• Buro Jansen & Janssen is een onderzoeksburo dat politie, justitie, inlichtingendiensten, de overheid in Nederland en Europa kritisch volgt. Een grond-rechten kollektief dat al 30 jaar publiceert over uitbreiding van repressieve wetgeving, publiek-private samenwerking, bevoegdheden, overheids-optreden en andere staatsaangelegenheden.
    Buro Jansen & Janssen Postbus 10591, 1001EN Amsterdam, 020-6123202, 06-34339533, signal +31684065516, info@burojansen.nl (pgp)
    Steun Buro Jansen & Janssen. Word donateur, NL43 ASNB 0856 9868 52 of NL56 INGB 0000 6039 04 ten name van Stichting Res Publica, Postbus 11556, 1001 GN Amsterdam.

  • Categorieën

  • Spooky Business: U.S. Corporations Enlist Ex-Intelligence Agents to Spy on Nonprofit Groups (2013)

    A new report details how corporations are increasingly spying on nonprofit groups they regard as potential threats. The corporate watchdog organization Essential Information found a diverse groups of nonprofits have been targeted with espionage, including environmental, antiwar, public interest, consumer safety, pesticide reform, gun control, social justice, animal rights and arms control groups. The corporations carrying out the spying include the U.S. Chamber of Commerce, Wal-Mart, Monsanto, Bank of America, Dow Chemical, Kraft, Coca-Cola, Chevron, Burger King, McDonald’s, Shell, BP, and others. According to the report, these corporations employ former CIA, National Security Agency and FBI agents to engage in private surveillance work, which is often illegal in nature but rarely — if ever — prosecuted. We’re joined by Gary Ruskin, author of the report, “Spooky Business: Corporate Espionage Against Nonprofit Organizations,” and director of the Center for Corporate Policy, a project of Essential Information.

    Click here to watch part 2 of this interview.
    Transcript

    This is a rush transcript. Copy may not be in its final form.

    AMY GOODMAN: As we turn to a new report detailing how corporations are increasingly spying on nonprofit groups that they regard as potential threats. The report’s called, “Spooky Business: Corporate Espionage Against Nonprofit Organizations.” It was released by the corporate watch group Essential Information. The report found a diverse group of nonprofits have been targeted with espionage, including environmental, antiwar, public interest, consumer safety, pesticide reform, gun control, social justice, animal rights, and arms control groups. The corporations carrying out the spying include the U.S. Chamber of Commerce, Wal-Mart, Monsanto, Bank of America, Dow Chemical, Kraft, Coca-Cola, Chevron, Burger King, McDonald’s, Shell, BP, and others. According to the report, these corporations employ former CIA, NSA and FBI agents to engage in private surveillance work which is often illegal in nature but rarely, if ever, prosecuted. For more we go to California where we’re joined by the report’s author, Gary Ruskin. He is the director of the Center for Corporate Policy, a project of Essential Information. Gary, Welcome back to Democracy Now! Explain what you found.

    GARY RUSKIN: Thanks for having me on the show again, Amy. Yeah, we found a tremendous diversity of corporate espionage being conducted against a wide variety of civic groups across the country and the U.K., the case in Ecuador and in France as well. So what we found was a tremendous variety of use of different types of espionage tactics from dumpster diving to hiring investigators to pose as journalists or volunteers, to electronic espionage, information warfare, information operations hacking, electronic surveillance. And so this appears to be a growing phenomenon both here in the United States and maybe in other parts of the world as well. But our report is an effort to document something that’s very hard to know very much about. We aggregated 30 different cases of corporate espionage to try to talk about them, but really, each of the cases we have very fragmentary information. And so it’s hard to say — we have a, we have a part of an iceberg whether it’s the tip of the iceberg or the tippy tip of the iceberg, we don’t really know.

    AMY GOODMAN: Gary, let’s got to — I want to go to 2010; Greenpeace files a federal lawsuit against Dow Chemical and Sasol North America for engaging in corporate espionage. The lawsuit alleged corporate spies stole thousands of confidential documents from Greenpeace, including campaign plans, employee records; phone records, donor and media lists. Democracy Now! spoke to Charlie Cray, the senior researcher with Greenpeace USA at the time. He explained what happened.

    CHARLIE CRAY: BBI, the defunct private investigation firm hired subcontractors including off-duty police officers who went through Greenpeace’s trash to find useful documents on a regular basis. Over two years they did this almost twice a week on average. They also used subcontractors who had colleagues who attempted to infiltrate Greenpeace as volunteers. They cased the Greenpeace office looking for we don’t know what, but probably doing advanced scouting for people who would then intrude upon the property. We found a list of door codes, we found a folder that said “wiretap info,” which was empty. We know this company has sub-contracted with a company called Net Safe, which is a company that was made of former NSA officials skilled in computer hacking and things like that. So we really don’t know the full extent of this, but what we’ve seen is incredibly shocking. And our goal is to bring this out into the light of day and to stop it if it’s still going on.”

    AMY GOODMAN: That was Charlie Cray, senior researcher with Greenpeace USA. Gary Ruskin, if you could responded to that and then talk about Wal-Mart and Up Against the Wall, the nonprofit organization?

    GARY RUSKIN: The Greenpeace example is a great example of what corporate America can bring to bear, the lawlessness that they can bring to bear on nonprofit organizations like Greenpeace, like Peta, like Knowledge Ecology International, on Public Citizen and others. This was a tremendously diverse and powerful campaign of espionage that they targeted Greenpeace with. And so, you know, there are so many other examples in the report, but you mentioned Wal-Mart has a very large internal security operation and so we know of a case, for example, where they planted essentially a person with a bug in a meeting of people organizing about Wal-Mart and then as well they had a van that was able to surveil some other activities, protest activities as well. There are so many stories we can tell from the report. Another famous one was the largest operated nuclear power plants in the world; Electricite de France, caught with a copy of a Greenpeace hard drive on one of its contractor’s computers because they’d hacked into Greenpeace France. So there just so many stories we can tell.

    AMY GOODMAN: So how does it go from spying to interrupting the activity of these organizations? And also if you could also talk about the spying on Occupy Wall Street.

    GARY RUSKIN: Sure. Well, what we found in some of the cases is there are spies that actually, you know, actively participate in an organization. For example, one of the most famous cases was a woman who’s real name was Mary Lou Sapone, who went by a Mary McFate and was very active in gun control movement for quite a long time and ran for the National Board of Directors of a prominent gun control organization and worked with the Brady Campaign like. She was totally a spy. Another example was there was —

    AMY GOODMAN: A spy for?

    GARY RUSKIN: A spy probably for the NRA. And then there are other pretty well-known examples, like for example, there was a former congressman the late Congressmen Henry Hyde was also a bank director at a bank, he didn’t pay — the bank went belly up and he was the only bank director who did not pay the settlement for the bank going defunct. And he had a lawyer dispatch a journalist or someone who posed as a journalist to get information from the guy who uncovered so much of this Ron Dueling [SP].

    AMY GOODMAN: Well Gary Ruskin, we are going to continue covering this issue, were going do part 2 of the interview and post it online at democracynow.org. Gary Ruskin is Director of The Center for Corporate Policy, a project of Essential Information. We’ll link to the report “Spooky Business: Corporate Espionage Against Nonprofit Organizations.”

    The original content of this program is licensed under a Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 United States License. Please attribute legal copies of this work to democracynow.org. Some of the work(s) that this program incorporates, however, may be separately licensed. For further information or additional permissions, contact us.

    Monday, November 25, 2013

    Find this story at 25 November 2013

    Vuilnis van milieugroepen gebruikt door grote bedrijven

    Worden Greenpeace, Milieudefensie en andere milieuorganisaties in Nederland in de gaten gehouden door de bedrijven die zij kritisch volgen? Duidelijke aanwijzingen zijn er niet, maar de Amerikaanse praktijk van de jaren negentig die James Ridgeway in het maanblad Motherjones schetst, plaatst vraagtekens bij deze betrekkelijke rust. Het verhaal van Ridgeway is een moderne variant van de oud papier-affaire die Buro Jansen & Janssen in 1994 onthulde. Marcel Paul Knotter haalde toen

    jarenlang oud papier op bij verschillende actiegroepen. Het papier was zogenaamd bestemd voor een school, maar in werkelijkheid bracht hij het naar het kantoor van ABC in Vinkeveen. ABC was het particuliere recherchebureau van Peter Siebelt, die de informatie regelmatig deelde met de Telegraaf. In het Amerikaanse verhaal gaat het om Beckett Brown International (BBI), in 2000 omgedoopt tot S2i. BBI, werkzaam van 1995 tot en met 2001, was een maatje groter dan ABC. Het bedrijf kon tot zijn klantenkring the Carlyle Group, the National Rifle Assocoation, Wal-Mart, maar ook grote public-relations bedrijven zoals Ketchum en Nichols-Dezenhall Communications rekenen. Ketchum is een internationaal pr bedrijf en heeft in Nederland als zakelijke partner Winkelman en Van Hessen. Ridgeway sprak uitgebreid met de gedesillusioneerde investeerder John C. Dodd III die hem ook verschillende interne documenten van BBI overhandigde.

    Het verhaal van Beckett Brown International begint in 1994 in Easton, Maryland, de Verenigde Staten. Beckett is werkzaam in de adviseringsbranche en introduceert Dodd aan een voormalig medewerker van de geheime dienst Paul Radowski en later nog aan Joseph A. Masonis en een expert in explosieven George Ferris. Het bedrijf Beckett Brown International, vernoemd naar Richard Beckett en Sam Brown, de advocaat van het bedrijf, gaat officieel in augustus 1995 van start met Radowski, Masonis en Ferris als medewerkers. BBI is een allround beveiligingsbedrijf. Het verzorgt in 1997 de beveiliging van de inauguratie van Bill Clinton en heeft in het begin klanten als Phillip Morris. In 1998 telt het bedrijf 22 medewerkers waaronder David Bresset, Phil Giraldi en Vincent Cannistraro drie voormalige CIA officieren. Cannistraro was voormalig hoofd van het Contra-terreur-centrum van de CIA en in de jaren tachtig verantwoordelijk voor de Amerikaanse steun aan de Contra’s.

    Giraldi verliet in 1999 het bedrijf dat toen al met onconventionele middelen zijn pijlen op Greenpeace had gericht. De vuilnis werd doorzocht en infiltranten werden ingezet. In september 2000 vindt het Taco Bell schandaal plaats. GE Food Alert, een coalitie tegen gentechnologie, had al in juli dat jaar ontdekt dat genetisch gemanipuleerde maïs die niet voor de consumptie geschikt was in voedsel terecht was gekomen. BBI wordt door het pr bedrijf Ketchum ingeschakeld om uit te zoeken welke informatie verschillende actiegroepen hebben. BBI doet een poging om de vuilnis van het Center for Food Safety, Friends of the Earth en GE Food Alert te bemachtigen. Bij de eerste groep wordt ook een poging tot infiltratie gedaan. De operatie wordt door Jay Bly, ook een voormalig geheimedienst-man, vanuit BBI gecoördineerd. Tim Ward, een voormalig politieagent uit Maryland, staat ook op de loonlijst en verzorgt de contacten met lokale politiemensen die soms wat bijklussen voor BBI. Citaat uit een email van Bly aan Ward: ‘I got hold of Jim Daron [a Washington police officer working for BBI] yesterday. He was supposed to do Vermont Ave and Penn Ave SE last night. I have not heard from him today …’

    Of de vuilnis operatie deze keer succesvol was wordt niet duidelijk uit de email die Ridgeway boven tafel kreeg. Beckett Brown is er in het verleden wel in geslaagd de notulen van een strategie-bijeenkomst van het GE food netwerk aan Ketchum te overhandigen. In 1999 stelt BBI daartoe het rapport ‘Intelligence Analysis for Dow Global Trends Tracking Team’ op. De praktijk van ‘dumpster diving’ zoals de Amerikanen het vuilnis-kijken voor informatie noemen was niet volledig onbekend bij de leiding van het bedrijf. David Queen, vice -president van BBI, schrijft in 1998 een memo aan Radowski over vuilnis-doorzoeken. De voormalige aanklager uit Pennsylvania memoreert dat dit doorzoeken enkele problematische kanten heeft waartoe BBI buiten het bedrijf advies dient in te winnen met het oog op mogelijke gerechtelijke stappen tegen het bedrijf.

    Een schrale troost voor de milieubeweging is dat Beckett Brown International geen scrupules lijkt te kennen en het vuil van wie dan ook doorzoekt. In combinatie met een ander pr bedrijf, Nichols-Dezenhall Communications, dat werkzaam is voor Nestle, wordt een poging gedaan de vuilnis van de concurrent van Nestle, Whetstone Chocolates, te bemachtigen.

    Greenpeace leek het hoofddoel van de vuilnis-operatie met betrekking tot milieuorganisaties. Jennifer Trapnell, een ex-vriendin van Tim Ward vertelt Ridgeway over enkele nachtelijke operaties. Doel was niet zozeer de strategie met betrekking tot een campagne te bemachtigen, maar zowel de lopende zaken als de organisatiestructuur in beeld te brengen. Financiële rapporten, veiligheidsinstructies van het Greenpeace kantoor en de toegangscodes voor het kantoor waren in het bezit van BBI. Hoewel Greenpeace ruime ervaring heeft met inbraken en infiltratie door pr bedrijven was de observatie door BBI niet opgevallen.

    Een van de BBi-projecten waarbij ook een infiltrant is ingezet is de campagne van Greenpeace in samenwerking met lokale milieuorganisaties rond ‘cancer alley’ in Louisiana. Het traject langs de Mississippi River van Baton Rouge tot New Orleans is een industrieterrein waar onder andere Shell is gevestigd. De milieubeweging heeft het de bijnaam ‘cancer alley’ gegeven, maar de bedrijven, waaronder Shell, betwisten het gevaar van de locatie. BBI verzamelde voor de pr bedrijven Ketchum en Nichols-Dezenhall Communications informatie, maar trachtte ook tweespalt te zaaien in de campagne van lokale milieugroepen en Greenpeace met de inzet van infiltrant Mary Lou Sapone. Sapone infiltreerde de milieugroep CLEAN in Louisiana en gaf informatie door aan BBI. Sapone was al eerder actief als infiltrant in de jaren tachtig. Voor Perceptions International infiltreerde ze toen in een dierenrechtengroep in Connecticut.

    Infiltratie was naast het vuilnisdoorzoeken voor informatie een gebruikelijke werkwijze van BBI. In 1996 en 1997 werd een infiltrant ingezet om het verzet van een lokale actiegroep in Noord California tegen een vuilstortplaats in kaart te brengen voor het bedrijf Browning-Ferris Industries dat de stortplaats wilde exploiteren.

    Een ander bedrijf, Condea Vista, maakte ook gebruik van de diensten van BBI. Investeerder Dodd kwam het bedrijf tegen in het omvangrijke archief dat hij na de beëindiging van Beckett Brown International opsloeg. Bij het doorlezen van dit archief kwam hij stukken tegen die de naam ‘Lakes Charles project’ droegen. Eind jaren negentig was Condea Vista verwikkeld in een juridisch gevecht met werknemers die het bedrijf aanklaagden wegens ziekte ten gevolge van lekkage van pijpleidingen. Ook werden er campagnes gevoerd door milieu-activisten tegen de vervuiling van Lake Charles in Louisiana. Condea Vista huurde het pr bedrijf Nichols-Dezenhall in dat op zijn beurt BBI weer inschakelde. Bij de vervuiling draait het om een 40 jaar oude pijpleiding die door het bedrijf is gebruikt om erg giftige stoffen te transporteren. Van de vele miljoenen tonnen chemische stoffen die door lekkage in het milieu zijn terecht gekomen heeft het bedrijf maar een fractie opgeruimd. In een gerechtelijke procedure van enkele zieke werknemers tegen Condea Vista trad advocaat Tom Filo op. Filo vertelt Ridgeway dat tijdens de zaak tegen het bedrijf verschillende keren in zijn kantoor was ingebroken. Een keer reageerde hij op het alarm en vond politieagenten in zijn kantoor, die de voordeur hadden opengebroken en het alarm hadden uitgezet. ‘Weird shit was going on back then,’ vat hij de gebeurtenissen samen. Dodd nodigde Filo uit om het archief door te kijken. Filo vond vertrouwelijke documenten zoals medische rapportages van werknemers, die volgens hem alleen gestolen konden zijn. Naast inbraken, observaties van lokale milieuactivisten maakt BBI ook gebruik van informanten. Opnieuw komt de naam op van Mary Lou Sapone, maar er was ook een andere infiltrant. Sapone huurde een schoolmeester in die actief werd in CLEAN (Calcasieu League for Environmental Action Now) en in korte tijd mee ging doen aan allerlei belangrijke vergaderingen. Jay Bly was direct bij het Lakes Charles project betrokken door bijvoorbeeld de observatie van Greenpeace medewerker Beth Zilbert. Bly rapporteerde aan Tim Ward over de activiteiten van BBI in deze zaak. Perry R. Sanders, een andere advocaat die zieke werknemers vertegenwoordigt, heeft een getuigenverklaring van Bly en Ward waarin beide mannen bekennen voor Condea Vista in Lake Charles en Washington DC te hebben gewerkt. Tevens bekenden beiden dat het bedrijf op de hoogte was van hun activiteiten, maar ze wilden niet in detail treden.

    Greenpeace onderzoekt de juridische mogelijkheden om de bedrijven die BBI hebben ingehuurd aan te klagen. Het archief van Dodd wordt doorgespit om te doorgronden hoe diep de campagnes van Greenpeace geïnfiltreerd waren. De indruk bestaat dat BBI niet alleen de vuilnis van Greenpeace doorzocht, maar ook andere middelen gebruikte. In het archief van Dodd werden lijsten van donateurs en allerlei persoonlijke gegevens over de werknemers gevonden.

    De hoofdrolspelers in de spionage-operatie van BBI zijn nog steeds actief in de wereld van de ‘beveiliging’. Tim Ward heeft een eigen bedrijf Chesapeake Strategies en Jay Bly werkt voor hem. Het bedrijf beveiligt ook onderzoeksinstituten tegen dierenrechten-activisten. Joseph Masonis werkt voor Annapolis Group een bedrijf dat trots is op zijn 45-jarige ervaring met de United States Secret Service. Richard Beckett leidt het bedrijf Global Security Services dat naast intelligence services en paramilitaire operaties ook senator Barack Obama beveiligd heeft.

    Investeerder John C. Dodd III heeft dozen vol administratie van Beckett Brown International en S2i gered van de vernietiging. Hij wil graag getuigen voor het Amerikaanse Congres of welke instantie dan ook over de vuile praktijken van het bedrijf dat hij mogelijk heeft gemaakt, maar niemand heeft hem nog uitgenodigd.

    Find this story at 1 June 2008

     

    Greenpeace Sues Chemical Companies for Corporate Espionage (2010)

    Greenpeace has filed a lawsuit against two major chemical companies and their PR firms for corporate espionage. The complaint alleges that Dow Chemical and Sasol — formerly CONDEA Vista — hired private investigators to spy on Greenpeace in the late 1990s. The charges of espionage center on surveillance of the Greenpeace office in Washington, D.C., and the infiltration of a community group in St. Charles, Louisiana, that was working with Greenpeace on dioxin contamination. Greenpeace accuses the corporations of engaging in this level of surveillance “with the intention of preempting, blunting, or thwarting” the organization’s environmental advocacy campaigns. For more on this story, we speak with Greenpeace USA senior researcher Charlie Cray. Dow Chemical declined to comment on the lawsuit. [includes rush transcript]
    Transcript

    This is a rush transcript. Copy may not be in its final form.

    JUAN GONZALEZ: Greenpeace has filed a federal lawsuit against Dow Chemical and Sasol North America for engaging in corporate espionage. Also named in the suit are the public relations firms Dezenhall Resources and Ketchum and the now-defunct firm Beckett Brown International. The lawsuit alleges that corporate spies stole thousands of confidential documents from Greenpeace, including campaign plans, employee records, phone records, and donor and media lists.

    AMY GOODMAN: For more on the lawsuit, we’re joined now from Washington, D.C. by Greenpeace senior researcher Charlie Cray.

    Charlie Cray, you’re talking about corporations that infiltrated Greenpeace around the country and stole all these documents. Explain exactly what happened.

    CHARLIE CRAY: Well, Dow Chemical and Sasol Resources, which used to be CONDEA Vista, are two large chemical companies that Greenpeace was campaigning against for their emissions of dioxin and other pollutants. And Dow had these public relations companies — these two companies did — that went to this firm, this former Secret Service, FBI, NSA people, who in turn pilfered Greenpeace documents, intruded on Greenpeace property, surveilled individuals, intercepted electronic communications, and it went on and on.

    And after this company fell apart, the former owner, who was left holding the bag, called a reporter, Jim Ridgeway, who published a story in Mother Jones in April of 2008, revealing some of these activities. When we read that, we launched an investigation. We collected as much evidence as we can, and we filed suit here in the District of Columbia on Monday. People can find the complaint at spygate.org, spygate.org, as well as a fraction of the supporting evidence. I mean, we have seen essentially a company that will — and the charges are laid out in the case — trespass, intrusion and RICO, which is, you know, conspiring to create an enterprise to commit illegal acts and the sharing of information among all these parties. And, you know, we’re going to take this issue to court, because we feel we have a very strong case against all these entities.

    AMY GOODMAN: Talk about how it all happened. I mean, this is massive, and it goes well beyond Greenpeace, when you look at these companies infiltrating your organization. Give examples for us.

    CHARLIE CRAY: Well, BBI, the defunct private investigation firm, hired subcontractors, including off-duty police officers, who went through Greenpeace’s trash to find useful documents on a regular basis over two years. They did this almost twice a week on average. They also used subcontractors who had colleagues who attempted to infiltrate Greenpeace as volunteers. They cased the Greenpeace office, looking for we don’t know what, but probably doing advance scouting for people who would then intrude upon the property. We found a list of door codes. We found a folder that said “wiretap info,” which was empty. We know this company has subtracted with a company called NetSafe, which is a company that was made of former NSA officials skilled in computer hacking and things like that. So, we really don’t know the full extent of this, but what we’ve seen is incredibly shocking. And our goal is to bring this out into the light of day and to stop it if it’s still going on.

    JUAN GONZALEZ: Now, in some cases, they actually — in one case that was reported, they actually used a Washington, D.C. police officer to assist them in this, and they were gathering credit card information, Social Security numbers of Greenpeace employees, as well?

    CHARLIE CRAY: We found that — we found that information. We found campaign plans. We found media plans, lists of media. You can imagine what a company like Dow can do with that kind of information, preempting Greenpeace strategies and so forth. And it wasn’t just Dow. There were dozens of companies that were clients of both these PR firms and the investigative firm.

    AMY GOODMAN: Charlie Cray, we want to thank you for being with us. And as Jim Ridgeway reported — and he’s the one who exposed GM spying on Ralph Nader decades ago, that was exposed in Congress, and there was a big settlement for Ralph Nader — he also reported spying targeted Friends of the Earth, GE Food Alert, the Center for Food Security, Fenton Communications. Charlie, thanks for being with us. Greenpeace is his organization. We’ll be covering Greenpeace and many other organizations from around the world as we broadcast from Cancún, Mexico, all next week at the U.N. global warming summit.

    The original content of this program is licensed under a Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 United States License. Please attribute legal copies of this work to democracynow.org. Some of the work(s) that this program incorporates, however, may be separately licensed. For further information or additional permissions, contact us.

    Friday, December 3, 2010

    Find this story at 3 December 2010

    Greenwald’s Interpretation of BOUNDLESSINFORMANT NSA Documents Is Oftentimes Wrong

    For those of us who know something about the National Security Agency (NSA) and who have at the same time been closely following the drip-drop page-at-a-time disclosures of NSA documents by Glenn Greenwald and Laura Poitras, this has been an enormously frustrating time. Many of the recent headlines in the newspapers, especially in Europe, promise much, but when you do a tear-down analysis of the contents there is very little of substance there that we did not already know. Last week’s expose by the Dutch newspaper NRC Handelsblad was just such an example, where with one single example everything that the newspaper claimed was brand new had (in fact) been published 17 years earlier by Dutch historian Dr. Cees Wiebes. Ah, what we do to sell newspapers.

    There should also be tighter fact-checking by the newspapers of their interpretation of the information that they are being spoon-fed before they rush to print.

    For instance, over the past month or so we have been fed once-a-week articles from newspapers France, Germany, Spain, Norway and now the Netherlands (does anyone see a pattern here) all based on a single NSA document from the agency’s BOUNDLESSINFORMANT database of metadata intercepts for a 30-day period from December 2012 to January 2013. The newspaper headlines all have claimed that the BOUNDLESSINFORMANT revealed that NSA was intercepting the telephone and internet communications of these countries. But an analysis of the SIGINT Activity Designators (SIGADs) listed in these documents reveals that NSA was not intercepting these communications, but rather the host nation intelligence services – to whit the BND in Germany, DGSE in France, the FE in Norway and the MIVD in the Netherlands. These agencies have secretly been proving this metadata material to NSA, although it is not known for how long.

    There are other factual problems with the interpretation that has been placed on these documents. It really would be nice if the individuals using these materials do a little research into NSA operational procedures before leaping to conclusions lest they be further embarrassed in the future by mistakes such as this.

    I am not the only person who has noted some of these glaring mistakes being made by the authors of the recent newspaper articles based on the BOUNDLESSINFORMANT document. Here is an insightful study done by a Dutch analyst who has been closely following the materials being leaked:

    Screenshots from BOUNDLESSINFORMANT can be misleading

    electrospaces.blogspot.nl

    November 23, 2013

    Over the last months, a number of European newspapers published screenshots from an NSA tool codenamed BOUNDLESSINFORMANT, which were said to show the number of data that NSA collected from those countries.

    Most recently, a dispute about the numbers mentioned in a screenshot about Norway urged Snowden-journalist Glenn Greenwald to publish a similar screenshot about Afghanistan. But as this article will show, Greenwald’s interpretation of the latter was wrong, which also raises new questions about how to make sense out of the screenshots about other countries.

    Norway vs Afghanistan

    On November 19, the website of the Norwegian tabloid Dagbladet published a BOUNDLESSINFORMANT screenshot which, according to the paper, showed that NSA apparently monitored 33 million Norwegian phone calls (although actually, the NSA tool only presents metadata).

    The report by Dagbladet was almost immediatly corrected by the Norwegian military intelligence agency Etteretningstjenesten (or E-tjenesten), which said that they collected the data “to support Norwegian military operations in conflict areas abroad, or connected to the fight against terrorism, also abroad” and that “this was not data collection from Norway against Norway, but Norwegian data collection that is shared with the Americans”.

    Earlier, a very similar explanation was given about the data from France, Spain and Germany. They too were said to be collected by French, Spanish and German intelligence agencies outside their borders, like in war zones, and then shared with NSA. Director Alexander added that these data were from a system that contained phone records collected by the US and NATO countries “in defense of our countries and in support of military operations”.

    Glenn Greenwald strongly contradicted this explanation in an article written for Dagbladet on November 22. In trying to prove his argument, he also released a screenshot from BOUNDLESSINFORMANT about Afghanistan (shown down below) and explained it as follows:
    “What it shows is that the NSA collects on average of 1.2-1.5 million calls per day from that country: a small subset of the total collected by the NSA for Spain (4 million/day) and Norway (1.2 million).

    Clearly, the NSA counts the communications it collects from Afghanistan in the slide labeled «Afghanistan» — not the slides labeled «Spain» or «Norway». Moreover, it is impossible that the slide labeled «Spain» and the slide labeled «Norway» only show communications collected from Afghanistan because the total collected from Afghanistan is so much less than the total collected from Spain and Norway.”

    Global overview

    But Greenwald apparently forgot some documents he released earlier:

    Last September, the Indian paper The Hindu published three less known versions of the BOUNDLESSINFORMANT global overview page, showing the total amounts of data sorted in three different ways: Aggregate, DNI and DNR. Each results in a slightly different top 5 of countries, which is also reflected in the colors of the heat map.

    In the overall (aggregated) counting, Afghanistan is in the second place, with a total amount of over 2 billion internet records (DNI) and almost 22 billion telephony records (DNR) counted:

    The screenshot about Afghanistan published by Greenwald only shows information about some 35 million telephony (DNR) records, collected by a facility only known by its SIGAD US-962A5 and processed or analysed by DRTBox. This number is just a tiny fraction of the billions of data from both internet and telephone communications from Afghanistan as listed in the global overview.

    Differences

    With these big differences, it’s clear that this screenshot about Afghanistan is not showing all data which NSA collected from that country, not even all telephony data. The most likely option is that it only shows metadata from telephone communications intercepted by the facility designated US-962A5.

    That fits the fact that this SIGAD denotes a sub- or even sub-sub-facility of US-962, which means there are more locations under this collection program. Afghanistan is undoubtedly being monitored by numerous SIGINT collection stations and facilities, so seeing only one SIGAD in this screenshot proves that it can never show the whole collection from that country.

    This makes that Greenwald’s argument against the data being collected abroad is not valid anymore (although there maybe other arguments against it). Glenn Greenwald was asked via Twitter to comment on the findings of this article, but there was no reaction.

    More questions

    The new insight about the Afghanistan data means that the interpretation of the screenshots about other countries can be wrong too. Especially those showing only one collection facility, like France, Spain and Norway (and maybe also Italy and The Netherlands), might not be showing information about that specific country, but maybe only about the specific intercept location.

    This also leads to other questions, like: are this really screenshots (why is there no classification marking)? Are they part of other documents or did Snowden himself made them? And how did he make the selection: by country, by facility, or otherwise?

    There are many questions about NSA capabilities and operations which Snowden cannot answer, but he can answer how exactly he got to these documents and what their proper context is. Maybe Glenn Greenwald also knows more about this, and if so, it’s about time to tell that part of the story too.

    Matthew M. Aid is the author of Intel Wars: The Secret History of the Fight Against Terror (January 2012) and The Secret Sentry, the definitive history of the National Security Agency. He is a leading intelligence historian and expert on the NSA, and a regular commentator on intelligence matters for the New York Times, the Financial Times, the National Journal, the Associated Press, CBS News, National Public Radio (NPR) and many others. He lives in Washington, DC.

    November 24, 2013

    Find this story at 24 November 2013

    NRC over NSA

    Een van de elementen op de kaart van de NRC van zaterdag zijn de rode stippen die de vestigingen van SCS aangeven. Dat bestand is hetzelfde als dat van de kaart in Spiegel, waarvan een ongecensureerde versie  beschikbaar is bij Cryptome.

    Die kaart is uit augustus 2010. Als je de kaarten naast elkaar legt kom je een eind bij het vaststellen welke plaatsen NRC zwart heeft gemaakt. Wat betreft Europa kom je dan bijv. op het rijtje Bakoe, Kiev, Madrid , Moskou en
    Tblisi.

    x-keyscore servers op Cryptome

    SCS sites op Cryptome

    NRC driver 1

    Europeans Shared Spy Data With U.S.; Phone Records Collected Were Handed Over to Americans to Help Protect Allied Troops in War Zones

    Millions of phone records at the center of a firestorm in Europe over spying by the National Security Agency were secretly supplied to the U.S. by European intelligence services—not collected by the NSA, upending a furor that cast a pall over trans-Atlantic relations.

