection for public interest journalism deriving from whistleblowers. Lord Carlile, the former independent reviewer of terrorism legislation in the UK, took part in the drafting of the principles and has endorsed them as an international template for resolving issues such as the present one. Many states have registered serious objections at the UN about spying, and there are diplomatic moves towards an international agreement to restrict surveillance activity. In direct response to the Guardian’s revelations, Frank La Rue, the special rapporteur on freedom of expression, has brought forward new guidelines on internet privacy, which were adopted last week by the UN general assembly.
When it comes to assessing the balance that must be struck between maintaining secrecy and exposing information in the public interest there are often borderline cases. This isn’t one. It’s a no-brainer. The Guardian’s revelations are precisely the sort of information that a free press is supposed to reveal.
The claims made that the Guardian has threatened national security need to be subjected to penetrating scrutiny. I will be seeking a far more detailed explanation than the security chiefs gave the intelligence committee. If they wish to pursue an agenda of unqualified secrecy, then they are swimming against the international tide. They must justify some of the claims they have made in public, because, as matters stand, I have seen nothing in the Guardian articles that could be a risk to national security. In this instance the balance of public interest is clear.
Ben Emmerson
The Guardian, Monday 2 December 2013 18.21 GMT
Find this story at 2 December 2013
© 2013 Guardian News and Media Limited or its affiliated companies. All rights reserved.
Meet the Spies Doing the NSA’s Dirty Work; This obscure FBI unit does the domestic surveillance that no other intelligence agency can touch.3 december 2013
With every fresh leak, the world learns more about the U.S. National Security Agency’s massive and controversial surveillance apparatus. Lost in the commotion has been the story of the NSA’s indispensable partner in its global spying operations: an obscure, clandestine unit of the Federal Bureau of Investigation that, even for a surveillance agency, keeps a low profile.
When the media and members of Congress say the NSA spies on Americans, what they really mean is that the FBI helps the NSA do it, providing a technical and legal infrastructure that permits the NSA, which by law collects foreign intelligence, to operate on U.S. soil. It’s the FBI, a domestic U.S. law enforcement agency, that collects digital information from at least nine American technology companies as part of the NSA’s Prism system. It was the FBI that petitioned the Foreign Intelligence Surveillance Court to order Verizon Business Network Services, one of the United States’ biggest telecom carriers for corporations, to hand over the call records of millions of its customers to the NSA.
But the FBI is no mere errand boy for the United States’ biggest intelligence agency. It carries out its own signals intelligence operations and is trying to collect huge amounts of email and Internet data from U.S. companies — an operation that the NSA once conducted, was reprimanded for, and says it abandoned.
The heart of the FBI’s signals intelligence activities is an obscure organization called the Data Intercept Technology Unit, or DITU (pronounced DEE-too). The handful of news articles that mentioned it prior to revelations of NSA surveillance this summer did so mostly in passing. It has barely been discussed in congressional testimony. An NSA PowerPoint presentation given to journalists by former NSA contractor Edward Snowden hints at DITU’s pivotal role in the NSA’s Prism system — it appears as a nondescript box on a flowchart showing how the NSA “task[s]” information to be collected, which is then gathered and delivered by the DITU.
But interviews with current and former law enforcement officials, as well as technology industry representatives, reveal that the unit is the FBI’s equivalent of the National Security Agency and the primary liaison between the spy agency and many of America’s most important technology companies, including Google, Facebook, YouTube, and Apple.
The DITU is located in a sprawling compound at Marine Corps Base Quantico in Virginia, home of the FBI’s training academy and the bureau’s Operational Technology Division, which runs all the FBI’s technical intelligence collection, processing, and reporting. Its motto: “Vigilance Through Technology.” The DITU is responsible for intercepting telephone calls and emails of terrorists and foreign intelligence targets inside the United States. According to a senior Justice Department official, the NSA could not do its job without the DITU’s help. The unit works closely with the “big three” U.S. telecommunications companies — AT&T, Verizon, and Sprint — to ensure its ability to intercept the telephone and Internet communications of its domestic targets, as well as the NSA’s ability to intercept electronic communications transiting through the United States on fiber-optic cables.
For Prism, the DITU maintains the surveillance equipment that captures what the NSA wants from U.S. technology companies, including archived emails, chat-room sessions, social media posts, and Internet phone calls. The unit then transmits that information to the NSA, where it’s routed into other parts of the agency for analysis and used in reports.
After Prism was disclosed in the Washington Post and the Guardian, some technology company executives claimed they knew nothing about a collection program run by the NSA. And that may have been true. The companies would likely have interacted only with officials from the DITU and others in the FBI and the Justice Department, said sources who have worked with the unit to implement surveillance orders.
“The DITU is the main interface with providers on the national security side,” said a technology industry representative who has worked with the unit on many occasions. It ensures that phone companies as well as Internet service and email providers are complying with surveillance law and delivering the information that the government has demanded and in the format that it wants. And if companies aren’t complying or are experiencing technical difficulties, they can expect a visit from the DITU’s technical experts to address the problem.
* * *
Recently, the DITU has helped construct data-filtering software that the FBI wants telecom carriers and Internet service providers to install on their networks so that the government can collect large volumes of data about emails and Internet traffic.
The software, known as a port reader, makes copies of emails as they flow through a network. Then, in practically an instant, the port reader dissects them, removing only the metadata that has been approved by a court.
The FBI has built metadata collection systems before. In the late 1990s, it deployed the Carnivore system, which the DITU helped manage, to pull header information out of emails. But the FBI today is after much more than just traditional metadata — who sent a message and who received it. The FBI wants as many as 13 individual fields of information, according to the industry representative. The data include the route a message took over a network, Internet protocol addresses, and port numbers, which are used to handle different kinds of incoming and outgoing communications. Those last two pieces of information can reveal where a computer is physically located — perhaps along with its user — as well as what types of applications and operating system it’s running. That information could be useful for government hackers who want to install spyware on a suspect’s computer — a secret task that the DITU also helps carry out.
The DITU devised the port reader after law enforcement officials complained that they weren’t getting enough information from emails and Internet traffic. The FBI has argued that under the Patriot Act, it has the authority to capture metadata and doesn’t need a warrant to get them. Some federal prosecutors have gone to court to compel port reader adoption, the industry representative said. If a company failed to comply with a court order, it could be held in contempt.
The FBI’s pursuit of Internet metadata bears striking similarities to the NSA’s efforts to obtain the same information. After the 9/11 terrorist attacks, the agency began collecting the information under a secret order signed by President George W. Bush. Documents that were declassified Nov. 18 by Barack Obama’s administration show that the agency ran afoul of the Foreign Intelligence Surveillance Court after it discovered that the NSA was collecting more metadata than the court had allowed. The NSA abandoned the Internet metadata collection program in 2011, according to administration officials.
But the FBI has been moving ahead with its own efforts, collecting more metadata than it has in the past. It’s not clear how many companies have installed the port reader, but at least two firms are pushing back, arguing that because it captures an entire email, including content, the government needs a warrant to get the information. The government counters that the emails are only copied for a fraction of a second and that no content is passed along to the government, only metadata. The port reader is designed also to collect information about the size of communications packets and traffic flows, which can help analysts better understand how communications are moving on a network. It’s unclear whether this data is considered metadata or content; it appears to fall within a legal gray zone, experts said.
* * *
The DITU also runs a bespoke surveillance service, devising or building technology capable of intercepting information when the companies can’t do it themselves. In the early days of social media, when companies like LinkedIn and Facebook were starting out, the unit worked with companies on a technical solution for capturing information about a specific target without also capturing information related to other people to whom the target was connected, such as comments on posts, shared photographs, and personal data from other people’s profiles, according to a technology expert who was involved in the negotiations.
The technicians and engineers who work at the DITU have to stay up to date on the latest trends and developments in technology so that the government doesn’t find itself unable to tap into a new system. Many DITU employees used to work for the telecom companies that have to implement government surveillance orders, according to the industry representative. “There are a lot of people with inside knowledge about how telecommunications work. It’s probably more intellectual property than the carriers are comfortable with the FBI knowing.”
The DITU has also intervened to ensure that the government maintains uninterrupted access to the latest commercial technology. According to the Guardian, the unit worked with Microsoft to “understand” potential obstacles to surveillance in a new feature of Outlook.com that let users create email aliases. At the time, the NSA wanted to make sure that it could circumvent Microsoft’s encryption and maintain access to Outlook messages. In a statement to the Guardian, Microsoft said, “When we upgrade or update products we aren’t absolved from the need to comply with existing or future lawful demands.” It’s the DITU’s job to help keep companies in compliance. In other instances, the unit will go to companies that manufacture surveillance software and ask them to build in particular capabilities, the industry representative said.
The DITU falls under the FBI’s Operational Technology Division, home to agents, engineers, electronic technicians, computer forensics examiners, and analysts who “support our most significant investigations and national security operations with advanced electronic surveillance, digital forensics, technical surveillance, tactical operations, and communications capabilities,” according to the FBI’s website. Among its publicly disclosed capabilities are surveillance of “wireline, wireless, and data network communication technologies”; collection of digital evidence from computers, including audio files, video, and images; “counter-encryption” support to help break codes; and operation of what the FBI claims is “the largest fixed land mobile radio system in the U.S.”
The Operational Technology Division also specializes in so-called black-bag jobs to install surveillance equipment, as well as computer hacking, referred to on the website as “covert entry/search capability,” which is carried out under law enforcement and intelligence warrants.
The tech experts at Quantico are the FBI’s silent cybersleuths. “While [the division’s] work doesn’t typically make the news, the fruits of its labor are evident in the busted child pornography ring, the exposed computer hacker, the prevented bombing, the averted terrorist plot, and the prosecuted corrupt official,” according to the website.
According to former law enforcement officials and technology industry experts, the DITU is among the most secretive and sophisticated outfits at Quantico. The FBI declined Foreign Policy’s request for an interview about the unit. But in a written statement, an FBI spokesperson said it “plays a key role in providing technical expertise, services, policy guidance, and support to the FBI and the intelligence community in collecting evidence and intelligence through the use of lawfully authorized electronic surveillance.”
In addition to Carnivore, the DITU helped develop early FBI Internet surveillance tools with names like CoolMiner, Packeteer, and Phiple Troenix. One former law enforcement official said the DITU helped build the FBI’s Magic Lantern keystroke logging system, a device that could be implanted on a computer and clandestinely record what its user typed. The system was devised to spy on criminals who had encrypted their communications. It was part of a broader surveillance program known as Cyber Knight.
In 2007, Wired reported that the FBI had built another piece of surveillance malware to track the source of a bomb threat against a Washington state high school. Called a “computer and Internet protocol address verifier,” it was able to collect details like IP addresses, a list of programs running on an infected computer, the operating system it was using, the last web address visited, and the logged-in user name. The malware was handled by the FBI’s Cryptologic and Electronic Analysis Unit, located next door to the DITU’s facilities at Quantico. Wired reported that information collected by the malware from its host was sent via the Internet to Quantico.
The DITU has also deployed what the former law enforcement official described as “beacons,” which can be implanted in emails and, when opened on a target’s computer, can record the target’s IP address. The former official said the beacons were first deployed to track down kidnappers.
* * *
Lately, one of the DITU’s most important jobs has been to keep track of surveillance operations, particularly as part of the NSA’s Prism system, to ensure that companies are producing the information that the spy agency wants and that the government has been authorized to obtain.
The NSA is the most frequent requester of the DITU’s services, sources said. There is a direct fiber-optic connection between Quantico and the agency’s headquarters at Fort Meade, Maryland; data can be moved there instantly. From the companies’ perspective, it doesn’t much matter where the information ends up, so long as the government shows up with a lawful order to get it.
“The fact that either the targets are coming from the NSA or the output goes to the NSA doesn’t matter to us. We’re being compelled. We’re not going to do any more than we have to,” said one industry representative.
But having the DITU act as a conduit provides a useful public relations benefit: Technology companies can claim — correctly — that they do not provide any information about their customers directly to the NSA, because they give it to the DITU, which in turn passes it to the NSA.
But in the government’s response to the controversy that has erupted over government surveillance programs, FBI officials have been conspicuously absent. Robert Mueller, who stepped down as the FBI’s director in September, testified before Congress about disclosed surveillance only twice, and that was in June, before many of the NSA documents that Snowden leaked had been revealed in the media. On Nov. 14, James Comey gave his first congressional testimony as the FBI’s new director, and he was not asked about the FBI’s involvement in surveillance operations that have been attributed to the NSA. Attorney General Eric Holder has made few public comments about surveillance. (His deputy has testified several times.)
The former law enforcement official said Holder and Mueller should have offered testimony and explained how the FBI works with the NSA. He was concerned by reports that the NSA had not been adhering to its own minimization procedures, which the Justice Department and the FBI review and vouch for when submitting requests to the Foreign Intelligence Surveillance Court.
“Where they hadn’t done what was represented to the court, that’s unforgivable. That’s where I got sick to my stomach,” the former law enforcement official said. “The government’s position is, we go to the court, apply the law — it’s all approved. That makes for a good story until you find out what was approved wasn’t actually what was done.”
BY SHANE HARRIS | NOVEMBER 21, 2013
Find this story at 21 November 2013
©2013 The Slate Group, LLC.
FBI Pursuing Real-Time Gmail Spying Powers as “Top Priority” for 20133 december 2013
For now, law enforcement has trouble monitoring Gmail communications in real time
Despite the pervasiveness of law enforcement surveillance of digital communication, the FBI still has a difficult time monitoring Gmail, Google Voice, and Dropbox in real time. But that may change soon, because the bureau says it has made gaining more powers to wiretap all forms of Internet conversation and cloud storage a “top priority” this year.
Last week, during a talk for the American Bar Association in Washington, D.C., FBI general counsel Andrew Weissmann discussed some of the pressing surveillance and national security issues facing the bureau. He gave a few updates on the FBI’s efforts to address what it calls the “going dark” problem—how the rise in popularity of email and social networks has stifled its ability to monitor communications as they are being transmitted. It’s no secret that under the Electronic Communications Privacy Act, the feds can easily obtain archive copies of emails. When it comes to spying on emails or Gchat in real time, however, it’s a different story.
That’s because a 1994 surveillance law called the Communications Assistance for Law Enforcement Act only allows the government to force Internet providers and phone companies to install surveillance equipment within their networks. But it doesn’t cover email, cloud services, or online chat providers like Skype. Weissmann said that the FBI wants the power to mandate real-time surveillance of everything from Dropbox and online games (“the chat feature in Scrabble”) to Gmail and Google Voice. “Those communications are being used for criminal conversations,” he said.
While it is true that CALEA can only be used to compel Internet and phone providers to build in surveillance capabilities into their networks, the feds do have some existing powers to request surveillance of other services. Authorities can use a “Title III” order under the “Wiretap Act” to ask email and online chat providers furnish the government with “technical assistance necessary to accomplish the interception.” However, the FBI claims this is not sufficient because mandating that providers help with “technical assistance” is not the same thing as forcing them to “effectuate” a wiretap. In 2011, then-FBI general counsel Valerie Caproni—Weissmann’s predecessor—stated that Title III orders did not provide the bureau with an “effective lever” to “encourage providers” to set up live surveillance quickly and efficiently. In other words, the FBI believes it doesn’t have enough power under current legislation to strong-arm companies into providing real-time wiretaps of communications.
Because Gmail is sent between a user’s computer and Google’s servers using SSL encryption, for instance, the FBI can’t intercept it as it is flowing across networks and relies on the company to provide it with access. Google spokesman Chris Gaither hinted that it is already possible for the company to set up live surveillance under some circumstances. “CALEA doesn’t apply to Gmail but an order under the Wiretap Act may,” Gaither told me in an email. “At some point we may expand our transparency report to cover this topic in more depth, but until then I’m not able to provide additional information.”
Either way, the FBI is not happy with the current arrangement and is on a crusade for more surveillance authority. According to Weissmann, the bureau is working with “members of intelligence community” to craft a proposal for new Internet spy powers as “a top priority this year.” Citing security concerns, he declined to reveal any specifics. “It’s a very hard thing to talk about publicly,” he said, though acknowledged that “it’s something that there should be a public debate about.”
Ryan Gallagher is a journalist who reports from the intersection of surveillance, national security, and privacy for Slate’s Future Tense blog. He is also a Future Tense fellow at the New America Foundation.
By Ryan Gallagher
Find this story at 26 March 2013
© 2013 The Slate Group, LLC.
Is NSA Prism the New FBI Carnivore?3 december 2013
From the ‘Uncle Sam is Watching’ files:
Lots of concern and talk in the last couple of days over the Washington Post’s leaked government story on PRISM.
The TL;dr version is that PRISM was/is an NSA operation that routes American’s private information to the NSA where it can be analyzed in the interest of national security.
While the revelation about NSA PRISM is new – the fact that the U.S. Government has active programs to surveil the Internet for email and otherwise is not.
Back in 2005 it was revealed that the FBI had to abandon it’s own Internet surveillance effort known as Carnivore. With Carnivore, the FBI was quite literally injesting email and Internet content en masse from the U.S .
Officially known as the Digital Collection System 1000 (DCS-1000), Carnivore captures data traffic that flows through an Internet service provider (ISP). The system prompted a flurry of criticism from privacy advocates when it was announced in 2000 during the Clinton administration.
At the time that Carnivore was shut down, the Electronic Privacy Information Center (EPIC) speculated that, “FBI’s need for Carnivore-like Internet surveillance tools is decreasing, likely because ISPs are providing Internet traffic information directly to the government.”
Eight years later, it looks like EPIC was right – since it would appear based on the WaPo report that the NSA has been getting info directly from providers.
I saw the head of the NSA, General Alexander speak at Defcon last year and he’s slotted to speak as a keynote at Black Hat this year. I wonder if he’ll actually show up now given the revelation of PRISM.
By Sean Michael Kerner | June 06, 2013
Find this story at 6 June 2013
Copyright 2013 QuinStreet Inc.
FBI retires its Carnivore (2005)3 december 2013
FBI surveillance experts have put their once-controversial Carnivore Internet surveillance tool out to pasture, preferring instead to use commercial products to eavesdrop on network traffic, according to documents released Friday.
Two reports to Congress obtained by the Washington-based Electronic Privacy Information Center under the Freedom of Information Act reveal that the FBI didn’t use Carnivore, or its rebranded version “DCS-1000,” at all during the 2002 and 2003 fiscal years. Instead, the bureau turned to unnamed commercially-available products to conduct Internet surveillance thirteen times in criminal investigations in that period.
Carnivore became a hot topic among civil libertarians, some network operators and many lawmakers in 2000, when an ISP’s legal challenge brought the surveillance tool’s existence to light. One controversy revolved around the FBI’s legally-murky use of the device to obtain e-mail headers and other information without a wiretap warrant — an issue Congress resolved by explicitly legalizing the practice in the 2001 USA PATRIOT Act.