    Widespread electronic spying that ignited a political firestorm in Europe was conducted by French and European intelligence services and not by the National Security Agency, as was widely reported in recent days. Adam Entous reports on the News Hub. Photo: AP.

    The revelations suggest a greater level of European involvement in global surveillance, in conjunction at times with the NSA. The disclosures also put European leaders who loudly protested reports of the NSA’s spying in a difficult spot, showing how their spy agencies aided the Americans.

    The phone records collected by the Europeans—in war zones and other areas outside their borders—were shared with the NSA as part of efforts to help protect American and allied troops and civilians, U.S. officials said.

    European leaders remain chagrined over revelations that the U.S. was spying on dozens of world leaders, including close allies in Europe. The new disclosures were separate from those programs.

    But they nevertheless underline the complexities of intelligence relationships, and how the U.S. and its allies cooperate in some ways and compete in others.
    More
    NSA Said to View 23 Countries Closer U.S. Intelligence Partners Than Israel
    Senate to Review All U.S. Spying
    Spying Revelations Add Hurdle to U.S.-EU Trade Talks
    Germany Warns of Repercussions from U.S. Spying
    Obama Unaware as NSA Spied on World Leaders

    “That the evil NSA and the wicked U.S. were the only ones engaged in this gross violation of international norms—that was the fairy tale,” said James Lewis, a former State Department official, now a technology-policy specialist at the Center for Strategic and International Studies. “It was never true. The U.S’s behavior wasn’t outside the norm. It is the norm.”

    Consecutive reports in French, Spanish and Italian newspapers over the past week sparked a frenzy of finger-pointing by European politicians. The reports were based on documents leaked by former NSA contractor Edward Snowden and purportedly showed the extent to which the NSA sweeps up phone records in those countries.

    France’s Le Monde said the documents showed that more than 70 million French phone records between early December 2012 and early January 2013 were collected by the NSA, prompting Paris to lodge a protest with the U.S. In Spain, El Mundo reported that it had seen NSA documents that showed the U.S. spy agency had intercepted 60.5 million Spanish phone calls during the same time period.

    U.S. officials initially responded to the reports by branding them as inaccurate, without specifying how. On Tuesday, The Wall Street Journal reported that the data cited by the European news reports wasn’t collected by the NSA, but by its European partners.

    U.S. officials said the data was provided to the NSA under long-standing intelligence sharing arrangements.

    In a congressional hearing Tuesday, the National Security Agency director, Gen. Keith Alexander, confirmed the broad outlines of the Journal report, saying that the specific documents released by Mr. Snowden didn’t represent data collected by the NSA or any other U.S. agency and didn’t include records from calls within those countries.
    Phone Trouble

    Politicians have reacted to recent disclosures about U.S. surveillance programs based on leaks from former National Security Agency contractor Edward Snowden.
    View Graphics

    He said the data—displayed in computer-screen shots—were instead from a system that contained phone records collected by the U.S. and North Atlantic Treaty Organization countries “in defense of our countries and in support of military operations.”

    He said the conclusion that the U.S. collected the data “is false. And it’s false that it was collected on European citizens. It was neither.”

    The U.S. until now had been silent about the role of European partners in these collection efforts so as to protect the relationships.

    French officials declined to comment.

    A Spanish official said that Spain’s intelligence collaboration with the NSA has been limited to theaters of operations in Mali, Afghanistan and certain international operations against jihadist groups. The so-called metadata published in El Mundo was gathered during these operations, not in Spain.

    The Italian Embassy in Washington didn’t immediately respond to a request for comment.

    The revelations that the phone data were collected by European intelligence services rather than NSA could spark a backlash against the same politicians who had been pointing their fingers at the U.S.—although that response could be tempered by assurances that the data were collected abroad and not domestically.

    A U.S. analysis of the document published by Le Monde concluded the phone records the French had collected were actually from outside of France, then were shared with the U.S. The data don’t show that the French spied on their own people inside France.

    U.S. intelligence officials said they hadn’t seen the documents cited by El Mundo, but that the data appear to come from similar information the NSA obtained from Spanish intelligence agencies documenting their collection efforts abroad.

    At Tuesday’s House Intelligence Committee hearing, lawmakers also pressed Gen. Alexander and the Director of National Intelligence James Clapper on the NSA’s tapping of world leaders’ phone conversations, including German Chancellor Angela Merkel.

    Asked whether U.S. allies spy on the U.S., Mr. Clapper said, “Absolutely.”

    Rep. Adam Schiff (D., Calif.) asked why Congress hadn’t been informed when U.S. spies tapped a world leader’s telephone. Mr. Clapper said Congress isn’t told about each and every “selector,” the intelligence term for a phone number or other information that would identify an espionage target.

    “Not all selectors are equal,” Mr. Schiff responded, especially “when the selector is the chancellor of an allied nation.”

    The Wall Street Journal reported Monday that President Barack Obama didn’t know about NSA’s tapping of Ms. Merkel’s phone—which stretched back as far as 2002—until a review this summer turned it up.

    Mr. Clapper said that intelligence agencies follow the priorities set by the president and key departments, but they don’t necessarily provide top officials with details on how each requirement is being fulfilled.

    The White House does, however, see the final product, he said.

    Reporting to policy makers on the “plans and intentions” of world leaders is a standard request to intelligence agencies like the NSA, Mr. Clapper said. The best way to understand a foreign leader’s intentions, he said, is to obtain that person’s communications.

    Privately, some intelligence officials disputed claims that the president and top White House officials were unaware of how such information is obtained.

    “If there’s an intelligence report that says the leader of this country is likely to say X or Y, where do you think that comes from?” the official said.

    The House Intelligence Committee chairman, Rep. Mike Rogers (R., Mich.) remained a staunch defender of the NSA’s operations.

    “I am a little concerned about where we are—that we’ve decided that we’re going to name our intelligence services at the earliest opportunity as the bad guys in the process of trying to collect information lawfully and legally, with the most oversight that I’ve ever seen,” he said. “We’re the only intelligence service in the world that is forced to go to a court before they even collect on foreign intelligence operations, which is shocking to me.”

    —Christopher Bjork in Madrid and Stacy Meichtry in Paris contributed to this article.

    By Adam Entous and Siobhan Gorman connect
    Updated Oct. 29, 2013 7:31 p.m. ET

    Find this story at 29 October 2013

    ©2013 Dow Jones & Company, Inc.

    Europe shared spy data with US; Europe spy services ‘shared phone data’

    The NSA says European spy services shared phone data with it, and reports alleging otherwise are ‘false’.

    MILLIONS of phone records at the centre of a firestorm in Europe over spying by the National Security Agency were secretly supplied to the US by European intelligence services – not collected by the NSA, upending a furore that cast a pall over trans-Atlantic relations.

    The revelations suggest a greater level of European involvement in global surveillance, in conjunction at times with the NSA. The disclosures also put European leaders who loudly protested reports of the NSA’s spying in a difficult spot, showing how their spy agencies aided the Americans.

    The phone records collected by the Europeans – in war zones and other areas outside their borders – were shared with the NSA as part of efforts to help protect American and allied troops and civilians, US officials said.

    European leaders remain chagrined over revelations that the US was spying on dozens of world leaders, including close allies in Europe.

    The new disclosures were separate from those programs, but they underline the complexities of intelligence relationships, and how the US and its allies co-operate in some ways and compete in others.

    “That the evil NSA and the wicked US were the only ones engaged in this gross violation of international norms -that was the fairy tale,” said James Lewis, a former State Department official, now a technology-policy specialist at the Centre for Strategic and International Studies.

    “It was never true. The US’s behaviour wasn’t outside the norm. It is the norm.”

    Consecutive reports in French, Spanish and Italian newspapers over the past week sparked a frenzy of finger-pointing by European politicians. The reports were based on documents leaked by former NSA contractor Edward Snowden and purportedly showed the extent to which the NSA sweeps up phone records in those countries.

    France’s Le Monde said the documents showed that more than 70 million French phone records between early December last year and early January this year were collected by the NSA, prompting Paris to lodge a protest with the US. In Spain, El Mundo reported that it had seen NSA documents that showed the US spy agency had intercepted 60.5 million Spanish phone calls during the same time period.

    US officials initially responded to the reports by branding them as inaccurate, without specifying how. Late yesterday, The Wall Street Journal reported that the data cited by the European news reports wasn’t collected by the NSA but by its European partners.

    US officials said the data was provided to the NSA under long-standing intelligence sharing arrangements.

    Hours later, in a congressional hearing, the National Security Agency director, General Keith Alexander, confirmed the broad outlines of the Journal report, saying the specific documents released by Mr Snowden didn’t represent data collected by the NSA or any other US agency and didn’t include records from calls within those countries.

    He said the data, displayed in computer-screen shots, was instead from a system that contained phone records collected by the US and NATO countries “in defence of our countries and in support of military operations”.

    He said conclusions the US collected the data were “false. And it’s false that it was collected on European citizens. It was neither.”

    The US until now had been silent about the role of European partners in these collection efforts to protect the relationships. French officials declined to comment.

    A Spanish official said Spain’s intelligence collaboration with the NSA has been limited to theatres of operations in Afghanistan, Mali and international operations against jihadist groups. The data published in El Mundo was gathered during these operations, not in Spain.

    At yesterday’s house intelligence committee hearing, politicians pressed General Alexander and Director of National Intelligence James Clapper on the NSA’s tapping of world leaders’ phone conversations, including the German Chancellor, Angela Merkel.

    Asked whether US allies spy on the US, Mr Clapper said: “Absolutely.”

    Democrat congressman Adam Schiff asked why congress had not been informed when US spies tapped a world leader’s telephone.

    Mr Clapper said congress wasn’t told about each and every “selector”, the intelligence term for a phone number or other information that would identify an espionage target.

    “Not all selectors are equal,” Mr Schiff responded, especially “when the selector is the chancellor of an allied nation.”

    Mr Clapper said intelligence agencies followed the priorities set by the President and key departments, but did not necessarily provide top officials with details on how each requirement was being fulfilled.

    The White House did, however, see the final product, he said.

    Reporting to policymakers on the “plans and intentions” of world leaders was a standard request to intelligence agencies such as the NSA, Mr Clapper said, and the best way to understand a foreign leader’s intentions was to obtain their communications.

    Privately, some intelligence officials disputed claims that the President and top White House officials were unaware of how such information was obtained.

    “If there’s an intelligence report that says the leader of this country is likely to say X or Y, where do you think that comes from?” the official said

    Adam Entous and Siobhan Gorman
    The Wall Street Journal
    October 31, 2013 12:00AM

    Find this story at 31 October 2013

    © www.theaustralian.com.au

    NSA spy row: France and Spain ‘shared phone data’ with US

    Spain and France’s intelligence agencies carried out collection of phone records and shared them with NSA, agency says

    European intelligence agencies and not American spies were responsible for the mass collection of phone records which sparked outrage in France and Spain, the US has claimed.

    General Keith Alexander, the head of the National Security Agency, said reports that the US had collected millions of Spanish and French phone records were “absolutely false”.

    “To be perfectly clear, this is not information that we collected on European citizens,” Gen Alexander said when asked about the reports, which were based on classified documents leaked by Edward Snowden, the former NSA contractor.

    Shortly before the NSA chief appeared before a Congressional committee, US officials briefed the Wall Street Journal that in fact Spain and France’s own intelligence agencies had carried out the surveillance and then shared their findings with the NSA.

    The anonymous officials claimed that the monitored calls were not even made within Spanish and French borders and could be surveillance carried on outside of Europe.
    Related Articles
    GCHQ monitors luxury hotel bookings made by foreign diplomats 17 Nov 2013
    US spy chief defends spying on foreign leaders 30 Oct 2013
    Germany, France and Spain ‘were all spying on citizens’ 01 Nov 2013
    Anger in France over claims that NSA spied on politicians, business leaders as well as terrorists 21 Oct 2013
    NSA spying: US should not be collecting calls on allies, says top senator 28 Oct 2013
    Russia ‘spied on G20 leaders with USB sticks’ 29 Oct 2013

    In an aggressive rebuttal of the reports in the French paper Le Monde and the Spanish El Mundo, Gen Alexander said “they and the person who stole the classified data [Mr Snowden] do not understand what they were looking at” when they published slides from an NSA document.

    The US push back came as President Barack Obama was said to be on the verge of ordering a halt to spying on the heads of allied governments.

    The White House said it was looking at all US spy activities in the wake of leaks by Mr Snowden but was putting a “special emphasis on whether we have the appropriate posture when it comes to heads of state”.

    Mr Obama was reported to have already halted eavesdropping at UN’s headquarters in New York.

    German officials said that while the White House’s public statements had become more conciliatory there remained deep wariness and that little progress had been made behind closed doors in formalising an American commitment to curb spying.

    “An agreement that you feel might be broken at any time is not worth very much,” one diplomat told The Telegraph.

    “We need to re-establish trust and then come to some kind of understanding comparable to the [no spy agreement] the US has with other English speaking countries.”

    Despite the relatively close US-German relations, the White House is reluctant to be drawn into any formal agreement and especially resistant to demands that a no-spy deal be expanded to cover all 28 EU member states.

    Viviane Reding, vice-president of the European Commission and EU justice commissioner, warned that the spying row could spill over and damage talks on a free-trade agreement between the EU and US.

    “Friends and partners do not spy on each other,” she said in a speech in Washington. “For ambitious and complex negotiations to succeed there needs to be trust among the negotiating partners. It is urgent and essential that our US partners take clear action to rebuild trust.”

    A spokesman for the US trade negotiators said it would be “unfortunate to let these issues – however important – distract us” from reaching a deal vital to freeing up transatlantic trade worth $3.3 billion dollars (£2bn) a day.

    James Clapper, America’s top national intelligence, told a Congressional hearing yesterday the US does not “spy indiscriminately on the citizens of any country”.

    “We do not spy on anyone except for valid foreign intelligence purposes, and we only work within the law,” Mr Clapper said. “To be sure on occasions we’ve made mistakes, some quite significant, but these are usually caused by human error or technical problems.”

    Pressure from European leaders was added to as some of the US intelligence community’s key Congressional allies balked at the scale of surveillance on friendly governments.

    Dianne Feinstein, the chair of powerful Senate intelligence committee, said she was “totally opposed” to tapping allied leaders and called for a wide-ranging Senate review of the activities of US spy agencies.

    “I do not believe the United States should be collecting phone calls or emails of friendly presidents and prime ministers,” she said.

    John Boehner, the Republican speaker of the house and a traditional hawk on national security, said US spy policy was “imbalanced” and backed calls for a review.

    Mr Boehner has previously been a staunch advocate of the NSA and faced down a July rebellion by libertarian Republicans who tried to pass a law significantly curbing the agency’s power.

    By Raf Sanchez, Peter Foster in Washington

    8:35PM GMT 29 Oct 2013

    Find this story at 29 October 2013

    © Copyright of Telegraph Media Group Limited 2013

    ‘We didn’t spy on the Europeans, their OWN governments did’, says NSA (but still no apology for tapping German chancellor Merkel’s phone)

    Gen. Keith Alexander, the National Security Agency director, says foreign governments spied on their own people and shared data with the U.S.
    The NSA had been accused of snooping on 130.5 million phone calls in France and Spain, and keeping computerized records
    Sen. Dianne Feinstein said newspapers in Europe ‘got it all wrong’

    Alexander’s denial will fall heavily on the fugitive leaker Edward Snowden and his journalist cohorts, whom the NSA chief said ‘did not understand what they were looking at’
    The National Security Agency’s director flatly denied as ‘completely false’ claims that U.S. intelligence agencies monitored tens of millions of phone calls in France and Spain during a month-long period beginning in late 2012.

    Gen. Keith Alexander contradicted the news reports that said his NSA had collected data about the calls and stored it as part of a wide-ranging surveillance program, saying that the journalists who wrote them misinterpreted documents stolen by the fugitive leaker Edward Snowden.

    And a key Democratic senator added that European papers that leveled the allegations ‘got it all wrong’ with respect to at least two countries – saying that it was those nations’ intelligence services that collected the data and shared it with their U.S. counterparts as part of the global war on terror.

    Protests: (Left to right) NSA Deputy Director Chris Inglis, NSA Director General Keith Alexander and DNI James Clapper look on as a protestor disrupts the Capitol Hill hearing

    National Security Agency Director Gen. Keith Alexander testified Tuesday that the governments of France and Spain conducted surveillance on their own citizens’ phone conversations, and then shared the intelligence data with the U.S.

    On Monday newspapers in three countries published computer-screen images, reportedly provided by Snowden, showing what appeared to be data hoovered up by the United States from European citizens’ phone calls.

    But Alexander testified in a House Intelligence Committee hearing that ’those screenshots that show – or lead people to believe – that we, the NSA, or the U.S., collect that information is false.’

    ‘The assertions by reporters in France, Spain and Italy that NSA collected tens of millions of phone calls are completely false,’ Alexander said.

    According to the French newspaper Le Monde and the Spanish daily El Mundo, the NSA had collected the records of at least 70 million phone calls in France and another 60.5 million in Spain between December and January.

    Italy’s L’Espresso magazine also alleged, with help from Snowden, that the U.S. was engaged in persistent monitoring of Italy’s telecommunications networks.

    General Alexander denied it all.

    ‘To be perfectly clear, this is not information that we collected on European citizens. It represents information that we and our NATO allies have collected in defense of our countries and in support of military operations.’

    Reporters, he added, ‘cite as evidence screen shots of the results of a web tool used for data management purposes, but both they and the person who stole the classified data did not understand what they were looking at.’

    President Barack Obama said he is instituting a complete review of U.S. intelligence procedures in the wake of stinging allegations that the NSA has been peeping on foreign leaders through their phones and email accounts

    California Democratic Sen. Dianne Feinstein, who chairs the Senate Intelligence Committee, said Tuesday that ’the papers got it all wrong on the two programs, France and Germany.’

    ‘This was not the United States collecting on France and Germany. This was France and Germany collecting. And it had nothing to do with their citizens, it had to do with collecting in NATO areas of war, like Afghanistan.’

    Feinstein on Monday called for a complete review of all the U.S. intelligence community’s spying programs, saying that ‘Congress needs to know exactly what our intelligence community is doing.’

    In the weekend’s other intelligence bombshell, the U.S. stood accused of snooping on German Chancellor Angela Merkel’s cell phone and spying on Mexican President Felipe Calderon’s private emails.

    But Director of National Intelligence James Clapper told the committee that spying on foreign leaders is nothing new.

    ‘That’s a hardy perennial,’ he said, ‘and as long as I’ve been in the intelligence business, 50 years, leadership intentions, in whatever form that’s expressed, is kind of a basic tenet of what we are to collect and analyze.’

    ‘It’s one of the first things I learned in intel school in 1963,’ he assured the members of Congress, saying that the U.S. routinely spies on foreign leaders to ascertain their intentions, ‘no matter what level you’re talking about. That can be military leaders as well.’

    Clapper hinted that committee members had been briefed on such programs, saying that in cases where the NSA is surveilling foreign leaders, ’that should be reported to the committee … in considerable detail’ as a ‘significant’ intelligence activity over which Congress has oversight.’

    He added that ‘we do only what the policymakers, writ large, have actually asked us to do.’

    Republican committee chair Mike Rogers of Michigan began the hearing by acknowledging that ‘every nation collects foreign intelligence’ and ’that is not unique to the United States’.

    Clapper pleaded with the panel to think carefully before restricting the government’s ability to collect foreign intelligence, warning that they would be ‘incurring greater risks’ from overseas adversaries.

    Gen. Alexander dispensed with his prepared statement and spoke ‘from the heart,’ saying that his agency would rather ’take the beatings’ from reporters and the public ’than … give up a program’ that would prevent a future attack on the nation.

    The Wall Street Journal reported Tuesday afternoon that other U.S. officials had confirmed Alexander’s version of events, and that the electronic spying in France and Spain was carried out by those nations’ governments.

    The resulting phone records, they said, were then shared with the NSA as part of a program aimed at keeping U.S. military personnel and civilians safe in areas of military conflict.

    None of the nations involved would speak to the Journal about their own level of involvement in a scandal that initially touched only the U.S., but which now promises to embroil intelligence services on a global scale.

    By David Martosko, U.s. Political Editor

    PUBLISHED: 21:45 GMT, 29 October 2013 | UPDATED: 10:59 GMT, 30 October 2013

    Find this story at 29 October 2013

    © Associated Newspapers Ltd

     

    NSA Powerpoint Slides on BOUNDLESSINFORMANT

    These 4 slides are from the powerpoint “BOUNDLESSINFORMANT: Describing Mission Capabilities from Metadata Records.” They include the cover page and pages 3, 5, and 6 of the presentation. The powerpoint, leaked to the Guardian newspaper’s Glenn Greenwald by Edward Snowden, was first released by the Guardian newspaper on June 8, 2013 at this web page: http://www.guardian.co.uk/world/interactive/2013/jun/08/nsa-boundless-informant-data-mining-slides

    Also included with this collection is a “heat map” of parts of the world most subject to surveillance by Boundless Informant. This image was embedded in the Guardian’s story, which described Boundless Informant as “the NSA’s secret tool to track global surveillance data,” which collected “almost 3 billion pieces of intelligence from US computer networks over a 30-day period ending in March 2013.” http://www.theguardian.com/world/2013/jun/08/nsa-boundless-informant-global-datamining

    UNCLASSIFIED//FOR OFFICIAL USE ONLY
    BOUNDLESSINFORMANT – Frequently Asked Questions
    09-06-2012

     

    (U/FOUO) Questions

     

    1) What is BOUNDLESSINFORMANT! What is its purpose?

    2) Who are the intended users of the tool?

    3) What are the different views?

    4) Where do you get your data?

    5) Do you have all the data? What data is missing?

    6) Why are you showing metadata record counts versus content?

    7) Do you distinguish between sustained collect and survey collect?

    8) What is the technical architecture for the tool?

    9) What are some upcoming features/enhancements?

    1 0) How are new features or views requested and prioritized?

    1 1) Why are record counts different from other tools like ASDF and What’s On Cover?

    12) Why is the tool NOFORN? Is there a releasable version?

    13) How do you compile your record counts for each country?

     

    Note: This document is a work-in-progress and will be updated frequently as additional
    questions and guidance are provided.

    1) (U) What is BOUNDLESSINFORMANT? What is its purpose?

    (U//FOUO) BOUNDLESSINFORMANT is a GAO prototype tool for a self-documenting SIGINT
    system. The purpose of the tool is to fundamentally shift the manner in which GAO describes its
    collection posture. BOUNDLESSINFORMANT provides the ability to dynamically describe GAO’s
    collection capabilities (through metadata record counts) with no human intervention and graphically
    display the information in a map view, bar chart, or simple table. Prior to

    BOUNDLESSINFORMANT, the method for understanding the collection capabilities of GAO’s
    assets involved ad hoc surveying of repositories, sites, developers, and/or programs and offices. By
    extracting information from every DNI and DNR metadata record, the tool is able to create a near real-
    time snapshot of GAO’s collection capability at any given moment. The tool allows users to select a
    country on a map and view the metadata volume and select details about the collection against that
    country. The tool also allows users to view high level metrics by organization and then drill down to a
    more actionable level – down to the program and cover term.

    Sample Use Cases

    • (U//FOUO) How many records are collected for an organizational unit (e.g. FORNSAT)?

    • (U//FOUO) How many records (and what type) are collected against a particular country?

    • (U//FOUO) Are there any visible trends for the collection?

    • (U//FOUO) What assets collect against a specific country? What type of collection?

    • (U//FOUO) What is the field of view for a specific site? What countriees does it collect
    against? What type of collection?

    2) (U) Who are the intended users of the tool?

    • (U//FOUO) Mission and collection managers seeking to understand output characteristics
    of a site based on what is being ingested into downstream repositories. .

    (U//FOUO) Strategic Managers seeking to understand top level metrics at the

     

    organization/office level or seeking to answer data calls on NSA collection capability.

    BOUNDLESSINFORMANT – FAQ Page 1 o:

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

     

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

    BOUNDLESSINFORMANT – Frequently Asked Questions

    09-06-2012

    • (U//FOUO) Analysts looking for additional sites to task for coverage of a particular

    technology within a specific country.

    3) What are the different views?

    (U//FOUO) Map View – The Map View is designed to allow users to view overall DNI, DNR, or
    aggregated collection posture of the agency or a site. Clicking on a country will show the collection
    posture (record counts, type of collection, and contributing SIGADs or sites) against that particular
    country in addition to providing a graphical display of record count trends. In order to bin the records
    into a country, a normalized phone number (DNR) or an administrative region atom (DNI) must be
    populated within the record. Clicking on a site (within the Site Specific view) will show the viewshed
    for that site – what countries the site collects against.

    (U//FOUO) Org View – The Organization View is designed to allow users to view the metadata record
    counts by organizational structure (i.e. GAO – SSO – RAM-A – SPINNERET) all the way down to the
    cover term. Since it’s not necessary to have a normalized number or administrative region populated,
    the numbers in the Org View will be higher than the numbers in the Map View.

    (U//FOUO) Similarity View – The Similarity View is currently a placeholder view for an upcoming
    feature that will graphically display sites that are similar in nature. This can be used to identify areas
    for a de-duplication effort or to inform analysts of additional SIGADs to task for queries (similar to
    Amazon’s “if you like this item, you’ll also like these” feature).

     

    4) (U) Where do you get your data?

    (U//FOUO) BOUNDLESSINFORMANT extracts metadata records from GM-PLACE post-
    FALLOUT (DNI ingest processor) and post-TUSKATTIRE (DNR ingest processor). The records are
    enriched with organization information (e.g. SSO, FORNSAT) and cover term. Every valid DNI and
    DNR metadata record is aggregated to provide a count at the appropriate level. See the different views
    question above for additional information.

     

    5) (U) Do you have all the data? What data is missing?

    • (U//FOUO) The tool resides on GM-PLACE which is only accredited up to TS//SI//NOFORN.
    Therefore, the tool does not contain ECI or FISA data.

    • (U//FOUO) The Map View only shows counts for records with a valid normalized number
    (DNR) or administrative region atom (DNI).

    • (U//FOUO) Only metadata records that are sent back to NSA-W through FASCIA or
    FALLOUT are counted. Therefore, programs with a distributed data distribution system (e.g.
    MUSCULAR and Terrestrial RF) are not currently counted.

    • (U//FOUO) Only SIGINT records are currently counted. There are no ELINT or other “INT”
    records included.

    6) (U) Why are you showing metadata record counts versus content?

    (U//FOUO)

    7) (U ) Do you distin g uish between sustained collect and survey collect?

    (U//FOUO) The tool currently makes no distinction between sustained collect and survey collect. This
    feature is on the roadmap.

     

    BOUNDLESSINFORMANT – FAQ Page 2 o:

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

     

    UNCLASSIFIED//FOR OFFICIAL USE ONLY
    BOUNDLESSINFORMANT – Frequently Asked Questions
    09-06-2012

     

    8) What is the technical architecture for the tool?

    Click here for a graphical view of the tool’s architecture

    (U//FOUO) DNI metadata (ASDF), DNR metadata (FASCIA) delivered to Hadoop
    Distributed File System (HDFS) on GM-PLACE

    (U//FOUO) Use Java MapReduce job to transform/filter and enrich FASCIA/ASDF data with
    business logic to assign organization rules to data

    (U//FOUO) Bulk import of DNI/DNR data (serialized Google Protobuf objects) into
    Cloudbase (enabled by custom aggregators)

    (U//FOUO) Use Java web app (hosted via Tomcat) on MachineShop (formerly Turkey Tower)
    to query Cloudbase

    (U//FOUO) GUI triggers queries to CloudBase – GXT (ExtGWT)

     

    9) What are some upcoming features/enhancements?

    • (U//FOUO) Add technology type (e.g. JUGGERNAUT, LOPER) to provide additional
    granularity in the numbers

    (U//FOUO) Add additional details to the Differential view

    (U//FOUO) Refine the Site Specific view

    (U//FOUO) Include CASN information

    (U//FOUO) Add ability to export data behind any view (pddg,sigad,sysid,casn,tech,count)

    (U//FOUO) Add in selected (vs. unselected) data indicators

    (U//FOUO) Include filter for sustained versus survey collection

     

    10) How are new features or views requested and prioritized?

    (U//FOUO) The team uses Flawmill to accept user requests for additional functionality or
    enhancements. Users are also allowed to vote on which functionality or enhancements are most
    important to them (as well as add comments). The BOUNDLESSINFORMANT team will periodically
    review all requests and triage according to level of effort (Easy, Medium, Hard) and mission impact
    (High, Medium, Low). The team will review the queue with the project champion and government
    steering committee to be added onto the BOUNDLESSINFORMANT roadmap.

    1 1) Why are record counts different from other tools like ASDF and What’s On

    Cover?

    (U//FOUO) There are a number of reasons why record counts may vary. The purpose of the tool is to
    provide

     

    BOUNDLESSINFORMANT – FAQ

     

    Page 3 o:

     

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

    July 13, 2012

    Find this story at  txt

    Find this story at jpeg

    Find this story at pdf

    Order of Battle of the CIA-NSA Special Collection Service (SCS)

    The following page from an August 13, 2010 NSA powerpoint presentation on the joint CIA-NSA clandestine SIGINT unit known as the Special Collection Service (SCS) appeared on the Der Spiegel website last week. It has since be replaced by a heavily redacted version of the same page which deletes the locations of all SCS listening posts outside of Europe.

    The page shows the locations of all SCS listening posts around the world as of August 2010, of which 74 were active, 3 were listed as being dormant, 14 were unmanned remote controlled stations, three sites were then being surveyed, and two were listed as being “technical support activities.”

    In Europe, SCS sites were located at Athens and embassy annex, Baku, Berlin, Budapest, RAF Croughton (UK), Frankfurt, Geneva, Kiev, Madrid, Milan, Moscow and embassy annex, Paris, Prague, Pristina, Rome, Sarajevo, Sofia, Tblisi, Tirana, Vienna and embassy annex, and Zagreb.

    In Asia SCS were located at Bangkok and PSA, Beijing, Chengdu, Chiang Mai, Hong Kong, Jakarta, Kuala Lumpur, Manila, Phnom Penh, Rangoon, Shanghai, and Taipei.

    In the Middle East and North Africa (MENA) region, SCS sites were located at Abu Dhabi, Algiers, Amman, Amarah, Ankara, Baghdad and embassy annex, Basrah, Beirut, Benghazi, Cairo, Damascus, Istanbul, Jeddah, Khartoum, Kirkuk, Kuwait City, Manama, Mosul, Riyadh, Sana’a, Sulaymaniyah, Talil(?), “Tehran-in-Exile”, and Tripoli.

    In South Asia, SCS sites were located at one site illegible, Islamabad, Herat, Kabul and embassy annex, Karachi, Lahore, New Delhi, and Peshawar.

    In Africa, SCS sites were located inside the U.S. embassies in Abuja, Addis Ababa, Bamako, Lagos, Nairobi, Monrovia, Kinshasa, Lusaka, and Luanda.

    In Central America and the Caribbean, SCS sites were located at Guadalajara, Guatemala City, Havana, Hermosillo, Managua, Mexico City, Monterrey, Panama City, San Jose, and Tegucigalpa.