Under section 216 of the act, the FBI can conduct a limited form of Internet surveillance without first visiting a judge and establishing probable cause that the target has committed a crime. In such cases the FBI is authorized to capture routing information like e-mail addresses or IP addresses, but not the contents of the communications.
According to the released reports, the bureau used that power three times in 2002 and six times in 2003 in cases in which it brought its own Internet surveillance gear to the job. Each of those surveillance operations lasted sixty days or less, except for one investigation into alleged extortion, arson and “teaching of others how to make and use destructive devices” that ran over eight months from January 10th to August 26th, 2002.
Other cases investigated under section 216 involved alleged mail fraud, controlled substance sales, providing material support to terrorism, and making obscene or harassing telephone calls within the District of Columbia. The surveillance targets’ names are not listed in the reports.
In four additional cases, twice each in 2002 and 2003, the FBI obtained a full-blown Internet wiretap warrant from a judge, permitting them to capture the contents of a target’s Internet communications in real time. No more information on those cases is provided in the reports because they involved “sensitive investigations,” according to the bureau.
The new documents only enumerate criminal investigations in which the FBI deployed a government-owned surveillance tool, not those in which an ISP used its own equipment to facilitate the spying. Cases involving foreign espionage or international terrorism are also omitted.
Developed by a contractor, Carnivore was a customizable packet sniffer that, in conjunction with other FBI tools, could capture e-mail messages, and reconstruct Web pages exactly as a surveillance target saw them while surfing the Web. FBI agents lugged it with them to ISPs that lacked their own spying capability.
Kevin Poulsen, SecurityFocus 2005-01-14
Find this story at 14 January 2005
Copyright 2010, SecurityFocus
EarthLink Says It Refuses to Install FBI’s Carnivore Surveillance Device (2000)3 december 2013
One of the nation’s largest Internet-service providers, EarthLink Inc., has refused toinstall a new Federal Bureau of Investigation electronic surveillance device on its network, saying technical adjustments required to use the device caused disruptions for customers.
The FBI has used Carnivore, as the surveillance device is called, in a number of criminal investigations. But EarthLink is the first ISP to offer a public account of an actual experience with Carnivore. The FBI has claimed that Carnivore won’t interfere with an ISP’s operations.
“It has the potential to hurt our network, to bring pieces of it down,” Steve Dougherty, EarthLink’s director of technology acquisition, said of Carnivore. “It could impact thousands of people.”
While EarthLink executives said they would continue to work with authorities in criminal investigations, they vowed not to allow the FBI to install Carnivore on the company’s network. The company also has substantial privacy concerns.
EarthLink has already voiced its concerns in court. The ISP is the plaintiff in a legal fight launched against Carnivore earlier this year with the help of attorney Robert Corn-Revere, according to people close to the case. Previously, the identity of the plaintiff in the case, which is under seal, wasn’t known. A federal magistrate ruled against EarthLink in the case early this year, forcing it to give the FBI access to its system. Mr. Corn-Revere declined to comment.
EarthLink’s problems with Carnivore began earlier this year, when the FBI installed a Carnivore device on its network at a hub site in Pasadena, Calif. The FBI had a court order that allowed it to install the equipment as part of a criminal investigation.
The FBI connected Carnivore, a small computer box loaded with sophisticated software for monitoring e-mail messages and other online communications, to EarthLink’s remote access servers, a set of networking equipment that answers incoming modem calls from customers. But Carnivore wasn’t compatible with the operating system software on the remote access servers. So EarthLink had to install an older version of the system software that would work with Carnivore, according to Mr. Dougherty.
EarthLink says the older version of the software caused its remote access servers to crash, which in turn knocked out access for a number of its customers. Mr. Dougherty declined to specify how many, saying only that “many” people were affected.
EarthLink executives said they were also concerned about privacy. The company said it had no way of knowing whether Carnivore was limiting its surveillance to the criminal investigation at hand or trolling more broadly. Other ISPs have said there could be serious liability issues for them if the privacy of individuals not connected to an investigation is compromised.
“There ought to be some transparency to the methods and tools that law enforcement is using to search-and-seize communications,” said John R. LoGalbo, vice president of public policy at PSINet Inc., an ISP in Ashburn, Va.
EarthLink executives declined to say whether the company has received court orders for information about other customers since the disruption earlier this year. EarthLink said it would help authorities in criminal investigations using techniques other than Carnivore.
The FBI insists that Carnivore doesn’t affect the performance or stability of an ISP’s existing networks. The bureau says Carnivore passively monitors traffic, recording only information that is relevant to FBI investigations.
In some cases, the FBI said, the ISP is equipped to turn over data without the use of Carnivore. This is common in cases where only e-mail messages are sought because that type of data can easily be obtained through less-intrusive means.
Attorney General Janet Reno said Thursday that she was putting the system under review. She said the Justice Department would investigate Carnivore’s constitutional implications and make sure that the FBI was using it in “a consistent and balanced way.”
Write to Nick Wingfield at nick.wingfield@wsj.com , Ted Bridis at ted.bridis@wsj.com and Neil King Jr. at neil.king@wsj.com
By NICK WINGFIELD, TED BRIDIS and
NEIL KING JR. | Staff Reporters of
THE WALL STREET JOURNAL
Find this story at 14 July 2000
Copyright ©2013 Dow Jones & Company, Inc.
Carnivore (2000) FOIA documents3 december 2013
On July 11, 2000, the existence of an FBI Internet monitoring system called “Carnivore” was widely reported. Although the public details were sketchy, reports indicated that the Carnivore system is installed at the facilities of an Internet Service Provider (ISP) and can monitor all traffic moving through that ISP. The FBI claims that Carnivore “filters” data traffic and delivers to investigators only those “packets” that they are lawfully authorized to obtain. Because the details remain secret, the public is left to trust the FBI’s characterization of the system and — more significantly — the FBI’s compliance with legal requirements.
One day after the initial disclosures, EPIC filed a Freedom of Information Act (FOIA) request seeking the public release of all FBI records concerning Carnivore, including the source code, other technical details, and legal analyses addressing the potential privacy implications of the technology. On July 18, 2000, after Carnivore had become a major issue of public concern, EPIC asked the Justice Department to expedite the processing of its request. When DOJ failed to respond within the statutory deadline, EPIC filed suit in U.S. District Court seeking the immediate release of all information concerning Carnivore.
At an emergency hearing held on August 2, 2000, U.S. District Judge James Robertson ordered the FBI to report back to the court by August 16 and to identify the amount of material at issue and the Bureau’s schedule for releasing it. The FBI subsequently reported that 3000 pages of responsive material were located, but it refused to commit to a date for the completion of processing.
In late January 2001, the FBI completed its processing of EPIC’s FOIA request. The Bureau revised its earlier estimate and reported that there were 1756 pages of responsive material; 1502 were released in part and 254 were withheld in their entirety (see link below for sample scanned documents).
On August 1, 2001, the FBI moved for summary judgment, asserting that it fully met its obligations under FOIA. On August 9, 2001, EPIC filed a motion to stay further proceedings pending discovery, on the grounds that the FBI has failed to conduct an adequate search for responsive documents.
On March 25, 2002, the court issued an order directing the FBI to initiate a new search for responsive documents. The new search was to be conducted in the offices of General Counsel and Congressional & Public Affairs, and be completed no later than May 24, 2002. The documents listed above were located and released as a result of that court-ordered search.
Find this story at 11 July 2000
Find the FOIA documents at
And here
Carnivore Details Emerge (2000)3 december 2013
A web spying capability, multi-million dollar price tag, and a secret Carnivore ancestor are some of the details to poke through heavy FBI editing.
“ Carnivore is remarkably tolerant of network aberration, such a speed change, data corruption and targeted smurf type attacks. ”
FBI report
WASHINGTON–The FBI’s Carnivore surveillance tool monitors more than just email. Newly declassified documents obtained by Electronic Privacy Information Center (EPIC) under the Freedom of Information Act reveal that Carnivore can monitor all of a target user’s Internet traffic, and, in conjunction with other FBI tools, can reconstruct web pages exactly as a surveillance target saw them while surfing the web. The capability is one of the new details to emerge from some six-hundred pages of heavily redacted documents given to the Washington-based nonprofit group this week, and reviewed by SecurityFocus Wednesday. The documents confirm that Carnivore grew from an earlier FBI project called Omnivore, but reveal for the first time that Omnivore itself replaced a still older tool. The name of that project was carefully blacked out of the documents, and remains classified “secret.” The older surveillance system had “deficiencies that rendered the design solution unacceptable.” The project was eventually shut down. Development of Omnivore began in February 1997, and the first prototypes were delivered on October 31st of that year. The FBI’s eagerness to use the system may have slowed its development: one report notes that it became “difficult to maintain the schedule,” because the Bureau deployed the nascent surveillance tool for “several emergency situations” while it was still in beta release. “The field deployments used development team personnel to support the technical challenges surrounding the insertion of the OMNIVORE device,” reads the report. The ‘Phiple Troenix’ Project In September 1998, the FBI network surveillance lab in Quantico launched a project to move Omnivore from Sun’s Solaris operating system to a Windows NT platform. “This will facilitate the miniaturization of the system and support a wide range of personal computer (PC) equipment,” notes the project’s Statement of Need. (Other reasons for the switch were redacted from the documents.) The project was called “Phiple Troenix”–apparently a spoonerism of “Triple Phoenix,” a type of palm tree–and its result was dubbed “Carnivore.” Phiple Troenix’s estimated price tag of $800,000 included training for personnel at the Bureau’s Washington-based National Infrastructure Protection Center (NIPC). Meanwhile, the Omnivore project was formally closed down in June 1999, with a final cost of $900,000. Carnivore came out of beta with version 1.2, released in September 1999. As of May 2000, it was in version 1.3.4. At that time it underwent an exhaustive series of carefully prescribed tests under a variety of conditions. The results, according to a memo from the FBI lab, were positive. “Carnivore is remarkably tolerant of network aberration, such a speed change, data corruption and targeted smurf type attacks.
RELATED STORIES
Corporate Carnivore Available
Forty-five days of the Carnivore
Carnivore: Just Say No?
Carnivore in Court
“We call ours ‘Sniffy.'”
FBI Defends Carnivore
The FBI can
configure the tool to store all traffic to or from a particular Internet IP address, while monitoring DHCP and RADIUS protocols to track a particular user. In “pen mode,” in which it implements a limited type of surveillance not requiring a wiretap warrant, Carnivore can capture all packet header information for a targeted user, or zero in on email addresses or FTP login data. Web Surveillance Version 2.0 will include the ability to display captured Internet traffic directly from Carnivore. For now, the tool only stores data as raw packets, and another application called “Packeteer” is later used to process those packets. A third program called “CoolMiner” uses Packeteer’s output to display and organize the intercepted data. Collectively, the three applications, Carnivore, Packeteer and CoolMiner, are referred to by the FBI lab as the “DragonWare suite.” The documents show that in tests, CoolMiner was able to reconstruct HTTP traffic captured by Carnivore into coherent web pages, a capability that would allow FBI agents to see the pages exactly as the user saw them while surfing the web. Justice Department and FBI officials have testified that Carnivore is used almost exclusively to monitor email, but noted that it was capable of monitoring messages sent over web-based email services like Hotmail. An “Enhanced Carnivore” contract began in November 1999, the papers show, and will run out in January of next year at a total cost of $650,000. Some of the documents show that the FBI plans to add yet more features to version 2.0 and 3.0 of the surveillance tool, but the details are almost entirely redacted. A document subject to particularly heavy editing shows that the FBI was interested in voice over IP technology, and was in particular looking at protocols used by Net2Phone and FreeTel. EPIC attorney David Sobel said the organization intends to challenge the FBI’s editing of the released documents. In the meantime, EPIC is hurriedly scanning in the pages and putting them on the web, “so that the official technical review is not the only one,” explained Sobel. “We want an unofficial review with as wide a range of participants as possible.” The FBI’s next release of documents is scheduled for mid-November.
Kevin Poulsen, SecurityFocus 2000-10-04
Find this story at 4 October 2000
Copyright 2010, SecurityFocus
FBI agent Marcus C. Thomas (who is mentioned in the EPIC FOIA documents) made a very interesting presentation at NANOG 20 yesterday morning, discussing Carnivore. (2000)3 december 2013
Agent Thomas gave a demonstration of both Carnivore 1.34 (the currently
deployed version) and Carnivore 2.0 (the development version) as well as
some of the other DragonWare tools.
Most of this information isn’t new, but it demonstrates that the
DragonWare tools can be used to massively analyze all network traffic
accessible to a Carnivore box.
The configuration screen of Carnivore shows that protocol information can
be captured in 3 different modes: Full, Pen, and None. There are check
boxes for TCP, UDP, and ICMP.
Carnivore can be used to capture all data sent to or from a given IP
address, or range of IP addresses.
It can be used to search on information in the traffic, doing matching
against text entered in the “Data Text Strings” box. This, the agent
assured us, was so that web mail could be identified and captured, but
other browsing could be excluded.
It can be used to automatically capture telnet, pop3, and FTP logins with
the click of a check box.
It can monitor mail to and/or from specific email addresses.
It can be configured to monitor based on IP address, RADIUS username, MAC
address, or network adaptor.
IPs can be manually added to a running Carnivore session for monitoring.
Carnivore allows for monitoring of specific TCP or UDP ports and port
ranges (with drop down boxes for the most common protocols).
Carnivore 2.0 is much the same, but the configuration menu is cleaner, and
it allows Boolean statements for exclusion filter creation.
—
The Packeteer program takes raw network traffic dumps, reconstructs the
packets, and writes them to browsable files.
CoolMiner is the post-processor session browser. The demo was version
1.2SP4. CoolMiner has the ability to replay a victim’s steps while web
browsing, chatting on ICQ, Yahoo Messenger, AIM, IRC. It can step through
telnet sessions, AOL account usage, and Netmeeting. It can display
information sent to a network printer. It can process netbios data.
CoolMiner displays summary usage, broken down by origination and
destination IP addresses, which can be selectively viewed.
Carnivore usually runs on Windows NT Workstation, but could run on Windows
2000.
Some choice quotes from Agent Thomas:
“Non-relevant data is sealed from disclosure.”
“Carnivore has no active interaction with any devices on the network.”
“In most cases Carnivore is only used with a Title III. The FBI will
deploy Carnivore without a warrant in cases where the victim is willing to
allow a Carnivore box to monitor his communication.”
“We rely on the ISP’s security [for the security of the Carnivore box].”
“We aren’t concerned about the ISP’s security.”
When asked how Carnivore boxes were protected from attack, he said that
the only way they were accessible was through dialup or ISDN. “We could
take measures all the way up to encryption if we thought it was
necessary.”
While it doesn’t appear that Carnivore uses a dial-back system to prevent
unauthorized access, Thomas mentioned that the FBI sometimes “uses a
firmware device to prevent unauthorized calls.”
When asked to address the concerns that FBI agents could modify Carnivore
data to plant evidence, Thomas reported that Carnivore logs FBI agents’
access attempts. The FBI agent access logs for the Carnivore box become
part of the court records. When asked the question “It’s often common
practice to write back doors into [software programs]. How do we know you
aren’t doing that?”, Thomas replied “I agree 100%. You’re absolutely
right.”
When asked why the FBI would not release source, he said: “We don’t sell
guns, even though we have them.”
When asked: “What do you do in cases where the subject is using
encryption?” Thomas replied, “This suite of devices can’t handle that.” I
guess they hand it off to the NSA.
He further stated that about 10% of the FBI’s Carnivore cases are thwarted
by the use of encryption, and that it is “more common to find encryption
when we seize static data, such as on hard drives.”
80% of Carnivore cases have involved national security.
Marcus Thomas can be contacted for questions at mthomas@fbi.gov or at
(730) 632-6091. He is “usually at his desk.”
24 October 2000
Find this story at 24 October 2000
The war on democracy; How corporations and spy agencies use “security” to defend profiteering and crush activism3 december 2013
A stunning new report compiles extensive evidence showing how some of the world’s largest corporations have partnered with private intelligence firms and government intelligence agencies to spy on activist and nonprofit groups. Environmental activism is a prominent though not exclusive focus of these activities.
The report by the Center for Corporate Policy (CCP) in Washington DC titled Spooky Business: Corporate Espionage against Nonprofit Organizations draws on a wide range of public record evidence, including lawsuits and journalistic investigations. It paints a disturbing picture of a global corporate espionage programme that is out of control, with possibly as much as one in four activists being private spies.
The report argues that a key precondition for corporate espionage is that the nonprofit in question:
“… impairs or at least threatens a company’s assets or image sufficiently.”
One of the groups that has been targeted the most, and by a range of different corporations, is Greenpeace. In the 1990s, Greenpeace was tracked by private security firm Beckett Brown International (BBI) on behalf of the world’s largest chlorine producer, Dow Chemical, due to the environmental organisation’s campaigning against the use of chlorine to manufacture paper and plastics. The spying included:
“… pilfering documents from trash bins, attempting to plant undercover operatives within groups, casing offices, collecting phone records of activists, and penetrating confidential meetings.”
Other Greenpeace offices in France and Europe were hacked and spied on by French private intelligence firms at the behest of Électricité de France, the world’s largest operator of nuclear power plants, 85% owned by the French government.
Oil companies Shell and BP had also reportedly hired Hackluyt, a private investigative firm with “close links” to MI6, to infiltrate Greenpeace by planting an agent who “posed as a left -wing sympathiser and film maker.” His mission was to “betray plans of Greenpeace’s activities against oil giants,” including gathering “information about the movements of the motor vessel Greenpeace in the north Atlantic.”
The CCP report notes that:
“A diverse array of nonprofits have been targeted by espionage, including environmental, anti-war, public interest, consumer, food safety, pesticide reform, nursing home reform, gun control, social justice, animal rights and arms control groups.
Many of the world’s largest corporations and their trade associations – including the US Chamber of Commerce, Walmart, Monsanto, Bank of America, Dow Chemical, Kraft, Coca-Cola, Chevron, Burger King, McDonald’s, Shell, BP, BAE, Sasol, Brown & Williamson and E.ON – have been linked to espionage or planned espionage against nonprofit organizations, activists and whistleblowers.”
Exploring other examples of this activity, the report notes that in Ecuador, after a lawsuit against Texaco triggering a $9.5 billion fine for spilling 350 million gallons of oil around Lago Agrio, the private investigations firm Kroll tried to hire journalist Mary Cuddehe as a “corporate spy” for Chevron, to undermine studies of the environmental health effects of the spill.
Referring to the work of US investigative reporter Jeremy Scahill, the report points out that the notorious defence contractor Blackwater, later renamed XE Services and now Academi, had sought to become “the intel arm” of Monsanto, the agricultural and biotechnology corporation associated with genetically modified foods. Blackwater was paid to “provide operatives to infiltrate activist groups organizing against the multinational biotech firm.”
In another case, the UK’s Camp for Climate Action, which supports the decommissioning of coal-fired plants, was infiltrated by private security firm Vericola on behalf of three energy companies, E.ON, Scottish Power, and Scottish Resources Group.
Reviewing emails released by Wikileaks from the Texas-based private intelligence firm Stratfor, the report shows how the firm reportedly “conducted espionage against human rights, animal rights and environmental groups, on behalf of companies such as Coca-Cola.” In one case, the emails suggest that Stratfor investigated People for the Ethical Treatment of Animals (PETA) at Coca-Cola’s request, and had access to a classified FBI investigation on PETA.
The report uncovers compelling evidence that much corporate espionage is facilitated by government agencies, particularly the FBI. The CCP report examines a September 2010 document from the Office of the Inspector General in the US Justice Department, which reviewed FBI investigations between 2001 and 2006. It concluded that:
“… the factual basis of opening some of the investigations of individuals affiliated with the groups was factually weak… In some cases, we also found that the FBI extended the duration of investigations involving advocacy groups or their members without adequate basis…. In some cases, the FBI classified some of its investigations relating to nonviolent civil disobedience under its ‘Acts of Terrorism’ classification.”
For instance, on an FBI investigation of Greenpeace, the Justice Department found that:
“… the FBI articulated little or no basis for suspecting a violation of any federal criminal statute… the FBI’s opening EC [electronic communication] did not articulate any basis to suspect that they were planning any federal crimes….We also found that the FBI kept this investigation open for over 3 years, long past the corporate shareholder meetings that the subjects were supposedly planning to disrupt… We concluded that the investigation was kept open ‘beyond the point at which its underlying justification no longer existed,’ which was inconsistent with the FBI’s Manual of Investigative and Operational Guidelines (MIOG).”
The FBI’s involvement in corporate espionage has been institutionalised through ‘InfraGard’, “a little-known partnership between private industry, the FBI and the Department of Homeland Security.” The partnership involves the participation of “more than 23,000 representatives of private industry,” including 350 of the Fortune 500 companies.
But it’s not just the FBI. According to the new report, “active-duty CIA operatives are allowed to sell their expertise to the highest bidder”, a policy that gives “financial firms and hedge funds access to the nation’s top-level intelligence talent. Little is known about the CIA’s moonlighting policy, or which corporations have hired current CIA operatives.”
The report concludes that, due to an extreme lack of oversight, government effectively tends to simply “rubber stamp” such intelligence outsourcing:
“In effect, corporations are now able to replicate in miniature the services of a private CIA, employing active-duty and retired officers from intelligence and/or law enforcement. Lawlessness committed by this private intelligence and law enforcement capacity, which appears to enjoy near impunity, is a threat to democracy and the rule of law. In essence, corporations are now able to hire a private law enforcement capacity – which is barely constrained by legal and ethical norms – and use it to subvert or destroy civic groups. This greatly erodes the capacity of the civic sector to countervail the tremendous power of corporate and wealthy elites.”
Gary Ruskin, author of the report, said:
“Corporate espionage against nonprofit organizations is an egregious abuse of corporate power that is subverting democracy. Who will rein in the forces of corporate lawlessness as they bear down upon nonprofit defenders of justice?”
That’s a good question. Ironically, many of the same companies spearheading the war on democracy are also at war with planet earth – just last week the Guardian revealed that 90 of some of the biggest corporations generate nearly two-thirds of greenhouse gas emissions and are thus overwhelmingly responsible for climate change.
Dr Nafeez Ahmed is executive director of the Institute for Policy Research & Development and author of A User’s Guide to the Crisis of Civilisation: And How to Save It among other books. Follow him on Twitter
Find this story at 28 November 2013
© 2013 Guardian News and Media Limited or its affiliated companies. All rights reserved.
Corporations increasingly spying on nonprofits, group says3 december 2013
Corporations are increasingly spying on nonprofit groups they view as potential threats with little fear of retribution, according to a new report by a corporate watchdog group.
The large companies employ former Central Intelligence Agency, National Security Agency, FBI, military and police officers to monitor and in some cases infiltrate groups that have been critical of them, according to the report by Essential Information, which was founded by Ralph Nader in the 1980s.
“Many different types of nonprofits have been targeted with espionage, including environmental, anti-war, public interest, consumer, food safety, pesticide reform, nursing-home reform, gun control, social justice, animal rights and arms control groups,” the report said.
Photos: Top 10 Southern California companies
The spying is problematic because some investigators violate laws — a French utility was fined about $2 million in 2011 for hacking the computers of Greenpeace France — while chilling groups that stand up for consumers, the report said.
“Corporate espionage against nonprofit organizations is an egregious abuse of corporate power that is subverting democracy,” said Gary Ruskin, the report’s author. “Who will rein in the forces of corporate lawlessness as they bear down upon nonprofit defenders of justice?”
Corporations and their trade associations have been linked to a wide variety of espionage tactics against nonprofit organizations, including posing as volunteers or journalists to obtain information about nonprofits’ activities, the report said.
“Many of these tactics are either highly unethical or illegal,” the report said.
Essential Information is a Washington-based nonprofit that promotes corporate accountability.
By Stuart Pfeifer
November 20, 2013, 1:25 p.m.
Find this story at 20 November 2013
Copyright 2013 http://www.latimes.com
Meet the Arab-American lawyer who the NSA spied on–back in 196727 november 2013
Abdeen Jabara was hardly shocked when the scandal over the National Security Agency’s global surveillance dragnet broke in June.
“I was not at all surprised by the Snowden revelations about the NSA,” Jabara, a prominent lawyer and a founder of the American-Arab Anti-Discrimination Committee, told me in a phone interview. “The United States has this huge, huge international surveillance apparatus in place and after 9/11 they were going to use it as much as they could as part of the war on terror. It was just too tempting.”
He would know–he’s lived it. Jabara is one of many Americans to have been personally spied on by the NSA decades ago. A court battle that started in 1972 eventually forced the secretive surveillance agency to acknowledge that it pried into the life of an American in an effort that began in August 1967. The disclosure was the first time the U.S. admitted it had spied on an American.
Jabara’s story lays bare the deep roots of the NSA’s surveillance. Today, with the NSA operating under the ethos of “collect it all,” there’s much more surveillance of Americans when compared to prior decades. But the current spying occurs in a less targeted way.
Documents published by The Guardian have revealed that virtually every American’s communications are swept up by phone and Internet surveillance, though the government is not targeting individual Americans. Instead, the NSA is targeting foreigners but has retained–and sometimes searched– information about Americans in communication with foreign subjects of spying. In contrast, Jabara was working as a lawyer at a time when the NSA was specifically targeting domestic dissidents.
In 1972, Jabara filed suit against the government for prying into his life. A young Detroit-based attorney at the time, Jabara represented people from the Arab-American community caught up in legal trouble. He also took on the cases of people harassed by the Federal Bureau of Investigation, which had stepped up efforts to surveil Arab activists in the aftermath of the 1967 war, when the U.S. alliance with Israel was solidified. Jabara was caught up in what was called “Operation Boulder,” a Nixon administration-era program that put Arabs under surveillance. “Operation Boulder,” which was sparked by the murder of Israeli athletes at the Munich Olympics in 1972, went after domestic activist groups and was instrumental in the deportation of hundreds of people on technical irregularities.
Jabara was spied on without a warrant, albeit incidentally–the U.S. government never targeted him, but surveilled phone calls and telegrams from his clients. His case forced the government to disclose that Jabara was spied on and that non-governmental domestic groups shared information on Jabara with the U.S. The FBI was the primary agency tracking him, but it was the NSA that furnished the federal law enforcement agency with records of Jabara’s phone conversations.
In 1979, a federal district court judge handed Jabara and his legal team a victory with a ruling that said the U.S. had violated Jabara’s Fourth Amendment and privacy rights. The federal government appealed, and a separate court delivered a setback to Jabara. In 1982, an appeals court ruled that the government can intercept conversations between U.S. citizens and people overseas–even if there is no reason to believe the citizen is a “foreign agent.” The final step in the case came in 1984, when the FBI agreed to destroy all the files on Jabara and stipulated that the lawyer did not engage in criminal activity.
The timeline of Jabara’s case traverses a changing legal landscape governing surveillance. When Jabara first filed suit, there was no legal framework prohibiting the government from spying on Americans without a warrant. But in the wake of disclosures about the NSA keeping a “watch list” of some 1,650 anti-war activists and other evidence of domestic surveillance, the Foreign Intelligence Surveillance Act was passed in 1979. The act required intelligence agencies to go to a secretive court–where the judges are handpicked by the Supreme Court’s Chief Justice–in order to target Americans. It’s an open question whether the secretive court, criticized for being deferential to government claims, would have denied the NSA’s and FBI’s bid to spy on Jabara. But it would have had to show probable cause that Jabara was an agent of a foreign power–an assertion that federal judges eventually rejected.
Parallels between current-day surveillance and the spying on Jabara are easy to come by. The U.S. government attempted to shield disclosing data on surveilling Jabara by asserting the “state secrets” privilege. The Obama administration used the same argument to try to dismiss a lawsuit against the NSA. Both surveillance efforts raise the question of how to square a secret spying regime with a Constitution that ostensibly protects privacy. And the government revealed that it shared information on Jabara with three foreign governments–a foreshadowing of revelations that the U.S. shares intelligence information with allies, including the Israeli government. (Jabara suspected that the U.S. shared data on him with Israel, though the government denied that.)
Lee Tien, a senior staff attorney with the Electronic Frontier Foundation, said that not much had shifted since the government spied on Jabara. “What has changed is that the intelligence community is doing even more surveillance,” Tien told me in an interview. “What didn’t change? They’re still surveilling people in the United States and they’re doing it illegally.”
Now, the question is whether more legal checks will be put on the NSA’s surveillance regime. The secretive agency is battling civil liberties groups in courts and could be reined in by new legislation proposed by elected officials. But Jabara’s case–and the long history of NSA spying–shows that despite reform efforts, spying on Americans continues unabated.
Alex Kane on October 3, 2013
Find this story at 3 October 2013
© 2013 Mondoweiss
Arab-American Attorney Abdeen Jabara: I Was Spied on by the National Security Agency 40 Years Ago27 november 2013
As more revelations come to light about the National Security Agency, we speak to civil rights attorney Abdeen Jabara, co-founder of the American-Arab Anti-Discrimination Committee. He was involved in a groundbreaking court case in the 1970s that forced the NSA to acknowledge it had been spying on him since 1967. At the time of the spying, Jabara was a lawyer in Detroit representing Arab-American clients and people being targeted by the FBI. The disclosure was the first time the NSA admitted it had spied on an American.
Transcript
This is a rush transcript. Copy may not be in its final form.
AMY GOODMAN: I want to turn now to a—perhaps related, but certainly to the climate, I want to end today’s show on the National Security Agency. Our guest here in New York, Abdeen Jabara, who was co-founder of the American-Arab Anti-Discrimination Committee, was involved in a groundbreaking court case in the 1970s that forced the National Security Agency to acknowledge it had been spying on him since 1967. The disclosure was the first time, I believe, that the NSA admitted it had spied on an American. I mean, this is at a time, Abdeen Jabara, that most people had no idea what the NSA was. This is not like these last few months.
ABDEEN JABARA: Well, it was—this is very interesting. I didn’t know what the NSA was. I mean, I started a lawsuit against the FBI, because I thought that the FBI had been spying on me and monitoring my activities—
AMY GOODMAN: Why?
ABDEEN JABARA: —and that of my clients. Well, I’ll tell you why. Because I had been very, very active in Palestinian support work. And one day I read in Newsweek magazine, in the Periscope section, that 26 Arabs in the United States had been targeted for surveillance, electronic surveillance. So, I thought, surely, some of those had been clients of mine or had talked to me on the phone about issues and so forth. And that’s when I brought the lawsuit. And—
AMY GOODMAN: So you sued the FBI in 1972.
ABDEEN JABARA: Right, I sued the FBI in 1972, and the FBI answered. And on the issue about electronic surveillance, they declined to answer on the basis that it was privileged and state secret. At that point in time, the ACLU came in to represent me, and we forced them to answer that question. They admitted that there had been some overhears, alright, that I had not been personally targeted for electronic surveillance, but there had been overhears of my conversations with some of my clients. And they also said they received information from other federal agencies. And they didn’t want to answer that, who that agency was. And the court compelled them to answer. And it turned out that other agency was the NSA. And we didn’t know, you know, what the NSA was. Jim Bamford’s book, The Puzzle Palace, hadn’t yet been published. And we found out that the FBI had requested any information that the NSA had, and the NSA had six different communications that I had made. I was president of the Association of American Arab University Graduates in 1972, so I had a great deal of work on my plate as the president of the association. And I don’t know what these communications were.
And the district court, Judge Ralph Freeman, held that my First Amendment and my Fourth Amendment rights had been violated. An appeal was made to the Sixth Circuit Court of Appeals in Cincinnati. And the Sixth Circuit set aside part of that ruling, saying that there is no violation of a Fourth Amendment right by the National Security Agency to surveil an American’s communications overseas, even though the person is not a foreign agent. And, in fact, five years ago, Congress codified that, where they have said—and there’s an article in today’s New York Times about this—by saying that there’s no warrant requirement where the target is a foreign target, even though an American citizen is communicating overseas.
So, this whole issue, I was surprised, after all the revelations about the Snowden-NSA brouhaha, that nobody had looked back at what had occurred back in the—in the ’70s to show that at that time it came out in the press that over 1,600 Americans had been surveilled by the NSA. And this was before the passage of FISA, Foreign Intelligence Surveillance Act. Out of that issue in the ’70s, they passed this FISA Act, which said that—and they set up a secret court, which is the national security court. The judges of that are appointed by the chief justice of the Supreme Court.
AMY GOODMAN: We have less than a minute. So—
ABDEEN JABARA: Yes.
AMY GOODMAN: —keep going.
ABDEEN JABARA: So, they set that up, and they said that that will create safeguards, alright? This will create safeguards, and that the only targets can be foreign agents.
AMY GOODMAN: Finally, Abdeen Jabara, so there are all these records on you, not only that the FBI and NSA had. How many other agencies had them? And did you get them expunged?
ABDEEN JABARA: As a matter of fact, I did. After the case was remanded to the trial court, the district in Detroit, we entered into a settlement with the FBI whereby they acknowledged that I had not been in violation of any U.S. laws, that I had been exercising my constitutional rights, and that they would destroy the entire file that they had collected on me.
AMY GOODMAN: How many agencies had they shared this file with?
ABDEEN JABARA: They had shared it with three foreign governments and 17—
AMY GOODMAN: Which governments?
ABDEEN JABARA: —17 domestic agencies.
AMY GOODMAN: Which governments?
ABDEEN JABARA: Well, they didn’t tell us.
AMY GOODMAN: Ah—
ABDEEN JABARA: But you can just surmise.
AMY GOODMAN: I want to thank you all for being with us. Thank you so much, Abdeen Jabara, former vice chair of the ADC, one of the founders of the American-Arab Anti-Discrimination Committee; Albert Mokhiber, former president of the ADC; and Congressmember John Conyers. Congratulations on your almost 50 years of service.
I’ll be speaking on Saturday at 2:00 at the Green Fest in Los Angeles, and at 6:00 at Newport Beach Marriott in California.
The original content of this program is licensed under a Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 United States License. Please attribute legal copies of this work to democracynow.org. Some of the work(s) that this program incorporates, however, may be separately licensed. For further information or additional permissions, contact us.
Thursday, October 17, 2013
Find this story at 17 October 2013
De spiegel van ‘Das Leben der Anderen’ in Duitsland; 38 jaar getapt door de Duitse inlichtingendienst27 november 2013
Nut en noodzaak van inlichtingendiensten wordt alleen zichtbaar als feiten over het werk van die diensten aan het licht komen. Succes verhalen over operaties worden beschreven door loyale onderzoekers en ‘deskundigen.’ Rob de Wijk stelde het boek ‘Doelwit Europa’ samen om te laten zien hoeveel aanslagen voorkomen waren door veiligheidsdiensten. Bij die succesverhalen zijn kanttekeningen te zetten. Er is bijvoorbeeld de voorkennis over aanslagen van de inlichtingendiensten waar niets is mee gedaan. De gevolgen van dat inadequate optreden is duidelijk geworden op 11 maart 2004 in Madrid en de 5 juli 2005 in London. Ook de betrokkenheid van informanten en infiltranten van inlichtingendiensten bij ernstige strafbare feiten roept vragen op over nut en noodzaak.
Rolf Gössner schreef over die strafbare feiten van informanten het boek “Geheime Informanten, V-Leute des Verfassungsschützes: Kriminelle im Dienst des Staates.” Het boek beschrijft de infiltratie van de Duitse extreem rechtse partij de NPD (Nationaldemokratische Partei Deutschlands) door de Duitse geheime dienst in het begin van de eenentwintigste eeuw. De Duitse regering overwoog de partij te verbieden, maar als de verhalen over de infiltratie van de partij opduiken is het mis. De verspreiding en vermenigvuldiging van fascistisch propaganda materiaal door betaalde informanten van de dienst is de eerste smet. Vervolgens volgen getuigenissen over mishandelingen en pogingen tot doodslag. Het verbod van de NPD is van de baan. Even is de betrokkenheid van NPD informanten bij strafbare feiten een groot schandaal. Gössner documenteert de feiten in “Geheime Informanten.” De consequenties voor de Verfassungsschütz zijn echter minimaal.
Voor Gössner zelf is het echter niet afgelopen. De inlichtingendienst zal hem tot 18 november 2008 in de gaten blijven houden. Op die dag heeft de staat de vice-president van de internationale liga voor de rechten van de mens, publicist en advocaat ruim 38 jaar in de gaten gehouden. Het Bundesamt für Verfassungsschütz deelt de rechtbank dan mee dat zij de observatie van Gössner stopzetten, “ … daß die Beobachtung des Klägers – nach aktuell erfolgter Prüfung durch das Bundesministerium des Innern und das Bundesamt für Verfassungsschutz – eingestellt worden ist.” De dienst is net op tijd omdat op 20 november 2009 de rechtzaak van Gössner tegen de staat begint. Een zaak die de dienst naar alle waarschijnlijkheid verloren had, gezien recente uitspraken over de observatie van fractievoorzitter van de politieke partij Die Linke, Bodo Ramelow.