    And in South America, SCS sites were located in Brasilia, Bogota, Caracas, La Paz, Merida and Quito.

    Any corrections to the above would be gratefully received.

    Matthew M. Aid is the author of Intel Wars: The Secret History of the Fight Against Terror (January 2012) and The Secret Sentry, the definitive history of the National Security Agency. He is a leading intelligence historian and expert on the NSA, and a regular commentator on intelligence matters for the New York Times, the Financial Times, the National Journal, the Associated Press, CBS News, National Public Radio (NPR) and many others. He lives in Washington, DC.

    October 28, 2013

    Find this story at 28 October 2013

    Der Spiegel pdf 

    Der Spiegel unredacted image

    Checking in with ‘Royal Concierge’: GCHQ ran hotel surveillance ring to spy on diplomats and delegations

    Britain’s secret listening service, GCHQ, uses a spying system codenamed “Royal Concierge” to carry out detailed surveillance on foreign diplomats and government delegations at more than 350 hotels across the world, Germany’s Der Spiegel magazine reported on Sunday.

    The disclosures, based on intelligence data leaked by the US whistleblower Edward Snowden, follow reports that British intelligence installs secret software to spy on selected companies and revelations earlier this month by The Independent that GCHQ operates a listening post on the roof of the UK’s Berlin embassy.

    Der Spiegel said that GCHQ used “Royal Concierge” to spy on the booking arrangements of the hotels involved in order to gain information about the travel plans of diplomats and government delegations. It said the system was used to “prepare” their hotel rooms for more detailed surveillance.

    The magazine said the information gained enabled the GCHQ’s so-called “technical departments” to bug the telephones and computers used by diplomats in their hotel rooms. It said “Royal Concierge” was also used to prepare the ground for the setting up of the GCHQ’s so-called “Humint Operations” – an abbreviation for “Human Intelligence” surveillance involving the deployment of agents to spy on diplomats.

    Der Spiegel did not say which hotels were targeted. Contacted by the magazine, a spokesman for GCHQ said he could “neither confirm nor deny” Der Spiegel’s report.

    The disclosures are the latest in a series of embarrassing revelations about the covert activities of GCHQ and its US counterpart, the National Security Agency, leaked to the media by fugitive whistleblower Edward Snowden.

    The intelligence leaks have revealed the existence of the GCHQ/NSA “Tempora” spying operation involving the mass surveillance of Internet, phone and email traffic which crosses the Atlantic through undersea fibre-optic cables. The British government has claimed to have had no knowledge of the programme.

    Disclosures published by Der Spiegel last week said that GCHQ used doctored websites including those from the business network LinkedIn to install surveillance software on the computers of unwitting companies and individuals.

    The system was said to be codenamed “Quantum Insert”. One of the targeted companies was identified as the part-state-owned Belgian telecommunications firm Belgacom. Another was a concern named Mach, which is used by several mobile phone companies to coordinate international roaming traffic.

    In Germany, disclosures that the NSA used an embassy listening post to bug Chancellor Angela Merkel’s mobile phone were followed a fortnight ago by an investigation by The Independent which revealed that GCHQ runs a similar listening post.

    German MPs have said they are outraged that US and British intelligence spies on the politicians of a country which is their key European ally. They have called for the setting up of no-spying agreements between Washington, London and Berlin.

    Germany’s two main political parties announced yesterday that they had agreed to set up a cyber security centre to establish how networks could be better protected from invasive surveillance.

    Tony Paterson
    Sunday, 17 November 2013

    Find this story at 17 November 2013

    © independent.co.uk

    ‘Royal Concierge’ GCHQ Monitors Diplomats’ Hotel Bookings

    Britain’s GCHQ intelligence service monitors diplomats’ travels using a sophisticated automated system that tracks hotel bookings. Once a room has been identified, it opens the door to a variety of spying options.

    When diplomats travel to international summits, consultations and negotiations on behalf of governments, they generally tend to spend the night at high-end hotels. When they check-in, in addition to a comfortable room, they sometimes get a very unique form of room service that they did not order: a thorough monitoring by the British Government Communications Headquarters, or GCHQ in short.

    Intelligence service documents from the archive of NSA whistleblower Edward Snowden show that, for more than three years, GCHQ has had a system to automatically monitor hotel bookings of at least 350 upscale hotels around the world in order to target, search and analyze reservations to detect diplomats and government officials.

    The top secret program carries the codename “Royal Concierge,” and has a logo showing a penguin wearing a crown, a purple cape and holding a wand. The penguin is apparently meant to symbolize the black and white uniform worn by staff at luxury hotels.

    The aim of the program is to inform GCHQ, at the time of the booking, of the city and hotel a foreign diplomat intends to visit. This enables the “technical operations community” to make the necessary preparations in a timely manner, the secret documents state. The documents cast doubt on the truthfulness of claims made last week to a committee in parliament by the heads of the three British intelligence agencies: Namely that the exclusive reason and purpose behind their efforts is the battle against terrorism, and to make sure they can monitor the latest postings by al-Qaida and similar entities.

    The documents show that the prototype of “Royal Concierge” was first tested in 2010. The much-touted program, referred to internally as an “innovation,” was apparently so successful that further development continued.

    Daily Alerts

    The documents provide details on how the British program for tracking international diplomats functioned. Whenever a reservation confirmation is emailed to a conspicuous address inside a government domain (like gov.xx) from any of the 350 hotels around the world being monitored, a daily alert “tip-off” is sent to the appropriate GCHQ analysts. The documents seen by SPIEGEL do not include hotel names, but they do cite anonymized hotels in Zurich and Singapore as examples.

    A further document states that this advance knowledge of which foreign diplomats will be staying in what hotels provides GCHQ with a whole palette of intelligence capabilities and options. The documents reveal an impressive listing of capabilities for monitoring a hotel room and its temporary resident that seem to exhaust the creative potential of modern spying. Among the possibilities, of course, are wiretapping the room telephone and fax machine as well as the monitoring of computers hooked up to the hotel network (“computer network exploitation”).

    It also states that a “Technical Attack” is deployed by the British “TECA” team for guests of high interest. The documents state that these elite units develop a range of “specialist technologies” that are “designed to bridge the gaps to communications that our conventional accesses cannot reach.” These “Active Approach Teams” are small, but possess advanced technical skill that allow them to work within “often unique requirements.”

    The guests, of course, have no clue about these advanced technical preparations that are made for their visits. In cases of “governmental hard targets,” the information obtained through “Royal Concierge” can also involve “Humint” operations. The abbreviation is short for “human intelligence” — in other words, the deployment of human spies who might then be listening in on a diplomat’s conversations at the hotel bar.

    ‘Wild, Wild West’

    The documents seen by SPIEGEL do not state how often the program has been used, but they do indicate that it continued to be developed and that it captured the imagination of the intelligence agency’s workers, including the GCHQ unit responsible for “effects.” Given the access they had to hotel bookings through “Royal Concierge,” one document pondered: “Can we influence the hotel choice?” And: Did they have the ability to cancel visits entirely? Another slide lists “car hire” as one of the possible extensions to the program.

    Contacted by SPIEGEL, GCHQ said that it “neither confirms nor denies the allegation.”

    Her Royal Majesty’s agents appear to be very conscious of the fact that the automated monitoring of diplomats’ travel by the British intelligence service crosses into controversial terrain. One of the presentations describing “Royal Concierge” is titled “Tales from the Wild, Wild West of GCHQ Operational Datamining.”

    11/17/2013 08:09 AM
    By Laura Poitras, Marcel Rosenbach and Holger Stark

    Find this story at 17 November 2013

    © SPIEGEL ONLINE 2013

    The CIA’s New Black Bag Is Digital; When the NSA can’t break into your computer, these guys break into your house.

    During a coffee break at an intelligence conference held in The Netherlands a few years back, a senior Scandinavian counterterrorism official regaled me with a story. One of his service’s surveillance teams was conducting routine monitoring of a senior militant leader when they suddenly noticed through their high-powered surveillance cameras two men breaking into the militant’s apartment. The target was at Friday evening prayers at the local mosque. But rather than ransack the apartment and steal the computer equipment and other valuables while he was away — as any right-minded burglar would normally have done — one of the men pulled out a disk and loaded some programs onto the resident’s laptop computer while the other man kept watch at the window. The whole operation took less than two minutes, then the two trespassers fled the way they came, leaving no trace that they had ever been there.

    It did not take long for the official to determine that the two men were, in fact, Central Intelligence Agency (CIA) operatives conducting what is known in the U.S. intelligence community as either a “black bag job” or a “surreptitious entry” operation. Back in the Cold War, such a mission might have involved cracking safes, stealing code books, or photographing the settings on cipher machines. Today, this kind of break-in is known inside the CIA and National Security Agency as an “off-net operation,” a clandestine human intelligence mission whose specific purpose is to surreptitiously gain access to the computer systems and email accounts of targets of high interest to America’s spies. As we’ve learned in recent weeks, the National Security Agency’s ability to electronically eavesdrop from afar is massive. But it is not infinite. There are times when the agency cannot gain access to the computers or gadgets they’d like to listen in on. And so they call in the CIA’s black bag crew for help.

    The CIA’s clandestine service is now conducting these sorts of black bag operations on behalf of the NSA, but at a tempo not seen since the height of the Cold War. Moreover, these missions, as well as a series of parallel signals intelligence (SIGINT) collection operations conducted by the CIA’s Office of Technical Collection, have proven to be instrumental in facilitating and improving the NSA’s SIGINT collection efforts in the years since the 9/11 terrorist attacks.
    More FP Coverage
    the NSA Leaks
    Meet the Spies Doing the NSA’s Dirty Work
    Exclusive: Inside America’s Plan to Kill Online Privacy Rights Everywhere
    Spy Copters, Lasers, and Break-In Teams

    Over the past decade specially-trained CIA clandestine operators have mounted over one hundred extremely sensitive black bag jobs designed to penetrate foreign government and military communications and computer systems, as well as the computer systems of some of the world’s largest foreign multinational corporations. Spyware software has been secretly planted in computer servers; secure telephone lines have been bugged; fiber optic cables, data switching centers and telephone exchanges have been tapped; and computer backup tapes and disks have been stolen or surreptitiously copied in these operations.

    In other words, the CIA has become instrumental in setting up the shadowy surveillance dragnet that has now been thrown into public view. Sources within the U.S. intelligence community confirm that since 9/11, CIA clandestine operations have given the NSA access to a number of new and critically important targets around the world, especially in China and elsewhere in East Asia, as well as the Middle East, the Near East, and South Asia. (I’m not aware of any such operations here on U.S. soil.) In one particularly significant operation conducted a few years back in a strife-ridden South Asian nation, a team of CIA technical operations officers installed a sophisticated tap on a switching center servicing several fiber-optic cable trunk lines, which has allowed NSA to intercept in real time some of the most sensitive internal communications traffic by that country’s general staff and top military commanders for the past several years. In another more recent case, CIA case officers broke into a home in Western Europe and surreptitiously loaded Agency-developed spyware into the personal computer of a man suspected of being a major recruiter for individuals wishing to fight with the militant group al-Nusra Front in Syria, allowing CIA operatives to read all of his email traffic and monitor his Skype calls on his computer.

    The fact that the NSA and CIA now work so closely together is fascinating on a number of levels. But it’s particularly remarkable accomplishment, given the fact that the two agencies until fairly recently hated each others’ guts.

    Ingenues and TBARs

    As detailed in my history of the NSA, The Secret Sentry, the CIA and NSA had what could best be described as a contentious relationship during the Cold War era. Some NSA veterans still refer to their colleagues at the CIA as ‘TBARs,’ which stands for ‘Those Bastards Across the River,’ with the river in question being the Potomac. Perhaps reflecting their higher level of educational accomplishment, CIA officers have an even more lurid series of monikers for their NSA colleagues at Fort Meade, most of which cannot be repeated in polite company because of recurring references to fecal matter. One retired CIA official described his NSA counterparts as “a bunch of damn ingenues.” Another CIA veteran perhaps put it best when he described the Cold War relationship amongst and between his agency and the NSA as “the best of enemies.”

    The historical antagonism between the two agencies started at the top. Allen W. Dulles, who was the director of the CIA from 1953 to 1961, disliked NSA director General Ralph Canine so intensely that he deliberately kept the NSA in the dark about a number of the agency’s high-profile SIGINT projects, like the celebrated Berlin Tunnel cable tapping operation in the mid-1950s. The late Richard M. Helms, who was director of the CIA from 1966 to 1973, told me over drinks at the Army-Navy Club in downtown Washington, D.C. only half jokingly that during his thirty-plus years in the U.S. intelligence community, his relations with the KGB were, in his words, “warmer and more collegial” than with the NSA. William E. Colby, who served as Director of Central Intelligence from 1973-1976, had the same problem. Colby was so frustrated by his inability to assert any degree of control over the NSA that he told a congressional committee that “I think it is clear I do not have command authority over the [NSA].” And the animus between CIA director Admiral Stansfield Turner (CIA director from 1977-1981) and his counterpart at the NSA, Admiral Bobby Ray Inman, was so intense that they could only communicate through intermediaries.

    But the 9/11 terrorist attacks changed the operational dynamic between these two agencies, perhaps forever. In the thirteen years since the 9/11 terrorist attacks, the NSA and CIA have largely, but not completely, moved past the Cold War animus. In addition, both agencies have become increasingly dependent on one another for the success of their respective intelligence operations, leading to what can best be described as an increasingly close symbiotic relationship between these two titans of the U.S. intelligence community.

    While the increasingly intimate relationship between the NSA and CIA is not a secret, the specific nature and extent of the work that each agency does for the other is deemed to be extremely sensitive, especially since many of these operations are directed against friends and allies of the United States. For example, the Special Collection Service (SCS), the secretive joint CIA-NSA clandestine SIGINT organization based in Beltsville, Maryland, now operates more than 65 listening posts inside U.S. embassies and consulates around the world. While recent media reports have focused on the presence of SCS listening posts in certain Latin America capitals, intelligence sources confirm that most of the organization’s resources have been focused over the past decade on the Middle East, South Asia, and East Asia. For example, virtually every U.S. embassy in the Middle East now hosts a SCS SIGINT station that monitors, twenty-four hours a day, the complete spectrum of electronic communications traffic within a one hundred mile radius of the embassy site. The biggest problem that the SCS currently faces is that it has no presence in some of the U.S. intelligence community’s top targets, such as Iran and North Korea, because the U.S. government has no diplomatic relations with these countries.

    At the same time, SIGINT coming from the NSA has become a crucial means whereby the CIA can not only validate the intelligence it gets from its oftentimes unreliable agents, but SIGINT has been, and remains the lynchpin underlying the success over the past nine years of the CIA’s secret unmanned drone strikes in Pakistan, Yemen and elsewhere around the world.

    But the biggest changes have occurred in the CIA’s human intelligence (HUMINT) collection efforts on behalf of NSA. Over the past decade, foreign government telecommunications and computer systems have become one of the most important targeting priorities of the CIA’s National Clandestine Service (NCS), which since the spring of this year has been headed by one of the agency’s veteran Africa and Middle East hands. The previous director, Michael J. Sulick, is widely credited with making HUMINT collection against foreign computer and telecommunications systems one of the service’s top priority targets after he rose to the top of the NCS in September 2007.

    Today, a cadre of several hundred CIA NCS case officers, known as Technical Operations Officers, have been recruited and trained to work exclusively on penetrating foreign communications and computer systems targets so that NSA can gain access to the information stored on or transmitted by these systems. Several dozen of these officers now work fulltime in several offices at NSA headquarters at Fort George G. Meade, something which would have been inconceivable prior to 9/11.

    CIA operatives have also intensified their efforts to recruit IT specialists and computer systems operators employed by foreign government ministries, major military command headquarters staffs, big foreign multinational corporations, and important international non-governmental organizations.

    Since 9/11, the NCS has also developed a variety of so-called “black boxes” which can quickly crack computer passwords, bypass commercially-available computer security software systems, and clone cellular telephones — all without leaving a trace. To use one rudimentary example, computer users oftentimes forget to erase default accounts and passwords when installing a system, or incorrectly set protections on computer network servers or e-mail accounts. This is a vulnerability which operatives now routinely exploit.

    For many countries in the world, especially in the developing world, CIA operatives can now relatively easily obtain telephone metadata records, such as details of all long distance or international telephone calls, through secret liaison arrangements with local security services and police agencies.

    America’s European allies are a different story. While the connections between the NSA and, for example, the British signals intelligence service GCHQ are well-documented, the CIA has a harder time obtaining personal information of British citizens. The same is true in Germany, Scandinavia and the Netherlands, which have also been most reluctant to share this sort of data with the CIA. But the French intelligence and security services have continued to share this sort of data with the CIA, particularly in counterterrorism operations.

    U.S. intelligence officials are generally comfortable with the new collaboration. Those I have spoken to over the past three weeks have only one major concern. The fear is that details of these operations, including the identities of the targets covered by these operations, currently reside in the four laptops reportedly held by Edward Snowden, who has spent the past three weeks in the transit lounge at Sheremetyevo Airport outside Moscow waiting for his fate to be decided. Officials at both the CIA and NSA know that the public disclosure of these operations would cause incalculable damage to U.S. intelligence operations abroad as well as massive embarrassment to the U.S. government. If anyone wonders why the U.S. government wants to get its hands on Edward Snowden and his computers so badly, this is an important reason why.

    David Burnett/Newsmakers

    Matthew M. Aid is the author of Intel Wars: The Secret History of the Fight Against Terror and The Secret Sentry: The Untold History of the National Security Agency, and is co-editor with Cees Wiebes of Secrets of Signals Intelligence During the Cold War and Beyond.

    BY MATTHEW M. AID | JULY 17, 2013

    Find this story at 17 July 2013

    ©2013 The Slate Group, LLC. All rights reserved.

    The CIA Burglar Who Went Rogue; Douglas Groat thought he understood the risks of his job—until he took on his own employer

    “I’d come back from an op and couldn’t wait for what happens next,” says Douglas Groat (shown in a reenactment with tools of the trade). (James Quantz Jr. )

    The six CIA officers were sweating. It was almost noon on a June day in the Middle Eastern capital, already in the 90s outside and even hotter inside the black sedan where the five men and one woman sat jammed in together. Sat and waited.

    They had flown in two days earlier for this mission: to break into the embassy of a South Asian country, steal that country’s secret codes and get out without leaving a trace. During months of planning, they had been assured by the local CIA station that the building would be empty at this hour except for one person—a member of the embassy’s diplomatic staff working secretly for the agency.

    But suddenly the driver’s hand-held radio crackled with a voice-encrypted warning: “Maintain position. Do not approach target.” It was the local CIA station, relaying a warning from the agency’s spy inside: a cleaning lady had arrived.

    From the back seat Douglas Groat swore under his breath. A tall, muscular man of 43, he was the leader of the break-in team, at this point—1990—a seven-year veteran of this risky work. “We were white faces in a car in daytime,” Groat recalls, too noticeable for comfort. Still they waited, for an hour, he says, before the radio crackled again: “OK to proceed to target.” The cleaning lady had left.

    Groat and the others were out of the car within seconds. The embassy staffer let them in the back door. Groat picked the lock on the code room—a small, windowless space secured for secret communications, a standard feature of most embassies—and the team swept inside. Groat opened the safe within 15 minutes, having practiced on a similar model back in the States. The woman and two other officers were trained in photography and what the CIA calls “flaps and seals”; they carefully opened and photographed the code books and one-time pads, or booklets of random numbers used to create almost unbreakable codes, and then resealed each document and replaced it in the safe exactly as it had been before. Two hours after entering the embassy, they were gone.

    After dropping the break-in specialists off at their hotel, the driver took the photographs to the U.S. Embassy, where they were sent to CIA headquarters by diplomatic pouch. The next morning, the team flew out.

    The CIA is not in the habit of discussing its clandestine operations, but the agency’s purpose is clear enough. As then-chief James Woolsey said in a 1994 speech to former intelligence operatives: “What we really exist for is stealing secrets.” Indeed, the agency declined to comment for this article, but over the course of more than 80 interviews, 25 people—including more than a dozen former agency officers—described the workings of a secret CIA unit that employed Groat and specialized in stealing codes, the most guarded secrets of any nation.

    What Groat and his crew were doing followed in the tradition of all espionage agencies. During World War II, for example, Soviet spies stole the secrets of how the United States built the atom bomb, and the British secretly read Nazi communications after acquiring a copy of a German Enigma cipher machine from Polish intelligence. The Office of Strategic Services, the CIA’s predecessor, targeted the Vichy French Embassy in Washington, D.C. one night in June 1942. An operative code-named Cynthia arranged a tryst inside the embassy with her lover, who was the press attaché there. The tryst, as both knew, was a cover story—a way to explain her presence to the night watchman. After the 31-year-old, auburn-haired spy and her lover stripped in the hall outside the code room, Cynthia, naked but for her pearls and high-heeled shoes, signaled out a window to a waiting OSS safe expert, a specialist known as the “Georgia Cracker.” He soon had the safe open and the codebooks removed; an OSS team photographed the books in a hotel nearby, and Cynthia returned them to the safe before dawn. The stolen codes were said to have helped OSS undercover operations in North Africa that paved the way for the Allied invasion there six months later.

    In 1956, Soviet leader Nikita Khrushchev denounced Joseph Stalin’s mass terror and “cult of personality” in a speech to a closed session of the Communist Party Congress in Moscow. Khrushchev repudiated his predecessor in such stark terms that his speech weakened the Soviet Union’s grip on Eastern Europe and contributed to Moscow’s split with China. As word of his “secret speech” filtered out, the CIA fell under enormous pressure to obtain a copy. The agency’s director, Allen W. Dulles, secured one—he never disclosed how, but by most accounts his source was Israeli intelligence—and leaked it to the New York Times. He later wrote that getting the speech was “one of the major intelligence coups” of his career.

    In a secret program called HTLINGUAL, the CIA screened more than 28 million first-class letters and opened 215,000 of them between 1953 and 1973, even though the Supreme Court held as far back as 1878 in Ex parte Jackson and reaffirmed in 1970 in U.S. v. Van Leeuwen that the Fourth Amendment bars third parties from opening first-class mail without a warrant. The program’s stated purpose was to obtain foreign intelligence, but it targeted domestic peace and civil rights activists as well. In a 1962 memo to the director of the CIA’s Office of Security, the deputy chief of the counterintelligence staff warned that the program could lead “to grave charges of criminal misuse of the mails” and therefore U.S. intelligence agencies must “vigorously deny” HTLINGUAL, which should be “relatively easy to ‘hush up.’ ”

    One of the agency’s most ambitious known theft attempts took place after a Soviet submarine sank in 1968 several hundred miles northwest of Hawaii, losing all hands. After spending at least $200 million to build a ship designed especially for the mission, the agency tried in 1974 to steal the sub from its resting place, 17,000 feet deep. Using a giant claw, the ship, the Glomar Explorer, lifted the sub from the ocean bottom, but it broke in two as it was raised. The agency recovered the forward third of the vessel, but former CIA director William E. Colby confirmed in the French edition of his memoir, which slipped through the agency’s censorship, that the operation fell short of its main objective—recovering the part of the sub containing Soviet nuclear missiles and codebooks.

    Codes have always been primary espionage targets, but they have become more valuable as encryption programs have become both more common and more complex. Today, even the National Security Agency, the nation’s code-making and -breaking arm and its largest intelligence agency, has trouble keeping up with the flood of messages it intercepts. When decrypting other countries’ codes is so difficult, the most obvious solution is to steal them.

    That is why by 1955, and probably earlier, the CIA created a special unit to perform what the agency calls “surreptitious entries.” This unit was so secret that few people inside CIA headquarters knew it existed; it wasn’t even listed in the CIA’s classified telephone book. Officially it was named the Special Operations Division, but the handful of agency officers selected for it called it the Shop.

    In Doug Groat’s time there, in the 1980s and early ’90s, the Shop occupied a nondescript one-story building just south of a shopping mall in the Washington suburb of Springfield, Virginia. The building was part of a government complex surrounded by a chain-link fence; the pebbled glass in the windows let in light but allowed no view in or out. The men and women of the Shop made up a team of specialists: lock pickers, safecrackers, photographers, electronics wizards and code experts. One team member was a master at disabling alarm systems, another at flaps and seals. Their mission, put simply, was to travel the world and break into other countries’ embassies to steal codes, and it was extraordinarily dangerous. They did not have the protection of diplomatic cover; if caught, they might face imprisonment or execution. The CIA, they assumed, would claim it knew nothing about them. “It was generally understood, from talking to the other guys,” Groat recalls. “Nobody ever said it in so many words.”

    Groat started working at the Shop in 1982 and became the CIA’s top burglar and premier lock picker. He planned or participated in 60 missions in Europe, Africa, South America and the Middle East. He received several $5,000 awards for successful entry missions—a significant sum for someone earning less than $40,000 a year at the time—as well as an award from the CIA’s Clandestine Service and another from the NSA. In several instances, as in the operation in the Middle East capital, he led the entry team. But that operation was Groat’s last. The simple fact that a cleaning lady had unexpectedly shown up for work set off a chain of events that pit him against his employer. The operations of the Shop, as described by Groat, other former members of the Shop and other intelligence professionals, illustrate the lengths to which the CIA went to steal other nations’ secrets. What happened to Groat illustrates the measures the agency took to protect secrets of its own.

    Groat would seem an excellent candidate for the job of stealing codes. Six-foot-three, handsome and articulate, he is a former Green Beret trained in scuba diving, underwater explosives, parachuting, survival and evasion; he knows how to build homemade pistols, shotguns, silencers, booby traps and bombs. He also speaks Mandarin Chinese. He says he relished his work at the Shop—both for the opportunity to serve his country and for the adrenaline rush that came with the risks.

    He grew up in Scotia, New York, near Albany. He joined the Army in 1967, before marrying his high-school sweetheart, and served as a captain in the Special Forces. He left after four years and worked in a series of law-enforcement jobs. As a police officer in Glenville, New York, Groat displayed a streak of unyielding resolve: He ticketed fire engines when he believed they were breaking the law. “The trucks would run with lights flashing even when they were not responding to a fire. They were checking the hydrants,” he says. “I warned them, ‘Do it again and I’ll ticket you.’ They did and I did.” After he ticketed the fire chief, Groat was fired. He sued and won his job back—and then, having made his point, quit to become a deputy U.S. marshal in Phoenix.

    By then Groat and his wife had a daughter and a son. In 1980, he joined the CIA and moved his family to Great Falls, Virginia. At age 33, he was sent off to the Farm, the CIA’s training base near Williamsburg, to learn the black arts of espionage. Two years later, after testing well for hand coordination and the capacity to pay painstaking attention to detail, he was accepted for the Shop.

    In training there he demonstrated an exceptional talent for picking locks, so the CIA sent him to vocational courses in opening both locks and safes. As a result, the CIA’s top burglar was also a bonded locksmith, member number 13526 of the Associated Locksmiths of America. He was also a duly certified member of the Safe and Vault Technicians Association.

    Although Hollywood films show burglars with an ear glued to a safe to listen for the tumblers, Groat says it doesn’t work that way. “You feel the tumblers. In your fingers,” he says. “There are three to four wheels in a typical safe combination lock. As you turn the dial you can feel it as you hit each wheel, because there’s extra tension on the dial. Then you manipulate one wheel at a time until the drop lever inside falls into the open position and the safe is unlocked.”

    After training came the real thing. “It was exhilarating,” Groat recalls of his first mission, targeting a South American embassy in Northern Europe. When he traveled to a target, he used an alias and carried phony ID—”pocket litter,” as it is known in the trade. His fake identities were backstopped, meaning that if anyone called to check with the real companies listed on his cards, someone would vouch for him as an employee. He also was given bank and credit cards in an alias to pay his travel expenses.

    Because Groat’s work was so sensitive, he had to conceal it. Although his wife understood the nature of his work, for years his children did not. “I didn’t know where my father worked until I was in high school, in the ninth or tenth grade,” says Groat’s son, Shawn. “My sister typed a report on special paper that dissolved in water, although we didn’t know it. My father realized what she was doing and said, ‘You can’t use that paper.’ Then he ate the paper.

    “He then sat us down and said, ‘I don’t work for the State Department. I work for the CIA.’” The State Department had been his cover story to explain his frequent travels to friends, relatives and neighbors. He said he inspected security at U.S. embassies.

    Groat would not talk about which countries’ codes he and his colleagues stole. Other intelligence sources said that in 1989, he led an extraordinary mission to Nepal to steal a code machine from the East German Embassy there—the CIA and the NSA, which worked closely with the Shop, wanted the device so badly that Groat was told to go in, grab the safe containing the code machine and get out. Never mind the rule about leaving no trace; in this case it would be immediately obvious that a very large object was missing.

    According to two CIA sources, the agency and the NSA had collected three decades’ worth of encrypted East German communications traffic; the machine would allow them to read it and, if the Soviets and the other Warsaw Pact countries were linked in a common system, perhaps to decrypt Soviet traffic as well.

    The CIA station in Katmandu arranged for an official ceremony to be held more than an hour away from the capital and for all foreign diplomats to be invited. The agency knew the East Germans could not refuse to attend. That would leave Groat’s team about three hours to work. Posing as tourists, they arrived in Katmandu two days before the mission and slipped into a safe house. On the appointed day, they left the safe house wearing disguises crafted by a CIA specialist—whole-face latex masks that transformed them into Nepalese, with darker skin and jet-black hair. At the embassy, Groat popped the front door open with a small pry bar. Inside, the intruders peeled off their stifling masks and with a bolt-cutter removed a padlock barring the way to the embassy’s security area. Once in the code room, Groat and two teammates strained to lift the safe from the floorboards and wrestled it down the stairs and out to a waiting van.

    They drove the safe to the American Embassy, where it was opened—and found to contain no code machine. Based on faulty intelligence, the CIA had sent its break-in team on a Himalayan goose chase.

    In planning an operation, Groat says, he would normally reconnoiter the target personally. But he was told there was no budget to send him before his 1990 mission to the Middle East capital, so he had to rely on assurances from the local CIA station. Although the team accomplished its mission and returned to the Shop within two days, Groat was enraged at what he believed was sloppy advance work.

    “It was a near miss, very scary,” he says. “I had to complain. It could have been disastrous for the U.S. government and the officers involved.”

    Not to worry, Groat’s boss told him; he would personally tell the official who supervised the Shop what had happened. Groat says his boss warned him that if he went outside channels and briefed the supervisor on his own, “it would end my career.” He went to the supervisor anyway. “I told [him] if we had been caught our agent would be killed,” he says. “He said he didn’t care. That it was an aberration and wouldn’t happen again.” Groat did not back down; in fact, he escalated matters by taking his complaint to the CIA inspector general. The IG at the time was Frederick P. Hitz, who now teaches law at the University of Virginia. Hitz recalls that his office investigated the matter.

    “On the issue that preparations for that entry had not been properly made, we did find there was merit in his complaint,” Hitz says. “His grievances had some justification in fact. He felt there was sloppiness that endangered himself and his crew, the safety of the men for whom he was responsible. We felt there was some reason for his being upset at the way his operation was prepared.”