Gössner had een rechtzaak tegen de staat aangespannen met betrekking tot die observatie en de mogelijke vernietiging van de verzamelde gegevens over hem door de inlichtingendienst. Deze procedure loopt al sinds februari 2006. De geheime dienst merkt op dat zij de gegevens die over Gössner verzameld zijn in afwachting van een gerechtelijke uitspraak bewaren. “Die hier zum Kläger erfaßten Daten werden ab sofort gesperrt. Von der Löschung der Daten wird – trotz ihrer Löschungsreife – insbesondere wegen der anhängigen Auskunftsklageverfahren bis zum rechtskräftigen Abschluß der Verfahren abgesehen.”
Rolf Gössner werd in de gaten gehouden omdat hij contacten had met mensen en organisaties die door het Bundesamt für Verfassungsschütz worden bestempeld als links extremistisch of beïnvloed door het links extremisme. De observatie vindt plaats op grond van het feit dat hij zou samenwerken met deze groepen. “Zusammenarbeit mit linksextremistischen bzw. linksextremistisch beeinflussten Personenzusammenschlüssen,” wordt hem eind jaren negentig door de inlichtingendienst meegedeeld. Onder de groepen, bevindt zich ook de Vereinigung der Verfolgten des Naziregimes“ (VVN), de vereniging van slachtoffers van het nazi regime. De inlichtingendienst beschuldigt Rolf Gössner zelf niet van staatsgevaarlijke activiteiten. Hij wordt “nicht vorgeworfen, selbst verfassungsfeindliche Ziele zu verfolgen oder sich entsprechend geäußert zu haben.” Hij is slachtoffer geworden van de stelselmatige observatie door de inlichtingendienst omdat hij de ‘verkeerde’ contacten zou hebben als publicist en advocaat, zegt hij in de media. “Eine Art Kontaktschuld ist mir zur Last gelegt, nicht etwa eigene verfassungswidrige Beiträge oder Bestrebungen,” vertelt Gössner aan de Stuttgarter Zeitung.
In1996 deed het tijdschrift ‘Geheim” een inzage verzoek bij de Verfassungsschütz. Uit de stukken die naar aanleiding van dat verzoek werden geopenbaard werd duidelijk dat het blad al sinds 1970 in de gaten werd gehouden. De inlichtingendienst bestempelde het blad als links extremistisch. Gössner schreef regelmatig voor het blad en kwam ook in de stukken voor. Daarnaast heeft hij in de 38 jaar dat hij is geobserveerd, gewerkt als advocaat voor verschillende instellingen en individuen. Ook was hij actief als burgerrechten en mensenrechten activist. In de jaren negentig werkte hij als een adviseur voor de politieke partij de Grünen in Hannover. De inlichtingendienst heeft al die contacten van Gössner geobserveerd en afgeluisterd.
Een bron binnen het Bundesamt für Verfassungsschütz vertelde het tijdschrift Stern dat het aantal artikelen, recensies van Gössners boeken, voordrachten, interviews en andere informatie die over Gössner verzameld zijn niet meer te overzien is. Onder de documenten bevinden zich interviews van de advocaat in de Weserkurier en de Frankfurter Rundschau. De Bundesdatenschutzbeauftragten, het Duitse College Bescherming Persoonsgegevens, vond het niet te bevatten wat er over Gössner verzameld was. De Bundesdatenschutzbeauftragten mochten de documenten echter niet inzien. Zij werden door ambtenaren van de inlichtingendienst voorgelezen omdat volgens de dienst bronnen moeten worden beschermd.
Geheime bronnen doet vermoeden dat er informanten tegen Gössner zijn ingezet ook bijvoorbeeld in zijn tijd dat hij voor de Grünen werkte. De inlichtingendienst beweert echter dat er geen agenten zijn ingezet om specifiek de mensenrechtenactivist te observeren, maar Gössner kan dat zelf niet controleren. Hij heeft in eerste instantie een deel, ongeveer 500 pagina’s, van zijn persoonsdossier gekregen. Grote delen zijn zwart gemaakt. Zijn dossier over alleen de periode 2000 tot 2008 telt ruim 2000 pagina’s. Uit de gekregen stukken kan Gössner opmaken dat een deel van de zwart gemaakte teksten commentaren van de inlichtingendienst zijn op de lezingen en teksten van de publicist.
Over de geheimhouding verklaart de dienst dat deze in het belang is van informanten, ter bescherming van de bronnen van de dienst. Gössner moet de dienst op het woord geloven dat er geen informanten tegen hem persoonlijk zijn ingezet, maar dat is onmogelijk nadat je 38 jaar bent afgeluisterd door diezelfde dienst. Hij gaat er vanuit dat de dienst al zijn gesprekken met de klanten van zijn advocatenpraktijk en zijn mensenrechten werk heeft afgeluisterd.
De rechtbank heeft de dienst opgedragen het dossier van Gössner van 1970 tot 2000 en de niet vrijgegeven stukken van 2000 tot 2008 ter inzage aan de rechtbank over te dragen. Deze gaat dan beoordelen wat geheim mag blijven en wat niet.
Het niet vrijgeven van bepaalde documenten valt onder een verordening van de minister van Binnenlandse Zaken. Gössner vecht echter ook deze akte van geheimhouding aan. In een vraaggesprek met het blad de Neue Kriminalpolitik draait de advocaat de bescherming van de informanten van de overheid om. Als werknemers of betrokkenen uit de gelederen van de politie of de inlichtingendienst zich bij Gössner melden om misstanden openbaar te maken of te bespreken wordt de geheimhouding van die gesprekken geschonden. In zijn boek “Geheime Informanten” komen verhalen over zulke misstanden voor. Als de inlichtingendienst de advocaat/publicist in de gaten hield dan liepen de klokkenluiders gevaar. Door zich op haar bronbescherming te beroepen, maar tegelijkertijd de geheimhouding van de advocaat te schenden, erkent de inlichtingendienst dat het haar slechts om het eigen lijfbehoud gaat. Niet het behoud van de rechtstaat, maar dat van de dienst is haar doel. “Meine bereits über 30 Jahre währende Langzeitüberwachung kann gravierende Folgen in allen drei Berufen zeitigen. In meinem publizistischen Tätigkeitsbereich müssen Informanten etwa aus dem Polizei- oder Geheimdienst-Apparat, die sich wegen Mißständen an mich wenden, damit rechnen, daß ihr Kontakt zu mir überwacht wird. Insofern ist der eigentlich gesetzlich garantierte Informantenschutz nicht mehr gewährleistet. Genau so wenig wie das Mandatsgeheimnis bei meiner Tätigkeit als Rechtsanwalt. Kein Mandant kann mehr sicher sein, daß das, was er mir vertraulich mitteilt, tatsächlich auch vertraulich bleibt – es sei denn, die Unterredung erfolgt in Wald und Flur. Wenn ich meiner Tätigkeit als parlamentarischer Berater nachgehe, dann ist der Schutz jener gewählten Abgeordneten vor geheimdienstlicher Ausforschung nicht mehr gewährleistet, die ich persönlich berate. Ein wirklich unhaltbarer Zustand.”
Gössner was kritisch over het veiligheidsapparaat en over het werk van inlichtingendiensten. Het boek ‘Geheime Informanten’ is daarvan een voorbeeld. Dit kan een motief van de inlichtingendienst zijn geweest om hem veertig jaar in de gaten te houden ondanks protesten van vooraanstaande journalisten, schrijvers, juristen, maar ook de Duitse Bundestag (parlement) en de Duitse regering. Zelfs een regering van SPD en de Grünen weerhield de inlichtingendienst er niet van om Gössner te observeren.
Critici hun leven lang in de gaten houden is iets dat alleen de Stasi deed, lijkt de algemene stelling. De archieven van de Stasi zijn daar het levende bewijs van. De observatie van de mensenrechten activist door de Duitse inlichtingendienst en de duizenden pagina’s die over zijn leven zijn verzameld maken duidelijk dat dit niet alleen in het Oost Duitsland van Erich Honecker gebeurde.
Find this story at 1 June 2009
Police are cracking down on students – but what threat to law and order is an over-articulate history graduate?27 november 2013
For most of my life student politics has been little more than a joke. Suddenly it’s become both serious and admirable
Why are some of the most powerful people in Britain so terrified of a bunch of students? If that sounds a ridiculous question, consider a few recent news stories. As reported in this paper last week, Cambridge police are looking for spies to inform on undergraduate protests against spending cuts and other “student-union type stuff”. Meanwhile, in London last Thursday, a student union leader, Michael Chessum, was arrested after a small and routine demo. Officers hauled him off to Holborn police station for not informing them of the precise route of the protest – even though it was on campus.
The 24-year-old has since been freed – on the strict condition that he doesn’t “engage in protest on any University Campus and not within half a mile boundary of any university”. Even with a copy of the bail grant in front of me, I cannot make out whether that applies to any London college, any British university – or just any institute of higher education anywhere in the world. As full-time head of the University of London’s student union, Chessum’s job is partly to protest: the police are blocking him from doing his work. But I suppose there’s no telling just what threat to law and order might be posed by an over-articulate history graduate.
While we’re trawling for the ridiculous, let us remember another incident this summer at the University of London, when a 25-year-old woman was arrested for the crime of chalking a slogan on a wall. That’s right: dragged off by the police for writing in water-soluble chalk. Presumably, there would have been no bother had she used PowerPoint.
It all sounds farcical – it is farcical – until you delve into the details. Take the London demo that landed Chessum in such bother: university staff were filming their own students from a balcony of Senate House (the building that inspired the Ministry of Truth in Orwell’s Nineteen Eighty-Four, appropriately enough). Such surveillance is a recent tradition, the nice man in the University press office explains to me – and if the police wanted the footage that would be no problem.
That link with the police is becoming increasingly important across more and more of our universities. London students allege that officers and university security guards co-ordinate their attempts to rein in demonstrations while staff comment on the increased police presence around campus. At Sussex, student protests against outsourcing services were broken up this April, when the university called in the police – who duly turned up with riot vans and dogs. A similar thing happened at Royal Holloway university, Surrey in 2011: a small number of students occupied one measly corridor to demonstrate against course closures and redundancies; the management barely bothered to negotiate, but cited “health and safety” and called in the police to clear away the young people paying their salaries.
For most of my life, student politics has been little more than a joke – the stuff of Neil off the Young Ones, or apprentice Blairites. But in the past few years it has suddenly become both serious and admirable, most notably with the protests of 2010 against £9,000 tuition fees and the university occupations that followed. And at just that point, both the police and university management have become very jumpy.
For the police, this is part of the age-old work of clamping down on possible sources of civil disobedience. But the motivation for the universities is much more complicated. Their historic role has been to foster intellectual inquiry and host debate. Yet in the brave new market of higher education, when universities are competing with each other to be both conveyor belts to the jobs market and vehicles for private investment, such dissent is not only awkward – it’s dangerously uncommercial. As Andrew McGettigan, author of The Great University Gamble, puts it: “Anything too disruptive gets in the way of the business plan.”
Last month it appeared that Edinburgh University had forced its student union to sign a gagging clause (now withdrawn). No union officer is allowed to make any public criticism of the university without giving at least 48 hours’ notice. University managers reportedly made that a deal-breaker if the student union was to get any funds.
The managers of the University of London want to shut down the student union at the end of this academic year. The plan – which is why Chessum and co were marching last week – is to keep the swimming pool and the various sports clubs, but to quash all university-wide student representation. After all, the students are only the people paying the salary of the university vice-chancellor, Adrian Smith – why should they get a say? The plan, it may not surprise you to learn, was drawn up by a panel that didn’t number a single student. What with sky-high fees and rocketing rents in the capital, you might think that the need for a pan-London student body had never been higher. But then, you’re not a university manager on a six-figure salary.
Where universities were historically places of free expression, now they are having to sacrifice that role for the sake of the free market. For students, that comes in the form of a crackdown on dissent. Yet the twentysomethings at university now will end up running our politics, our businesses and our media. You might want these future leaders to be questioning and concerned about society. Or you might wonder whether sending in the police to arrest a woman chalking a wall is proportionate. Either way, you should be troubled.
Aditya Chakrabortty
The Guardian, Monday 18 November 2013 20.00 GMT
Find this story at 18 November 2013
© 2013 Guardian News and Media Limited or its affiliated companies. All rights reserved.
Ideologische orde: Gaan we protesteren? Inlichtingenoperatie studentenprotesten ‘Gaan we stenen gooien?’ deel 227 november 2013
Diverse studentendemonstraties van de afgelopen jaren werden in potentie als het plegen van een misdrijf beschouwd, zo blijkt uit documenten die J&J in handen kreeg via de Wob. Bescherming van de openbare orde komt steeds meer in het teken te staan van het verzamelen van inlichtingen zonder dat hierbij duidelijk wordt waarvoor, en wat er mee gebeurt. Burgemeesters, College van B&W’s en gemeenteraden weten niets van deze operaties af.
Van eind 2009 tot de zomer van 2011 demonstreerden studenten en docenten tegen de bezuinigingen in het onderwijs. In die periode werden diverse actieve studenten in Utrecht en Amsterdam benaderd door de inlichtingendienst.
In het eerdere artikel ‘Gaan we stenen gooien?’ worden deze benaderingen in verband gebracht met het persbericht van de operationele driehoek van Den Haag van 20 januari 2011. De avond voorafgaande de demonstratie meldde burgemeester Van Aartsen namelijk dat ‘de gemeente Den Haag aanwijzingen had dat radicalen de studentendemonstratie van vandaag willen verstoren’. De burgemeester zei dat de politie die aanwijzingen baseerde op informatie afkomstig van ‘open en gesloten bronnen’.
Tijdens de demonstratie op die dag vonden er enige schermutselingen plaats op het Plein voor het Tweede Kamergebouw en op het Malieveld. De NOS meldde dat volgens de driehoek de 27 verdachten (cijfers van de politie) leden zouden zijn van de linkse groep Anti-Fascistische Aktie (AFA). Van de 27 verdachten werden er nog op dezelfde dag 22 vrijgelaten.
Inlichtingenoperatie
Naast deze benaderingen bleek het politie-apparaat een inlichtingenoperatie op touw te hebben gezet waarbij niet alleen studenten, maar ook politieke partijen in de gaten werden gehouden. Namen van sprekers en ‘bekende’ actievoerders werden aan het dossier toegevoegd om de ‘radicale’ claim van burgemeester Van Aartsen te onderbouwen.
Al die inlichtingen bleken echter boterzacht, zoals Van Aartsen in de operationele driehoek van donderdag 20 januari 2011 moest toegeven: “De burgemeester geeft aan dat hij de verstrekte informatie van de AIVD onbevredigend vindt en schorst het driehoeksoverleg.” De burgemeester belde de baas van de AIVD die meldde dat hij “niet meer informatie kan verstrekken, anders dan dat het om personen van AFA zou gaan die naar Den Haag zouden willen komen.”
De chef van de AIVD zou tijdens het telefoongesprek met Van Aartsen hebben gezegd dat “Zij [antifascisten, red.] de neiging zullen hebben om zich te mengen onder de demonstranten en gewelddadig willen optreden.” Zodra het driehoeksoverleg werd hervat, deed een van de directeuren van politie Haaglanden er nog een schepje bovenop: “Daaruit (diverse open bronnen) blijkt dat meerdere personen zich mogelijk radicaal willen manifesteren.”
Eerst vond Van Aartsen de AIVD-informatie onbevredigend, wist de politie van niets en enkele minuten later was er sprake van dat de horden “van een vijftal groepen met een verschillende achtergrond, maar alle van linkse signatuur” de volgende dag de stad zouden bestormen. “Daaronder zijn anarchistische en antiglobalistische groeperingen met een extreem karakter”, voegde de politie er nog aan toe.
Scenario’s werden aangescherpt. Tijdens het driehoeksoverleg werd een persbericht opgesteld. ‘De Haagse Driehoek heeft aanwijzingen dat radicale groeperingen de studentendemonstratie van vrijdag willen aangrijpen om de openbare orde in Den Haag te verstoren.’ De bronnen van de Driehoek waren ‘gesloten en open bronnen.’ Dit suggereerde dat de inlichtingendienst over informanten beschikte en dat er actief op internet en in actiecentra was gezocht naar oproepen om te gaan rellen.
Uit de laatste alinea van het verslag van de driehoek van 20 januari 2011 blijkt echter dat er geen enkele aanwijzing was dat radicalen de demonstratie zouden verstoren: ‘De driehoek besluit voorts dat de burgemeester een noodbevel zal uitvaardigen, indien er concrete aanwijzingen zijn dat bepaalde personen die op de demonstratie afkomen de orde daadwerkelijk gaan verstoren en de politie voorts verwacht dat het uitvaardigen van een noodbevel ondersteunt bij het aan kunnen houden van dergelijke personen.’
Een opruiend persbericht van de gemeente Den Haag over ‘radicalen en een studentendemonstratie’, insinuaties van de AIVD, een politie die gespannen de demonstratie tegemoet trad en volgens de rechter weinig hoffelijk met de demonstranten omging en benaderingen van studenten door inlichtingendiensten in diverse steden. Wat ging er vooraf aan de demonstratie van 21 januari 2011 en wat speelde zich af in 2010 en 2011 rond de protesten van studenten en docenten tegen bezuinigingen in het onderwijs?
Anarcho-extremisten
Jaarlijks slaat de inlichtingendienst AIVD alarm over het gevaar voor de democratische rechtsorde door toedoen van Antifascistische Actie (AFA). In het jaarverslag over 2009 wordt gemeld dat ‘de dreiging uit de kleine kring extremisten rond Antifascistische Actie onverminderd hoog blijft. Die kern is in 2009 niet gegroeid, maar de aanhang die zij weet te genereren wel. De harde kern van AFA omvat enige tientallen personen.’
In 2010 maken de antifascisten deel van een groter contingent van activisten: ‘De AIVD heeft in 2010 geconstateerd dat sprake is van toenemende samenwerking tussen de verschillende linkse actiegroepen. Dat wil zeggen dat het onderscheid tussen de groeperingen die zich richten op antifascisme, antiglobalisering, milieu, dierenrechten en – in mindere mate – op asiel- en vreemdelingenbeleid, vervaagt.’
Het jaar daarop heeft de dienst een term gevonden voor deze multi-activisten: ‘anarcho-extremisten’. ‘Anarcho-extremisten zijn op vele terreinen en in diverse samenstellingen actief. Zo waren begin 2011 Amsterdamse anarchisten met AFA-Den Haag nauw betrokken bij de uit de hand gelopen studentendemonstratie in Den Haag’ (jaarverslag AIVD 2011).
In 2012 wordt het anarcho-extremisme direct gekoppeld aan een nieuwe ideologie, het vandalisme. ‘In 2012 zag de AIVD uit anarcho-extremistische hoek voornamelijk vandalisme bij diverse objecten in verband met hun ‘antikapitalistische’ strijd. Anarcho-extremisten hebben in 2012, in het kader van hun ‘internationale solidariteit’, diverse activiteiten ondernomen.’
Het noemen van de studentendemonstratie in Den Haag in het jaarverslag van 2011 past naadloos bij de term ‘multi-activisten’ dat voortkomt uit AFA, of in ieder geval de antifascisten. De dienst is ook trots op haar informatie-positie en geeft zichzelf een schouderklopje: ‘De AIVD heeft in het onderzoek naar antifascisme nauw contact gehad met de RID.’ [Regionale Inlichtingendienst, red.]
De activiteiten van de AIVD en RID resulteerden in het in goede banen leiden van de verschillende dreigende confrontaties tussen antifascisten en extreem-rechts (AIVD jaarverslag 2009). Niet alleen de RID wordt bij de strijd tegen de anarcho-extremisten betrokken, ook de wetenschap: ‘De AIVD heeft in 2010 gewerkt aan een grotere doelmatigheid door middel van systematische prioritering van onderzoeken, een betere samenwerking met enerzijds de Regionale Inlichtingendiensten en anderzijds buitenlandse diensten, en door vaker aansluiting te zoeken bij de wetenschap (academic outreach).’ (AIVD jaarverslag 2010)
Daarnaast werd het onderscheid tussen het verzamelen van informatie ten behoeve van het openbare orde- en inlichtingenbeleid ten aanzien van politiek actieve groeperingen steeds diffuser. Dreiging is het toverwoord in het project RID 2015: ‘De vorming van de nationale politie en de organisatorische veranderingen die hiervan het gevolg zijn hebben mede geleid tot een heroriëntatie op de samenwerking met de Regionale Inlichtingendiensten. Het project RID2015 moet ertoe leiden dat de inzet van de RID ten behoeve van het vroegtijdig onderkennen van opkomende dreigingen in de regio efficiënter wordt.’ (AIVD jaarverslag 2011).
Zoals verschillende studentenorganisaties zich voorbereidden op de landelijke demonstraties in Den Haag en Amsterdam, zo werkten de politie en de inlichtingendiensten aan het koppelen van studenten aan antifascisten of anarcho-extremisten. Regiopolitie Utrecht PL0910 2010295357-1: ‘Vandaag was er een studenten demonstratie op de Uithof tegen de bezuinigingsplannen op het onderwijs. De demonstratie begon om 12.30 uur voor het Minnaert gebouw op de Leuvenlaan. Vanaf daar liepen ongeveer een kleine 200 demonstranten, voornamelijk studenten en een handjevol linkse betogers (type anarchist/kraker), in optocht in de richting van de Heidelberglaan.’
Het feit dat die ‘linkse’ demonstranten misschien ook studenten hadden kunnen zijn, kwam niet bij de functionarissen op. Enkele agenten ‘hebben een auto gecontroleerd met linkse demonstranten, geen studenten. In de auto, een Volkswagen Golf met het kenteken … zaten drie mannen en de bestuurder was … geboren in 1978. Zij kwamen vanuit Rotterdam om te demonstreren en liepen met een groot stuk karton met daarop een tekst (PL0910 2010295357-1).’
Geen incidenten
In het hele land werden in 2010 betogingen georganiseerd. Zoals op 21 mei op het Amsterdamse Museumplein waar rond de 5.000 mensen op afkwamen. De manifestatie en mars verliepen rustig. Er waren enkele ’tegen demonstranten’ die pleitten voor afschaffing van de basisbeurs voor studenten.
Hoewel de demonstratie door de Amsterdamse Driehoek benaderd werd met termen als ‘dreigingsanalyse’, ‘Conflict en Crisisbeheersing’ en ‘Capaciteitsmanagement bewaken en beveiligen’ verliep het protest gemoedelijk. Er bleek in Amsterdam nog geen sprake van het opzetten van een inlichtingen-operatie, maar dit was wel de periode waarin de eerste studenten werden benaderd om als informant voor de inlichtingendiensten te komen werken.
Met een inlichtingen-operatie was men in Den Haag al wel begonnen. Op 10 februari 2010 demonstreerde een groep MBO-studenten in de hofstad waar 100 personen aan deelnamen. Het Haagse Bureau Regionale Informatie (BRI) had een informatierapport over de organisatoren en deelnemers samengesteld dat niet openbaar werd gemaakt door de Haagse politie. Ook voor een demonstratie op 25 maart 2010 (400 deelnemers) werd een zogenoemd verstrekkingsrapport opgesteld door BRI Haaglanden. Ook dit rapport werd niet openbaar gemaakt.
In het plan van aanpak voor de ‘manifestatie comité SOS 25 maart 2010’ wordt verwezen naar een spontane blokkade van het ministerie van OC&W enkele dagen eerder: ‘Op donderdag 18 maart 2010 vond een spontane demonstratie plaats van ongeveer 50 studenten. […] Hierop besloten het paraat Peloton in te zetten. […] Er hebben zich bij deze demonstratie geen noemenswaardige incidenten voorgedaan.’ Of deze spontane actie een trigger is geweest voor de politie om meer inlichtingen te kunnen verzamelen, is niet duidelijk.
Eigenlijk is het vreemd. Al geruime tijd vonden er geen incidenten plaats bij protesten tegen de bezuinigingen. Ook niet op 18 maart 2010: ‘Ik verbalisant vroeg aan … of het om een aangemelde demonstratie ging. Hij verklaarde dat het om een niet aangemelde, maar spontane demonstratie ging. Vervolgens heeft collega … telefonisch contact opgenomen met bureau Conflict en Crisisbeheersing van politie Haaglanden, welke op haar beurt middels de directie van politie Haaglanden in overleg met de burgemeester trad. De Burgemeester besloot dat de demonstratie per direct beëindigd diende te worden. Tevens besloot de burgemeester dat er proces-verbaal moest worden aangezegd, terzake het niet hebben kennis gegeven van een demonstratie. Persoon verklaarde: ‘Dit is een spontane en vreedzame demonstratie, om aandacht te vragen voor de kwaliteit van het onderwijs en het behoud van studiefinanciering’ (PL1512 2010059606-1 donderdag 18 maart 2010 omstreeks 08.30 uur).’
De student kreeg een boete voor het uiten van zijn mening, omdat de burgemeester van Den Haag niet tijdig op de hoogte was gesteld. Dat is naast een enkele bezetting (vaak met toestemming van de schoolbesturen) de enige ‘zware overtreding’. Het aantal demonstraties was aanzienlijk, ook de opkomst, maar incidenten bleven dus uit. Op 29 november 2010 demonstreerden 1.500 studenten op het Plein in Den Haag, op 8 december 200 docenten. In Utrecht demonstreerden op 10 december 200 studenten, op 16 december 30. In Arnhem gingen 10 december 500 studenten de straat op, in Amsterdam 5.000.
Internet surveillance
Waarom er inlichtingen worden verzameld rondom het buitenparlementaire protest van studenten en docenten, wordt ook niet duidelijk. De regiopolitie Gelderland Midden schrijft in het proces verbaal PL0745 2010137777-1 over een demonstratie van de Wageningse Studenten Organisatie dat ‘de sfeer goed was en er geen incidenten waren.’ Een deel van het proces-verbaal wordt echter geweigerd op grond van ’toezicht, controle en inspectie’ en ‘opsporing en vervolging’.
Volgens de Arnhemse politie is ‘het optreden van de politie erop gericht de demonstratie in goede banen te leiden en het handhaven van de openbare orde (brief primaire beslissing 6 februari 2012).’ Waarom dan informatie achterhouden over een gemoedelijk verlopen manifestatie? Ook het mutatierapport en het journaal/de mutaties van het protest in Amsterdam op 10 december 2010 wordt niet verstrekt.
En waarom worden in het mutatierapport over een demonstratie in Nijmegen de namen van de sprekers vermeld? ‘Op vrijdag 10 december 2010 omstreeks 13:30 uur heeft er een demonstratie plaatsgevonden door het centrum van Nijmegen. De studenten zijn gestart op het stationsplein te Nijmegen. … [weg gelakt] heeft het openingswoord gedaan. Hierop volgend heeft meneer … (weg gelakt) gesproken (PL081A 2010123893-1).’
Bij protesten en maatschappelijke onrust kijkt de overheid steeds vaker naar ontwikkelingen op het internet, met name sociale media. In de loop van 2010 wordt ook dit een belangrijke informatiebron in verband met de studentenprotesten. Dit gaat soms fout waardoor de politie een verkeerde inschatting maakt van de omvang van een manifestatie.
Op 29 november 2010 komt de operationele Driehoek van Den Haag samen en concludeert: ‘Visser (van politie Haaglanden) dat door oproepen op het internet het aantal verwachte deelnemers aan de demonstratie aan de LSVB-SP en Studentenraad TU aanzienlijk is toegenomen: van oorspronkelijk 50 naar ruim 1000.’ Deze conclusie is vreemd aangezien er in een eerder stadium overleg is geweest met de organisatoren.
Ook bij andere demonstraties worden sociale media en het internet afgestruind voor aanvullende informatie. In combinatie met een vooringenomen inlichtingen- en politie-apparaat kan het volgende bericht op het Forum voor de Vrijheid (FvdV) de trigger zijn geweest voor het persbericht van de Burgemeester van Den Haag om radicalen en studenten aan elkaar te verbinden. ‘Laatste nieuws: de AFA komt ook, om te rellen’, bericht het forum op 20 januari 2011 om 16:07 uur. (http://forum-voor-de-vrijheid.nl/vrijheid/archive/index.php/t-24493.html)
Drie dagen later stellen Anarchistische Groep Nijmegen en Anti-Fascistische Actie in een gezamenlijk persbericht dat zij niet hebben opgeroepen om geweld te gebruiken bij de demonstratie tegen de bezuinigingen op het hoger onderwijs van 21 januari 2011 in Den Haag. Het persbericht kwam echter te laat om de spin van de operationele Driehoek (politie, justitie en openbaar bestuur) van Den Haag nog in het voordeel van de studentendemonstratie te laten draaien.
Politiek en anarcho-extremisme
De scheiding tussen het ‘handhaven van de openbare orde’ en ‘inlichtingen inzamelen in verband met de bescherming van de democratische rechtsorde’ is flinterdun. RID Gelderland Zuid maakte bijvoorbeeld een verstrekkingsrapport openbare orde op. Het rapport met het nummer 0018762 en betrouwbaarheidscode informatie B3 (meestal betrouwbaar, gehoord/bevestigd) gaat over een actieweek met een informatiemarkt, een publiciteitsact, een discussie- en filmavond en een menselijke ketting. Nu kan de openbare orde in het geding zijn geweest, maar om studentenprotest tegen bezuinigingen in het onderwijs meteen op te schalen naar een risicowedstrijd in het betaald voetbal is nogal overdreven. Een publiciteitsactie van Red Bull belandt ook niet op het bord van de RID.
Een jaar later, eind januari 2011 gebeurt eigenlijk hetzelfde in Den Haag. Nu met meer consequenties voor enkele studenten dan in februari 2010 in Nijmegen. Vanaf begin januari 2011 krijgt de Haagse politie vanuit heel Nederland informatierapporten over studenten die willen deelnemen aan de manifestatie op het Malieveld op 21 januari 2011.
Regiopolitie Twente RID rapportnummer 2011…, betrouwbaarheidscode A (toelichting code Waar): ‘In de maand januari 2011 werd informatie ontvangen dat: Er op 21 januari ongeveer 18000 studenten naar Den Haag zullen vertrekken om deel te nemen aan de studentendemonstratie. Er vanuit Twente ongeveer 1500 studenten zullen vertrekken.’
Politie Gelderland Zuid verstrekkingsrapport 19893, betrouwbaarheidscode informatie A: ‘In verband met de studentenmanifestatie die gehouden wordt op 21 januari 2011 te Den Haag is bij de RID Gelderland-Zuid de navolgende informatie binnengekomen. In het totaal hebben 500 studenten van de Radboud Universiteit zich aangemeld voor het busvervoer naar genoemde manifestatie. Er zullen ook nog studenten reizen met een OV-kaart, deze zijn niet in het aantal opgenomen. Vanaf HAN (Hogeschool Arnhem/Nijmegen) zullen ook bussen met studenten vertrekken naar Den Haag. Op dit moment zijn er bij de RID nog geen aantallen bekend.’
Opvallend is dat de RID ook politieke partijen in de gaten houdt en meldt dat ‘door een Nijmeegse politieke partij ook een busregeling naar Den Haag wordt aangeboden.’ Waarom de RID dit in een verstrekkingsrapport opneemt, is onduidelijk.
Al eerder vielen politiek getinte opmerkingen in de documenten rond het studentenprotest op. De Amsterdamse politie schreef in het draaiboek van de demonstratie op 21 mei 2010 dat ‘de LSVb zijn achterban daarom inmiddels heeft opgeroepen niet op de PvdA te stemmen. Door de LSVb wordt dit ontkend; dit geluid is echter wel veelvuldig in de media te horen.’ De PvdA had in de periode voorafgaande de demonstratie aangegeven de bezuinigingen in het onderwijs van het kabinet Rutte 1 te zullen steunen. Waarom de politie het stemadvies van het LSVb in het draaiboek opneemt is onduidelijk.
Ditzelfde geldt voor de opmerkingen over de SP in de stukken met betrekking tot de demonstratie van 21 januari 2011. In het algemene draaiboek van de demonstratie van politie Haaglanden staat vermeld: ‘Binnen deze groep deelnemers is er de mogelijke deelname aan de manifestatie van diverse politieke partijen. … [weg gelakt] deze politieke partij heeft aangegeven bij de LSVb om de manifestatie te ondersteunen. De SP staat bekend als zeer aktie bereid en steunt daarin diverse demonstranten.’
Binnen de operationele driehoek van Den Haag van 19 januari 2011 wordt opgemerkt dat: ‘De SP wel de gelegenheid zal krijgen om in de demonstratie te participeren, maar niet de kans krijgt om de demonstratie ‘over te nemen’, zoals in het verleden nog wel eens gebeurde.’ Wie deze laatste opmerking heeft gemaakt, is onduidelijk. Het zal iemand van de politie of van de bestuursdienst van de gemeente zijn geweest. Opnieuw is onduidelijk waarom ambtenaren van het bevoegd gezag opmerkingen over bepaalde politieke partijen menen te moeten maken.
Opmaat
Na een jaar van protesten die allemaal zeer gemoedelijk zijn verlopen, lijkt de gemeente Den Haag het roer om te gooien. Er moet een stevig politie-apparaat worden neergezet en het liefst wil de driehoek de protesten uitsluitend op het Malieveld toestaan. Het LSVb gaat daarmee akkoord, maar de Haagse Studentenvakbond wil door de stad lopen om haar mening te kunnen uiten.
Dat Den Haag wil opschalen naar ‘oorlogssterkte’ blijkt uit een bijstandsaanvraag aan de commissaris van de Koningin van Zuid-Holland. De driehoek wil een peloton KMar (Koninklijke Marechaussee, militaire politie) inzetten op 21 januari 2011. De commissaris van de Koningin, Jan Franssen, wijst de aanvraag af: ‘Gelet op het feit dat de gevraagde bijstand kan worden geleverd door regiopolitiekorps(en) binnen de eigen provincie, zie ik geen aanleiding voor bijstandsverlening door de Kmar. Ten aanzien van de geldende wet- en regelgeving kan ik daarom geen akkoord geven op bijstandsverlening door de Kmar.’
Militaire politie op betogende studenten afsturen, de toon lijkt gezet. Korpschef Van Essen is verbolgen, burgemeester Van Aartsen geeft geen tegengas en ook het openbaar ministerie blijft stil. Van Essen is van oordeel dat ‘het kabinetsbeleid gericht is op een veel ruimere inzet van de KMar dan de Politiewet mogelijk maakt.’ De volgende keer zal hij dan ook opnieuw om bijstand van de KMar vragen.
De toon van de driehoek lijkt niet in relatie te staan met het relaxte studentenprotest tegen de bezuinigingen in 2010, maar met het profiel dat vooral de politie van de demonstranten heeft samengesteld. In een brief van 6 januari 2011 aan de leden van de operationele driehoek schrijft directeur opsporing en informatie over 21 januari dat ‘een demonstratieve tocht door de stad de interventiemogelijkheden door de politie bemoeilijkt.’ Bij deze opmerking in het kader van de risico inschatting maakt zij onderscheid tussen burgers en demonstranten: ‘De noodzaak bij een eventueel politieoptreden de demonstranten te scheiden van goedwillende burgers en evenementen.’
‘Goedwillende burger’ en ‘demonstranten’ lijken binnen het politiejargon niet te combineren. De demonstranten zijn op het moment van schrijven van deze brief nog geen anarcho-extremisten, maar de opschaling en de wijze van presentatie van het ‘probleem’ demonstranten, lijken wel een opmaat voor het radicale persbericht van 20 januari 2011.
In de dagen voorafgaande de demonstratie van vrijdag 21 januari komt de driehoek dagelijks bij elkaar. De samenwerking met het LSVb, de studentenvakbond die een statisch protest wil, lijkt goed. ‘… [weg gelakt] geeft aan dat de politie rond deze demonstratie actief gebruik maakt van de sociale media in nauwe samenwerking met de organisaties (operationele driehoek 19 januari 2011).’ Over de Haagse studentenvakbond is men minder te spreken: ‘… [weg gelakt] heeft bij deze demonstratie enige zorg bij het gebrek aan ervaring bij de organisatie. Het grootste risico rond deze tocht zit in het deel waarbij men in de buurt van de Malietoren komt.’ En de eerste tekenen van rellen die gaan plaatsvinden op vrijdag worden ingeluid: ‘… [weg gelakt] laat weten dat recente informatie binnen is gekomen, dat mogelijk Rotterdamse hooligans van plan zijn om bij de demonstratie aan te sluiten om zo de confrontatie met de politie aan te kunnen gaan. … [weg gelakt] meldt dat de voetbal eenheden bezig zijn om deze informatie te verifiëren …’
Opvallend aan de bewering dat er hooligans onderweg zouden zijn naar Den Haag, is dat het in de verdere berichtgeving niet meer terugkomt. De Haagse politie weigert wel de verstrekkingsrapporten van 17, 19 en 24 januari 2011 openbaar te maken, maar binnen zowel de mediacommunicatie als de operationele driehoek komt het onderwerp hooligans slechts één keer ter sprake. Was de komst van de Feyenoord-supporters op dezelfde manier aangekondigd als de komst van AFA? In de trant van: ‘Laatste nieuws: SCF komt ook!’ Ergens op Facebook of een forum post iemand deze tekst, kennelijk om te stoken. De Rotterdamse hooligans komen ook niet terug, en of het bericht geverifieerd is, wordt niet duidelijk uit de stukken.