    Given the tensions rising between Groat and his managers, the IG also recommended that Groat be transferred to another unit. Hitz says he is fairly certain that he also urged that steps be taken to avoid a repeat of the problems Groat had encountered and that “we expected this not to happen again.” But the recommendation that Groat be transferred created a problem: There was no other unit like the Shop. Groat says he was given a desk at a CIA building in Tysons Corner, in Northern Virginia, but no work to do—for 14 months. In October 1992, he says, he was moved to another office in Northern Virginia but still given no duties. He worked out at a gym in a nearby CIA building and went home by 11 a.m.

    By then Groat was at the end of his rope. “I was under more and more pressure” to quit, he says. “I was being pushed out and I was looking at losing my retirement.” He called the inspector general, “and he told me to find another job because I wasn’t going to get my job [at the Shop] back.”

    The way Groat saw it, he had risked his life for nearly a decade to perform some of his country’s most demanding, valuable and risky work. He was the best at what he did, and yet that didn’t seem to matter; some bureaucrats had forced him out of the Shop for speaking out.

    So he decided to run his own operation. Against the CIA.

    In September 1992, Groat sent three anonymous letters to the ambassador of an Asian country revealing an operation he had participated in about a year and a half earlier to bug computers in an embassy the country maintained in Scandinavia. “It was a last-ditch effort to get the agency to pay attention,” Groat says. Clearly, he knew he was taking a terrible risk. At least one letter was intercepted and turned over to the CIA. But one or more may have gotten through, because the bugs suddenly went silent.

    By early 1993, CIA counterintelligence officers had launched an investigation to find out who wrote the letters. The FBI was brought in, and its agents combed through the library at CIA headquarters in Langley, Virginia, dusting for prints on a list of foreign embassies in case the letters’ author had found the address there. The FBI “came to my house two or three times,” Groat says. Its agents showed him a form stating that his thumbprints, and the prints of two other people, were identified on the page listing the foreign missions. Of course, that didn’t prove who had written the letters.<

    Groat was called into CIA headquarters and questioned. “I knew they didn’t have anything,” he says. “Since I thought I was still in a negotiation with the Office of General Counsel to resolve this whole thing I wasn’t going to say anything. I wanted them to believe I had done it but not know that I had done it. I wanted to let that play out.” When he refused to take a polygraph, he was put on administrative leave.

    By the summer of 1994 his marriage was disintegrating, and that October Groat left home. He later bought a Winnebago and began wandering the country with a girlfriend. Meanwhile, he began negotiating a retirement package with the CIA and hired an attorney, Mark Bradley, a former Pakistan analyst for the agency.

    In a letter to James W. Zirkle, the CIA’s associate general counsel, Bradley noted that Groat “gave the CIA 14 years of his life….His numerous awards and citations demonstrate how well he performed his assignments, many of which were extremely dangerous. He gave his heart and soul to the Agency and feels that it has let him down.” Groat wanted $500,000 to compensate him, Bradley added, “for the loss of his career.”

    In reply, Zirkle wrote that before the agency would consider “the very substantial settlement” being sought, Groat would have “to accurately identify the person…responsible for the compromise of the operation” under investigation. “If he can provide us with clear and convincing corroborating evidence confirming the information that he would provide, we would be prepared to consider not using the polygraph.” But the exchange of letters led nowhere. In September 1996 Groat was divorced, and a month later he was dismissed from the CIA, with no severance and no pension.

    Seeking new leverage with the agency, Groat made another risky move: In January 1997 he telephoned Zirkle and said that without a settlement, he would have to earn a living as a security consultant to foreign governments, advising them on how to protect their codes.

    Groat’s telephone call detonated like a bombshell at CIA headquarters. Senior officials had long debated what to do about him. Some favored negotiating a money settlement and keeping him quiet; others wanted to take a hard line. Groat’s call intensified the agency’s dilemma, but it seemed to have worked: Zirkle urged patience; a settlement was imminent. “We are working very hard to come to a timely and satisfactory resolution,” the lawyer wrote in a subsequent letter.

    That March, Zirkle sent Groat a written offer of $50,000 a year as a contract employee until 2003, when he would be eligible to retire with a full pension. The contract amounted to $300,000—$200,000 less than what Groat had sought. Again, Zirkle reminded him, he would have to cooperate with the counterintelligence investigation. He would be required to take a polygraph, and he would have to agree not to contact any foreign government. Bradley urged his client to take the money and run, but Groat believed the agency’s offer was too low.

    Later that month, he visited 15 foreign consulates in San Francisco to drop off a letter in which he identified himself as a former CIA officer whose job was “to gain access to…crypto systems of select foreign countries.” The letter offered his expertise to train security officers on ways to protect “your most sensitive information” but did not disclose any information about how the CIA stole codes. The letter included a telephone number and a mailbox in Sacramento where he could be contacted.

    Groat says he had no takers—and claims he didn’t really want any. “I never intended to consult for a foreign country,” he says. “It was a negotiating ploy….Yes, I realized it was taking a risk. I did unconventional work in my career, and this was unconventional.” He did not act secretly, Groat notes; he wanted the agency and the FBI to know. He told the CIA what he planned to do, and he gave the FBI a copy of his letter after he had visited the consulates. The FBI opened another investigation of Groat.

    Molly Flynn, the FBI agent assigned to the case, introduced herself to Groat and stayed in touch with him after he moved to Atlanta for training as an inspector for a gas pipeline company. In late March, Groat called Flynn to say he was heading for Pennsylvania to start on his first inspection job.

    Flynn invited him to stop off in Washington for a meeting she would arrange with representatives of the CIA, the FBI and the Justice Department to try to resolve the situation. Still hoping to reach a settlement, Groat says, “I accepted eagerly.”

    On April 2, 1998, he walked into an FBI building in downtown Washington. Flynn greeted him in the lobby. Had the others arrived yet? he asked as she led him to a first-floor conference room. She said they had not. As the door clicked shut behind him, she delivered unexpected news. “I told him we had resolved the matter, but not to his liking,” Flynn recalls. A man in a white shirt and tie—a Justice Department official, Groat later concluded—told him: “We decided not to negotiate with you. We indicted you instead.” Then the man turned and left.

    Groat was arrested and held in the room for five hours. Flynn and two other agents remained with him, he says. His car keys were taken away. “One of the FBI agents said, ‘It probably wouldn’t do much good to ask you questions, would it?’ And I said, ‘No, it wouldn’t.’” After being strip-searched, fingerprinted and handcuffed, he says, he was driven to the Federal District Court building and locked in a cell. Held there for two days, he was strip-searched again in front of eight people, including a female officer, shackled and outfitted with a stun belt. “My eyes were covered with a pair of goggles, the lenses masked over with duct tape,” he says. He was moved by van, with a police escort, to a waiting helicopter.

    After a short ride, he was taken to a windowless room that would be his home for the next six months. He was never told where he was, but he was told he was being treated as an “extreme risk” prisoner. The lights in his cell were kept on 24/7, and a ceiling-mounted camera monitored him all the time.<

    Robert Tucker, a federal public defender in Washington, was assigned to Groat’s case. When Tucker wanted to visit his client, he was picked up in a van with blacked-out windows and taken to him. Tucker, too, never learned where Groat was being held.

    A few days before Groat’s arrest, a federal grand jury in Washington had handed down a sealed indictment accusing him of transmitting, or trying to transmit, information on “the targeting and compromise of cryptographic systems” of unnamed foreign countries—a reference to his distributing his letter to the consulates. The formal charge was espionage, which carries a possible penalty of death. He was also charged with extortion, another reference to his approach to the consulates; the indictment accused him of attempting to reveal “activities and methods to foreign governments” unless the CIA “paid the defendant for his silence in excess of five hundred thousand dollars ($500,000).”

    As a trial date approached, prosecutors offered Groat a plea agreement. Although they were not pressing for the death penalty, Groat faced the prospect of life in prison if a jury convicted him of espionage. Reluctantly, he agreed to plead guilty to extortion if the government would drop the spying charges. “I had no choice,” he says. “I was threatened with 40 years to life if I didn’t take the deal.” Groat also agreed to testify fully in the CIA and FBI counterintelligence investigations, and he subsequently confessed that he sent the letters about the bugged computers.

    On September 25, 1998, Groat stood before Judge Thomas F. Hogan of the Federal District Court in Washington and entered his guilty plea. He was sentenced to five years.

    The question of where Groat would serve his time was complicated by what a federal Bureau of Prisons official referred to as his “special abilities.” While still in solitary, he wrote to a friend: “The marshals are treating me like I’m a cross between MacGyver, Houdini and Rambo.” But in the end, he was sent to the minimum-security wing of the federal prison camp in Cumberland, Maryland. “My skills, after all, were not for escaping,” Groat notes. “They were for entering places.”

    There Groat was assigned to a case manager, who introduced herself as Aleta. Given her new client’s reputation, she put him in solitary the first night. But officials gradually noticed she and Groat spent a lot of time talking to each other. As a result, he was transferred to the federal prison in Terre Haute, Indiana, after two years, but the two corresponded often.

    In March 2002, Groat was released a month short of four years, his sentence reduced for good behavior. Aleta was waiting for him at the prison gate, and they were married that December. Today, Doug and Aleta Groat live on 80 acres in the South. He prefers not to disclose his location any more specifically than that. He has not told his neighbors or friends about his previous life as a spy; he works the land and tries to forget the past.

    When he looks back, Groat tries to focus on the good parts. “I loved the work at CIA. I’d come back from an op and couldn’t wait for what happens next,” he says. “I thought the work was good for the country. I was saddened by the way I was treated by the agency, because I tried to do my job.”

    The CIA was unwilling to talk about Douglas Groat or anything connected with his case. Asked whether it has a team that goes around the globe breaking into foreign embassies and stealing codes, a spokesperson provided a five-word statement: “The CIA declined to comment.”

    By David Wise
    Smithsonian magazine, October 2012, Subscribe

    Find this story at October 2012

    © smithsonianmag.com

    Spy Copters, Lasers, and Break-In Teams; How the FBI keeps watch on foreign diplomats.

    Between 2006 and 2009, surveillance helicopters conducted daily flights over northwest Washington, D.C., taking high-resolution photographs of the new Chinese Embassy being constructed on Van Ness Street. The aircraft belonged to the Federal Bureau of Investigation, which wanted to determine where the embassy’s communications center was being located. But the Chinese construction crews hid their work on this part of the building by pulling tarpaulins over the site as it was being constructed.

    The FBI also monitored the movements and activities of the Chinese construction workers building the embassy, who were staying at a Days Inn on Connecticut Avenue just north of the construction site, in the hopes of possibly recruiting one or two of them. According to one Chinese diplomat, his fellow officials detected individuals who they assumed to be FBI agents covertly monitoring the construction materials and equipment being used to build the embassy, which were stored on the University of the District of Columbia’s soccer field across the street from where the Chinese Embassy currently stands. The diplomat added that Chinese security officials assumed that the FBI agents were trying to determine whether it was possible to plant eavesdropping devices inside the construction materials stored at the site.

    In recent weeks, the U.S. National Security Agency’s efforts to monitor foreign diplomats have become the stuff of worldwide headlines. But the FBI has been in the business of spying on diplomats and breaking their codes for far longer than the NSA has. The surveillance of the Chinese Embassy was just one piece of a far larger espionage operation. The FBI not only endeavors to steal or covertly compromise foreign government, military, and commercial computer, telecommunications, and encryption systems being used in the United States, but the FBI and NSA work closely to intercept the communications of all diplomatic missions and international organizations located on American soil. In some important respects, the FBI’s cryptologic work is more secretive than that being performed by the NSA because of the immense diplomatic sensitivity of these operations if they were to ever be exposed publicly.

    The Bureau of Investigation, the predecessor to today’s FBI, has been monitoring diplomatic communications since at least 1910, when it periodically solved Mexican government and revolutionary group cable traffic coming in and out of the United States. And for over a century, the FBI and its predecessors have been aggressive practitioners of the age-old art of stealing codes and ciphers. In June 1916, Bureau of Investigations agents surreptitiously obtained a copy of the new Mexican consular code by picking the pockets of a Mexican diplomatic courier while he cavorted with “fast women” in one of the innumerable border fleshpots along the Rio Grande.
    More FP Coverage
    the NSA Leaks
    Meet the Spies Doing the NSA’s Dirty Work
    Exclusive: Inside America’s Plan to Kill Online Privacy Rights Everywhere
    The FBI is Helping the NSA Spy, but Senators Don’t Want to Know About It

    Little has changed in the intervening century. Despite the creation of the NSA in 1952 to centralize in one agency all U.S. government signals intelligence (SIGINT) collection and processing work, the FBI, which did not respond to requests for comment for this story, has never ceased its own independent cryptologic efforts, especially when those efforts have been aim at diplomats on American soil.

    ***

    The number of foreign government targets that the FBI monitors inside the United States is huge and growing. State Department records show that 176 countries maintain embassies in Washington, not including Cuba and Iran, which the U.S. government does not have diplomatic relations with but which maintain interest sections inside the Swiss and Pakistani embassies, respectively.

    In addition, 115 of the 193 members of the United Nations maintain diplomatic missions of varying sizes in New York City. There are also 62 consulates in Los Angeles, 52 in Chicago, 42 in San Francisco, 38 in Houston, 35 in Miami, and 26 in Boston and Atlanta.

    All told, there are almost 600 foreign government embassies, consulates, missions, or representative offices in the United States, all of which are watched to one degree or another by the counterintelligence officers of the FBI. Only eight countries do not maintain any diplomatic presence in the United States whatsoever, the most important of which is nuclear-armed North Korea.

    Every one of these embassies and consulates is watched by the FBI’s legion of counterintelligence officers to one degree or another. But some countries’ receive the vast majority of the FBI’s attention, such as Russia, China, Libya, Israel, Egypt, Syria, Jordan, Lebanon, Saudi Arabia, Iraq, Afghanistan, India, Pakistan, and Venezuela. The Cuban and Iranian interests section in Washington — and their missions to the United Nations in New York — of course receive special attention as well.

    Unsurprisingly, most of the FBI’s surveillance is technical in nature. For example, with substantial technical assistance from the NSA and the “big three” American telecommunications companies (AT&T, Verizon, and Sprint), the FBI taps the phones (including cell phones) of virtually every embassy and consulate in the United States. The FBI also intercepts the home phones and emails of many diplomats. The FBI’s Washington and New York field offices have special wiretap centers that specialize in collecting all telephone, email, instant messaging, text messaging, and cellular telephone traffic coming in and out of all high-priority diplomatic targets in the United States 24 hours a day, seven days a week. According to a former Justice Department source, over the past decade these extremely sensitive intercepts have identified a number of spies working for governments that were caught in the act of stealing U.S. government secrets, as well as a larger number of cases involving the theft of industrial secrets from American companies.

    Since 1978, all electronic communications, both plaintext and encrypted, between these embassies and their home countries have been routinely intercepted by the NSA’s BLARNEY fiber-optic-cable intercept program. The NSA provides copies of all these intercepts, including telephone calls and emails, to the FBI’s secretive signals-intelligence unit, the Data Intercept Technology Unit (DITU) at the Quantico Marine Corps base in Northern Virginia, and to the FBI’s electronic-eavesdropping centers in Washington and New York.

    The FBI also uses a wide range of vehicles and airborne surveillance assets to monitor the movements and activities of foreign diplomats and intelligence operatives in Washington and New York. Some of the vans, aircraft, and helicopters used by the FBI for this purpose are equipped with equipment capable of intercepting cell-phone calls and other electronic forms of communication. And when that doesn’t work, the FBI calls in the burglars.

    ***

    Another important part of the FBI’s surveillance effort is dedicated to trying to surreptitiously get inside these diplomatic establishments on behalf of the NSA, which increasingly depends on the FBI to penetrate the computer and telecommunications networks used by these embassies and compromise their information security systems.

    The FBI perfected this clandestine technique, known as the Surreptitious Entry Program operation, during Cold War intelligence-gathering operations directed at the Soviet Union and its Eastern European allies. These missions remain highly classified because of the diplomatic sensitivity surrounding breaking into the embassies of friends and enemies alike. In one instance during the 1960s, FBI agents reportedly drove a garbage truck into the central courtyard of the Czech Embassy in the middle of the night and spirited away one of the embassy’s cipher machines for study by the NSA’s code breakers.

    The FBI is still conducting these highly sensitive operations. Specially trained teams of FBI agents are still periodically breaking into foreign embassies and consulates in the United States, primarily in New York and Washington. In New York, a special team of FBI burglars is based in a converted warehouse in Long Island City in Queens, according to a former FBI employee who worked there. The nondescript facility is large enough that the FBI can build mock-ups of the exteriors and interiors of embassies being targeted for break-ins. The FBI has a similar facility in Northern Virginia, where full-size mock-ups of embassies in Washington are constructed to train FBI teams prior to conducting black-bag jobs of the facilities.

    To facilitate these operations, the FBI has a huge library of architectural drawings, floor plans, building permits, and any other documents that it can lay its hands on concerning the layouts of every embassy and consulate in the United States. Many of these documents were obtained in close conjunction with the diplomatic security staff of the State Department and the uniformed branch of the Secret Service, which is responsible for providing security for foreign diplomatic establishments in the United States. The FBI also interviews the repair and maintenance personnel who service the leased computers and telecommunications equipment used by a host of embassies and other diplomatic establishments in Washington and New York.

    Since the 9/11 terrorist attacks, the tempo of FBI clandestine operations designed to steal, compromise, or influence foreign computer, telecommunications, or encryption systems has increased by several orders of magnitude. According to a former Justice Department official, over the past decade clandestine human-intelligence operations run by the FBI’s Washington and New York field offices have been enormously successful in compromising a wide range of computer systems and encryption technology used by foreign governments and corporate entities. In a number of important cases, these FBI operations have allowed the NSA’s code-breakers to penetrate foreign encryption systems that had defied the ability of the code-breakers to solve through conventional cryptanalytic means. For example, the FBI was able to give the NSA the daily changes in cipher keys for an encryption system used by a country in the developing world. In another case, the FBI was able to covertly insert spyware into the operating system of a computer being used by a foreign mission in New York, allowing the NSA to read the plaintext versions of cables before they were encrypted.

    ***

    But by far the most productive and sensitive intelligence source about what is going on inside embassies and consulates in the United States is a joint FBI-NSA electronic-eavesdropping program known as Close Access SIGINT. It enables the FBI and NSA to listen to what is transpiring inside these buildings by using a wide range of covert technical sensors that are monitored in real time from covert listening posts located in close proximity to the targets.

    Some of these operations involve spyware software that has been covertly planted inside the computer systems of embassies and consulates, which allows the NSA’s computer-hacking organization, the Office of Tailored Access Operations (TAO), to read in real time everything that is being stored on individual computers or on the computer network itself. Some of these implants are designed and operated by TAO. Others are designed by the FBI’s SIGINT unit, the DITU. Some sensors periodically copy the contents of computer hard drives; another sensor takes screen shots of documents being processed or reviewed on compromised computer systems. The FBI is also using sophisticated laser and acoustic systems to image and record the sounds of what is being typed on computers, according to a source with access to the trove of documents leaked to the media by former NSA contractor Edward Snowden.

    To pick up the signals from these clandestine sensors, the FBI uses front companies to lease office space within line of sight of nearly 50 embassies and consulates in Washington and New York. In other instances, the FBI and NSA have installed disguised receivers on building rooftops near these embassies to pick up the data signals from clandestine sensors implanted inside these embassies and consulates. Some of these disguised receivers can clearly be seen on the rooftop of a building located within line of sight of the Chinese, Israeli, and Pakistani embassies on Van Ness Street in northwest Washington. It’s a neighborhood that’s awfully familiar to the FBI and its eavesdroppers.
    Save big when you subscribe to FP.

    MICHAEL BRADLEY/AFP/Getty Images

    Matthew M. Aid is the author of Intel Wars: The Secret History of the Fight Against Terror and The Secret Sentry: The Untold History of the National Security Agency.

    BY MATTHEW M. AID | NOVEMBER 19, 2013

    Find this story at 19 November 2013

    © 2013 The Slate Group, LLC. All rights reserved.

    Jeremy Hammond: FBI directed my attacks on foreign government sites

    Anonymous hacktivist told court FBI informant and fellow hacker Sabu supplied him with list of countries vulnerable to cyber-attack

    Hammond said: ‘I took responsibility by pleading guilty, but when will the government be made to answer for its crimes?’ Photograph: Michael Gottschalk/AFP

    The Anonymous hacktivist sentenced on Friday to 10 years in federal prison for his role in releasing thousands of emails from the private intelligence firm Stratfor has told a Manhattan court that he was directed by an FBI informant to break into the official websites of several governments around the world.

    Jeremy Hammond, 28, told a federal court for the southern district of New York that a fellow hacker who went under the internet pseudonym “Sabu” had supplied him with lists of websites that were vulnerable to attack, including those of many foreign countries. The defendant mentioned specifically Brazil, Iran and Turkey before being stopped by judge Loretta Preska, who had ruled previously that the names of all the countries involved should be redacted to retain their secrecy.

    Within a couple of hours of the hearing, the three countries had been identified publicly by Forbes, the Huffington Post and Twitter feeds serving more than a million followers. “I broke into numerous sites and handed over passwords and backdoors that enabled Sabu – and by extension his FBI handlers – to control these targets,” Hammond told the court.

    The 28-year-old hacker has floated the theory in the past that he was used as part of an effective private army by the FBI to target vulnerable foreign government websites, using the informant Sabu – real name Hector Xavier Monsegur – as a go-between. Sabu, who was a leading figure in the Anonymous-affiliated hacking group LulzSec, was turned by the FBI into one of its primary informants on the hacker world after he was arrested in 2011, about six months before the Stratfor website was breached.

    Referring to the hacking of foreign government websites, Hammond said that in one instance, he and Sabu provided details on how to crack into the websites of one particular unidentified country to other hackers who then went on to deface and destroy those websites. “I don’t know how other information I provided to [Sabu] may have been used, but I think the government’s collection and use of this data needs to be investigated,” he told the court

    He added: “The government celebrates my conviction and imprisonment, hoping that it will close the door on the full story. I took responsibility for my actions, by pleading guilty, but when will the government be made to answer for its crimes?”

    Hammond’s 10-year federal prison service makes it one of the longest punishments dished out for criminal hacking offences in US history. It joins a lengthening line of long jail terms imposed on hackers and whistleblowers as part of the US authorities’ attempt to contain data security of government agencies and corporations in the digital age.

    Preska also imposed a three-year period of probationary supervision once Hammond is released from jail that included extraordinary measures designed to prevent him ever hacking again. The terms of the supervision state that when he is out of prison he must: have no contact with “electronic civil disobedience websites or organisations”; have all his internet activity monitored; subject himself to searches of his body, house, car or any other possessions at any time without warrant; and never do anything to hide his identity on the internet.

    Hammond’s 10-year sentence was the maximum available to the judge after he pleaded guilty to one count of the Computer Fraud and Abuse Act (CFAA) relating to his December 2011 breach of the website of the Austin, Texas-based private intelligence company Strategic Forecasting, Inc. Delivering the sentence, Preska dismissed the defendant’s explanation of his motivation as one of concern for social justice, saying that he had in fact intended to create “maximum mayhem”. “There is nothing high-minded and public-spirited about causing mayhem,” the judge said.

    She quoted from comments made by Hammond under various internet handles at the time of the Stratfor hack in which he had talked about his goal of “destroying the heart, hoping for bankruptcy, collapse”. She criticised what she called his “unrepentant recidivism – he has an almost unbroken record of offences that demonstrate an almost total disrespect for the law.”

    Before the sentence came down, Hammond read out an outspoken statement to court in which he said he had been motivated to join the hacker group Anonymous because of a desire to “continue the work of exposing and confronting corruption”. He said he had been “particularly moved by the heroic actions of Chelsea Manning, who had exposed the atrocities committed by US forces in Iraq and Afghanistan. She took an enormous personal risk to leak this information – believing that the public had a right to know and hoping that her disclosures would be a positive step to end these abuses.”

    In his own case, he said that as a result of the Stratfor hack, “some of the dangers of the unregulated private intelligence industry are now known. It has been revealed through Wikileaks and other journalists around the world that Stratfor maintained a worldwide network of informants that they used to engage in intrusive and possibly illegal surveillance activities on behalf of large multinational corporations.”

    Margaret Kunstler, a prominent member of the Hammond’s defence team, told the Guardian after the sentencing that the maximum punishment was “not a great surprise”. She said that Preska had turned Hammond’s own comments in web chats against him, “but I think she doesn’t understand the language that’s used in chat rooms and the internet – for her to have used such language against him and not understand what his comments meant seemed piggy to say the least.”

    • This article was amended on 17 November 2013. An earlier version incorrectly described Margaret Kunstler as Hammond’s lead defence lawyer.

    Ed Pilkington in New York
    theguardian.com, Friday 15 November 2013 20.22 GMT

    Find this story at 15 November 2013

    © 2013 Guardian News and Media Limited or its affiliated companies. All rights reserved.

    Jeremy Hammond: Stung or entrapped? The case of the Stratfor hacker raises troubling questions about FBI’s involvement in catching or creating crime

    On the day he learned he was to spend 10 years in federal prison for his involvement in an Anonymous hack, 28-year-old Jeremy Hammond read a statement to the Manhattan court. As well as framing his hacktivism as a public service, aimed at revealing the shadier operations of corporate intelligence firms, Hammond told the court that the FBI had played a significant role in cyberattacks in which he had participated, using infamous Anonymous snitch Sabu to provide information to hackers.

    Hammond specifically noted that the FBI informant had provided him with information on vulnerabilities within the official websites of various governments around the world, including Brazil, Syria, Iran and Turkey. (The names of the nations were redacted from the court statement, but soon emerged online.)

    Hammond stated: “I broke into numerous sites and handed over passwords and back doors that enabled Sabu — and by extension his FBI handlers — to control these targets … The government celebrates my conviction and imprisonment, hoping that it will close the door on the full story. I took responsibility for my actions, by pleading guilty, but when will the government be made to answer for its crimes?”

    The hackivist’s contention here is that the U.S. government used hackers to garner information on, and cyber-advantage over, foreign governments. The hackers were then condemned as criminal, having unwittingly performed services for the U.S. government through illegal hacks. Whether or not the targets provided by Sabu were actually of interest to U.S. national intelligence, or whether they were simply valueless sting bate for hackers is unclear. What is evident, however, is that without government assistance, a number of illegal hacks would not have been carried out as they were. The decades-old question thus arises of when a government sting crosses the boundary into entrapment. In the years since 9/11, little more than a faint line in the sand seems to distinguish (legal) stings and (illegal) entrapment operations by the FBI.
    advertisement

    The criterion purportedly dividing sting and entrapment operations is weak. An operation counts as a sting (as opposed to entrapment) if it can be shown that a suspect would have carried out the crime, given the chance. It’s a perverse logic of hypotheticals when the government provides all the conditions for a crime to take place (e.g., providing talented hackers with government targets) — conditions that would not have been in place otherwise. A number of recent FBI cases relating to political activism have reeked of entrapment, but have been framed as stings. Recall, for example, the group of young Cleveland anarchists, strung along by an FBI agent into agreeing on a plan to blow up a bridge. The young men were, at every turn, prompted and offered materials by an FBI informant. “The alleged terrorist masterminds end up seeming, when the full story comes out, unable to terrorize their way out of a paper bag without law enforcement tutelage,” noted Rick Perlstein on the case in Rolling Stone last year.

    Hammond’s case is different. The 28-year-old is a smart, articulate and experienced activist and hacker. As his guilty plea made clear, he knew what he was doing and he acted in what he felt was the public interest, to expose and hold accountable the private intelligence industry. However, Hammond also engaged in wholly government-prompted hacks and is now being ferociously punished. If it can be shown that the U.S. government used information gathered by hackers on Sabu’s tips, crucial questions arise about why the hackers and not the government agencies that used their skills are being persecuted. If, however, Sabu’s information about foreign government sites’ vulnerabilities were no more than a lure, questions of entrapment should be raised. Either way, as Hammond begins his lengthy federal prison sentence for a nonviolent crime, through which he received no personal enrichment, the FBI’s role in catching the hacktivist deserves greater scrutiny.

    monday, Nov 18, 2013 05:51 PM +0100
    Natasha Lennard

    Find this story at 18 November 2013

    © 2013 Salon Media Group, Inc.

    Jailed Anonymous hacker Jeremy Hammond: ‘My days of hacking are done’

    Hammond calls his 10-year sentence a ‘vengeful, spiteful act’ by US authorities eager to put a chill on political hacking

    ‘I knew when I started out with Anonymous that being put in jail and having a lengthy sentence was a possibility,’ Hammond said. Photo: AP

    Jeremy Hammond, the Anonymous hacktivist who released millions of emails relating to the private intelligence firm Stratfor, has denounced his prosecution and lengthy prison sentence as a “vengeful, spiteful act” designed to put a chill on politically-motivated hacking.

    Hammond was sentenced on Friday at federal court in Manhattan to the maximum 10 years in jail, plus three years supervised release. He had pleaded guilty to one count under the Computer Fraud and Abuse Act (CFAA) flowing from his 2011 hack of Strategic Forecasting, Inc, known as Stratfor. In an interview with the Guardian in the Metropolitan Correction Center in New York, conducted on Thursday, he said he was resigned to a long prison term which he sees as a conscious attempt by the US authorities to put a chill on political hacking.

    He had no doubt that his sentence would be long, describing it as a “vengeful, spiteful act”. He said of his prosecutors: “They have made it clear they are trying to send a message to others who come after me. A lot of it is because they got slapped around, they were embarrassed by Anonymous and they feel that they need to save face.”

    Most pointedly, Hammond suggested that the FBI may have manipulated him to carry out hacking attacks on “dozens” of foreign government websites. During his time with Anonymous, the loose collective of hackers working alongside WikiLeaks and other anti-secrecy groups, he was often directed by a individual known pseudonomously on the web as “Sabu”, the leader of the Anonymous-affiliated group Lulzsec, who turned out to be an FBI informant.

    Hammond, who is under court orders restricting what he says in public, told the Guardian that Sabu presented him with a list of targets, including many foreign government sites, and encouraged him to break into their computer systems. He said he was not sure whether Sabu was in turn acting on behalf of the FBI or other US government agency, but it was even possible that the FBI was using Sabu’s internet handle directly as contact between the two hackers was always made through cyberspace, never face-to-face.

    “It is kind of funny that here they are sentencing me for hacking Stratfor, but at the same time as I was doing that an FBI informant was suggesting to me foreign targets to hit. So you have to wonder how much they really care about protecting the security of websites.”

    In the interview, conducted in a secure prison meeting room hours before the 28-year-old Chicagoan was sentenced, he was sanguine about his prospects. “I knew when I started out with Anonymous that being put in jail and having a lengthy sentence was a possibility. Given the nature of the targets I was going after I knew I would upset a lot of powerful people.”

    Dressed in a brown prison jump suit, and with a long wispy goatee and moustache (he planned to shave both off before the sentencing hearing), Hammond was scathing about the way the CFAA was being twisted in his view for political ends. “They are widening the definition of what is covered by the Act and using it to target specifically political activists,” he said.

    He invoked the memory of Aaron Swartz, the open-data crusader who killed himself in January while awaiting trial under the CFAA for releasing documents from behind the subscription-only paywall of an online research group. “The same beast bit us both,” Hammond said. “They went after Aaron because of his involvement in legitimate political causes – they railroaded charges against him, and look what happened.”