Radicalen komen
In het ‘algemeen SGBO (Staf Grootschalig Bijzonder Optreden) draaiboek’ van de manifestatie lijken de radicalen nog geen plek te hebben gekregen. Alleen de SP wordt uitdrukkelijk vermeld. De beschrijving van de stand van zaken rond de protesten tegen de bezuinigingen lijkt ontspannen: ‘Na een serie kleine studentendemonstraties tegen de bezuinigingen in het onderwijs slaan diverse grote studentenorganisaties de handen ineen om een grote landelijke demonstratie te houden.’
Er wordt een demonstratie van rond de 15.000 studenten verwacht, waarvan het zwaartepunt vooral op het Malieveld zal komen te liggen. Een fluitje van een cent zou je zeggen, voor een gemeente die stelselmatig beweert jaarlijks duizenden demonstraties in goede banen te leiden. In het SGBO-draaiboek wordt gezinspeeld op mogelijke rellen: ‘Ondanks de uitgebreide voorbereidingen in samenspraak met de organisatoren, valt een kans op verstoringen van de openbare orde, intimidaties, kans op fysiek letsel en materiële schade voor publieke eigendommen niet uit te sluiten. Een confrontatie met de politie valt dan ook niet uit te sluiten.’
Waarom men geweld verwacht, wordt niet duidelijk. De Rotterdamse hooligans lijken niet te komen, van anarcho-extremisten is geen sprake in het draaiboek… nee, louter protesterende studenten. Draaiboeken worden gekenmerkt door een standaard-opzet die per evenement wordt ingevuld. Het is dan ook niet onlogisch dat specifieke calamiteiten niet in het draaiboek zijn verwerkt. Als er inlichtingen zijn afkomstig van inlichtingendienst die wijzen op verstoringen van de openbare orde, worden die opgenomen in het draaiboek. De verschillende commandanten kunnen daarop anticiperen. Bij de scenario’s zal duidelijk worden vermeld waar verkennings- en arrestatie-eenheden op moeten letten. Hoewel diverse passages zijn weg gelakt, straalt het draaiboek een sfeer uit van een nog nader te volgen relaxte demonstratie.
Onder de oppervlakte borrelt er echter iets. De Haagse politie lijkt een hekel te hebben aan demonstrerende studenten (‘het zijn geen goedwillende burgers’), men wilde aanvankelijk het liefst de militaire politie inzetten en bij de inlichtingen lijkt de focus te zijn gericht op ‘linkse betogers (type anarchist/kraker)’, al dan niet georganiseerd. Binnen deze context meldt de AIVD dat leden van AFA aan de demonstratie zullen deelnemen. Of deze informatie te herleiden valt aan de posting op het Forum voor de Vrijheid is niet langer na te gaan, maar de bewering is niet erg substantieel, gelijk die over de deelname van hooligans.
‘De burgemeester geeft aan dat hij de verstrekte informatie van de AIVD onbevredigend vindt en schorst het driehoeksoverleg”’, vermeldt het verslag van de operationele driehoek van 20 januari 2011. Zodra de vergadering wordt voortgezet stelt de politie dat ‘uit (diverse open bronnen) blijkt dat meerdere personen zich mogelijk radicaal willen manifesteren.’ Tijdens dit overleg wordt in alle haast een persbericht in elkaar gezet. ‘De Haagse driehoek heeft aanwijzingen dat radicale groeperingen de studentendemonstratie van vrijdag willen aangrijpen om de openbare orde in Den Haag te verstoren door zich te mengen tussen de demonstranten en de confrontatie te zoeken.’ Een noodbevel wordt uitgevaardigd, de Haagse politie staat op scherp. De sfeer wordt dusdanig opgestookt dat het wachten is op rellen.
Mandarijnen
Die rel komt er ook, zowel op Het Plein voor de Tweede Kamer en bij het ministerie van OC&W. De politie beweert dat er met van alles is gegooid en dat daarbij drie politiefunctionarissen gewond zijn geraakt. Er wordt een foto verspreid van een gat in het wegdek, maar of daar stenen uit zijn verwijderd, blijft onduidelijk.
Een van de arrestanten verklaart: ‘”Ik zag dat deze jongens ineens de stenen uit de straat gingen halen. Ik vond dat geen goed idee. […] Mijn vrienden en ik en nog een aantal andere studenten liepen naar de jongens toe en zeiden dat zij niet de stenen moesten pakken. […] Ik zag dat de jongens de stenen los lieten (PL1551 2011015630-4)”.’ Een andere demonstrant beschrijft hetzelfde tafereel: “‘Ik zag dat er mensen toen stenen uit de straat haalden om deze te gaan gooien. We hebben toen een jongen daar nog voor belet. Daarna kwamen de politiepaarden eraan en toen zijn we met z’n allen terug gelopen (PL1532 2011015619-4)”.’
Vervolgens beweert de politie dat agenten werden belaagd met vuurwerk. Dat er vuurwerk is gegooid, is duidelijk. Een politiefunctionaris hierover: ‘”Ik verbalisant hoorde een harde knal die afkomstig was van vuurwerk. Ik verbalisant ben gaan zoeken naar degene die vuurwerk aan het gooien waren. […] Ik verbalisant zag dat een persoon het voorwerp richting de collega’s van de Mobiele Eenheid gooide (PL1561 2011015692-4)”.’ Of het vuurwerk echter de politie of demonstranten heeft geraakt, is niet duidelijk.
Een andere agent over het vuurwerk: ‘”Wij zagen dat het voorwerp gelijkende op een langwerpig voorwerp door de lucht vloog. Wij zagen dat het voorwerp tussen de rennende demonstranten viel (PL1512 2011015692-2)”.’ Wat is er dan wel gegooid? Enkele demonstranten gooiden met etenswaar. ‘”Werd de verdachte tijdens de studentendemo aangehouden terzake het gooien van eieren naar de Mobiele Eenheid. Werd besloten de verdachte hiervoor een mini pv te geven terzake baldadigheid (PL1551 2011015667-1)”.’
De eieren komen terug in het politiejournaal van 21 januari 2011: ‘”Politie bij het Mauritshuis worden bekogeld met eieren”.’ En een lunchpakket: ‘”Vervolgens voerde de ME een charge uit. Dus iedereen in paniek en rende door elkaar heen. Dus toen heb ik uit baldadigheid een boterham uit mijn tas gepakt en die heb ik toen in de richting van de ME gegooid (PL1532 2011015653-4)”.’ En ten slotte een serie mandarijnen. De vrienden die de stenengooiers tegenhielden, hebben elk een mandarijn naar de politie gegooid. ‘”Ja, mandarijnen, een per persoon, we waren met z’n drieën. Om de bus te besmeuren (PL1532 2011015619-4)”.’ Een agent bevestigt het smijten met fruit: ‘”Ik zag dat deze mandarijn op ongeveer een halve meter achter de ME hard op de grond terecht kwam (PL1551 2011015630-5)”.’
Waarom gooien mensen die protesteren mandarijnen, eieren, vuurwerk, boterhammen en plastic flessen naar de Mobiele Eenheid? Wie de beelden bekijkt van de charges van de ME, is getuige van opgefokte agenten, klaar om welke student dan ook te slaan. Over het gooien van etenswaar wordt weinig in de stukken van de Haagse politie vermeld. In Amsterdam lijkt de mate waarin met fruit en groenten wordt gesmeten van belang voor het ingrijpen. ‘Het gooien van eieren, tomaten, appels naar objecten en gebouwen kan, wanneer dit op grotere schaal plaatsvindt, kunnen leiden tot aanhouding’, vermeldt het operationele draaiboek van de demonstratie van 21 mei 2010 van de Amsterdamse politie.
De spanning in Den Haag bleek dusdanig groot dat een paar mandarijnen genoeg was om over te gaan tot charges. De rechter oordeelde achteraf dat het optreden van de politie tijdens de demonstratie van 21 januari in Den Haag bepaald niet de schoonheidsprijs verdiende. De Amsterdamse politie ging een stap verder. Hier werd een directe link gelegd tussen de heersende onvrede onder de studenten en het optreden van de politie. ‘Naar aanleiding van de demonstratie in Den Haag (21 januari 2011) is de sfeer onder een deel van de studenten grimmiger geworden. Het optreden van de politie en de houding van het kabinet met betrekking tot de studiefinanciering ligt hieraan ten grondslag (Deeldraaiboek demonstratie 4 februari 2011).’
AFA-sympathisant
De self fulfilling prophecy van de Haagse driehoek werd op 21 januari 2011 bewaarheid. De burgemeester had vooraf beweerd dat radicalen zich zouden mengen onder de demonstranten om de openbare orde te verstoren. De inlichtingendienst had beweerd dat het om leden van AFA zou gaan. De politie sprak ‘van een vijftal groepen met een verschillende achtergrond, maar alle van linkse signatuur. Daaronder zijn anarchistische en anti-globalistische groeperingen met een extreem karakter’, meldde de politie.
De anarcho-extremisten hadden het gemunt op het vernietigen van de hofstad, zo leek het wel, maar afgezien van wat eieren, mandarijnen, boterhammen, een enkel flesje en vuurwerk dat tussen de demonstranten terecht kwam, bleef het rustig. Alle arrestanten bleken studenten. Hoe zat het dan met die anarcho-extremisten en AFA leden?
Tussen de processen-verbaal bevindt zich het verhaal van aanhouding van een jongeman door stillen. Hij werd aanvankelijk als minderjarig behandeld, maar bleek dat nét niet meer te zijn. De politie beweert dat hij agenten heeft geslagen, maar de verklaringen van de diverse betrokken functionarissen zijn dusdanig verwarrend dat daarbij vraagtekens moeten worden gezet. Iedereen, inclusief verdachte, zijn het er over eens dat hij een vriend die werd gearresteerd te hulp is geschoten. Hij kreeg daarbij flinke klappen van diverse agenten.
In het verhaal van deze jongeman komt AFA ter sprake. ‘”U vraagt mij wat ik vervolgens deed. Ik heb gelijk […] (zijn vriend) bij zijn middel gegrepen, om hem los te kunnen trekken van die mannen. U vraagt mij waarom ik zo reageerde. Ik dacht dat die onbekende mannen neonazi’s waren en met hen heb ik geen goede verstandhouding. Ik ben namelijk een AFA-sympathisant. U vraagt mij of ik heb gehoord dat die onbekende mannen zich kenbaar maakten als politie zijnde. Nee, dat heb ik niet gehoord en ik had dat ook niet kunnen weten (PL1561 2011015672-6)”.’
De agenten in burger die de jongeman voor neonazi’s aanzag, waren leden van een arrestatie-eenheid. Het enige gearresteerde AFA-lid, die volgens de Haagse driehoek de orde zou komen verstoren, probeerde slechts de aanhouding van een vriend te voorkomen. De participerende radicalen van 21 januari in Den Haag lijken niet onder de demonstranten te moeten worden gezocht, maar in kringen van de politie en de Driehoek.
Echter, na afloop van de demonstratie blijkt de deelname van AFA-sympathisanten een vaststaand feit te zijn geworden. ‘Ook het feit dat de driehoek koos voor een persbericht vooraf over de mogelijke komst van radicalen, is naar de mening van de korpschef een goede geweest’, vermeldt het verslag van de operationele driehoek van 24 januari 2011. ‘Bij de protesttocht van de studenten van de Haagse Hogeschool van het Johanna Westerdijkplein naar het Malieveld, bleek de staart door een groep gevormd, welke in gedrag en uiterlijke kenmerken, sterk afweek van de Haagse Hogeschool studenten’, aldus het informatierapport van Bureau Regionale Informatie 24 januari 2011. Dit rapport werd opgesteld in het kader van de evaluatie van het politieoptreden en omdat er vragen zijn gesteld in de gemeenteraad over het politiegeweld.
In het evaluatierapport worden feiten geconstateerd die in het mutatierapport PL1581 2011015635-1 van vier verbalisanten die de demonstratie van de Haagse studentenvakbond hebben begeleid niet voor komen. De opstellers reppen over veel stokken, ‘soms metalen pijpen’, die de agenten in beslag hebben genomen voordat de demonstratie op gang kwam. De functionarissen schrijven dat ‘voorkomen moest worden dat lieden linksaf naar OCW zouden afbuigen.’ Deze opmerking wordt gevolgd door ‘geen bijzonderheden.’
Gedurende de betoging bleek in de praktijk slechts één persoon staande te zijn gehouden met opruiende dvd’s in zijn rugzak. Alle overige personen van deze groep studenten die werden aangesproken (in totaal vier) of die een proces-verbaal hebben gekregen, bevonden zich al op het Malieveld. Van een groep die ‘niet de uiterlijke kenmerken van studenten hadden’ is in de rapportage van de begeleidende agenten geen sprake.
Radicale studenten of studentikoze radicalen?
De radicalen blijken echter al binnen de studentenmassa’s te zijn geïnfiltreerd. Vanaf 21 januari staat de politie op scherp en worden mensen die in het profiel van ‘links’, ‘anarchist’ of ‘kraker’ passen vermeld als zijnde onderdeel uitmakend van het studentenprotest. ‘Opvallend was dat er nagenoeg geen studenten aanwezig waren. Betroffen veelal krakers figuren onder andere … (weg gelakt) gespot (PL0910 2011034542-1, 9 februari 2011 studentenprotestutrecht.nl).’
Op 4 februari 2011 wil een groep studenten een lawaaidemonstratie houden in Amsterdam. Zij willen in de binnenstad diverse gebouwen van de Universiteit van Amsterdam (UvA) bezoeken om daarmee hun ongenoegen te uiten over de bezuinigingen in het onderwijs. Tijdens het SGBO-overleg voorafgaande de demonstratie meldt de inlichtingendienst van de politie: ‘Op dit moment is er niet meer informatie bekend over de demonstratie. Er zijn wel aanwijzingen dat er zich radicaliserende personen in de groep studenten zullen bevinden, maar dat is nog niet zeker.’
In het kader van de risicoanalyse wordt gesteld dat er ‘nog niets bekend is over het mogelijk aansluiten van krakers bij de demonstratie.’ Wel zijn er ‘aanwijzingen dat er radicaliserende personen onder de studenten bevinden’, maar niets is zeker en van aansluiting van krakers is niets bekend. Een dag eerder werd bij het subdriehoek overleg in Amsterdam geconstateerd dat ‘de sfeer bij studentendemonstraties steeds grimmiger wordt.’ Welke demonstraties, naast die van 21 januari in Den Haag, dit dan zijn geweest, wordt niet duidelijk gemaakt.
Binnen de SGBO-studentendemo wordt de sfeer nog eens onderstreept: ‘De sfeer onder de studenten is grimmiger geworden. Dit naar aanleiding van het politieoptreden in Den Haag en het standpunt van het kabinet. Er dient rekening mee gehouden te worden dat zich onder de demonstranten enkele tientallen zullen bevinden die het geweld niet schuwen.’ Gezien de hoeveelheid documenten zou je verwachten dat de politie rekent op duizenden demonstranten, maar de schattingen lopen uiteen tussen 100 en 250 studenten. In het deeldraaiboek ordehandhaving wordt echter een directe link met 21 januari gelegd: ‘Eerdere soortgelijke demonstratie in Den Haag leidde tot openbare orde problemen waarbij 27 personen zijn aangehouden (Historie).’
Een dag voorafgaande de demonstratie doet de chef informatie (CHIN) er nog een schepje bovenop: ‘Er is info dat binnen het Comité SOS de mening is dat een confrontatie met de ME ook media aandacht kan geven, dus mogelijk confrontatie niet echt als negatief wordt gezien (03-02-11 16:36 chef informatie).’
Verkenningseenheden (Victor00) verspreiden zich op de dag van de demonstratie over de stad. Bij het Centraal Station moeten ze op groepen studenten letten, bij kraakpanden in het oosten en westen van de stad op activiteiten en bij de verzamelplek op de ‘radicalen’. ‘Victor00: Binnengasthuisstraat groepje van 15 studenten met enkele krakers (vier krakers). Dragen borden met tekst ‘wij gaan de crisis niet betalen’ en ‘oprutte’ (04-02-11 14:43 distributie centrum).’
Diverse personen worden specifiek in de gaten gehouden. Dit zijn naar alle waarschijnlijkheid de studerende ‘vier krakers’. ‘Om 14:46 meldt Victor00: … [weg gelakt] en … [gelakt] gezien … [gelakt] op Binnengasthuisterrein … [gelakt] is druk aan het bellen. Signalement volgt.’ Blijkbaar werd er getwijfeld: ‘Victor00: … [gelakt] is 100% positief herkend. Victor00: Bij … [gelakt] fon.) loopt … [gelakt] (04-02-11 15:10).’ De ‘radicalen’ worden scherp in de gaten gehouden, maar op basis waarvan wordt volstrekt niet duidelijk.
In een item van Pownews beklaagt de verslaggever zich over de belabberde opkomst. Zelfs hem wordt geen duimbreed in de weggelegd om mensen te interviewen. De verkenningseenheden volgen de ‘radicalen’ tot het eind van de demonstratie. ‘Victor00 om 16:11: Stuk of 20 personen, plus … [gelakt] gaat UVA-gebouw aan het Binnengasthuisterrein in, niet zijnde het Crea Café. Victor00 om 16:15: … [gelakt] is het pand weer uit samen met een ander persoon … [gelakt].’
De Haagse politie geloofde heilig in de gecreëerde radicale illusie. In een brief van 17 maart 2011 over de aankondiging van een demonstratie op 25 maart 2011 door het platform ‘Onderwijs is een recht’ wordt impliciet de relatie met de schermutselingen van 21 januari gelegd. ‘Het vorenstaande zou erop kunnen duiden dat deze demonstratie wordt georganiseerd vanuit links activistische organisaties, die mogelijk uit zijn op openbare orde verstoringen.’ Tijdens het Driehoeksoverleg van 23 maart 2011 voegt de politie daaraan toe: ‘Voorts is de organisator voornemens om een geluidswagen mee te nemen. Deze zelfde wagen is eerder door krakers gebruikt tijdens een demonstratie.’
Dat de politie de studenten stigmatiseert door hen als ‘radicalen’ te omschrijven, is vreemd, want men geeft ook toe dat er goede afspraken zijn gemaakt met de organisatoren. Een dag voorafgaande de demonstratie werd er een spandoek opgehangen in de Hofvijver. De politie wist meteen wie het gedaan had: ‘Op de Lange Vijverberg twee demonstrant uitziende personen aangesproken die verklaarden er niks mee te maken te hebben (PL1512 2011061722-1).’