    Hammond has been in custody since March 2012 having been arrested in Chicago on suspicion of the Stratfor leak of millions of emails that were eventually released by WikiLeaks as the Global Intelligence Files. His sentence is an indication of the aggression with which prosecutors have been pursuing political hackers in the US – other Anonymous members in Britain involved in the breach of Stratfor were sentenced to much shorter jail terms.

    Hammond stressed that he had not benefitted personally in any way from the Stratfor email release, that exposed surveillance by private security firms on activists including Anonymous members themselves, Occupy protesters and campaigners in Bhopal, India involved in the push for compensation for victims of the 1984 industrial catastrophe. “Our main purpose in carrying out the Stratfor hack was to find out what private security and intelligence companies were doing, though none of us had any idea of the scale of it.”

    Paradoxically, Hammond insists that he would never have carried out the breach of Stratfor’s computer system had he not been led into doing it by Sabu – real name Hector Xavier Monsegur – the fellow hacker who is himself awaiting sentencing having pleaded guilty to 12 hacking-related criminal charges. “I had never heard of Stratfor until Sabu brought in another hacker who told me about it. Practically, I would never have done the Stratfor hack without Sabu’s involvement.”

    Hammond discovered that Monsegur was an FBI informant the day after his own arrest. As he was reading the criminal complaint against him, he saw quotes marked CW for “co-operating witness” that contained details that could only have come from Sabu.

    “I felt betrayed, obviously. Though I knew these things happen. What surprised me was that Sabu was involved in so much strategic targeting, in actually identifying targets. He gave me the information on targets.”

    Part of Sabu’s interest in him, he now believes, was that Hammond had access to advanced tools including one known as PLESK that allowed him to break into web systems used by large numbers of foreign governments. “The FBI and NSA are clearly able to do their own hacking of other countries. But when a new vulnerability emerges in internet security, sometimes hackers have access to tools that are ahead of them that can be very valuable,” he said.

    Looking back on his involvement with anonymous, the Chicagoan said that he had been drawn to work with Anonymous, because he saw it as “a model of resistance – it was decentralised, leaderless.” He grew increasingly political in his hacking focus, partly under the influence of the Occupy movement that began in Wall Street in September 2011 and spread across the country.

    Chelsea Manning, the US soldier formerly known as Bradley who leaked a massive trove of state secrets to WikiLeaks now serving a 35-year sentence in military jail, was a major influence on him. Manning showed him that “powerful institutions – whether military or private security firms – are involved in unaccountable activities that the public is totally unaware of that can only be exposed by whistleblowers and hackers”.

    Hammond has often described himself as an anarchist. He has a tattoo on his left shoulder of the anarchy symbol with the words: “Freedom, equality, anarchy”. Another tattoo on his left forearm shows the Chinese representation of “leader” or “army”, and a third tattoo on his right forearm is a glider signifying the hacking open-source movement that is drawn from the computer simulation Game of Life .

    He says he plans to use his time in prison “reading, writing, working out and playing sports – training myself to become more disciplined so I can be more effective on my release”. As to that release, he says he cannot predict how he will be thinking when he emerges from jail, but doubts that he would go back to hacking. “I think my days of hacking are done. That’s a role for somebody else now,” he said.

    Ed Pilkington in New York
    theguardian.com, Friday 15 November 2013 17.12 GMT

    Find this story at 15 November 2013

    © 2013 Guardian News and Media Limited or its affiliated companies. All rights reserved.

    A Conversation With Jeremy Hammond, American Political Prisoner Sentenced to 10 Years

    Jeremy Hammond, the Chicago activist and hacktivist (an activist who uses computer networks for political
    protests and other actions), was sentenced last week to 10 years in prison and three years of supervised release for hacking into the intelligence contractor Strategic Forcasting (or Stratfor) and other government, law enforcement and military suppliers’ websites.

    The Stratfor hack resulted in a cache of 5.2 million leaked emails and account information for approximately 860,000 Stratfor subscribers and clients, including information from 60,000 credit cards. To list a few of the many revelations, the emails revealed domestic spying on activists, including Occupy Wall Street; surveillance through persona management programs or fake online personas (“sock puppets”); and attempts to link American activist and journalist Alexa O’Brien to al-Qaeda. The Stratfor hack pullled back the curtain on the ofttimes illegal goings-on in the shadowy world of intelligence contractors.

    Mr. Hammond’s supervised release includes limited computer access and prohibits him using encryption and from associating with civil disobedience groups. The ban on encryption shows a fundamental misunderstanding of how the Internet works. Encryption is used in nearly every online transaction, such as email, social networking and online banking. The broad ban on freedom of association raises potential Constitutional issues. At the time of his arrest, Mr. Hammond was working under the banner of AntiSec, an offshoot of the hacktivist collective Anonymous.

    Jeremy Hammond, American Political Prisoner, courtesy of @FreeAnons.

    The packed courtroom looked more like a church wedding than a sentencing, with dozens of Westpoint cadets on a field trip sitting on the left and Mr. Hammond’s parents, friends and supporters — who caravanned from all over the U.S. to show solidarity for their fallen comrade — sitting on the right. Mr. Hammond, his attorneys, Sarah, Emily and Margaret Kunstler and Susan Kellman faced the stoic Judge Loretta Preska presiding over the solemn ceremony.

    On September 10th I visited Jeremy Hammond at Manhattan Correctional Center where he had been incarcerated for 18 months. Mr. Hammond, who was denied bail, was also disallowed all visitors, including family members. I am the first journalist with whom Mr. Hammond met since his arrest in March 2012. This interview was held months before sentencing. At the request of Mr. Hammond’s attorneys, who feared his words would be used at sentencing against him, I delayed publishing.
    ____________________________

    Vivien Lesnik Weisman: You are both a boots on the ground activist and a hacktivist. Can you explain hacktivisim, hacking for political purposes and off line activism?

    Jeremy Hammond: Hackers are by nature critical of systems, hacking is activism. The very act of hacking is inherently activist and political.

    VLW: How effective is activism without the added thread of technology, or hacktivism, in the modern world? Which is more effective?

    JH: Hacking is never going to take the place of grassroots community organizing. They complement each other.

    There is more to it of course than hacking. Hacktivism involves online social networking, sharing ideas. Protest is predictable; they know how to contain it. The government knows how to ignore it. Both direct action and civil disobedience are unpredictable. I’m all for it.

    I see hacktivism as a direct action tool. Offensive hacking with political intent is really nothing more than one more direct action tool. What you do when you get the information is what determines its efficacy as a direct action tool.

    And now because of the state of the world — foreclosures, the wars — hackers are becoming politicized. We break into systems and then movements like Occupy deliver the message. It all works together. There is street protest. There is direct action, and hacking is one more tool.

    Subverzo, hacktivist, at post-sentencing rally, Foley Square. Photo credit: Still from The Reality Wars, A.J. Abucay DP

    VLW: How did the decision to target the intelligence contractor, Stratfor, come about and what was your involvement?

    JH: Another hacker, who has not been indicted and therefore I will not name, brought the vulnerability. He had the credit cards already, before I ever got involved, on the Dec 5th. He chose Stratfor and brought it to us. There were 12 of us in the IRC (chat room) at that time.

    Stratfor was chosen by that hacker because Stratfor had targeted Anonymous and specifically #OpCartel (Anonymous action against Mexican drug cartels).

    Then the 12 of us in a private IRC channel approved it on the merits, as a meritocracy, the Anon way.

    None of the 12 in that chat room that included me and Sabu [hacker leader turned FBI informant] have ever been caught.

    Amongst the 12 were not only hackers. Some were social media types who brought attention to the actions.

    I did the Stratfor hack all by myself except for the original vulnerability. I was the main hacker in Anti-Sec.

    Sabu refers to Hetcor Xavier Monsegur, hacker and leader of LulzSec, an offshoot of Anonymous. LulzSec was an elite hacker collective that obtained notoriety as much for their high profile targets as for their clever self-promotion. Sabu was arrested by the FBI and began working for them that day. The following day he announced the formation of AntiSec, “the biggest unified collective of hackers in history.” Both in private IRC and through his various public Twitter accounts he encouraged hackers to join AntiSec and commit hacking crimes. Many hacktivists and rights organizations see these — including the Statfor hack — as government created crimes given that Sabu was working for his FBI handlers at the time he was inciting hackers to join AntiSec. After Sabu was turned, all of his actions can be seen as government actions. In essence, the name Sabu and the government can be used interchangeably in this context.

    He is responsible for the arrests of many Anons including Jeremy Hammond.

    Hector Xavier Monsegur Jr, hacker known by his nom de guerre Sabu, FBI informant.

    VLW: Did you ever suspect that Sabu was a Fed (FBI informant) before that became public?

    JH: I was in a chat room with 12 hackers. Chances are someone in there was a Fed. I don’t work with anyone who has not taken risks alongside me. Sabu had taken risks and hacked himself. Still, I could have done this all on my own. I was the main hacker in Anti-Sec.

    VLW: And that hacker who provided the exploits also came with the credit cards? And were the credit cards live?

    JH: Yes. The credit cards were live. We all spoke on Dec 6th and planned a coordinated day of action when we would choose charities and use the credit cards to make donations for Christmas to these charities, Christmas donations.

    VLW: LulzXmas?

    JH: Yes.

    Jeremy Hammond is often referred to as a digital Robin Hood for his participation in LulzXmas. Margaret Ratner Kunstler, Hammond’s attorney, clarified that her client did not himself make any donations or use the credit cards. He also did not personally profit from the hacked credit cards.

    JH: But our main focus was the emails, to reveal the spying. Stratfor was spying on the world. We revealed the anti-WikiLeaks actions by Stratfor. Stratfor was spying on Occupy Wall Street, WikiLeaks, and Anonymous.

    We didn’t even know about the Venezuelan coup discussions proving U.S. involvement in the attempted coup until we saw that in the Strafor emails later.

    It was all revealed on WikLeaks but I had moved on. I’d rather be hacking.

    [He smiles.]

    VLW: There is speculation that the Stratfor hack was designed by the government and carried out by their informant Sabu as an attempt to entrap Julian Assange by getting him to solicit information or even sell him information. Were you aware of such a plan and if so did you make a conscious decision to foil that plan by dumping on the Pirate Bay before the transaction could be completed?

    JH: No, that did not happen. Julian Assange and WikiLeaks was not a factor.

    In fact, many hacktivists make the claim that the Stratfor hack was designed to entrap Julian Assange. Hammond is not necessarily in a position to know whether that was the case or not.

    VLW: Stratfor was notified by the government that they had been penetrated and told to do nothing. Why did they allow Stratfor to be sacrificed?

    JH: We do not know to what degree they notified Stratfor. Interesting question, but we don’t know.

    VLW: Why did the Stratfor hack take so long to complete? And why destroy the servers?

    JH: I had to get to the mail servers. It takes time. We always destroy the servers.

    First you deface, then you take the information, then you destroy the server, for the Lulz [for fun], and so they can’t rebuild the system. We don’t want them to rebuild. And to destroy forensic information that could be used to find out who did it and how it was done.

    VLW: What are your preferred targets?

    JH: My preferred targets are military contractors, military suppliers and law enforcement.

    VLW: Intelligence contractors like Stratfor?

    JH: Tech intelligence firms are a preferred target. Tech firms — where white hat hackers are paid to target the 99% for their corporate overlord clients.

    Chris Hedges, journalist, TruthDig columnist, speaks at Hammond Rally. Photo credit: Still from The Reality Wars, A.J. Abucay DP

    Those firms also contain the keys to their corporate clients so there is a big payoff — Endgame Systems and Palantir, for example.

    Endgame Systems is the subject of much discussion. Engame Systems is self-described as providing offensive and defensive vulnerability research, mitigation of cyber-threats and cyber operations platforms. It is in the business of selling “zero day exploits.” That is, the vulnerabilities that have not yet been detected. According to a Business Week article, these zero day exploits are militarized and include entire blueprints of the computer systems of airports and other critical infrastructure including that of our western allies for example Paris’s Charles De Gaulle Airport. It is difficult to see how the sale of these exploits makes us more secure.

    A package of these zero day exploits can be purchased for 2.5 million dollars a year. The price list was revealed in a cache of emails in the HBGary hack, an earlier Anonymous operation. Endgame weaponry is sold by region — China, the Middle East, Russia, Latin America, and Europe. There are even target packs for European and other allies. That raises the question of whether these exploits are being sold to foreign actors. Even if not sold directly to enemies of the U.S., cyber munitions like conventional arms have a way of showing up in unintended places. Once these exploits are out there they are vulnerable to rouge hackers and rogue states.

    JH: White hat hackers are being paid to do supposedly defensive actions but they are offensive. White hat hackers are supposed to identify a vulnerability and then announce. But instead they sell the vulnerability, the exploits. So if you hack for the thrill it’s not ok. But for money, like Endgames, then somehow it is. And instead of going to jail for hacking you get awarded a government contract.

    At least, the NSA is supposed to — and that is a big “supposed to” — have some kind of government oversight and again that’s overstated; these government contractors, intel firms and tech firms like Stratfor have no oversight whatsoever. They are not bound by any laws. They are above the law. No FOIA (request for classified or other non-public information from the government under the Freedom Of Information Act) can compel them to reveal what they do. Rogue hackers have better access to vulnerabilities than government hackers.

    VLW: That reminds me of The Conscience of a Hacker by the Mentor. Did you read that?

    Known as the Hacker Manifesto, it could just be Jeremy Hammond’s ethos.

    It reads:
    You build atomic bombs, you wage wars, you murder, cheat, and lie to us and try to make us believe it’s for our own good, yet we’re the criminals.

    Yes, I am a criminal. My crime is that of curiosity. My crime is that of judging people by what they say and think, not what they look like.

    My crime is that of outsmarting you, something that you will never forgive me for. I am a hacker, and this is my manifesto. You may stop this individual, but you can’t stop us all… after all, we’re all alike.

    JH: From the 90’s? You hate me because I’m better than you are. Yeah, yeah.

    [He smiles.]

    Citizen journalist/activist and Hammond supporter Tara Jill Livestreams outside the court house. Photo credit: Still from The Reality Wars, A.J. Abucay DP

    VLW: What do you think about the new battlefield, or cyberwarfare?

    JH: The government calls it cybersecurity, but it’s really offensive hacking not just defensive.

    The Department of Defense deals in war and aggression but it is not called Department of War is it? The government calls what they do mitigation of the threat of a cyber offensive. But these are offensive acts. They are acts of war. This is the new terrain. The new battlefield.

    The war is on and it’s for the Internet. They spy on us, they spy on others, intellectual property rights wars, censorship….

    For example, when encryption first came out PGP (Pretty Good Privacy, the first publicly available encryption software) it was called a munition and they immediately tried to ban it.

    Encryption is part of our arsenal. It trumps the surveillance state.

    As Mr. Hammond was waiting to be handcuffed in order for me to be escorted out of the small room at Manhattan Correctional Center where Mr. Hammond and I had conversed for over 4 hours, I asked him one last question.

    VLW: You want to challenge the political system in the US and the world with technology. Is technology your weapon in the same way rifles were weapons in the past? Are you willing to die for your cause?

    Handcuffed and standing before me with the guard awaiting my exit he pondered the question. As the guard ushered me out he responded.

    JH: Die for my cause? Yes.
    Go to prison, die for my cause… or choose to live a life of submission.
    ____________________________

    Mr. Hammond’s bold and principled stand is sure to inspire others to make a similar choice.

    This is part one of a two part article.

    I am currently working on The Reality Wars, a feature length documentary about the targeting of activists, hacktivists and journalists by the US government and the nexus between intelligence contractors and the surveillance state. Jeremy Hammond and the Stratfor hack are covered in my film.

    Posted: 11/19/2013 10:18 am

    Find this story at 19 November 2013

    © 2013 TheHuffingtonPost.com, Inc.

    Cyber-Activist Jeremy Hammond Sentenced to 10 Years In Prison; The hacker, who pleaded guilty in May, is given the maximum sentence by a federal judge

    Cyber-activist Jeremy Hammond was sentenced to 10 years in federal prison this morning by Judge Loretta A. Preska in a federal courtroom in lower Manhattan for hacking the private intelligence firm Stratfor. When released, Hammond will be placed under supervised control, the terms of which include a prohibition on encryption or attempting to anonymize his identity online.

    Hammond has shown a “total lack of respect for the law,” Judge Preska said in her ruling, citing Hammond’s criminal record – which includes a felony conviction for hacking from when he was 19 – and what she called “unrepentant recidivism.” There is a “desperate need to promote respect for the law,” she said, as well as a “need for adequate public deterrence.”

    Read ‘Enemy of the State,’ Our 2012 Feature on Jeremy Hammond’s Rise and Fall

    As Hammond was led into the courtroom, he looked over the roughly 100 supporters who had shown up, smiled, and said, “What’s up, everybody?” Prior to the verdict, he read from a prepared statement and said it was time for him to step away from hacking as a form of activism, but recognized that tactic’s continuing importance. “Those in power do not want the truth exposed,” Hammond said from the podium, wearing black prison garb. He later stated that the injustices he has fought against “cannot be cured by reform, but by civil disobedience and direct action.” He spoke out against capitalism and a wide range of other social ills, including mass incarceration and crackdowns on protest movements.

    The Stratfor hack exposed previously unknown corporate spying on activists and organizers, including PETA and the Yes Men, and was largely constructed by the FBI using an informant named Hector Monsegur, better known by his online alias Sabu. Co-defendants in the U.K. were previously sentenced to relatively lighter terms. Citing Hammond’s record, Judge Preska said “there will not be any unwarranted sentencing disparity” between her ruling and the U.K. court’s decision.

    Hammond’s supporters and attorneys had previously called on Judge Preska to recuse herself following the discovery that her husband was a victim of the hack she was charged with ruling on. That motion was denied. (Full disclosure: This reporter previously spoke at a rally calling on Judge Preska to recuse herself.)

    Hammond’s defense team repeatedly stressed that their client was motivated by charitable intentions, a fact they said was reflected in his off-line life as well. Hammond has previously volunteered at Chicago soup kitchens, and has tutored fellow inmates in GED training during his incarceration.

    Rosemary Nidiry, speaking for the prosecution, painted a picture of a malicious criminal motivated by a desire to create “maximum mayhem,” a phrase Hammond used in a chat log to describe what he hoped would come from the Stratfor hack. Thousands of private credit card numbers were released as a result of the Stratfor hack, which the government argued served no public good.

    Sarah Kunstler, a defense attorney for Hammond, takes issue with both the prosecution and judge’s emphasis on the phrase “maximum mayhem” to the exclusion of Hammond’s broader philosophy shows an incomplete picture. “Political change can be disruptive and destructive,” Kunstler says. “That those words exclude political action is inaccurate.”

    Many supporters see Hammond’s case as part of a broader trend of the government seeking what they say are disproportionately long sentences for acts that are better understood as civil disobedience than rampant criminality. Aaron Swartz, who faced prosecution under the Computer Fraud and Abuse Act – the same statute used to prosecute Hammond – took his own life last year, after facing possible decades in prison for downloading academic journals from an MIT server. “The tech industry promised open access and democratization,” says Roy Singham, Swartz’s old boss and executive chairman of ThoughtWorks, a software company that advocates for social justice. “What we’ve given the world is surveillance and spying.” Singham says it’s “shameful” that “titans of the tech world” have not supported Hammond.

    Following his first conviction for hacking, Hammond said, he struggled with returning to that life, but felt it was his responsibility. That decision ultimately lead to the Stratfor hack. “I had to ask myself, if Chelsea Manning fell into the abysmal nightmare of prison fighting for the truth, could I in good conscience do any less, if I was able?” he said, addressing the court. “I thought the best way to demonstrate solidarity was to continue the work of exposing and confronting corruption.”

    by John Knefel
    NOVEMBER 15, 2013

    Find this story at 15 November 2013

    ©2013 Rolling Stone

    105 Years in Jail for Posting a Link? That’s what Barrett Brown is facing.

    A few months ago [1] I passed along the story of Barrett Brown, a young journalist/activist who relentlessly followed up on documents leaked by Anonymous, was targeted for this by the FBI, and who was eventually harassed enough that he cracked—which took the unfortunate form of recording a YouTube rant promising to “destroy” one of his tormentors.

    Brown was indicted for posting the YouTube threats, and there’s no question that it was an ill-advised rant regardless of the FBI instigation. But David Carr follows up with more today. It turns out that only three of the charges against Brown are related to the video. Twelve more are related to a link he posted in a chat room: [2]

    In December 2011, approximately five million e-mails from Stratfor Global Intelligence, an intelligence contractor, were hacked by Anonymous and posted on WikiLeaks. The files contained revelations about close and perhaps inappropriate ties between government security agencies and private contractors. In a chat room for Project PM, Mr. Brown posted a link to it.

    Among the millions of Stratfor files were data containing credit cards and security codes, part of the vast trove of internal company documents….According to one of the indictments, by linking to the files, Mr. Brown “provided access to data stolen from company Stratfor Global Intelligence to include in excess of 5,000 credit card account numbers, the card holders’ identification information, and the authentication features for the credit cards.”

    ….But keep in mind that no one has accused Mr. Brown of playing a role in the actual stealing of the data, only of posting a link to the trove of documents….“The YouTube video was a mistake, a big one,” said Gregg Housh, a friend of Mr. Brown’s who first introduced him to the activities of Anonymous. “But it is important to remember that the majority of the 105 years he faces are the result of linking to a file. He did not and has not hacked anything, and the link he posted has been posted by many, many other news organizations.”

    This is almost a textbook case of prosecutorial overreach. As Carr points out, the guy who actually stole the Stratfor information is facing a sentence of only ten years. So why is Brown facing 105 years? Certainly not for a video posted while he was in withdrawal from heroin addiction. More likely, it’s because the government considers him a thorn in their side and wants to send a message to anyone else planning to follow in Brown’s footsteps. That just ain’t right. As Carr says, “Punishment needs to fit the crime and in this instance, much of what has Mr. Brown staring at a century behind bars seems on the right side of the law, beginning with the First Amendment of the Constitution.”

    Links:
    [1] http://www.motherjones.com/kevin-drum/2013/03/barrett-brown-and-fbi
    [2] http://www.nytimes.com/2013/09/09/business/media/a-journalist-agitator-facing-prison-over-a-link.html?ref=business&pagewanted=all

    By Kevin Drum | Mon Sep. 9, 2013 8:47 AM PDT
    Social Title:
    105 years in jail for posting a link?

    Find this story at 9 September 2013

    Copyright ©2013 Mother Jones and the Foundation for National Progress.

    Barrett Brown’s Mother Will Be Sentenced Today

    The mother of Anonymous-affiliated activist Barrett Brown, Karen Lancaster McCutchin, will be sentenced today, November 8, the Associated Press reports.

    Back in May, she admitted to helping her son hide two laptops from federal agents that were investigating the activist. The laptops were hidden in a kitchen cabinet just as FBI agents were executing a search warrant.

    As per the plea agreement, McCutchin faces up to 12 months in prison and a fine of up to $100,000 (€75,000).

    In the meantime, the case of Barrett Brown continues. He is accused, among other things, of threatening a federal agent in a video published on YouTube, and posting links to information stolen by Anonymous hackers from the think tank Stratfor.

    He faces up to 105 years in prison and substantial fines.

    November 8th, 2013, 13:49 GMT · By Eduard Kovacs, November 8, 2013 [AP]

    Find this story at 8 November 2013

    © 2001 – 2013 Softpedia. All rights reserved.

    The Global Intelligence Files – Stratfor Files (2012)

    LONDON—Today, Monday 27 February, WikiLeaks began publishing The Global Intelligence Files – more than five million emails from the Texas-headquartered “global intelligence” company Stratfor. The emails date from between July 2004 and late December 2011. They reveal the inner workings of a company that fronts as an intelligence publisher, but provides confidential intelligence services to large corporations, such as Bhopal’s Dow Chemical Co., Lockheed Martin, Northrop Grumman, Raytheon and government agencies, including the US Department of Homeland Security, the US Marines and the US Defense Intelligence Agency. The emails show Stratfor’s web of informers, pay-off structure, payment-laundering techniques and psychological methods, for example :

    “[Y]ou have to take control of him. Control means financial, sexual or psychological control… This is intended to start our conversation on your next phase” – CEO George Friedman to Stratfor analyst Reva Bhalla on 6 December 2011, on how to exploit an Israeli intelligence informant providing information on the medical condition of the President of Venezuala, Hugo Chavez.

    The material contains privileged information about the US government’s attacks against Julian Assange and WikiLeaks and Stratfor’s own attempts to subvert WikiLeaks. There are more than 4,000 emails mentioning WikiLeaks or Julian Assange. The emails also expose the revolving door that operates in private intelligence companies in the United States. Government and diplomatic sources from around the world give Stratfor advance knowledge of global politics and events in exchange for money. The Global Intelligence Files exposes how Stratfor has recruited a global network of informants who are paid via Swiss banks accounts and pre-paid credit cards. Stratfor has a mix of covert and overt informants, which includes government employees, embassy staff and journalists around the world.

    The material shows how a private intelligence agency works, and how they target individuals for their corporate and government clients. For example, Stratfor monitored and analysed the online activities of Bhopal activists, including the “Yes Men”, for the US chemical giant Dow Chemical. The activists seek redress for the 1984 Dow Chemical/Union Carbide gas disaster in Bhopal, India. The disaster led to thousands of deaths, injuries in more than half a million people, and lasting environmental damage.

    Stratfor has realised that its routine use of secret cash bribes to get information from insiders is risky. In August 2011, Stratfor CEO George Friedman confidentially told his employees : “We are retaining a law firm to create a policy for Stratfor on the Foreign Corrupt Practices Act. I don’t plan to do the perp walk and I don’t want anyone here doing it either.”

    Stratfor’s use of insiders for intelligence soon turned into a money-making scheme of questionable legality. The emails show that in 2009 then-Goldman Sachs Managing Director Shea Morenz and Stratfor CEO George Friedman hatched an idea to “utilise the intelligence” it was pulling in from its insider network to start up a captive strategic investment fund. CEO George Friedman explained in a confidential August 2011 document, marked DO NOT SHARE OR DISCUSS : “What StratCap will do is use our Stratfor’s intelligence and analysis to trade in a range of geopolitical instruments, particularly government bonds, currencies and the like”. The emails show that in 2011 Goldman Sach’s Morenz invested “substantially” more than $4million and joined Stratfor’s board of directors. Throughout 2011, a complex offshore share structure extending as far as South Africa was erected, designed to make StratCap appear to be legally independent. But, confidentially, Friedman told StratFor staff : “Do not think of StratCap as an outside organisation. It will be integral… It will be useful to you if, for the sake of convenience, you think of it as another aspect of Stratfor and Shea as another executive in Stratfor… we are already working on mock portfolios and trades”. StratCap is due to launch in 2012.

    The Stratfor emails reveal a company that cultivates close ties with US government agencies and employs former US government staff. It is preparing the 3-year Forecast for the Commandant of the US Marine Corps, and it trains US marines and “other government intelligence agencies” in “becoming government Stratfors”. Stratfor’s Vice-President for Intelligence, Fred Burton, was formerly a special agent with the US State Department’s Diplomatic Security Service and was their Deputy Chief of the counterterrorism division. Despite the governmental ties, Stratfor and similar companies operate in complete secrecy with no political oversight or accountability. Stratfor claims that it operates “without ideology, agenda or national bias”, yet the emails reveal private intelligence staff who align themselves closely with US government policies and channel tips to the Mossad – including through an information mule in the Israeli newspaper Haaretz, Yossi Melman, who conspired with Guardian journalist David Leigh to secretly, and in violation of WikiLeaks’ contract with the Guardian, move WikiLeaks US diplomatic cables to Israel.

    Ironically, considering the present circumstances, Stratfor was trying to get into what it called the leak-focused “gravy train” that sprung up after WikiLeaks’ Afghanistan disclosures :

    “[Is it] possible for us to get some of that ’leak-focused’ gravy train ? This is an obvious fear sale, so that’s a good thing. And we have something to offer that the IT security companies don’t, mainly our focus on counter-intelligence and surveillance that Fred and Stick know better than anyone on the planet… Could we develop some ideas and procedures on the idea of ´leak-focused’ network security that focuses on preventing one’s own employees from leaking sensitive information… In fact, I’m not so sure this is an IT problem that requires an IT solution.”

    Like WikiLeaks’ diplomatic cables, much of the significance of the emails will be revealed over the coming weeks, as our coalition and the public search through them and discover connections. Readers will find that whereas large numbers of Stratfor’s subscribers and clients work in the US military and intelligence agencies, Stratfor gave a complimentary membership to the controversial Pakistan general Hamid Gul, former head of Pakistan’s ISI intelligence service, who, according to US diplomatic cables, planned an IED attack on international forces in Afghanistan in 2006. Readers will discover Stratfor’s internal email classification system that codes correspondence according to categories such as ’alpha’, ’tactical’ and ’secure’. The correspondence also contains code names for people of particular interest such as ’Hizzies’ (members of Hezbollah), or ’Adogg’ (Mahmoud Ahmedinejad).

    Stratfor did secret deals with dozens of media organisations and journalists – from Reuters to the Kiev Post. The list of Stratfor’s “Confederation Partners”, whom Stratfor internally referred to as its “Confed Fuck House” are included in the release. While it is acceptable for journalists to swap information or be paid by other media organisations, because Stratfor is a private intelligence organisation that services governments and private clients these relationships are corrupt or corrupting.

    WikiLeaks has also obtained Stratfor’s list of informants and, in many cases, records of its payoffs, including $1,200 a month paid to the informant “Geronimo” , handled by Stratfor’s Former State Department agent Fred Burton.

    WikiLeaks has built an investigative partnership with more than 25 media organisations and activists to inform the public about this huge body of documents. The organisations were provided access to a sophisticated investigative database developed by WikiLeaks and together with WikiLeaks are conducting journalistic evaluations of these emails. Important revelations discovered using this system will appear in the media in the coming weeks, together with the gradual release of the source documents.