Een dag later, na afloop van de demonstratie in Den Haag, schreef de directeur opsporing en informatie van de politie Haaglanden: ‘Op of omstreeks woensdag 9 maart 2011 kwam een verzoek binnen tot het houden van een demonstratie onder de noemer ‘Onderwijs is een recht’. De aanvraagster is gelieerd aan de krakerscene in Utrecht. In uw vergadering heeft u daarop besloten om naar aanleiding van deze informatie extra politiemaatregelen te nemen en een SGBO in te stellen. Er zijn geen verdachten aangehouden. Tijdens de demonstratie bleek een groot aantal deelnemers gelieerd is aan de krakersbeweging in den lande.’
Voorafgaande deze demonstratie, waaraan in totaal 150 studenten deelnamen, werd door het Bureau Regionale Informatie een informatierapport en een dreigingsinschatting opgesteld. Informatie van de RID Utrecht werd door de Haagse politie verwerkt. ‘… [weg gelakt] geeft aan dat de vrouw die de demonstratie organiseert, dat ook vrijdag in Utrecht heeft gedaan. Daar waren slechts 25 deelnemers. Het is dan ook denkbaar dat komende vrijdag ook weinig deelnemers komen (operationele driehoek Den Haag 21 maart 2011).’
Geen openbare maar ideologische orde
De inlichtingendienst van de politie heeft in het kader van haar taak ten aanzien van de openbare orde de bevoegdheid informatie te verzamelen ter voorkoming van verstoringen van de openbare orde. De burgemeester kan op basis van concrete aanwijzingen een demonstratie verbieden. Bij betogingen van extreem-rechts gebeurde dat in het verleden regelmatig. De burgemeesters oordeelden dan dat de kans op een tegendemonstratie en confrontatie met tegenstanders de orde zou verstoren.
Keer op keer oordeelden rechters dat de veronderstelling dat de orde verstoord zou gaan worden niet voldoende reden is om een demonstratie te verbieden. De aanwijzingen waren niet concreet. Bij de protesten van studenten tegen de bezuinigingen op het onderwijs valt op dat er op geen enkel moment concrete aanwijzingen zijn geweest dat er ordeverstoringen zouden plaatsvinden.
Wat wel zichtbaar is geworden, is dat de overheid een complete inlichtingenoperatie op touw heeft gezet om een relatie te leggen tussen krakers, anarchisten, linkse types en andere anarcho-extremisten enerzijds, en de protesten van studenten anderzijds. Deze operatie ging in het geheel niet over de openbare orde, maar om het identificeren van zogenaamde radicalen. De RID Den Haag en de AIVD vervulden bij deze operatie een sleutelrol.
Hoeveel informatie hiervan daadwerkelijk in allerlei dossiers is aanbeland, blijft onduidelijk. Wel is duidelijk dat er sprake is van een innig contact tussen de landelijke inlichtingendienst en de politie. ‘Meldingsformulier van het hoofd van de RID Haaglanden, 15 Haaglanden, RID referentie-nr 1414/11, Formulier met betrekking tot studentendemonstratie 25 maart 2011 te Den Haag.’
Dat deze relatie niet altijd vlekkeloos verloopt, wordt ook duidelijk aan de hand van inzage in de correspondentie tussen burgemeester Van Aartsen en het hoofd van de AIVD. ‘De burgemeester geeft aan dat hij de verstrekte informatie van de AIVD onbevredigend vindt en schorst het driehoeksoverleg (driehoeksoverleg 20 januari 2011).’ De burgemeester belt de baas van de AIVD die echter beweert dat hij ‘niet meer informatie kan verstrekken, anders dan dat het om personen van AFA zou gaan die naar Den Haag zouden willen komen.’ Daarbij is onduidelijk of de AIVD meer feitelijke informatie in handen heeft en die men niet prijs wil geven.
Het gaat bij protesten allang niet meer om de openbare orde, maar om de ideologische orde. Dit ligt in het verlengde van het concept ideologische misdaad dat het landelijk parket en de nationale politie hanteren. Hierbij ontwikkelt de politie zich als een soort inlichtingendienst die buitenparlementair verzet in de gaten houdt en de RID blijkbaar naar zich toetrekt. De openbare orde informatie wordt vermengd met de informatie over mogelijke staatsondermijnende activiteiten, lees ideologische groepen.
Slechts weinig bestuurders hebben zicht op deze activiteiten van de politie. De driehoek van Nijmegen, Enschede, Arnhem en Utrecht zijn allemaal buiten de inlichtingencommunicatie van de politie gehouden. ‘De gemeente Arnhem is noch beleidsmatig noch uitvoerend noch handhavend bij de door u genoemde studentenacties en/of studentengroep KSNA betrokken geweest. Ook op de agenda van de zogenaamde Driehoek komt het onderwerp studentenprotesten en/of studentengroepen in de door u genoemde periode (2009 – heden) niet voor’, schrijft de gemeentesecretaris van Arnhem.
Waarom informatie over politieke partijen en vreedzaam protesterende studenten dan in inlichtingendossiers belanden, is onduidelijk. Het feit dat iemand kraakt en student is en ook nog demonstreert tegen de bezuinigingen is blijkbaar voldoende om hem of haar aan te merken als ‘radicaal’. Als zo iemand dan ook nog deelneemt aan demonstraties van AFA, is er al snel sprake van anarcho-extremisme. Daarbij speelt de AIVD dan weer een rol.
In dit schimmenspel lijkt het allang niet meer om waarheid en feiten te gaan. De spin, het bespelen van de media en de gemeenteraad is het uitgangspunt. De rechtsorde is in dit verband door de driehoeken in verschillende steden vervangen door de ideologische orde. Een ieder moet hetzelfde denken, anders wordt je gebrandmerkt als ‘radicaal’ of ‘anarcho-extremist’. Protesteren als student tegen bezuinigingen in het onderwijs kunnen dan al snel worden omschreven als staatsgevaarlijke activiteiten.
Find this story at 10 July 2013
Police criticised and ridiculed over attempt to spy on students and protesters27 november 2013
Secret footage has revealed how a policeman tried to recruit an activist to feed him information about the political activities of students and other campaigners
Police chiefs have received a hefty dose of criticism, and ridicule, since it was revealed that one of their officers attempted to persuade an activist to spy on Cambridge University students.
As the Guardian disclosed here yesterday, a policeman approached a young activist and tried to recruit him as an informant.
Instead, the activist decided to expose the surveillance with the help of a concealed camera.
He recorded a meeting with the officer who said he wanted information about students, groups such as UK Uncut and Unite Against Fascism, and anti-fracking demonstrators.
A series of clips from the secret footage can be seen here, here, here, here and here.
Cambridge University did not want to comment, saying that it was a matter for the police. Cambridgeshire Police has only said :”Officers use covert tactics to gather intelligence, in accordance with the law, to assist in the prevention and detection of criminal activity.”
Today my colleague Hugh Muir takes an acerbic look at how “the secret snoopy state seeks to monitor the legitimate activity of those who might ask questions of it.”
Here’s a selection of what others have said.
The Cambridge University Student Union said they were “alarmed” and found it “absurd”.
They added :”Tactics such as these are not only intrusive, they also waste time targeting groups which are involved in making important and positive change in our society. We condemn the actions of the police in this matter and hope the Government will look critically at the use of surveillance measures by UK security forces.”
Cambridge Defend Education, an anti-cuts campaign named as a potential target of the infiltration, said :”The police will go to any lengths to gain ‘intelligence’ on activist groups, including deceiving women into long-term intimate relationships. It is telling that the police regard their activities as completely legitimate and legal, reflecting their crucial role in enforcing austerity policies through both violent and covert repression of those who oppose them.”
Rachel Wenstone, deputy president of the National Union of Students, said : “This revelation is an absolute scandal. This is yet another example of the questionable tactics that undercover police officers have taken in recent years to infiltrate campaign groups and extract information.We now need to know just how widespread this practice is.”
She added : “To group the activities of hardworking students’ unions within the same realm as those of the English Defence League is grossly offensive.”
The covertly-recorded footage had shown that the police officer also wanted information about the EDL, but recognised that the activist was on the wrong side of the political divide to provide those details.
Nick Pickles, director of Big Brother Watch, condemned the infiltration of “anti-fracking or educational campaign groups, where there is zero suspicion of any wrongdoing” as “a gross abuse of surveillance powers.”
“Coming after attempts to discredit the family of Stephen Lawrence and undercover officers fathering children with activists this episode makes clear why the police should not be able to approve their own undercover surveillance operations. Judicial oversight is essential if these kinds of abuses are to be prevented.
“Were it not such a stark reminder of the weak oversight of police intelligence operations you’d be forgiven for thinking this was the plot for a student film, albeit inspired more by David Brent than James Bond.”
“There should be a full, independent inquiry into the activities of this unit and I will be writing to the Independent Police Complaints Commission to ask that they investigate.”
Jules Carey, a solicitor at Tuckers’ law firm representing several campaigners taking action against the Metropolitan Police over the alleged behaviour of undercover officers, said of Cambridgeshire Police: “The force has clearly lost its way. There can be no justification in a democracy for attempting to deploy informants into student groups and protest organisations. The force should be seeking to uphold the fundamental right to protest, not taking cynical steps to undermine it”.
Isabella Sankey, director of policy for human rights campaigners Liberty, said: “After the scandalous infiltration of grieving families and environmental movements, police now set their sights on student activism.
“That any group which dares to dissent is apparently fair game should alarm anyone committed to proportionate policing and democracy itself. Proper judicial checks on police surveillance are badly overdue – Parliament must take responsibility and act.”
Find this story at 15 November 2013
© 2013 Guardian News and Media Limited or its affiliated companies. All rights reserved.
‘Gaan jullie stenen gooien?’ Inlichtingenoperatie rondom studentenprotest27 november 2013
Dat studenten actie voeren tegen aangekondigde bezuinigingen op het onderwijs is van alle tijden. Daar is niets staatsondermijnend aan. Des te meer opmerkelijk dat diverse actieve studenten gedurende de acties en betogingen door de Regionale Inlichtingendienst en geheime dienst AIVD benaderd zijn met de vraag informant te worden.
‘Gaan jullie stenen gooien?’
Eind 2009 stak er langzaam een storm van protest op tegen de bezuinigingen in het onderwijs. Al jaren wordt er zowel binnen de politiek als vanuit wetenschappelijke hoek geroepen dat er geïnvesteerd moet worden om het Nederlandse onderwijs op peil te houden. De regering van CDA en VVD met gedoogpartner PVV vindt echter dat ook het onderwijs moet korten in verband met de algemene economische malaise. De studentenbonden, maar ook docenten keerden zich tegen het beleid van staatssecretaris Zijlstra van het ministerie van Onderwijs, Cultuur en Wetenschap (OCW).
Naast de ‘officiële’ organen van studenten (LSVB en IOS) en de jongerenorganisaties van enkele politieke partijen (Dwars en Rood) ontstond er een keur aan actiegroepen. Verspreid over het land richtten studenten clubs op als de Kritische Studenten Utrecht (KSU), Kritische Studenten Nijmegen Arnhem (KSNA), Kritische Studenten Twente (KST), Professor Protest (Amsterdam), SACU (Studenten Actie Comité Utrecht), Onderwijs is een Recht (OIER, Landelijk) en de comités SOS Nijmegen en SOS Amsterdam.
Actiegolf
Vanaf april 2010 tot de zomer van 2011 spoelde een golf aan acties over het land. Ludieke acties op straat of in universiteiten, bezettingen van hogescholen en faculteiten en demonstraties in verschillende steden. In het najaar van 2010 nam het protest in omvang toe en in januari 2011 demonstreerden ruim 10.000 studenten tegen de bezuinigingen.
Doel van de acties was van meet af aan duidelijk: geen kortingen op het onderwijs, zeker in een tijd dat de werkloosheid toeneemt. Ook al leefde er groot ongenoegen over het kabinet en gedoogpartner PVV, de regering omverwerpen was nooit een doelstelling. Oppositiepartijen en universiteits- en schoolbesturen verzetten zich samen met de studenten.
Nu lopen ludieke acties, bezettingen en demonstraties wel eens uit de hand, maar zoals onderzoek van Buro Jansen & Janssen naar demonstratierecht in Den Haag heeft uitgewezen, gebeurt dit zelden. Als er al ongeregeldheden plaats vinden, zijn lang niet altijd de actievoerders de schuldigen. Veelal is het ook te wijten aan het optreden van de politie. Bij grote demonstraties is vaak ook een overmacht aan mobiele eenheid aanwezig. De laatste jaren blijven ernstige rellen dan ook uit.
Begin 2011, op het hoogtepunt van de protestgolf, deed zich echter iets geks voor. Op de ochtend van vrijdag 21 januari meldde VVD-burgemeester Van Aartsen aan de NOS dat ‘de gemeente Den Haag aanwijzingen had dat radicalen de studentendemonstratie van vandaag willen verstoren’. Van Aartsen zei dat de politie die aanwijzingen baseerde op informatie afkomstig van ‘open en gesloten bronnen’.
Tijdens die demonstratie vonden er enkele schermutselingen plaats, maar of daar de ‘radicalen’ bij betrokken waren waar Van Aartsen eerder die dag op doelde, bleef onduidelijk. De open bronnen zouden websites, pamfletten en allerlei bladen zijn. Bij gesloten bronnen kan het gaan om telefoon en internet taps, observaties, maar ook informanten en infiltranten.
Zoals verwacht vond er een relletje plaats op het Plein voor het Tweede Kamergebouw en op het Malieveld. De politie meldde dat een deel van de aangehouden jongeren deel uit zou maken van radicale groeperingen. Volgens burgemeester Van Aartsen waren de arrestanten leden van de linkse groep Anti-Fascistische Aktie, zo meldde de NOS die avond.
Radicalen
Volgens de demonstranten liepen er tijdens de betoging veel agenten in burger mee en was de ME dreigend aanwezig. Dit kan het gevolg zijn geweest van de dreigende taal van de burgemeester. De ‘radicalen’ moesten per slot van rekening in de gaten worden gehouden. Van de 27 verdachten (cijfers van de politie) werden er nog op dezelfde dag 22 vrijgelaten.
Vijf verdachten werden maandag 24 januari voorgeleid. Volgens het openbaar ministerie bevonden zich hieronder ‘enkele niet-studenten’. Het zou gaan om een 27-jarige man uit Spanje, een 22-jarige man uit Haarlem, een 21-jarige Amsterdammer, een 26-jarige inwoner van Wassenaar en een 18-jarige Delftenaar.
Het OM maakte niet duidelijk wie nu wel of niet student was. Een HBO-student Arts and Sciences kreeg 8 weken onvoorwaardelijk opgelegd, een student politicologie en geschiedenis 80 uur werkstraf, een bouwkundestudent 40 uur werkstraf en een student toerisme een boete van 500 euro.
Alle verdachten en advocaten spraken van excessief politiegeweld. “De ME mishandelde vrouwen en kinderen” en “ik smeet vrijdag een aantal stenen, nee, geen bakstenen, naar de ME, omdat het geweld dat de politie gebruikte me diep schokte.” De rechter moest toegeven dat het optreden van de politie “niet de schoonheidsprijs verdiende.”
De veroordeelden waren allemaal studenten, zelfs de Spanjaard. Waarom logen burgemeester, politie en OM zowel voor als na de demonstratie over ‘radicalen’? Bespeelden zij de media om zo studenten in een verkeerd daglicht te plaatsen? En waar kwamen die radicalen plotseling vandaan? Na de demonstratie waren de radicalen volgens de burgemeester deelnemers aan de actiegroep AFA. Welke kennis had de politie en vanwaar werd die ingezet?
De gebeurtenissen rondom de demonstratie van 21 januari richtte de aandacht op iets dat al maanden aan de gang was. Vanaf het begin van de studentenprotesten is de overheid bezig geweest om het verzet in kaart te brengen, studenten te benaderen, informanten te werven, te infiltreren en zicht te krijgen op verschillende groepen. Niet de Landelijke Studenten Vakbond (LSVb) of het Interstedelijk Studenten Overleg (IOS) zouden een gevaar vormen, maar andere ‘radicalere’ studentikoze actiegroepen.
Benadering
In april en mei 2010 werd ‘Marcel’ gebeld door een man die zei dat hij van de recherche was en zichzelf Veerkamp noemde. Van welke afdeling en in welke hoedanigheid de beambte contact opnam, vertelde hij niet. Veerkamp werkt echter voor de Regionale Inlichtingendienst Utrecht, zoals uit een andere benadering blijkt. (zie Observant 58, Voor de RID is Griekenland ook een gevaar). De ‘rechercheur’ wilde graag geregeld contact met Marcel.
Marcel is student en actief voor het Studenten Actie Comité Utrecht (SACU) dat nauw samenwerkt met de Kritische Studenten Utrecht (KSU). Beide actiegroepen richten zich op de bezuinigingen op het onderwijs, maar plaatsen die tevens in maatschappelijk perspectief. Naast bezettingen, demonstraties en acties organiseerden ze ook debatten, lezingen en discussies. De kritische studentengroepen hielden een weblog bij met verslagen, agenda en discussie, een open structuur.
De man van de ‘recherche’ wilde van Marcel uit eerste hand weten wat de Utrechtse studenten de komende tijd gingen doen. “Zij wilden graag weten wat ze van ons konden verwachten”, vat Marcel het telefonische onderhoud samen. Marcel vond het nogal vreemd dat de man hem benaderde. Voor demonstraties werd openlijk opgeroepen en de groep meldde deze zelfs bij de politie aan. Waarom zou hij dan achter de rug om van andere studenten met deze man gaan praten?
Al snel werd duidelijk waar het de man om te doen was. Tijdens een van de twee gesprekken vroeg hij Marcel of ze van plan waren om stenen te gaan gooien tijdens studentendemonstraties. Marcel was nogal overrompeld door deze vraag, het leek of de politie er op zat te wachten. Alsof er een behoefte bestond van de zijde van de overheid om de studenten te criminaliseren.
AFA
Waarom wordt een student in Utrecht benaderd met de vraag of de studenten stenen zouden gaan gooien? Als Marcel de enige benaderde actievoerder was geweest dan is de conclusie simpel. De man die hem belde is wellicht werkzaam voor de Regionale Inlichtingendienst (RID) en was op zoek naar een contact binnen de kritische studentengroepen met het oog op mogelijke toekomstige ongeregeldheden. RID’ers hebben zo ook contacten met voetbalsupporters, zoals die van FC Utrecht.
Hoewel het personeel van de RID professionals zijn in het misleiden van mensen, kan de opmerking betreffende ‘stenen gooien’ een verspreking zijn geweest. De benaderde Marcel is echter geen uitzondering. ‘Peter’ werd in een eerder stadium gebeld door iemand van de overheid. Hij is student in Amsterdam en was actief voor de actiegroep Professor Protest. Het is niet duidelijk of de man die hem benaderde dezelfde persoon is geweest die Marcel heeft gebeld. Peter werd gevraagd om als informant te gaan werken. Hij voelde daar niets voor en verbrak de verbinding.