    END

    Public partners in the investigation
    Comment
    Current WikiLeaks status
    How to read the data
    Public partners in the investigation:

    More than 25 media partners (others will be disclosed after their first publication) :

    Al Akhbar – Lebanon – http://english.al-akhbar.com
    Al Masry Al Youm – Egypt – http://www.almasry-alyoum.com
    Bivol – Bulgaria – http://bivol.bg
    CIPER – Chile – http://ciperchile.cl
    Dawn Media – Pakistan – http://www.dawn.com
    L’Espresso – Italy – http://espresso.repubblica.it
    La Repubblica – Italy – http://www.repubblica.it
    La Jornada – Mexico – www.jornada.unam.mx/
    La Nacion – Costa Rica – http://www.nacion.com
    Malaysia Today – Malaysia – www.malaysia-today.net
    McClatchy – United States – http://www.mcclatchydc.com
    Nawaat – Tunisia – http://nawaat.org
    NDR/ARD – Germany – http://www.ndr.de
    Owni – France – http://owni.fr
    Pagina 12 – Argentina – www.pagina12.com.ar
    Plaza Publica – Guatemala – http://plazapublica.com.gt
    Publico.es – Spain – www.publico.es
    Rolling Stone – United States – http://www.rollingstone.com
    Russian Reporter – Russia – http://rusrep.ru
    Sunday Star-Times – New Zealand – www.star-times.co.nz
    Ta Nea – Greece –- http://www.tanea.gr
    Taraf – Turkey – http://www.taraf.com.tr
    The Hindu – India – www.thehindu.com
    The Yes Men – Bhopal Activists – Global http://theyesmen.org
    Comment:

    WikiLeaks – Kristinn Hrafnsson, Official WikiLeaks representative, +35 4821 7121

    Other comment :
    Bhopal Medical Appeal (in UK) – Colin Toogood : colintoogood@bhopal.org / +44 (0) 1273 603278/ +44 (0) 7798 845074
    International Campaign for Justice in Bhopal (in India) – Rachna Dhingra : rachnya@gmail.com, +91 98 261 67369
    Yes Men – mike@theyesmen.org / +44 (0) 7578 682321 – andy@theyesmen.org, +1-718-208-0684
    Privacy International – +44 (0) 20 7242 2836

    Twitter tag : #gifiles
    CURRENT WIKILEAKS STATUS:

    An extrajudicial blockade imposed by VISA, MasterCard, PayPal, Bank of America, and Western Union that is designed to destroy WikiLeaks has been in place since December 2010. The EU Commission is considering whether it will open a formal investigation, but two lawsuits have been filed (http://wikileaks.org/Banking-Blocka…). There are also other ways to donate (https://shop.wikileaks.org/donate). It is legal to donate, including in the United States. The US Treasury has publicly stated that that there are no grounds to place WikiLeaks on a US government blacklist.

    WikiLeaks Founder and Publisher Julian Assange has not been charged with any crime in any country. Four prosecutors are currently trying to charge him under the Espionage Act of 1917 before a closed Grand Jury in Virginia, in the United States. Julian Assange has been detained for 447 days (10,728 hours) since Dec 7, 2010, without charge, and he is currently awaiting a decision from the UK Supreme Court on extradition to Sweden (http://www.justiceforassange.com/Su…). The decision is expected in March. The decision on whether he will be onwardly extradited to the US lies in the hands of the Swedish Executive, but Sweden’s Prime Minister Fredrik Reinfeldt has refused to state whether he will protect Assange from a politically motivated extradition to the United States (http://justice4assange.com/US-Extra… ).

    The Swedish Foreign Minister Carl Bildt has repeatedly attacked WikiLeaks this week in a bizarre manner (http://ferrada-noli.blogspot.com/20… ).

    An alleged WikiLeaks US military source, Bradley Manning, has been in pre-trial detention for 639 days (http://bradleymanning.org/ ). His arraignment took place on 24 February 2012. In December 2011, Manning’s attorney revealed in the preliminary hearing that the US government is attempting to enter a plea deal with Manning in order to “go after” Assange. Manning has 22 charges against him, including violating the Espionage Act of 1917 and aiding the enemy. Manning has deferred entering a plea. Julian Assange and WikiLeaks are legally represented in the Manning hearings by the US Centre for Constitutional Rights (http://ccrjustice.org/ ). WikiLeaks was denied full access to Manning’s hearing after appeal (http://ccrjustice.org/newsroom/pres… ). WikiLeaks put out a statement relating to Manning’s trial ahead of the Article 32 Hearing : (http://www.wikileaks.org/Statement-… ).

    The alleged WikiLeaks-supporting hacktivists known as the “PayPal 14” were arrested in 2011 following co-ordinated online demonstrations against the financial services companies that are carrying out the unlawful financial blockade on WikiLeaks (VISA, MasterCard, Paypal, Western Union, Bank of America). They are represented by attorney Stanley Cohen and will go before court in May 2012 (http://www.cyberguerrilla.org/?p=4644 ).

    WikiLeaks is about to launch a distributed, encrypted “Facebook for revolutionaries” (https://wlfriends.org/ ).

    Julian Assange is currently directing interviews, from house arrest, for a programme on the future of the world that is syndicated to various broadcasters. The first show will be broadcast in March (http://www.wikileaks.org/New-Assang… )
    HOW TO READ THE DATA

    This is a glossary and information on how to understand the internal terms and codes used by Stratfor in their emails. It is not a complete list. We call on the public to add to this list by tweeting #gifind

    To see a list of the terms George Friedman considers useful for his staff to know please download this PDF : The Stratfor Glossary of Useful, Baffling and Strange Intelligence Terms.

    OPEN SOURCE VS. “COVERT”

    As you browse through the content, you will notice that a large set of it is what is classified as “open source” (subject lines which include [OS]). These are basically email threads that start with someone posting a published and accessible source, such as news sites, and follow with commentary by the staff. In one of the emails, Joseph Nye is referenced saying :

    “Open source intelligence is the outer pieces of the jigsaw puzzle, without which one can neither begin nor complete the puzzle”

    CODES IN SUBJECT LINES

    Many of the emails have codes in the subject lines as well as in the body, to make it easier for the staff to “quickly identify when we need to go back and have a look-see.” [*] :

    Examples : INSIGHT – COUNTRY – Subject – SOURCE CODE INSIGHT – CHINA – Trains and planes – CN1000

    Please refer to the glossary for the code names of subject and country tags, as well as mailing list names.

    SOURCE CODES

    A lot of interesting stuff comes from “sources”. Sources are either informal contacts or people they have a formal relationship with. The IDs for sources have the format of CN120 or ME001. In terms of the character part, it refers to a region or a country :

    A) Regions ME – Middle East region EU – European Union EE – Eastern Europe LA- South America SA- South Asia

    B) Countries or Orgs CN – China PK – Pakistan IN- India ML – Malaysia VN – Vietnam NP- Nepal

    US – United States VZ – Venezuela CO- Colombia BR-Brazil NC- Nicaragua MX- Mexico CL/CH- Chile AR- Argentina PY- Paraguay BOL- Bolivia

    RU – Russia UA – Ukraine GE – Georgia TJ – Tajikstan MD – Moldova BG -Bulgaria CR/CZ- Czech Republic PT- Portugal

    ZA – South Africa AO – Angola SO – Somalia NG- Nigeria CD- DR Congo CI- Cote D’Ivoire ZW- Zimbabwe ZM- Zambia RW- Rwanda KE- Kenya ET- Ethiopia SD -Sudan MA- Morocco SN- Senegal GN- Guinea SL- Sierra Leone

    IR – Iran IQ- Iraq IL or IS- Israel SA- Saudi Arabia SY- Syria KU- Kuwait Y or YN – Yemen HZ – Hizbollah TK – Turkey LN- Lebanon LY- Libya UAE- UAE EG- Egypt (etc.)

    C) Odd codes OCH – Old China hand, a finance insider. Stick – Scott Stewart, high level employee Z’s – Zetas, Mexican drug gang

    INSIGHTS FORMAT

    When “insights” are sent, they usually have the following header information :

    SOURCE : The ID of the source, say CN123. Sometimes this is left “no source ID” when it’s a new source.

    ATTRIBUTION : How the source is to be attributed, i.e. “Source in the pharma distribution industry in China”, Stratfor source, etc.

    SOURCE DESCRIPTION : Describes the source, for example : “Source works with Mercator Pharmaceutical Solutions, distributing pharma to developing countries.” These include concrete details on the source for internal consumption so that there’s a better understanding on the source’s background and ability to make assessments on the ground.

    PUBLICATION : Yes or No. If the option is yes it doesn’t mean that it would be published, but rather that it _can_ be published.

    SOURCE RELIABILITY : A/B

    SOURCE RELIABILITY : A-F, A being the best and F being the worst. This grades the turnaround time of this source in responding to requests.

    ITEM CREDIBILITY : 1-10, 1 being the best and 10 being the worst (we may change the range here in the future). this changes a lot based on the info provided. 1 is “you can take this to the bank” and 10 would be an example of maybe – “this is a totally ridiculous rumor but something that is spreading on the ground”

    SPECIAL HANDLING : often this is “none” but it may be something like, “if you use this we need to be sure not to mention the part about XXX in the publication” or any other special notes

    SOURCE HANDLER : the person who can take follow-up questions and communicate with the source.

    MAILING LISTS

    alpha@stratfor.com Discussions circulated exclusively among analysts, writers and higher-ups, including ’insights’ and discussions about sources and source meetings. secure@stratfor.com Discussions circulated exclusively among analysts and higher-ups, and only for use within continental US (analysts traveling ’overseas’ are removed from the list for the duration of their journey). analysts@stratfor.com – Discussion among analysts only, who manage sources, gather and analyze intelligence. ct@stratfor.com Ongoing discussions to collect and analyze counterterrorism intelligence, circulated among select group of analysts. tactical@statfor.com Non-time sensitive discussions for internal training on technical and tactical matters within field of counterterrorism. intelligence@stratfor.com gvalerts@stratfor.com – Related to Gas ventures clients military@stratfor.com Military list for pre-approved staff africa@stratfor.com eastasia@stratfor.com mesa@stratfor.com Middle East/South Asia list for pre-approved staff. eurasia@stratfor.com os@stratfor.com List with information from the public domain circulated and discussed among all employees. adp@stratfor.com List for ADPs. See Glossary. translations@stratfor.com alerts@stratfor.com responses@stratfor.com dialog-list@stratfor.com

    GLOSSARY

    a) Industry and other misc. tags :

    HUMINT – Human intelligence OSINT- Open source intelligence DATA FLU BIRDFLU ECON TECH ENERGY MINING GV – Gas Venture CT – Counterterrorism G1-G4 B2-B4 S1-S4 MILITARY or MIL PENTAGON AQ- Al Qaeda AQAP – Al Qaeda in the Arabia Peninsula SF- Special Forces CONUS- Continental US

    b) Special internal codewords :

    Hizzies or HZ – Hizbollah Izzies or IZ – Israel A-dogg – Mahmoud Ahmadinajad, Iranian President Baby bashar – Bashar Al-Assad, Syrian President Uncle Mo – Moammar Gaddhafi ADP- Analyst Development Program. Four-month program at STRATFOR from which candidates— mostly recent college graduates— are selected for hire. Strictly protect and protect – Often mentioned in the ’subject’, means that the source is protected. Played- A term used for procuring sensitive information from sources. E.g. from one of the secure list messages circulating the ’complete scenario for the Israeli team in Centcom’s war game,’ the analyst who procured the data wrote : “I played the head of the Mossad which was great fun.” Excomm- Appears to be ’executive committee’ of STRATFOR.

    c) Regions and Orgs

    AFRICOM – African countries LATAM – Latin American MERCOSUR NATFA ASEAN APEC FSU – Former Soviet Union countries MESA or MIDDLEEAST – Middle East EASTASIA OPEC EURASIA SA – South Asia FSB- Federal Security Service (Russia)

    ATTACHED DOCUMENTS

    Attached documents can be searched by Filename or part of the file name. Preliminary searches for filenames using the terms ’lists’, ’source lists’ or ’insight lists’, coupled with the names of source handlers (e.g. Reva for Turkey, Brazil or Venezuela) produced Excel lists of the source names, contact info and source descriptions which correspond to the source codes (e.g. ME1315).

    Sourcing Criteria

    The following are the proposed criteria for analyzing both sources and insight.

    1. Source Timeliness 2. Source Accessibility/Position 3. Source Availability 4. Insight Credibility 5. Insight Uniqueness

    Source Timeliness : This is the average grade on how long this particular source turns around tasks and replies to inquiries. It may change but is more of a static indicator.

    Source Accessibility : Accessibility weighs the source’s position to have certain knowledge in a particular field. So, for example, if we are looking for energy insight and the source is an official in an energy agency, his or her Accessibility would be ranked higher than if s/he was a banker giving insight on energy. While we would welcome a banker giving his/her insight, a good source may not have a high accessibility ranking if they aren’t in a position to offer reliable insight on a certain topic. The source’s access to decision makers, specific training or education in the desired topic area, specific knowledge of events/situations/incidents can also be considered.

    Source Availability : How often can we go to this source ? Are they someone we can tap daily, weekly, monthly, yearly ?

    Insight Credibility : This is our assessment of the veracity of the insight offered. Here we need to consider whether or not this is disinformation, speculation, correct data or knowledgeable interpretation. Any bias that the source is displaying or any specific viewpoints or personal background the source is using in the assessment provided should also be considered.

    Insight Uniqueness : Is this insight something that could be found in OS ? If it is but the analysis of the information is unique, it would still have a high uniqueness ranking. Or, if it is concrete data, but is something that is only offered to industry insiders, i.e. stats that aren’t published but that aren’t secret, it would still have a high uniqueness score.

    Scoring

    All of the above factors will be scored on an A-F scale, with A being exemplary and F being useless.

    Source Timeliness : A = turnaround within 24 hours B = turnaround within 48 hours C = turnaround within a week D = turnaround within a month F = lucky to receive a reply at all

    Source Accessibility : A = Someone with intimate knowledge of the particular insight B = Someone within the industry but whose knowledge of the topic is not exact (e.g. if we were asking someone in the oil industry about natural gas) C = Someone working close to the industry who doesn’t have intimate knowledge of a particular topic but can speak to it intelligently (e.g. a financial consultant asked to gauge the movement of the stock market) D = Someone who may know a country but doesn’t have any concrete insight into a particular topic but can offer rumors and discussions heard on the topic F = Someone who has no knowledge of a particular industry at all

    Source Availability : A = Available pretty much whenever B = Can tap around once a week C = Can tap about once a month D = Can tap only several times a year F = Very limited availability

    Insight Credibility : A = We can take this information to the bank B = Good insight but maybe not entirely precise C = Insight is only partially true D = There may be some interest in the insight, but it is mostly false or just pure speculation. F = Likely to be disinformation

    Insight Uniqueness : A = Can’t be found anywhere else B = Can only be found in limited circles C = Insight can be found in OS, but the source has an interesting take/analysis D = Insight can be found in OS, but still may not be common knowledge F = Insight is accessible in numerous locations

    Daily Insight Scoring

    SOURCE : code ATTRIBUTION : this is what we should say if we use this info in a publication, e.g. STRATFOR source/source in the medical industry/source on the ground, etc SOURCE DESCRIPTION : this is where we put the more concrete details of the source for our internal consumption so we can better understand the source’s background and ability to make the assessments in the insight. PUBLICATION : Yes or no. If you put yes it doesn’t mean that we will publish it, but only that we can publish it. SOURCE RELIABILITY : A-F. A being the best and F being the worst. This grades the source overall – access to information, timeliness, availability, etc. In short, how good is this source ? ITEM CREDIBILITY : A-F. A = we can take this info to the bank ; B = Good insight but maybe not entirely precise ; C = Insight is only partially true ; D = There may be some interest in the insight, but it is mostly false or just pure speculation ; F = Likely to be disinformation. SPECIAL HANDLING : often this is “none” but it may be something like, “if you use this we need to be sure not to mention the part about XXX in thepublication” or any other special notes SOURCE HANDLER : the person who can take follow-up questions and communicate with the source.

    Lead journalist: Sarah Harrison

    Find this story at 27 February 2012

    Meet the Private Companies Helping Cops Spy on Protesters

    Promotional materials for private spy companies show that mass surveillance technology is being sold to police departments as a way to monitor dissent

    The documents leaked to media outlets by former NSA contractor Edward Snowden this year have brought national intelligence gathering and surveillance operations under a level of scrutiny not seen in decades. Often left out of this conversation, though, is the massive private surveillance industry that provides services to law enforcement, defense agencies and corporations in the U.S. and abroad – a sprawling constellation of companies and municipalities. “It’s a circle where everyone [in these industries] is benefitting,” says Eric King, lead researcher of watchdog group Privacy International. “Everyone gets more powerful, and richer.”

    Promotional materials for numerous private spy companies boast of how law enforcement organizations can use their products to monitor people at protests or other large crowds – including by keeping tabs on individual people’s social media presence. Kenneth Lipp, a journalist who attended the International Association of Chiefs of Police conference in Philadelphia from October 19th to 23rd, tells Rolling Stone that monitoring Twitter and Facebook was a main theme of the week. “Social media was the buzzword,” says Lipp. He says much of the discussion seemed to be aimed at designing policies that wouldn’t trigger potentially limiting court cases: “They want to avoid a warrant standard.”

    While the specifics of which police departments utilize what surveillance technologies is often unclear, there is evidence to suggest that use of mass surveillance against individuals not under direct investigation is common. “The default is mass surveillance, the same as NSA’s ‘collect it all’ mindset,” says King. “There’s not a single company that if you installed their product, [it] would comply with what anyone without a security clearance would think is appropriate, lawful use.”

    The YouTube page for a company called NICE, for instance, features a highly produced video showing how its products can be used in the event of a protest. “The NICE video analytic suite alerts on an unusually high occupancy level in a city center,” a narrator says as the camera zooms in on people chanting and holding signs that read “clean air” and “stop it now.” The video then shows authorities redirecting traffic to avoid a bottleneck, and promises that all audio and video from the event will be captured and processed almost immediately. “The entire event is then reconstructed on a chronological timeline, based on all multimedia sources,” says the narrator. According to an interview with the head of NICE’s security division published in Israel Gateway, NICE systems are used by New Jersey Transit and at the Statue of Liberty, though it isn’t clear if they are the same products shown in the video.

    “Thousands of customers worldwide use NICE Security solutions to keep people safe and protect property,” says Sara Preto, a spokesperson for NICE. She declined to confirm any specific clients, but added: “We work with law enforcement and other government agencies within the framework of all relevant and national laws.”

    Another program, made by Bright Planet and called BlueJay, is billed in a brochure to law enforcement as a “Twitter crime scanner.” BlueJay allows cops to covertly monitor accounts and hashtags; three that Bright Planet touts in promotional material are #gunfire, #meth, and #protest. In another promotional document, the company says BlueJay can “monitor large public events, social unrest, gang communications, and criminally predicated individuals,” as well as “track department mentions.” Bright Planet did not respond to a request for comment.

    A third company, 3i:Mind, lays out a scenario for a potential law enforcement client that begins: “Perhaps you are tracking an upcoming political rally.” It continues:

    Once you set up the OpenMIND™ system to profile and monitor the rally, it will search the web for the event on web pages, social networking sites, blogs, forums and so forth, looking for information about the nature of the rally (e.g. peaceful, violent, participant demographics), try to identify both online and physical world activist leaders and collect information about them, monitor the event in real-time and alert you on user-defined critical developments.

    The scenario concludes: “Your insight is distributed to the local police force warning them that the political rally may turn violent and potentially thwarting the violence before it occurs.” The 3i:Mind website gives no clues at to which governments or corporations use their products, and public information on the company is limited, though they have reportedly shown their product at various trade shows and police conferences. The company didn’t respond to a request for comment.

    Other companies are less upfront about how their products can be used to monitor social unrest. A product that will be familiar to anyone who attended an Occupy Wall Street protest in or around New York’s Zuccotti Park is SkyWatch, by FLIR, pointed out to Rolling Stone by Lipp, the journalist who attended the police conference. SkyWatch is a mobile tower in the form of a two-person cab that can be raised two stories high to provide “an array of surveillance options,” according to a promotional brochure. Those options include cameras and radar, as well as “customizable” options. The brochure says SkyWatch is perfect for “fluid operations whether on the front lines or at a hometown event.” As of this writing, the NYPD still has a SkyWatch deployed in a corner of Zuccotti Park, where Occupy activists were evicted by the police nearly two years ago.

    These promotional materials, taken together, paint a picture not only of local police forces becoming increasingly militarized, but also suggest departments are venturing into intelligence-gathering operations that may go well beyond traditional law enforcement mandates. “Two things make today’s surveillance particularly dangerous: the flood of ‘homeland security’ dollars (in the hundreds of millions) to state and local police for the purchase of spying technologies, and the fact that spook technology is outpacing privacy law,” says Kade Crockford, director of the Massachusetts ACLU’s technology for liberty program and the writer of the PrivacySOS blog, which covers these issues closely. “Flush with fancy new equipment, police turn to communities they have long spied on and infiltrated: low-income and communities of color, and dissident communities.”

    Many of the legal questions surrounding these kinds of police tactics remain unsettled, according to Faiza Patel, co-director of the Liberty and National Security program at New York University Law School’s Brennan Center for Justice. Information that is publicly available, like tweets and Facebook posts, is generally not protected by the Fourth Amendment, though legal questions may arise if that information is aggregated on a large scale – especially if that collection is based on political, religious or ethnic grounds. “This information can be useful, but it can also be used in ways that violate the Constitution,” says Patel. “The question is: what are [police departments] using it for?”

    Rolling Stone contacted police departments for the cities of New York City, Los Angeles, Chicago, Philadelphia and Washington D.C. for comment on this story.

    “The Philadelphia Police Department has their own cameras,” says that force’s spokesperson Jillian Russell. “The department does not have private surveillance companies monitor crime.” She directed follow-up questions about software used to process big data to a deputy mayor’s office, who didn’t return a phone call asking for comment.

    When asked if the LAPD uses programs to monitor protesters, a media relations email account sent an unsigned message that simply read: “We are not aware of this.”

    The other police departments did not respond to requests for comment.

    By JOHN KNEFEL
    October 24, 2013 3:16 PM ET

    Find this story at 24 October 2013

    Copyright ©2013 Rolling Stone

    Eskom apologises for spying on NGOs

    Nongovernmental organisations (NGO) GroundWork, Earthlife Africa and Greenpeace Africa have agreed to rejoin State-owned power utility Eskom’s NGO forum after the parastatal acknowledged that an investigation into its now-terminated contract with intelligence support services company Swartberg revealed that the firm was “spying” on the environmental groups.

    Eskom said in a statement on Monday that security management at the Medupi coal-fired power station, in Limpopo, had entered into the contract with Swartberg to “ensure protection of the Medupi site and to better anticipate threats to personnel and property”, following civil unrest at Medupi in May 2011.

    However, following media reports that Swartberg was gathering intelligence from the three organisations, the NGO forum members suspended their participation in February, calling for an investigation by the energy provider.

    After terminating the contract with Swartberg, Eskom commissioned independent legal firm Bowman Gilfillan to initiate an investigation, which revealed “concerns” about the way in which the contract was managed.

    After disclosing the extent, process and outcome of the investigation to the three affected NGOs, Eskom CEO Brian Dames said the use of private companies to gather intelligence from stakeholders was “unacceptable” and “not how Eskom does business”.

    “To the extent that this may have happened as a consequence, even if unintended, is regrettable and Eskom apologises for this,’’ he commented.

    The NGOs said in a statement that they believed their key demand for a full internal investigation and a public apology had been met.

    “We, therefore, think it is in order to return to the stakeholder forum, where we will continue to engage and, where necessary, challenge Eskom on its energy choices,” they stated.

    Eskom said it had, since the outcome of the investigation, taken steps to strengthen internal controls and brought the matter to the attention of the South African Police Service to determine whether any laws were contravened, and if any further action was required.

    The group said it would also implement the recommendations made following the investigation, including pursuing disciplinary action against individuals who did not comply with Eskom policies.

    Published 11 Nov 2013
    Article by: Natalie Greve

    Find this story at 11 November 2013

    Copyright © Creamer Media (Pty) Ltd

    Australian spy agency helped BHP negotiate trade deals

    An apology is the least Indonesia can expect from Australia following revelations of electronic spying, according to Greens Senator Scott Ludlam.

    BHP was among the companies helped by Australian spy agencies as they negotiated trade deals with Japan, a former Australian Secret Intelligence Service officer says.

    A former diplomat has also confirmed Australian intelligence agencies have long targeted Japanese companies. Writing in The Japan Times, Professor Gregory Clark said Australian companies were beneficiaries of intelligence operations.

    “In Australia, favoured firms getting spy material on Japanese contract policies and other business negotiations used to joke how [it had] ‘fallen off the back of a truck’,” Professor Clark wrote.

    “BHP knew we were giving them secret intelligence. They lapped it up.”

    Business information is a main target for [intelligence] agencies, he said. “The targeting is also highly corrupting since the information can be passed on selectively to co-operative firms – often firms that provide employment and cover for spy operatives.”
    Professor Clark’s observations are supported by a former Australian Secret Intelligence Service officer who said that commercial information became a priority after the global economic turmoil of the 1970s.

    “Suddenly [the Australian government] wanted to know what the demand would be for Australian iron ore and other commodities, and just what price the Japanese were prepared to pay for steel,” the former intelligence officer said.

    “We gave market information [to] major companies like BHP which were helpful to us, and officers at overseas stations would trade snippets with some of their commercial contacts … BHP knew we were giving them secret intelligence. They lapped it up.”

    The former spy says informal exchanges with business executives were continuing when he retired in the 1990s. More recently, US diplomatic cables obtained by WikiLeaks and published by Fairfax Media in 2011 revealed former BHP Billiton chief executive Marius Kloppers privately offered “to trade confidences” with US officials about China.

    ”Kloppers has a keen interest in learning everything he can about the Chinese and is not shy about asking us for our impressions,” US Consul-General Michael Thurston reported to Washington in 2009. BHP declined to comment at the time.

    The US and Britain have repeatedly denied charges of economic espionage following the disclosures of US intelligence contractor Edward Snowden. Australia says it is longstanding policy not to comment on intelligence matters.

    Australian National University international relations expert Dr Michael McKinley said: ”While most countries might have suspicions … the revelation of economic espionage has the potential to be highly embarrassing.”

    Professor Clark also highlights the potential for secret intelligence to harm diplomatic relations.

    After leaving the Australian foreign service in the mid 1960s because of his opposition to Australia’s participation in the Vietnam War, Professor Clark pursued a distinguished academic career in Japan.

    However as an Australian Government consultant he was also involved in policy making on Australian-Japanese relations in 1974-76.

    In his memoirs, Professor Clark recalls how “a piece of phoney information from an incompetent ASIS spy in Tokyo desperate to impress superiors” was used by conservative Canberra bureaucrats to stall trade negotiations with Japan during the Whitlam Labor Government.

    “[E]ven when it is clear that the information is unreliable and the spies are out of control, it is hard for anyone to complain or disagree,” he says.

    November 7, 2013
    Philip Dorling

    Find this story at 7 November 2013

    Copyright © 2013 Fairfax Media

    CSEC and Brazil: “Whose interests are being served”? (2013)

    Amusing to see both NaPo and the G&M hosting remarks from former CSIS deputy director Ray Boisvert dismissing the recent Snowden/Greenwald docs which revealed CSEC spied on Brazil’s Mines and Energy Ministry.

    Snowden was present at the Five Eyes conference where the CSEC presentation on their Olympia spying program on Brazil took place.

    Boisvert in both papers:

    “We were all too busy chasing bad guys who can actually kill people. The idea that we spend a lot of time, or any time at all, on a country like Brazil is pretty low margin stuff, not likely to happen.”

    The docs probably only represent “a war gaming exercise,” says Boisvert:

    “They have to do paper exercises and say, ‘OK, let’s say our target in counter-terrorism lives in Mali and we have to go up against the Malian telecommunications system.’ They’ll go look at another country and say, ‘OK, well they have a similar network so let’s do a paper exercise and say ‘what do we need?’” he said. ‘I think that’s all this was.’”

    Because when you’re “busy chasing bad guys who can actually kill people” and stuff, naturally your anti-terrorism war games will entail a cyber-espionage program searching for corporate secrets in a country where 40 of your own country’s mining corporations are operating.

    Wouldn’t have anything to do with looking for info on Brazil wanting to block a Canadian mining company from opening the largest open pit gold mine in Brazil, would it? Brazilian prosecutors say the company has failed to study the impact on local Indian communities and has advertised on its own website “plans to build a mine twice the size of the project first described in an environmental assessment it gave state officials.”

    Ok, foreign media. The Guardian, today:

    Canadian spies met with energy firms, documents reveal

    “The Canadian government agency that allegedly hacked into the Brazilian mining and energy ministry has participated in secret meetings in Ottawa where Canadian security agencies briefed energy corporations.

    According to freedom of information documents obtained by the Guardian, the meetings – conducted twice a year since 2005 – involved federal ministries, spy and police agencies, and representatives from scores of companies who obtained high-level security clearance.

    Meetings were officially billed to discuss ‘threats’ to energy infrastructure but also covered ‘challenges to energy projects from environmental groups,’ ‘cyber security initiatives’ and ‘economic and corporate espionage.’

    The documents – heavily redacted agendas – do not indicate that any international espionage was shared by CSEC officials, but the meetings were an opportunity for government agencies and companies to develop ‘ongoing trusting relations’ that would help them exchange information ‘off the record,’ wrote an official from the Natural Resources ministry in 2010.”

    Thank you, Enbridge, for providing the snacks for the one in May 2013.

    “Keith Stewart, an energy policy analyst with Greenpeace Canada, said: ‘There seems to be no limit to what the Harper government will do to help their friends in the oil and mining industries. They’ve muzzled scientists, gutted environmental laws, reneged on our international climate commitments, labelled environmental critics as criminals and traitors, and have now been caught engaging in economic espionage in a friendly country. Canadians, and our allies, have a right to ask who exactly is receiving the gathered intelligence and whose interests are being served.’”

    Good question. And did no Canadian media request these same FOIs?

    You know, I think I blogged about government security briefings to energy companies a few years ago — I’ll see if I can find it.

    Meanwhile, would be interesting to hear Boisvert’s explanation as to why the CSEC logo appeared on another NSA doc about intercepting phone calls and emails of ministers and diplomats at the 2009 G20 summit in London.

    More “paper exercises”? Filling in an empty spot on the page while chasing bad guys?

    And re the recent NSA spying on Brazil PM Dilma Rousseff and the state oil company Petrobras: Did CSEC help out its Five Eyes partner there too?

    Back in 1983, CSEC spied on two of Margaret Thatcher’s cabinet ministers on behalf of Thatcher and Britain’s spy agency GCHQ, so this wouldn’t exactly be new territory for CSEC.

    Fun fact : The annual report on CSEC produced by its independent watchdog commissioner must first be vetted by CSEC “for national security reasons” before it can be released.

    P.S. I pillaged the CSEC slide at top from Lux ex Umbra, where you can view the rest of them.

    Posted by admin on October 10, 2013 · Leave a Comment
    By Alison@Creekside

    Find this story at 10 October 2013

    Copyright © 2013

    Trade Secrets : Is the U.S.’s most advanced surveillance system feeding economic intelligence to American businesses? (1999)

    No one is surprised that the United States uses sophisticated electronic spying techniques against its enemies. But Europeans are increasingly worried about allegations that the U.S. uses those same techniques to gather economic intelligence about its allies.

    The most extensive claims yet came this spring in a report written for the European Parliament. The report says that the U.S.

    National Security Agency, through an electronic surveillance system called Echelon, routinely tracks telephone, fax, and e-mail transmissions from around the world and passes on useful corporate intelligence to American companies.

    Among the allegations: that the NSA fed information to Boeing and McDonnell Douglas enabling the companies to beat out European Airbus Industrie for a $ 6 billion contract; and that Raytheon received information that helped it win a $ 1.3 billion contract to provide radar to Brazil, edging out the French company Thomson-CSF. These claims follow previous allegations that the NSA supplied U.S. automakers with information that helped improve their competitiveness with the Japanese (see “Company Spies,” May/June 1994).

    Is there truth to these allegations? The NSA is among the most secretive of U.S. intelligence agencies and won’t say much beyond the fact that its mission is “foreign signals intelligence.” The companies involved all refused to comment.

    “Since the NSA’s collection capabilities are so grotesquely powerful, it’s difficult to know what’s going on over there,” says John Pike, an analyst at the watchdog group Federation of American Scientists, who has tracked the NSA for years.

    This much is known: The NSA owns one of the largest collections of supercomputers in the world, and it’s an open secret–as documented in the European Parliament report–that Echelon vacuums up massive amounts of data from communications satellites and the Internet and then uses its computers to winnow it down. The system scans communications for keywords–“bomb,” for instance–that might tip off analysts to an interesting topic.

    Fueling allegations of corporate espionage is the fact that defense contractors and U.S. intelligence agencies are linked extensively through business relationships. Raytheon, for instance, has large contracts to service NSA equipment, according to the European report.

    Englishman Glyn Ford, the European Parliament member who initiated the study, wants the NSA to come clean about its activities in Europe. And the Europeans have some leverage on this issue, if they decide to use it. In a drive to improve surveillance, the United States is pressuring European governments to make telephone companies build eavesdropping capabilities into their new systems. But if that’s what the U.S. wants, says Ford, it’s going to have to be open about what information it’s collecting: “If we are going to leave the keys under the doormat for the United States, we want a guarantee that they’re not going to steal the family silver,” he says.

    In the meantime, congressional critics have started to wonder if all that high-powered eavesdropping is limited to overseas snooping. In April, Bob Barr (R-Ga.), a member of the House Government Reform Committee, said he was worried by reports that the NSA was engaged in illicit domestic spying.

    “We don’t have any direct evidence from the NSA, since they’ve refused to provide any reports, even when asked by the House Intelligence Committee,” Barr says. “But if in fact the NSA is pulling two million transmissions an hour off of these satellites, I don’t think there’s any way they have of limiting them to non-U.S. citizens.”

    Last May, after the NSA stonewalled requests to discuss the issue, Congress amended the intelligence appropriations bill to require the agency to submit a report to Congress. (The bill is still in a conference committee.) And the NSA will face more questions when the Government Reform Committee holds hearings on Echelon and other surveillance programs.

    “We ought to prevent any agency from the dragnet approach–where they throw out a net and drag anything in,” Barr says.

    Kurt Kleiner
    Mother Jones November 1, 1999

    Find this story at 1 November 2013

    Copyright ©2013 Mother Jones and the Foundation for National Progress.

    Moscow Denies U.S.-Based Diplomat Sought Young Spies

    Moscow has angrily denied that one of its diplomats in Washington tried to recruit young Americans to spy for Russian intelligence agencies, calling the allegations a “horror story” reminiscent of the Cold War.

    The spy flap centering around the 59-year-old head of a Kremlin-funded cultural exchange program raises the specter of a new dispute rocking already stormy relations between Russia and the U.S.

    The FBI is investigating whether Yury Zaitsev, head of the Russian Center for Science and Culture, is a Russian intelligence officer who arranged all-expense-paid trips to Russia aimed at grooming young Americans, including students, political aides, nonprofit sector workers and business executives, according to Mother Jones magazine, which first broke the story.

    The Russian Embassy in Washington and Zaitsev himself rejected the allegations and expressed concern that unknown people were trying to ruin efforts by Presidents Barack Obama and Vladimir Putin to mend and expand ties.

    “It’s a shame that Russian-American relations periodically echo the Cold War,” Zaitsev, who refused to speak to Mother Jones on the issue, said late Wednesday in an interview with state news agency Itar-Tass. “Someone apparently wants to see the Iron Curtain fall between our two countries once again.”

    “This kind of horror story very much resembles the Cold War era,” embassy spokesman Yevgeny Khorishko said in a statement released to Russian media. “A blunt attempt is being made to distort and discredit the activities of the Russian cultural center, which focuses on developing trust and cooperation between our two countries and people.”

    He warned that “somebody intends to torpedo” a goal set by Obama and Putin at a Group of Eight summit in June to expand direct contracts between Americans and Russians so as to raise relations to a new level.

    But Khorishko vowed that Moscow would not be deterred by the spy allegations. ”The Russian cultural center has been working to expand contacts and improve understanding between Russian and American citizens and will continue to do this work,” he said.

    The Russian center is housed in a 1895 mansion purchased by Moscow in 1957. (rccusa.org)

    Mother Jones and other U.S. media reported that FBI officials had met with people who traveled to Moscow and St. Petersburg on trips organized by the Russian cultural center and quizzed them on whether Zaitsev worked for Russian intelligence and whether any attempts had been made to recruit them during their stay. The media reports, citing trip participants, said all had denied that the Russians had sought to recruit them.

    The FBI refused to comment on whether it had opened an investigation into Zaitsev.

    Zaitsev has diplomatic immunity, so U.S. prosecutors could not press charges against him if the FBI were to conclude that he broke the law. But the State Department could withdraw his immunity, forcing the Russian Foreign Ministry to recall him to Moscow.

    The cultural center has brought 128 Americans on “short-term, fact-finding trips” to Russia since the exchange program was created under a presidential decree in 2011, according to program information on the center’s website. The global program, which seeks participants aged 25 to 35, has also invited 1,219 people from other countries, including 283 from Europe, 157 from Asia and the Middle East, 29 from Africa and South America and 750 from other former Soviet republics.

    About 25 people participated in each trip from the U.S., and they stayed at five-star hotels and met with senior politicians like the mayors of Moscow and St. Petersburg and Federation Council Deputy Speaker Alexander Torshin, Mother Jones said.

    Zaitsev, a St. Petersburg native, said in the interview that trip participants were being targeted in a “witch hunt” rooted in a U.S. fear of Russia. “I think it is simply unacceptable that they are ordered to tell what, why, how and why,” he said.

    In a reminder of lingering suspicions in both countries, Zaitsev pointed out that the U.S. government also organizes exchange programs that bring young Russians to the United States, and he insisted that his program was as transparent as any of those. “All of the information about our programs and projects is publicly available on our website,” he said.

    Zaitsev’s path to Washington is not clear from his organization’s website. He received a doctorate in economics from the Leningrad Technological Institute in 1980 and then worked in several government-run student organizations until the Soviet collapse, according to his online biography. He worked in unspecified “leadership positions in private companies” from 1992 until he was appointed head of the cultural center in July 2010. He is married and has one adult son.

    The center’s second floor has a space library focusing on Russian-U.S. cooperation. (rccusa.org)

    But Zaitsev faces a formidable task. Relations between the Russia and the U.S. have soured since Putin returned to the presidency last year, with Washington deploring a Kremlin crackdown on the opposition and a ban on U.S. parents adopting Russian children. Moscow for its part has assailed the U.S. Magnitsky blacklist of Russian officials accused of human rights violations.

    The tensions have cast a shadow over yearlong events mean to celebrate the 80th anniversary of diplomatic relations.

    The Russian cultural center, also known as Rossotrudnichestvo, is “the official home of Russian culture in the United States” and was created in 2001 under a bilateral agreement aimed at fostering relations, according to its website.

    It is housed in a 1895 mansion located 20 minutes by foot from the White House that the Soviet government bought in 1957 and used for the embassy’s consular services for 40 years.

    The first floor contains the Moscow Room, decorated in cream and gold leaf and with paintings of the Bolshoi Theater, the Kremlin, Moscow State University and Christ the Savior Cathedral; as well as the Hall of Mirrors, with two gala portraits of Peter the Great and Catherine the Great; and the Russian-American Room, with a colorful panorama depicting key moments in Russian-American relations.

    The second floor hosts the Pushkin Library, with more than 2,000 books, 300 movies on video and DVD and more than 100 audiobooks; a space library focusing on Russian-U.S. cooperation in space exploration; and classrooms offering Russian-language lessons.

    The third floor contains two guest rooms, while the basement has a kitchen that prepares meals for the center’s receptions and offers classes on Russian cuisine.

    25 October 2013 | Issue 5242
    By Andrew McChesney

    Find this story at 25 October 2013

    © Copyright 1992-2013. The Moscow Times.

    Head of D.C.-based Russian cultural center being investigated as possible spy

    The FBI is investigating whether the U.S.-based director of a Russian government-run cultural exchange program was clandestinely recruiting Americans as possible intelligence assets, according to law enforcement officials.

    FBI agents have been interviewing Americans who participated in the Rossotrudnichestvo exchange program run by Yury Zaytsev, who also heads the Russian Center for Science and Culture in Washington. For the past 12 years, the program has paid for about 130 Americans to visit Russia.

    Latest from National Security
    Senior Navy civilians investigated in alleged fraud

    Craig Whitlock 2:27 AM ET

    Court records show $1.6 million was paid to an auto mechanic who produced rifle silencers for $8,000.
    Two admirals face inquiry in Navy bribery scheme

    Craig Whitlock NOV 9

    The Navy put the pair, including its top intelligence official, on leave and suspended their access to classified material.
    After teenager flees to Syria, family fights to bring him back

    Michael Birnbaum and Souad Mekhennet NOV 12

    A Muslim family living in Germany “kidnaps” the youth, who had jihadi aspirations, close to Syria’s border.
    NSA Secrets

    Full coverage of the revelations and debate surrounding National Security Agency surveillance programs.

    FBI spokeswoman Amy Thoreson declined to comment on whether there was an investigation or to discuss the bureau’s role. A woman who answered the phone at the cultural center said that neither Zaytsev nor the center would comment.

    “We know that the boys and girls are speaking,” said the woman, referring to the young Americans who participated in the program and have been interviewed by the FBI. “There are many. But we shall not put out a comment.”

    “We are clean and transparent, friendly and true,” said the woman, who did not give her name or title.

    The center, at Phelps Place in the Kalorama neighborhood of northwest Washington, offers language lessons and cultural programs, according to its Web site.

    A spokesman for the Russian Embassy in Washington denied that the cultural center was involved in the recruitment of spies.

    “All such ‘scaring information’ very much resembles Cold War era,” the spokesman, Yevgeniy Khorishko, said in an e-mail. He added that such allegations were being leveled only to “distort and to blacken activities of the Russian Cultural Center.”

    The FBI investigation of Zaytsev was first reported by Mother Jones magazine on its Web site.

    Law enforcement officials said the FBI is investigating whether Zaytsev and Rossotrudnichestvo have used trips to Russia to recruit Americans. Rossotrudnichestvo paid for all their expenses, including meals, travel, visa fees and lodging. Most of the trips involved about 25 participants, who sometimes stayed in luxury hotels and met with Russian government officials.

    Zaytsev did not go on the exchange trips, said one law enforcement official, but he created files on some of the participants, allegedly to cultivate them as future intelligence assets. Law enforcement officials would not comment on whether the FBI has any evidence that Zaytsev was successful in recruiting any assets.

    As part of their probe, FBI special agents are trying to interview the Americans who participated in the program, including graduate students, business executives, political aides and nonprofit workers. Rossotrudnichestvo also has cultural exchanges for young people in Europe, Africa, Latin America and Asia.

    Richard Portwood, the executive director of the Center for American-Russian Engagement of Emerging Leaders and a participant in the cultural exchange program, said he was interviewed by the FBI this month and was told that Zaytsev was a foreign intelligence officer.

    “These revelations came as a total surprise,” Portwood said in a statement. “My sincere hope is that Mr. Zaytsev’s alleged activities do not prevent U.S.-Russia cultural exchanges in the future.”

    Portwood, 27, a graduate student at Georgetown University’s School of Foreign Service, said in a telephone interview that he took two trips to Russia through the exchange program, each lasting a little more than a week, in December 2011 and in June 2012. He said the FBI wanted to know what he and others traveling with him did on the trips, whom they met with and whether they saw anything suspicious. Portwood said the trips did not raise any suspicions. But he added: “Cold War spy games have existed for decades between the U.S. and Russia. We’re not naive to that history.”

    Zaytsev, who is on a State Department list of foreign mission staff, has diplomatic immunity, according to an administration official. The United States could revoke his immunity, which would force him to return to Russia, a law enforcement official said.

    By Sari Horwitz, Published: October 23 E-mail the writer
    Nick Anderson contributed to this report.

    Find this story at 23 October 2013

    © 1996-2013 The Washington Post

    FBI Probing Whether Russia Used Cultural Junkets to Recruit American Intelligence Assets

    Did a senior Russian embassy officer set up exchange trips to Moscow to cultivate young, up-and-coming Americans as Russian intelligence assets?

    On September 30, Richard Portwood, a 27-year-old Georgetown University graduate student, received a phone call from an FBI agent who said the bureau wanted to meet with him urgently. Portwood didn’t know why the FBI would have any interest in him, but two days later he sat down with a pair of agents at a coffee shop near his apartment. They told him they suspected that Yury Zaytsev, the US director of a Russian government-run cultural exchange program that Portwood had participated in, was a spy.

    Since 2001, Zaytsev’s organization, Rossotrudnichestvo, has footed the bill for about 130 young Americans—including political aides, nonprofit advocates, and business executives—to visit Russia. Along with Portwood, Mother Jones has spoken to two other Rossotrudnichestvo participants who were questioned by the FBI about Zaytsev, who also heads the Russian Cultural Center in Washington.
    Yury Zaytsev, a Russian diplomat. Multiple sources tell us he is the subject of an extensive FBI investigation. Rossotrudnichestvo

    The FBI agents “have been very up front about” their investigation into whether Zaytsev is a Russian intelligence agent, says a 24-year-old nonprofit worker whom the FBI has interviewed twice and who asked not to be identified. The FBI agents, according to this source, said, “We’re investigating Yury for spying activities. We just want to know what interactions you’ve had with him.” The nonprofit worker was shocked. Zaytsev, he says, is “what you imagine when you imagine a Russian diplomat. He’s fairly stoic, tall, pale.” Zaytsev did not travel on the exchange trips he helped arrange, and his contact with the Americans who went on these trips was limited.

    The agents who interviewed the Rossotrudnichestvo participants did not tell them what evidence they possessed to support their suspicions. FBI spokeswoman Amy Thoreson declined to confirm or deny the existence of an investigation into Zaytsev or answer any questions about FBI actions regarding the Russian. (The FBI did not ask Mother Jones to withhold this story.) But based on what the bureau’s agents said during the interviews, the Americans who were questioned concluded the FBI suspects that Zaytsev and Rossotrudnichestvo have used the all-expenses-paid trips to Russia in an effort to cultivate young Americans as intelligence assets. (An asset could be someone who actually works with an intelligence service to gather information, or merely a contact who provides information, opinions, or gossip, not realizing it is being collected by an intelligence officer.) The nonprofit worker says the FBI agents told him that Zaytsev had identified him as a potential asset. Zaytsev or his associates, the agents said, had begun to build a file on the nonprofit worker and at least one other Rossotrudnichestvo participant who had been an adviser to an American governor.

    Advertise on MotherJones.com

    Many countries—including the United States—place spies abroad under diplomatic cover, and it’s common for law enforcement agencies to keep a close eye on foreign diplomats who might be engaged in espionage. The Americans interviewed by the FBI say the agents did not indicate whether they believed Zaytsev had succeeded in developing Americans as assets.

    The FBI appears to be mounting an extensive investigation of Zaytsev. The three Americans interviewed by the FBI say the agents told them the bureau is trying to interview every American who has attended these trips. The nonprofit worker says that FBI agents went so far as to contact a married couple, who are Rossotrudnichestvo alums, while they were vacationing in Japan. He says the agents told him they were also scouring flight manifests associated with Rossotrudnichestvo trips for names that showed up repeatedly and could be Zaytsev collaborators.

    All three former participants describe their Rossotrudnichestvo experience as a typical cultural exchange program, albeit a ritzy one. The organization paid for meals, travel, lodging, and every other expense associated with the trip, down to the visa fee. During the St. Petersburg leg of a June 2012 trip, participants stayed at the Sokos Hotel Palace Bridge, a luxury hotel that has hosted delegations for the G8 and G20 summits. Participants on that trip met with the governors of Moscow and St. Petersburg and with Aleksander Torshin, a high-ranking member of Vladimir Putin’s United Russia party. Since 2011, Rossotrudnichestvo has organized six trips. Most included about 25 people, although roughly 50 visited Russia during the group’s first trip in December 2011.

    The application process for this exchange program is simple. The application form calls for basic personal details—including the applicant’s place of work and job title—copies of the applicant’s passport, and a one-page letter “briefly outlining why you should be selected, why you are interested and what interests you have in collaboration with Russia.” Applicants tend to find the program through referrals. (Portwood has referred about 50 people to Rossotrudnichestvo. To his knowledge, Rossotrudnichestvo never denied any applicants.) The group also offers similar exchanges to young professionals in Asia, Latin America, Africa, and Europe.

    When I called the Russian Cultural Center last week, Zaytsev answered. He declined to answer questions about the FBI’s investigation on the phone, but he eagerly invited me to visit him at the center two days later. “I welcome any questions you have for me,” he said. When I arrived, though, Galina Komissarova, a center employee, asked me to leave, saying I hadn’t sent questions in advance as Zaytsev had requested. (He hadn’t.) Komissarova would not disclose her title or role at the center. “I just clean,” she said sternly, showing me the door. I discovered later that Komissarova is Zaytsev’s wife.

    Since then, Zaytsev has not replied to written questions or returned repeated phone calls.

    A State Department spokeswoman confirms that Zaytsev is on a list of foreign mission staff who have diplomatic immunity. If it chose to, the United States could revoke his immunity, forcing Russia to call him home.

    Portwood, who attended Rossotrudnichestvo trips in 2011 and 2012, and the other Americans questioned by the FBI were asked a similar set of questions. The agents wanted to know how they had heard about the exchange program and where in Russia they traveled. They also asked whether participants had encountered any anti-American sentiment on their trip, were offered jobs, or had suspicious interactions with Rossotrudnichestvo afterward. Portwood and the two other participants said they answered “no” to these questions.

    According to three Rossotrudnichestvo alums, Zaytsev displayed no suspicious behavior and none developed an ongoing relationship with him after their excursion. For most Rossotrudnichestvo participants, they say, Zaytsev was merely the name on the congratulatory letter they received when they were accepted into the exchange program.

    The third participant who spoke to Mother Jones about the exchange program, a 26-year-old resident of Washington, DC, is not surprised by the FBI’s allegations—and doesn’t care whether he was targeted as a possible intelligence asset. “There’s not a single American diplomat anywhere in the American sphere of influence who doesn’t have an open line of communication with the CIA. … [What Zaytsev is doing] is not something that every other single [foreign] cultural center in DC isn’t also doing,” he says. “And that doesn’t bother me. I don’t have a security clearance. I don’t work for an elected official. I run a social enterprise that has absolutely nothing to do with US-Russia relations.”

    Rossotrudnichestvo’s most recent Russia trip was scheduled for mid-October and it’s unclear whether or not it went forward as planned. After he was questioned by the FBI, Portwood emailed people he had earlier referred to the organization to inform them of what he learned. His email read, in part: “The FBI disclosed to me that Yury Zaytsev is a Russian Foreign Intelligence officer and a professional spy, acting as the Director of the Russian Cultural Center in Washington, D.C.…only so that he can maintain a residence here in the United States. In fact, the FBI alleges that part of Mr. Zaytsev’s mission is sending young professionals from the United States to Russia as part of a cultural program wherein participants are evaluated and/or assessed for Russian counterintelligence purposes.”

    Portwood was disappointed to learn the exchange program may have been a cover for Russian intelligence work. “It passed the smell test,” he says. “But I guess Russia’s Russia, you know?”

    UPDATE, 6:00 p.m. EDT, Wednesday October 23: The Russian Embassy provided the following statement in an email to Mother Jones:

    All such “scaring information” very much resembles Cold War era. A blunt tentative is made to distort and to blacken activities of the Russian Cultural Center in DC, which are aimed at developing mutual trust and cooperation between our peoples and countries. As a matter of fact, somebody intends to torpedo the guidelines of the Russian and U.S. Presidents, whose Joint Statement in Lough Erne emphasizes the importance of “expanding direct contracts between Americans and Russians that will serve to strengthen mutual understanding and trust and make it possible to raise U.S.-Russian relations to a qualitatively new level”.

    Russian Cultural Center has been working to expand contacts and better understanding between Russian and American citizens and will continue this work.

    —By Molly Redden
    | Wed Oct. 23, 2013 3:00 AM PDT | UPDATED Wed Oct. 23, 2013 3:00 PM PDT

    Find this story at 23 October 2013

    Copyright ©2013 Mother Jones and the Foundation for National Progress.

    KGB ‘recruited’ two politicians as agents

    KGB station chief Ivan Stenin (right) and his successor, Geronty Lazovik, in Canberra in 1971.

    A KGB officer ran two Australian federal parliamentarians as Soviet agents in the 1970s, according to a confidential account of ASIO counter-espionage operations during the Cold War.

    ASIO also tried to persuade a Russian military intelligence officer to defect by offering him treatment in the US for his stomach cancer.

    In an unusually candid document obtained by Fairfax Media, a former senior ASIO officer lists known Soviet intelligence officers in Australia and reveals numerous details of ASIO’s counter-espionage efforts. Much of the information remains classified.

    The account by the former counter-espionage specialist confirms that Soviet intelligence was very active in Australia throughout the Cold War and that ASIO’s counter-espionage efforts had only limited success.
    Advertisement

    The document reveals ASIO’s bid in the 1970s to induce a senior military intelligence officer, Yuriy Ivanovich Stepanenko, to defect.

    ASIO offered the Russian, who had stomach cancer, ”the best facilities in the world” at Johns Hopkins Hospital in Baltimore ”if he wanted to jump”.

    According to the former ASIO officer, the Russian was “tempted but didn’t live much longer”.

    The document also details how ASIO’s bugging operations revealed in the late 1960s and early 1970s that KGB officer Vladimir Aleksandrovich Aleksyev was “running two Australian politicians as agents, using tradecraft of a fairly high order”.

    Aleksyev was followed by Vladimir Yevgenyevich Tulayev, “a hard-eyed, well-dressed thug” who, according to declassified ASIO documents, was also “aggressively involved in intelligence operations in Australia”.

    Geronty Lazovik, another “definite agent runner”, was much more urbane and developed a wide range of contacts across Federal Parliament by targeting Labor politicians, staffers and lobbyists. However, ASIO director-general Peter Barbour delayed recommending that Tulayev and Lazovik be expelled before the 1972 federal election for fear of triggering political controversy.

    Declassified documents show that after the election the new Labor prime minister, Gough Whitlam, was concerned about ASIO’s investigations causing diplomatic embarrassment. Neither KGB officer was expelled and the government suspended ASIO’s phone taps on the Soviet embassy.

    Lazovik was reportedly later awarded a medal for his work in Australia. The award was for “allegedly recruiting a top agent in ASIO, Defence or [the Department of Foreign Affairs]”, according to the former ASIO officer.

    The document also sheds light on the 1983 Combe-Ivanov affair in which the Hawke Labor government blackballed former Labor national secretary and political lobbyist David Combe because of his involvement with KGB officer Valery Ivanov, who was expelled from Australia.

    The former ASIO officer says that Ivanov recruited a cipher clerk in the Indonesian embassy and that ASIO approached the Indonesians to agree to “a joint operation running the cipher clerk back against Ivanov”. However, the proposed double-agent operation had to aborted because of Ivanov’s expulsion.

    “The farewell party for Ivanov was bugged and revealing. He had been roundly castigated by [fellow KGB officer] Koshlyakov for going too far, too soon, and wasn’t very happy at that,” the former ASIO officer says.

    October 14, 2013
    Philip Dorling

    Find this story at 14 October 2013

    Copyright © 2013 Fairfax Media

    Revealed: How Australia spies on its neighbours

    Australia’s electronic spy agency is using the nation’s embassies to intercept phone calls and internet data in neighbouring countries, according to new information disclosed by intelligence whistleblower Edward Snowden and a former Australian intelligence officer.

    The secret Defence Signals Directorate operates clandestine surveillance facilities at embassies without the knowledge of most Australian diplomats.

    Fairfax Media has been told that signals intelligence collection occurs from Australian embassies in Jakarta, Bangkok, Hanoi, Beijing and Dili, the high commissions in Kuala Lumpur and Port Moresby and other diplomatic posts.

    A secret US National Security Agency document leaked by Mr Snowden and published by Germany’s Der Speigel magazine reveals a highly sensitive signals intelligence collection program conducted from US embassies and consulates and from the diplomatic missions of other “Five Eyes” intelligence partners, including Australia, Britain and Canada.

    Codenamed STATEROOM, the collection program involves interception of radio, telecommunications and internet traffic.

    The document says the DSD operates STATEROOM facilities at Australian diplomatic posts. It says the surveillance facilities are “small in size and in number of personnel staffing them”.

    “They are covert, and their true mission is not known by the majority of the diplomatic staff at the facility where they are assigned,” it says.

    The document says the DSD facilities are carefully concealed. “For example, antennas are sometimes hidden in false architectural features or roof maintenance sheds.”

    The Department of Foreign Affairs and Trade declined to comment on the potential diplomatic implications of the disclosure. A spokesperson said: “It is the long-standing practice of Australian governments not to comment on intelligence matters.”

    The leaked NSA document does not identify the location of the DSD facilities overseas. However, a former Australian defence intelligence officer told Fairfax Media that the directorate conducted surveillance from Australian embassies across Asia and the Pacific.

    In June, the East Timorese government complained publicly about Australian spying, including communications interception and the bugging of government offices during negotiations on the Timor Gap oil and gas reserves.

    The former intelligence officer said the interception facility at the Australian embassy in Jakarta played an important role in collecting intelligence on terrorist threats and people smuggling, “but the main focus is political, diplomatic and economic intelligence”.

    “The huge growth of mobile phone networks has been a great boon and Jakarta’s political elite are a loquacious bunch. Even when they think their own intelligence services are listening they just keep talking,” he said.

    He said the Australian consulate in Denpasar, Bali, had also been used for intelligence collection.

    Intelligence expert Des Ball said the DSD had long co-operated with the US in monitoring the Asia-Pacific region, including using listening posts in Australian embassies and consulates.

    “Knowing what our neighbours are really thinking is important for all sorts of diplomatic and trade negotiations,” Professor Ball told Fairfax Media.

    “It’s also necessary to map the whole of the telecommunications infrastructure in any area where we might one day have to conduct military operations so that we can make most use of our cyber warfare capabilities, however remote those contingencies might be, because you can’t get that knowledge and build those capabilities once a conflict starts.”

    Meanwhile, Indonesian Foreign Minister Marty Natalegawa has demanded an explanation of news that the US embassy in Jakarta has been used to tap the phones of Indonesian officials.

    “Indonesia cannot accept and strongly protests the news about the existence of tapping facilities at the US embassy in Jakarta,” Mr Natalegawa said.

    ”We have spoken to the US embassy representative in Jakarta demanding an official explanation from the US government about the news. If it’s confirmed, then it’s not only a breach of security, but a serious breach of diplomatic norms and ethics, and of course it’s not in line with the spirit of having a good relationship between the two countries.”

    The Age
    Date: October 31 2013
    Philip Dorling

    Find this story at 31 October 2013

    Copyright © 2013
    Fairfax Media

    Secret military intelligence unit ran 8 covert operations abroad?

    NEW DELHI: Technical Support Division (TSD), the secretive military intelligence unit set up by former Army chief General V K Singh which is accused of trying to overthrow the Omar Abdullah government, has claimed to have carried out at least eight successful covert operations in a foreign country.

    But the claims are so sensitive and sensational that it would be a key reason why the government will not hand over the inquiry report into the functioning of TSD to an external investigation agency.

    Sources said though the Army has recommended an independent investigation by an agency such as the CBI, the defence ministry has not fully endorsed the suggestion. In fact, official MoD notings have said the investigation won’t move forward because of lack of concrete evidence even if it is handed over to an external agency.

    Gen Singh has already dismissed all allegations, saying it was the Congress-led UPA government’s vendetta politics. “This is simple vendetta as some people are not comfortable with me sharing the dais with Narendra Modi to espouse the cause of ex-servicemen in the country,” Gen Singh had said over the weekend.

    Sources said the inquiry report also doesn’t conclusively prove that the money claimed to have been paid to various people reached the intended beneficiaries. “These are all based on statements of TSD officials, former DGMI (director general of military intelligence) and others. There is no concrete evidence that can stand the scrutiny of law,” a senior official.

    According to sources, among the most sensational claims in the report is that the TSD carried out eight specific covert operations in a foreign country. It has claimed to have spent a few crores on those operations. There is no corroborative evidence for the claims, but if it were to emerge in public, it would be a major embarrassment for New Delhi.

    Besides, the report prepared by director general military operations Lt Gen Vinod Bhatia has claimed that Rs 1.19 crore was given to Ghulam Hassan Mir, agriculture minister of Jammu and Kashmir, to topple the Omar Abdullah government.

    The report also claimed that Rs 2.38 crore was given to Hakikat Singh who set up an NGO called ‘Jammu and Kashmir Humanitarian Service Organisation’ that was in turn linked to ‘Yes Kashmir’ which filed a PIL against Army chief Gen Bikram Singh in the alleged fake encounter case in Jangalat Mandi when he was a brigadier.

    Bhatia’s report has also claimed that TSD spent Rs 8 crore to buy interception equipment from a Singapore-based company in November 2010. Though this was officially for Srinagar-based 15 Corps, it was misused for tapping into phone calls in New Delhi. In March 2012, the equipment was destroyed in Jammu and Kashmir. Then director general of military intelligence Lt Gen D S Thakur told the inquiry that he ordered destruction on instruction from the top brass.

    The report also said that at least three retired lieutenant generals, including an Army commander, were aware of some of the payoffs of military intelligence funds for TSD activities.

    Sources said the MoD recommendation was to look at closing structural gaps in the system. Among them was to ensure that the intelligence agencies do not overlap in their function. “Why should MI have such operations in foreign countries,” a source asked.

    Josy Joseph, TNN Sep 24, 2013, 02.45AM IST

    Find this story at 24 September 2013

    © 2013 Bennett, Coleman & Co. Ltd.