De combinatie van verschillende benaderingen, het bestempelen van elementen bij een studentendemonstratie als zijnde ‘radicaal’ en het benoemen van de ‘linkse groep Anti-Fascistische Aktie’ is te toevallig. In het deelrapport Ideologische Misdaad uit 2005 en 2007 van de KLPD worden deelnemers van AFA expliciet genoemd als ideologische misdadigers, mensen die worden verdacht van het plegen van een misdaad uit ideologische, politieke motieven.
Zodra activisten van AFA door politie worden gezien als ideologische misdadigers en door het landelijk parket gelijk worden gesteld aan roof misdadigers (Strategienota aandachtsgebieden 2005 – 2010) dan is een inlichtingenoperatie gericht op studenten een logisch uitvloeisel indien AFA-activisten ook student zijn en actief binnen die groepen. Daarbij passen benaderingen, infiltratie, aftappen, observaties en andere geheime methoden. Kritische studentengroepen plaatsen de strijd tegen de bezuinigingen van het kabinet in een breder perspectief.
Actieve studenten zijn soms ook politiek actief of strijden voor bijvoorbeeld dierenrechten, ondemocratisch Europa of bijeenkomsten van de G8 of G20. Het optreden van de overheid in deze doet sterk denken aan de inlichtingenoperatie van de BVD rond de Amsterdamse studentenbond ASVA in de jaren ’60 en ’70. Het verschil leek dat Marcel en Peter niet door de inlichtingendienst (de AIVD) zijn benaderd, maar door de ‘recherche’. De recherche zou dan misschien de Nationale Recherche zijn geweest vanwege de ‘ideologische misdaad’.
Geheime dienst
Nu is de wijze waarop prioriteiten gesteld worden aan het werk van politie en parket onderhevig aan politieke druk. Prioriteiten veranderen jaarlijks, afhankelijk van gevoerde discussies in de Tweede Kamer en de doelstellingen van een individuele minister. Het is echter moeilijk voor te stellen dat studentenprotesten plotseling als een belangrijk strategiepunt zijn benoemd voor de Nationale Recherche. Beleid verandert meestal traag, het duurt een tijd voordat het opsporingsapparaat zich gaat richten op een andere prioriteit.
Niet de Nationale Recherche zat dan ook achter de studenten aan, maar de geheime dienst. De benadering van ‘Karin’ onderstreept dit. Zij werd benaderd door iemand van het ministerie van Binnenlandse Zaken en Koninkrijksrelaties, het ministerie dat verantwoordelijk is voor het functioneren van de AIVD. Marcel en Peter zijn waarschijnlijk benaderd door functionarissen van de Regionale Inlichtingendiensten van Amsterdam en Utrecht.
Probleem is dat inlichtingenfunctionarissen meestal niet te koop lopen met hun naam en het werk dat ze verrichten. Indien je als burger zelf niet vraagt met wie je van doen hebt, kunnen zij niet de beleefdheid opbrengen om duidelijk aan te geven dat zij voor een inlichtingendienst werken.
Karin is student aan de Universiteit van Amsterdam (UvA). Zij is sinds eind 2010 betrokken bij het studentenverzet. In februari 2011 bezette zij samen met andere studenten het Bungehuis van de UvA. Aan de actiegroep waar zij deel van uitmaakte, Professor Protest, nam ook Peter deel.
Op 20 april 2011 werd Karin gebeld door een man die zich voorstelde als ‘Ivo Kersting’ (of Kertjens of Kerstman of Kerstland) van het ministerie van Binnenlandse Zaken en Koninkrijkrelaties. Haar mobiele nummer was niet gebruikt als perstelefoon dus Ivo moet haar nummer via het Centraal Informatiepunt Onderzoek Telecommunicatie (CIOT) hebben verkregen.
Ivo belde vanuit Amsterdam met nummerherkenning en sprak Karin met haar voornaam aan. Zij was nogal overrompeld door het telefoontje. Hij vroeg of hij op een gelegen tijdstip belde waarop zij ontkennend antwoordde. Hij kon haar over een uur terugbellen, maar zei niet waarover. Karin vroeg het nog, maar Ivo zei, “nee, over een uur hoor je dat wel”.
Een uur later hing hij weer aan de lijn, nu zonder achternaam. “Hallo, weer met Ivo, van Binnenlandse Zaken. Wij zijn de studentenbeweging in kaart aan het brengen. Jij bent toch woordvoerder geweest van de Bungehuis bezetting? Je bent ons positief opgevallen, en je zou ons erg helpen als je met ons rond de tafel komt zitten om wat te debatteren over de studentenbeweging.”
Ivo heeft gedurende de telefoongesprekken op geen enkele manier uitgelegd wat voor functie hij op het ‘ministerie’ vervulde. Karin antwoordde dat ze geen tijd had en niet meer actief betrokken ws bij de studentenprotesten. Ivo leek een beetje van zijn stuk gebracht door haar resolute antwoord. “Oh, dat is jammer je zou ons echt enorm kunnen helpen, kan ik je niet overhalen?”, probeerde hij nog. Toen Karin ontkennend antwoordde, gooide hij zonder gedag te zeggen de hoorn op de haak.
Intimiderend
Medewerkers van de inlichtingendienst hebben de neiging zich boven de burger, de samenleving te plaatsen. Ze hebben toegang tot allerlei persoonlijke informatie waardoor mensen die benaderd worden zich erg geïntimideerd voelen. Karin vond de gesprekken met Ivo Kersting vervelend en intimiderend. Hij bleef aandringen, draaien, geveinsd vriendelijk doen en doordrammen terwijl zij toch duidelijk was met haar ontkenning.
Ivo belde namelijk na een paar minuten weer terug. Hij verontschuldigde zich niet dat hij zo onbeschoft de hoorn op de haak had gegooid, maar zei meteen dat ze geld kreeg voor deelname aan het gesprek. Hoewel Karin opnieuw zei niet mee te willen werken, bleef de functionaris aanhouden. “We kunnen ook in Amsterdam afspreken. Ben je in Amsterdam? Je woont toch in Amsterdam? Ik ben nu met een collega in de buurt dus dan zouden we even kunnen spreken?”
Blijkbaar wisten ze meer van haar dan ze hadden laten doorschemeren. Karin wees de agenten opnieuw af, maar op het drammerige af bleef Ivo aanhouden. “Anders spreken we af dat jij bepaalt waar en wanneer je af wilt spreken. Je zou ons echt enorm kunnen helpen.” De druk werd opgevoerd. Karin moest zich schuldig gaan voelen. Zij wilde niet meewerken terwijl Ivo en zijn collega zo redelijk waren.
Dat waren ze echter niet. Ze intimideerden haar en toonden geen respect voor haar standpunt. “Weet je wat, ik overval je nu natuurlijk. Misschien kan ik je anders volgende week bellen”, zei Ivo alsof hij haar ontkenning helemaal niet had gehoord. Opnieuw voor de tiende keer antwoordde Karin dat ze niet wilde afspreken, geen tijd en zin had.
Karin was overrompeld, maar was nee blijven zeggen. Achteraf realiseert zij zich dat ze blij was dat ze wist dat ze het volste recht had om te weigeren mee te werken. Na een spervuur aan vragen te hebben overleefd en geschrokken te zijn van de behandeling, bleef er alleen maar boosheid bij haar hangen. “Het is eigenlijk politie van de ergste soort omdat ze zich niet eens voordoen als politie, en het laten lijken alsof je gewoon een gezellig kopje koffie gaat drinken”, vat ze het maanden later samen.
“Veel studenten die benaderd worden zullen dusdanig geïntimideerd zijn dat ze gaan praten omdat ze niet durven te weigeren. Anderen zullen denken dat het om een gezellige discussie of om een debat gaat”, concludeert Karin. De geheim agenten gaven haar ook die indruk. “Ze deden alsof het heel erg zou helpen als ik met ze zou gaan debatteren over de studentenbeweging, alsof zij invloed hadden op de besluitvorming rondom de bezuinigingen”, voegt ze nog toe. Karin is er van overtuigd dat er zeker studenten zijn geweest die op het aanbod zijn ingegaan en met Ivo en zijn collega of andere functionarissen hebben gesproken.
Persoonsdossiers
Naast Marcel, Peter en Karin zijn er ook andere mensen benaderd vanaf het najaar van 2010 tot en met de zomer van 2011. Waarom wordt een inlichtingendienst ingezet tegen een groep studenten die protesteert tegen de bezuinigingen op het onderwijs? Niet om rellen te voorkomen, zoals bij voetbalsupporters. Bij risicowedstrijden communiceert de RID vooral met de burgemeester en met de driehoek over mogelijke ongeregeldheden, niet met de inlichtingendienst.
Dat er een uitgebreidere inlichtingenoperatie rondom de studentenprotesten op touw is gezet, maken de eerste stukken duidelijk die via de Wet openbaarheid van Bestuur (WoB) en de Wet op de Inlichtingen- en Veiligheidsdiensten (WIV) zijn verkregen. De RID van de regiopolitie Haaglanden heeft op 27 januari 2011 een nabeschouwing van de studentendemonstratie opgesteld voor het Algemeen Commandant van de Staf grootschalig en bijzonder optreden (AC SGBO).
Of dit rapport alleen naar de algemeen commandant is gegaan, valt te betwijfelen. Op 21 maart 2011 schrijft rapporteur ‘R: 15:’ van de RID Haaglanden het verstrekkingrapport 1414/11 aan de AIVD. Het rapport gaat over een studentendemonstratie van 25 maart 2011. Er wordt in gemeld wie de organisator was van de betoging, de route en het aantal te verwachten demonstranten. Onduidelijk is of er delen van het rapport zijn achtergehouden.
Evenmin duidelijk is hoelang de overheid studenten al in kaart aan het brengen is. Duidelijk is wel dat er persoonsdossiers zijn samengesteld van individuele actievoerders. Op basis van die dossiers is de claim van burgemeester Van Aartsen, de politie en het Openbaar Ministerie rond de demonstratie van 21 januari 2011 te begrijpen. Of er provocateurs van politie of inlichtingendienst, mensen die aanzetten tot geweld, tussen de demonstrerende studenten rond hebben gelopen, is niet duidelijk. Wel waren er veel agenten in burger op de been en de ME trad onnodig hard op.
Marcel, Peter en Karin zijn fictieve namen.
Find this story at 26 maart 2013
Police tried to spy on Cambridge students, secret footage shows27 november 2013
Officer is filmed attempting to persuade activist in his 20s to become informant targeting ‘student-union type stuff’
Police sought to launch a secret operation to spy on the political activities of students at Cambridge University, a covertly recorded film reveals.
An officer monitoring political campaigners attempted to persuade an activist in his 20s to become an informant and feed him information about students and other protesters in return for money.
But instead the activist wore a hidden camera to record a meeting with the officer and expose the surveillance of undergraduates and others at the 800-year-old institution.
The officer, who is part of a covert unit, is filmed saying the police need informants like him to collect information about student protests as it is “impossible” to infiltrate their own officers into the university.
The Guardian is not disclosing the name of the Cambridgeshire officer and will call him Peter Smith. He asks the man who he is trying to recruit to target “student-union type stuff” and says that would be of interest because “the things they discuss can have an impact on community issues”.
Smith wanted the activist to name students who were going on protests, list the vehicles they travelled in to demonstrations, and identify leaders of protests. He also asked the activist to search Facebook for the latest information about protests that were being planned.
The other proposed targets of the surveillance include UK Uncut, the campaign against tax avoidance and government cuts, Unite Against Fascism and environmentalists. The Cambridgeshire police initially insisted that there were implications for “national security” but later dropped this argument when challenged.
At another point, the activist asked whether a group known as Cambridge Defend Education, which has protested against tuition fees and education cuts, would be of interest. Smith replied: “That’s the sort of thing that we would be looking for. Again, basic sort of stuff. It’s all the internet. When they have meetings and they are discussing what they are going to do, that’s when we’ll say: ‘Will you go along?'”
Cambridge Defend Education describes itself as being “mostly students and academics from Cambridge University”.
Rachel Wenstone, deputy president of the National Union of Students, said: “This is yet another example of the questionable tactics that undercover police officers have taken in recent years to infiltrate campaign groups and extract information.”
Julian Huppert, the Liberal Democrat MP for Cambridge, tweeted: “I’m shocked by this – seems wholly inappropriate.” Cambridge University did not comment, saying it was a matter for the police.
Cambridgeshire police said: “Officers use covert tactics to gather intelligence, in accordance with the law, to assist in the prevention and detection of criminal activity.”
The disclosures follow prolonged criticism of the police over their secret deployment of long-term undercover officers in political groups since 1968. Police chiefs have been accused of unjustifiably infiltrating and disrupting political groups that use non-violent methods to promote their aims.
Another technique for gathering intelligence on campaigners has been to convince activists to become paid informants and pass on details of future protests and prominent campaigners. The number of informants in political groups, according to police sources, runs into the hundreds.
The covert film sheds light on the rarely visible world of informants, illuminating how the police recruit and task them. The activist, who does not want to be named and has been given the pseudonym John Armstrong, was rung on his mobile out of blue at the beginning of October by the police officer.
Smith said he worked for the police and asked him if he was willing to come to a police station in Cambridge to help him with a matter that he did not disclose.
According to Armstrong, Smith had chosen him because he had been active in environmental and anti-nuclear groups and had been arrested three times on demonstrations, although not charged. He has also lived in Cambridge for many years.
Afterwards, Armstrong contacted the Guardian as he did not want to become an informant. He agreed to wear a concealed camera to record the contents of his second meeting with Smith.
During this meeting, Smith suggested that he wanted Armstrong to start by providing information about local groups in Cambridge, before progressing on to national campaigns.
“Let’s keep it small, you know little things that go on, little meetings that happen where they are going to discuss different issues in Cambridge, whether it be, such as at the university or those sorts of things,” the officer is recorded as saying. When Armstrong said he had been involved in a student-organised occupation of Cambridge University in a protest against tuition fees three years ago and asked if Smith would have been interested in that, Smith said yes. “Again, it’s those sorts of things. You know, what is the feeling of people, if you are inside.”
The young man then asked if it would have been difficult for the police to send their own officers into the occupation, to which Smith replied: “We can’t do it. It’s impossible. That’s why we need to work with people.” Armstrong has not been a student at Cambridge, although many of his friends are at the university.
When contacted by the Guardian, a Cambridgeshire police spokesperson said: “Officers use covert tactics to gather intelligence, in accordance with the law, to assist in the prevention and detection of criminal activity.” They declined to give any details of the unit Smith works for.
Smith outlined what information Armstrong would be required to slip him. “It will be a case of you going to meetings, say, I don’t know, UK Uncut, student … something like that, how many people were there, who was the main speaker, who was giving the talks, what was your assessment of the talk, was it a case of – were they trying to cause problems or were they trying to help people, you know, those sort of things.”
Smith also said he wanted Armstrong to collect information about Cambridge campaigners who were planning to go to protests in other parts of the country. “That’s where the names come in. Because what I will want to know is – OK, who’s going, do they plan on a peaceful protest which is absolutely fine, how they are going to go, as in what vehicles they are going to use, index numbers.”
He goes on to say: “So you will tell me, for example, there’s 50 people going from Cambridge University, these are the vehicles they are travelling in and they are going as a peaceful protest?”
Smith outlined how the information gathered by Armstrong would be funnelled to the police officers in charge of policing the demonstration: “The reason I am asking those questions is because it gives the officers or whoever’s looking after it on that side of things, as in at the protest, an idea of how many people are going to attend, where they are coming from, how many vehicles are going to turn up, so they can put measures in place to keep them off the road and things. It’s not because we want to target people and round them all up and arrest them.”
Smith also suggested that Armstrong use Facebook to find information about groups, adding: “It is easier to ask people like yourself to give us updates … It’s all about us doing things legally … We don’t hack into people’s accounts so then we would ask you for updates.”
The officer also suggested the man he hoped to recruit would be paid expenses or other sums. “You might go to a UK Uncut or Unite Against Fascism meeting one evening, you might get say £30 just for your time and effort for doing that. That’s the sort of thing you are looking at.”
As Smith sought to convince Armstrong to sign up, he also advised him not to “think too deeply” about informing on his fellow campaigners as he might “tie himself up in knots”.
Rob Evans and Mustafa Khalili
The Guardian, Thursday 14 November 2013 13.42 GMT
Find this story at 14 November 2013
© 2013 Guardian News and Media Limited or its affiliated companies. All rights reserved.
Spooky Business: A New Report on Corporate Espionage Against Non-profits27 november 2013
Giant corporations are employing highly unethical or illegal tools of espionage against nonprofit organizations with near impunity, according to a new report by Essential Information. The report, titled Spooky Business, documents how corporations hire shady investigative firms staffed with former employees of the Central Intelligence Agency (CIA), National Security Agency (NSA), US military, Federal Bureau of Investigations (FBI), Secret Service and local police departments to target nonprofit organizations.
“Corporate espionage against nonprofit organizations is an egregious abuse of corporate power that is subverting democracy,” said Gary Ruskin, author of Spooky Business. “Who will rein in the forces of corporate lawlessness as they bear down upon nonprofit defenders of justice?”
Many of the world’s largest corporations and their trade associations — including the U.S. Chamber of Commerce, Walmart, Monsanto, Bank of America, Dow Chemical, Kraft, Coca-Cola, Chevron, Burger King, McDonald’s, Shell, BP, BAE, Sasol, Brown & Williamson and E.ON – have been linked to espionage or planned espionage against nonprofit organizations, activists and whistleblowers.
Many different types of nonprofit organizations have been targeted with corporate espionage, including environmental, anti-war, public interest, consumer, food safety, pesticide reform, nursing home reform, gun control, social justice, animal rights and arms control groups.
Corporations and their trade associations have been linked to a wide variety of espionage tactics against nonprofit organizations. The most prevalent tactic appears to be infiltration by posing a volunteer or journalist, to obtain information from a nonprofit. But corporations have been linked to many other human, physical and electronic espionage tactics against nonprofits. Many of these tactics are either highly unethical or illegal.
Founded in 1982 by Ralph Nader, Essential Information is a Washington, DC-based nonprofit, tax-exempt organization. It is involved in a variety of projects to promote corporate accountability, a more just economy, public health and a sustainable planet. It has published a bi-monthly magazine, books and reports, sponsored conferences, provided writers with grants to pursue investigations, published daily news summaries, operated clearinghouses that disseminate information to grassroots organizations in the United States and developing countries worldwide, and has hosted scores of conferences focusing on government and corporate accountability.
November 20, 2013 · by editor · in Corporate Espionage
Find the report at 20 November 2013
© 2013 Center for Corporate Policy
<< oudere artikelen nieuwere artikelen >>