    Indian army spooks carried out covert operations in Pakistan

    NEW DELHI – The Indian military intelligence unit set up by former army chief General VK Singh was involved in sensitive covert operations in Pakistan and was even on the trail of 26/11 mastermind and Lashkar-e-Taiba chief Hafiz Saeed, officials associated with it have told HT.
    “Our main task was to combat the rising trend of state-sponsored terrorism by the ISI and we had developed contacts across the Line of Control in a bid to infiltrate Hafiz Saeed’s inner circle,” an official who served with the controversial Technical Services Division (TSD) said.
    Asked for an official response, an army spokesperson said, “The unit has been disbanded. Details of the unit, which was the subject matter of an inquiry, are only known to the Chief and a few senior officers. It is for the defence ministry now to initiate any further inquiries.”
    The spook unit was set up after the 26/11 Mumbai attacks on a defence ministry directive asking for the creation of covert capability.
    Army documents, perused by HT, reveal the senior-most officers signed off on the formation of this unit. File No A/106/TSD and 71018/ MI give details of approvals by the Director General Military Intelligence, vice-chief and chief of army staff.
    The TSD – disbanded after allegations that it spied on defence ministry officials through off-the-air interceptors – was raised as a strategic force multiplier for preparing, planning and executing special operations “inside depth areas of countries of interest and countering enemy efforts within the country by effective covert means”.
    But it then got caught in an internecine battle between army chiefs. The TSD – which reported directly to Gen VK Singh – used secret service funds to initiate a PIL against current chief General Bikram Singh. As reported by HT in October 2012, secret funds were paid to an NGO to file the PIL, in a bid to stall Bikram Singh’s appointment as chief.
    However, covert ops were the unit’s essential mandate and deniability was built into it and it reads, “The proposed organization (TSD) will enable the military intelligence directorate to provide a quick response to any act of state-sponsored terrorism with a high degree of deniability.” Its task was to carry out special missions and “cover any tracks leading to the organisation”.
    Though covert operations were formally shut down by IK Gujral when he was PM in 1997, sources reveal the TSD carried out several such operations within and outside the country – such as Op Rehbar 1, 2 and 3 (in Kashmir), Op Seven Sisters (Northeast) and Op Deep Strike (Pakistan). Controversy is dogging the unit once again after disclosures in The Indian Express that secret service funds were also used to destabilise the Omar Abdullah government in Held Kashmir. The BJP has raised questions over the timing of the disclosures. While the defence ministry has had the inquiry report since March, the revelations have come soon after Singh shared the stage with the saffron party’s PM candidate Narendra Modi last Sunday.

    September 23, 2013
    The Nation Monitoring

    Find this story at 23 September 2013

    © The Nation

    Random afluisteren in India

    In het voorjaar van 2010 was India een paar weken in de ban van een afluisterschandaal, maar vervolgens verdween dat in de vergetelheid. Dit is opmerkelijk gezien de staat van dienst van de inlichtingenwereld in India. Schandalen die gewone Indiërs raken, maar ook corruptie, slecht management, verkeerde technologie en apparatuur en bovenal incompetentie lijken de boventoon te voeren bij de NTRO, die verantwoordelijk wordt gehouden voor het schandaal. NTRO, National Technical Research Organisation, gebruikt IMSI Catchers om voor lange tijd en op grote schaal politici, ambtenaren, zakenmensen, beroemdheden en gewone Indiërs af te luisteren.

    Het gebruik van een IMSI catcher moet nauwlettend gecontroleerd worden. Het afluisterschandaal in India laat zien wat de gevaren zijn van het toelaten van het apparaat in een veiligheidsstelsel. Een IMSI catcher is een mobiele zendmast. Het International Mobile Subscriber Identity nummer is een uniek nummer dat aan een SIM kaart voor een mobiele telefoon is gekoppeld. Aan het IMSI nummer zit tevens een uniek telefoonnummer. Het IMSI nummer bestaat uit drie groepen getallen, 111/22/3333333333. Aan het nummer is te zien uit welk land de SIM kaart komt. De eerste cijfers (111) staan voor het land, Nederland heeft bijvoorbeeld 204 als code. De tweede set cijfers (22) onthullen de provider, KPN heeft bijvoorbeeld 08 en Vodafone 04. De laatste cijfers, maximaal tien cijfers, zijn het unieke abonnementsnummer. Dit is niet hetzelfde als het telefoonnummer. Telefoons waar twee SIM kaarten in zitten, hebben ook twee IMSI nummers.
    De IMSI catcher fungeert als mobiele antenne die het gsm verkeer in de buurt opvangt, hierbij gaat het alleen om uitgaande gesprekken. Bij gewone mobiele telefoons vindt de versleuteling van de conversaties plaats in de dichtstbijzijnde mast. De IMSI catcher hoeft de informatie dus niet te kraken, maar kan simpelweg de gesproken of geschreven data lezen. De catcher moet het telefoonverkeer wel doorgeleiden naar een reguliere mast anders kan er geen contact worden gemaakt met de persoon die door de gsm wordt gebeld. De catcher fungeert als tussenstation om de data ofwel direct af te vangen ofwel niet versleuteld door te geleiden. Het doel van de catcher is natuurlijk ook? om het telefoonnummer van een beller te achterhalen. Voor opsporingsinstanties die het gsm nummer van een verdachte niet kunnen traceren is dit een handig middel. Men plaatst een catcher in de buurt van de persoon in kwestie, vangt de nummers allemaal af en kan nagaan welk nummer men moet hebben. Bij politie-invallen kan het apparaat ook zijn dienst bewijzen door op locatie het telefoonverkeer te monitoren, vooral als binnen een onderzoek niet alle gsm-nummers bekend zijn. Tevens kan de catcher worden gebruikt voor spionage doeleinden, vooral spionage die de overheid niet aan de grote klok wil hangen. Bij het afluisteren met een IMSI catcher heeft men namelijk geen medewerking van een Telecom provider nodig. De IMSI catcher laat echter wel een spoor achter die een gebruiker kan wijzen op onregelmatigheden in de transmissie en het apparaat is niet altijd succesvol. De IMSI catcher was tot begin 2011 ook te koop door particulieren. Verschillende bedrijven in New Delhi, Gurgaon en Noida boden de ‘off-the-air-monitoring’ systemen aan. In 2011 besloot de regering de handel van de apparaten aan banden te leggen. Private ondernemingen bleken namelijk gebruik te maken van de catcher.

    NTRO
    In India is de IMSI Catcher op grote schaal ingezet voor spionage doeleinden, zo onthulde het weekblad Outlook in het voorjaar van 2010. Vanaf waarschijnlijk eind 2006 tot en met april 2010 werden politieke tegenstanders, mensen die promotie zouden maken, leden van het kabinet en allerlei andere politieke en niet politieke figuren door één van de Indiase geheime diensten afgeluisterd. De gesprekken werden afgeluisterd, opgenomen en bewaard. De dienst die verantwoordelijk is voor het afluisteren is de National Technical Research Organisation, de NTRO. De NTRO werd na de Kargil oorlog in 1999 opgezet. Dit conflict ontstond toen het Pakistaanse leger posities in het district Kargil, in de regio Kashmir innam. India reageerde furieus en verdreef de Pakistanen uit een groot deel van Kargil. De laatste posities werden door Pakistan verlaten na diplomatieke druk. De Kargil Review Committee concludeerde in 1999 dat een van de redenen van het uit de hand lopen van het conflict gebrekkige inlichtingen was. De Defence Intelligence Agency (DIA) en de National Technical Facilities Organization (NTFO) die al snel NTRO werd gedoopt, werden opgezet.
    De NTRO begon zijn werkzaamheden in april 2004. De NTRO is de Indiase stofzuiger van data, zowel internet als telecommunicatie data, en monitort het Indiase grondgebied en luchtruim. De NTRO gebruikt hiervoor allerlei technische hulpmiddelen, van satellieten tot IMSI catchers. De Technology Experiment Satellite (TES), een satelliet die is uitgerust met een camera die foto’s kan maken van voorwerpen van een meter, is een van de hulpmiddelen. De satelliet werd in oktober 2001 gelanceerd en de beelden worden beheerd door de Indian Space Research Organisation (ISRO). Beelden worden ook commercieel verhandeld door een bedrijf dat verbonden is aan de ISRO, Antrix Corporation. BBC News rapporteerde dat India door TES ook beelden bezit van de oorlog in Afghanistan. In 2001 was India het tweede land naast de Verenigde Staten dat een satelliet bezit die beelden kan genereren van voorwerpen van een meter groot. Een van de functionarissen die centraal staat in de introductie van de afluister praktijken door de NTRO is dhr. Narayanan. Narayanan heeft decennia lang een centrale rol gespeeld in de Indiase inlichtingenwereld. Hij was hoofd van het Intelligence Bureau van 1988 tot 1992, en diende daarbij onder vijf verschillende minister-presidenten. Daarna nam hij een adviserende rol op zich onder de directe verantwoordelijkheid van de minister-president van India. In zijn rol als National Security Advisor (NSA) introduceerde hij de nieuwe afluistertechnologie in India in 2005. Narayanan wordt wel de ‘super spook’ van India genoemd, omdat hij zijn gehele wat? leven? al in de kringen van de Research and Analysis Wing (R&AW), het Intelligence Bureau en de NSA heeft bewogen. Zijn verhouding met minister-president Manmohan Singh was toen hij National Security Advisor niet close. Hij had bezwaren tegen de nucleaire samenwerking tussen Amerika en India en de toenadering van India en Pakistan. In de Wikileaks Cables over India die begin 2011 zijn vrijgegeven door The Hindu wordt Narayanan echter wel omschreven als een belangenbehartiger van de relatie met de Verenigde Staten. In een van de berichten wordt hij omschreven als de smeerolie voor zaken die voor de Amerikanen interessant zijn.
    De NTRO valt onder de verantwoordelijkheid van de inlichtingendienst buitenland van India, de Research and Analysis Wing (R&AW), hoewel het een zekere mate van onafhankelijkheid heeft. De NTRO faciliteit waar het afluisteren van de communicatie met het buitenland wordt gedaan ligt in de buurt van Kala Ghoda, zuidelijk Mumbai. Bij Malad, dat in de buurt ligt van Kala Ghoda, komen de datakabels die internet- en telecommunicatie tussen continenten mogelijk maken het Indiase vasteland binnen. De NTRO zit er letterlijk boven op. Hierbij gaat het om communicatie tussen India en het buitenland. De inlichtingendiensten van India hebben daarnaast genoeg binnenlandse capaciteit om de iedere Indiase burger af te luisteren.

    Afluisteren
    Het afluisterschandaal van de NTRO werd eind april 2010 door het weekblad Outlook onthuld. In de editie van 3 mei van dat jaar zegt een senior inlichtingenofficier dat de NTRO geen toestemming nodig heeft om een telefoon te tappen. Het gaat volgens hem om het onderscheppen van een signaal tussen de gsm en de antenne. Volgens de officier gaat het daarom niet om het afluisteren van een telefoonnummer. Het apparaat zou signalen binnen een cirkel van twee kilometer kunnen onderscheppen. De medewerker van de NTRO lijkt te suggereren dat er helemaal niets mis is met het afluisteren met behulp van een IMSI catcher, het signaal wordt gewoon opgevangen en bewaard. Op dezelfde wijze lijkt de minister van Binnenlandse Zaken van India, P. Chidambaram, de storm rond het afluisterschandaal te willen sussen. In een van de eerste reacties verklaarden bronnen binnen de regering dat het ging om een proef van de NTRO. De regering had geen opdracht gegeven, dus is zij niet verantwoordelijk, en er hoeft geen onderzoek te komen. Volgens de minister waren in de bestanden van de NTRO ook geen bewijzen gevonden van het afluisteren van politici. Tevens wees de regering erop dat de NTRO niet zelfstandig operaties uitvoert, maar werkt onder auspiciën van andere diensten. Bij deze diensten zou het gaan om zeven inlichtingendiensten: het Intelligence Bureau, de Research and Analysis Wing, de Directorate of Revenue Intelligence, Enforcement Directorate, Narcotics Control Bureau, Economic Intelligence Unit and Directorate-General of Investigations, Income-Tax (CBDT). Een oud medewerker van de NTRO voegde daar in de Economic Times van 24 april 2010 nog aan toe dat de dienst slechts onderzoek doet naar technische hulpmiddelen. Volgens hem luistert de dienst geen individuen af en wordt het NTRO in diskrediet gebracht door verongelijkte werknemers.
    Ook de politie heeft de bevoegdheid om af te luisteren. De minister van Binnenlandse Zaken stelde dat ruim dertig instanties in de verschillende Indiase deelstaten de mogelijkheid hebben om te tappen en af te luisteren. Volgens minister Chidambaram ligt daarom de macht tot het uitvoeren van deze observaties niet alleen op nationaal niveau, maar ook op deelstaatniveau. Dat dit ook daadwerkelijk aan de hand is werd in dezelfde periode geïllustreerd door een afluisterschandaal van de CBDT. Deze dienst had lobbyisten van de telecommunicatie industrie afgeluisterd ten tijde van de toewijzing van mobiele breedband netwerken met de 2G technologie. Bij deze onthulling werd niet de CBDT beschuldigd van illegale taps, maar kregen de bedrijven het te verduren. De afgeluisterde gesprekken onthulden de grote invloed van de industrie op de besluitvorming van de regering. De CBDT luisterde de lobbyisten af in het kader van een onderzoek naar belastingfraude. Zowel politiek als binnen de juridische wereld worden er vraagtekens gezet bij het afluisteren van mensen die worden verdacht van belastingfraude.
    Hoewel de onthulling in de Outlook erg gedetailleerd was, was het antwoord van de minister en de dienst dat er niets aan de hand is. Er wordt niet afgeluisterd en er is geen bewijs gevonden dat het is gebeurd, luidde het officiële regeringsstandpunt. De Indiase Telecomwet van 1885 en de toegevoegde wijziging van 2008 maken afluisteren echter wel mogelijk. Bij het afluisteren gaat het om uitzonderlijke situaties en niet om een standaard regel. Het was dus wel degelijk een schending van wettelijke regels. In de week erna bevestigden enkele inlichtingenofficieren anoniem dat er op grote schaal afgeluisterd wordt. Naast de vier politici waarover Outlook in het nummer van 3 mei 2010 publiceerde bleken er veel meer mensen te zijn afgeluisterd. Het gaat daarbij naast politici om ambtenaren, zakenmensen, gewone Indiërs en beroemdheden. Volgens de anonieme officieren werden de gesprekken zonder wettelijke toestemming afgeluisterd . De officieren vertellen in de Outlook van 10 mei 2010 dat zij de opdrachten mondeling kregen of soms op een geel memo papiertje. Volgens de officieren waren de afluisteroperaties allemaal illegaal , zonder toestemming van de NSA of het kabinet van de minister-president. Er mocht ook geen administratie van worden bijgehouden. De IMSI catchers werden ingezet om bijvoorbeeld in Delhi, de hoofdstad van India, rond te rijden om gsm verkeer op te vangen. Eigenlijk waren het ‘fishing operaties’ op zoek naar dat ene gesprek dat mogelijk een gevaar kan zijn voor de nationale veiligheid. Het systeem scant alle nummers zonder onderscheid te maken en kan alles opnemen. Op elk willekeurig moment kan het apparaat dat in India is gebruikt maximaal 64 gesprekken opnemen. Sommige gesprekken werden vernietigd, andere werden bewaard. Het wordt uit het interview met de medewerkers niet duidelijk wie er verantwoordelijk was voor het besluit om gesprekken al dan niet te vernietigen. In The Times of India worden anonieme bronnen aangehaald die zeggen dat het afluisteren van de politici was uitgevoerd door “junior officials”, maar dat hun werk deel uitmaakt van een grotere operatie.
    Volgens de medewerkers van de inlichtingendiensten gaat het om in totaal vijf apparaten die door de NTRO gebruikt worden. Van de ritten van de auto met de IMSI Catcher worden twee logboeken bijgehouden. Het ene logboek bevat geen enkel detail van de operatie. Het andere logboek is “top secret” en bevat gedetailleerde informatie over de locatie waar het apparaat heeft afgeluisterd. De precieze route, bestemmingen, data en tijden zijn in dat logboek te vinden. Medewerkers van de inlichtingendienst vertelden dat het niet alleen de NTRO hoeft te zijn die verantwoordelijk is voor het tappen. Verschillende van de zeven inlichtingendiensten en zelfs de politie hebben een IMSI catcher. Bronnen in de inlichtingenwereld hebben het weekblad Outlook aangegeven dat er in totaal 90 apparaten zijn aangeschaft door de verschillende instanties. Vooral in regio’s waar veel moslims wonen gebeurt dit volgens de officier. De inlichtingenofficieren die in Outlook worden geïnterviewd worden ondersteund in hun verhalen door een oud- directeur van het Intelligence Bureau (IB), dhr. Dhar. Hij vertelde het Indiase weekblad Tehelka dat de NTRO namen moet hebben gekregen om af te luisteren. Tevens verklaart hij dat politieke leiders regelmatig inlichtingendiensten de opdracht geven om mensen af te luisteren zonder schriftelijke toestemming. Medewerkers van diensten die weigeren aan deze afluisterpraktijken mee te doen, worden ontslagen volgens de oud-directeur van het Intelligence Bureau.

    Iedereen is verdacht
    Het is onduidelijk wat het doel is van de afluisteroperatie die zeker vier jaar heeft geduurd. Hoewel de verantwoordelijk minister in zijn eerste reactie had aangegeven niets van het afluisteren af te weten, gaven regeringsbronnen aan de The Times of India toe dat de NTRO wel toezicht uitvoerde. Welk toezicht wordt door de Times niet vermeld. Volgens de bronnen staan die activiteiten onder directe verantwoordelijkheid van de National Security Advisor of het kabinet van de minister-president waaronder de Research and Analysis Wing en de NTRO valt. Bij de NSA zou het gaan om dhr. Narayanan, de man die aan de wieg stond van het afluisteren in 2005. In de Indiase media worden ook verbanden gelegd met de lange traditie van de Indian National Congress (INC), een regeringspartij, om de oppositie in diskrediet te brengen door het verzamelen van politiek gevoelige informatie door het inzetten van inlichtingendiensten. Het dagblad The Pioneer vergelijkt het met de werkwijze van de Indiase roddelpers, maar dan veel serieuzer. Volgens de krant gaat het er bij het afluisteren om om te achterhalen wie elkaar ontmoeten, met wie iemand contact heeft, met wie personen van de elite slapen en vergelijkbare vragen uit de roddelbladen. Het lijkt er volgens de krant op dat de inlichtingendiensten de levens van politieke spelers in kaart probeert te brengen.
    De Indian National Congress (INC) is echter niet de enige politieke partij die deze middelen inzet. Het lijkt erop dat het binnen de Indiase democratie de gewoonte is om de oppositie op allerlei manieren in de gaten te houden. De wijze waarop de oppositie het schandaal gebruikte om de regering onder druk te zetten, lijkt deze stelling ook te ondersteunen. De oppositie is geschokt en wil uitleg van de minister-president, maar daadwerkelijke wettelijke hervormingen werden niet met zoveel woorden geëist.
    De verantwoordelijk minister voor de afluisteroperatie is Chidambaram. Chidambaram is lid van de Indian National Congress (INC). Onder de afgeluisterde politici bevond zich ook de minister voor Consumentenzaken, voedsel en distributie, Sharad Pawar van de Nationalist Congress Party (NCP), een afsplitsing van de INC. De NCP neemt op dit moment ook deel aan de regering samen met het INC. Ook leden van de partij van de minister van Binnenlandse Zaken zoals dhr. Digvijay Singh werden afgeluisterd, evenals leden van de oppositie, zoals het hoofd van de Communistische Partij India, dhr. Karat. Het afluisteren vond niet alleen nationaal plaats, ook in deelstaten van India zoals in Bihar werden hoge politici afgeluisterd, zoals de premier van Bihar, dhr. Kumar.
    De onderwerpen van de gesprekken die Outlook in haar bezit heeft, zijn uiteenlopend. Bij de gesprekken van de minister van Consumentenzaken ging het om het grote schandaal rond de Indian Premier League (IPL), de Indiase cricket competitie, IPL-gate, waar sprake was van witwassen van geld en het vooraf bepalen van de winnaar van een wedstrijd. De premier van Bihar belde een collega om te lobbyen voor meer geld voor zijn deelstaat. En van de communistische partij zijn gesprekken bewaard uit 2008 toen er oppositie werd gevoerd tegen de aankoop van nucleaire technologie van de Verenigde Staten. Hoewel Karat tegenstander was van de overeenkomst tussen India en de Verenigde Staten stond hij onderhandelingen met minister-president Singh niet in weg. Hij fungeerde ook als een belangrijke exponent van de oppositie in India tegen de overeenkomst. De gegevens over de afluisterpraktijk van de NTRO geven nu aan dat dhr. Karat toen is afgeluisterd. Uiteindelijk bleef de Communistische Partij bij haar standpunt om tegen te stemmen, maar de regering behaalde toch een nipte overwinning. De Samajwadi Party (SP) en tien leden van de BJP, beide oppositie partijen, hielpen de regering aan haar meerderheid. De overeenkomst met de Amerikanen kon doorgaan. Naar nu blijkt werden er tijdens de onderhandelingen over het akkoord met de Amerikanen parlementariërs omgekocht. In documenten van de Amerikaanse vertegenwoordiging in India die door Wikileaks zijn buitgemaakt, blijkt dat de Amerikanen op de hoogte waren van de steekpenningen die parlementariërs ontvingen om voor te stemmen. Of de afgeluisterde gesprekken hebben bijgedragen aan het omkopen van leden van het parlement is niet duidelijk.

    DE NTRO als schandaal
    De NTRO heeft absoluut geen schoon blazoen. De korte historie van de dienst kent al vele schandalen, gebrekkig functioneren, politieke benoemingen en tekenen van corruptie. India kent geen Commissie van Toezicht op de Inlichtingen en Veiligheidsdiensten, wel een algemene controledienst, te vergelijken met de algemene Rekenkamer. De regering stelde dhr. P.V. Kumar van de Comptroller and Auditor General of India (CAG) aan om de misstanden bij de NTRO te onderzoeken. Kumar is een oud medewerker van de Research and Analysis Wing en werd na zijn onderzoek begin 2011 aangesteld om de NTRO te leiden. In hoeverre er een einde is gekomen aan de misstappen is dan ook niet duidelijk. Een van de schandalen naast het afluisteren van politici is de benoeming van de tweede man van de dienst, dhr. Vijararaghavan, en zijn betrokkenheid bij een deal met het Amerikaanse bedrijf CISCO. Na de deal met CISCO werd de dochter van Vijararaghavan door CISCO in dienst genomen. De positie van de tweede man staat ook ter discussie omdat hij naast zijn functie bij de NTRO ook nog zijn oude functie als hoofd van Defence Research and Development Organisation (DRDO) vervult en tevens directeur is van een lobbygroep van de elektronica-industrie. Ook diverse andere benoemingen worden door de CAG onderzocht op hun onvolkomenheden. Het gerechtshof in Delhi oordeelde verder dat er een onderzoek moet komen naar administratieve en financiële onregelmatigheden bij de aanstelling van ruim zeventig werknemers. Vacatures zouden zijn opgevuld met niet capabele mensen zonder de juiste opleiding en voor sommige functies is zelfs geen vacature uitgeschreven, maar die zijn onderhands opgevuld.
    Naast het personeelsbeleid zijn er ook vragen gerezen over de aankoop van apparatuur door de dienst. Een medewerker schafte zonder overleg met het agentschap dat over de aankopen van gevoelige apparatuur gaat, computers aan die vitale Chinese onderdelen bevat. De spanningen tussen India en China fluctueren al decennia lang tussen gespannen en vriendschappelijk. De laatste jaren gaat het beter, maar tien jaar geleden had de verhouding tussen de twee landen een nieuw dieptepunt bereikt na Indiase kernproeven. En dat de relatie verre van close is maakten Canadese onderzoekers van de Information Warfare Monitor (IWM) duidelijk toen zij India erop wezen dat begin 2010 Chinese hackers zich de toegang hadden verschaft tot computers van het Indiase leger. IWM had de Indiase overheid er een jaar eerder al op gewezen dat haar computers en servers kwetsbaar waren voor aanvallen uit vooral China. Op de computers die in 2010 gehackt zijn, zou informatie staan over het raketprogramma van India, de artillerie-brigades van Assam, luchtmachtbases en andere militaire informatie. De Canadese onderzoekers produceerden een rapport over de Chinese elektronische infiltratie, ‘Shadow in the Cloud’. In mei 2010 bleek dat de schade van de Chinese spionage operatie aanzienlijk is. Computers en servers van diplomatieke vestigingen van India in Kabul, Moskou, Dubai, Abuja, in de Verenigde Staten, Servië, België, Duitsland, Cyprus, het Verenigd Koninkrijk en Zimbabwe waren door de Chinezen overgenomen. Ook het kantoor van de National Security Advisor was besmet en zelfs bedrijven als Tata, YKK India en DLF Limited. Naast deze militair en economisch strategische spionage hadden de Chinezen het ook gemunt op de Tibetaanse gemeenschap in Dharamshala.
    Een andere medewerker kocht satelliet communicatiemiddelen van een bedrijf uit Singapore (Singapore Technologies), een bedrijf dat door de Indiase overheid op een zwarte lijst was geplaatst. Bij de aanbesteding van de satelliet communicatie apparatuur kwamen de specificaties van de NTRO precies overeen met het product van Singapore Technologies. In andere gevallen, zoals bij de aanschaf van onbemande vliegtuigen van het Israëlische bedrijf Israel Aerospace Industries (IAI) is door het NTRO geen aanbesteding uitgeschreven volgens de onderzoekers van CAG. De onbemande vliegtuigen moesten in januari 2010 aan de grond worden gehouden, omdat bleek dat de NTRO onveilige en open radiofrequenties gebruikte voor de besturing van de vliegtuigen. Volgens de India Today zouden ook de onbemande vliegtuigen van het Indiase leger op deze manier worden bediend. Bij grote uitgaven dient de NTRO een aanbesteding te doen en toestemming te vragen aan de National Security Advisor en uiteindelijk de minister-president. Ook dit laatste is bij diverse aankopen door de dienst niet gebeurd.
    Naast deze personele en technische misstappen wordt de kwaliteit van het werk van de dienst in het publieke debat in India in twijfel getrokken. Hoewel haar taak het verzamelen van informatie over mogelijke terroristische aanslagen, cyber crime, opstanden en illegale grensoverschrijdingen is, heeft de dienst geen enkel duidelijk succes geboekt. De aanslagen van 26 november 2008 in Mumbai worden gezien als het bewijs van de mislukking van de dienst. Toch lijkt de dienst onaantastbaar, zoals zoveel inlichtingendiensten. Twee jaar later was het opnieuw raak. Op basis van informatie van de inlichtingendiensten werd een man gearresteerd die verantwoordelijk werd gehouden van de aanslag op de “Duitse bakkerij”, een populaire uitgaansgelegenheid voor toeristen in Pune. Minister Chidambaram feliciteerde de inlichtingendiensten, maar ze bleken het bij het verkeerde eind te hebben. De man moest worden vrijgelaten wegens ontlastend bewijs.
    En hoewel de NTRO de stofzuiger is van data van Indiase burgers staat zij net als de andere spelers in de Indiase inlichtingenwereld bekend om het ‘kwijtraken’ van gevoelige data. In 2003 was de Defence Research and Development Organisation (DRDO) plotseling 53 computers kwijt. Toen zij werden teruggevonden, ontbraken de harde schijven. Op de harde schijven stonden geheime codes voor communicatie met inlichtingendiensten en het leger. In 2006 raakte een belangrijke wetenschapper van de DRDO zijn laptop kwijt op het vliegveld van Delhi. Op de laptop bewaarde de wetenschapper geheime informatie over het Indiase kernwapenarsenaal en raketsystemen. En in 2008 raakte een directeur van de NTRO zijn laptop met geheime informatie over de kernwapenprogramma’s in Pakistan, China en Noord Korea kwijt in Washington DC.

    Het schandaal staat niet op zich
    De NTRO is niet de enige dienst die tekenen vertoont van verval. Ook de dienst waaruit zij is voortgekomen, de Research and Analysis Wing, wordt geteisterd door technische, personele, administratieve en financiële schandalen. Eigenlijk is het niet onlogisch dat er schandalen optreden binnen de Indiase inlichtingenwereld. Met zoveel onregelmatigheden is het bijna vanzelfsprekend dat er schandalen plaatsvinden die ook Indiase burgers raken. Het NTRO schandaal staat dan ook niet op zich. Vergelijkbare afluisterpraktijken zijn de afgelopen decennia aan het licht gekomen. In de jaren tachtig kwam aan het licht dat de Indiase overheid politieke leiders afluisterde. Daarnaast werden ook toen toonaangevende journalisten in de gaten gehouden. In 1990 – 1991 was het opnieuw raak met een nieuw afluisterschandaal. De Peoples Union for Civil Liberties (PUCL), een burgerrechtenbeweging, bracht de zaak voor de rechter. Tijdens de rechtzaak gaf de CBI, Central Bureau of Investigation, toe dat op grote schaal journalisten, parlementariërs en leden van het kabinet zowel op nationaal als op deelstaatniveau waren afgeluisterd. Het CBI gaf toe dat deze afluisterpartij onwettig was.
    En is er wat veranderd na het schandaal in het voorjaar van 2010 dat de Indiase politiek enkele weken bezig hield? Nee, in juli van hetzelfde jaar werd de IMSI Catcher als nieuw gepresenteerd in een operatie met de codenaam Fox, alsof het om een nieuwe strijd ging tegen terrorisme en criminele bendes. De media waren het schandaal van twee maanden eerder al weer vergeten.

    Find this story at 20 April 2013

    No bugs found in former Nortel building, Defence officials now say

    The Conservative government says Defence officials have assured it that no listening devices have been found at the former Nortel campus,

    OTTAWA — The Conservative government says Defence officials have assured it that no listening devices have been found at the former Nortel campus, contradicting previous security concerns raised by both former Nortel and government intelligence employees.

    Former Nortel employees have contacted the Citizen to say that the listening devices were found when Department of National Defence officials did their initial security sweeps of the facility, purchased for DND’s new home.

    DND documents also indicate that concerns about the security surrounding the former Nortel campus were raised last year within the department. A briefing document for then-Defence minister Peter MacKay warned that the public announcement that the DND was moving into the complex before it could be properly secured created a major problem.

    “This not only raises the level of difficulty of verifying appropriate security safeguards in the future, it will probably dramatically increase security costs and cause delays to reach full operational capability,” MacKay was told in April 2012 by Canadian Forces security officers.

    Last year senior Nortel staff acknowledged that the company had been the subject of a number of spy and computer hacking operations over a decade, with the main culprits suspected of being associated with China.

    Michel Juneau-Katsuya, a former senior officer with the Canadian Security Intelligence Service, said the spy agency also determined that Nortel had been targeted. “We knew it was well penetrated,” he told the Citizen. “When I was the Chief of Asia-Pacific we warned Nortel.”

    But Julie Di Mambro, spokeswoman for Defence Minister Rob Nicholson, said Tuesday the government has now received assurances from DND. “Security officials have assured us that they have not discovered any bugs or listening devices,” she noted in an email. “Our government continues to be vigilant when it comes to maintaining the security of information and personnel.”

    No further details were provided.

    The purchase and refit of the Nortel campus has emerged as a political issue, with opposition MPs and others questioning whether the Conservative government’s plan to spend almost $1 billion on the purchase and renovations of the site makes financial sense. Retired lieutenant-general Andrew Leslie, now an adviser for Liberal Leader Justin Trudeau, told CTV on Monday that he thought it was a bad idea to spend such a large amount of money on a new military headquarters.

    The government spent $208 million to buy the property, with an additional $790 million to be spent on renovating the buildings for DND’s needs, according to a presentation made to the Senate by Treasury Board officials. The cost to prepare the site involves everything from creating new offices to installing secure computer networks.

    Asked last week for details about the listening devices and whether they were still functioning, the DND responded with a statement to the Citizen that it takes security at its installations seriously. “The Department of National Defence and Canadian Armed Forces cannot provide any information regarding specific measures and tests undertaken to secure a location or facility for reasons of national security,” noted an email from DND spokeswoman Carole Brown. “The DND/CAF must maintain a safe and secure environment at all of its facilities, in order to maintain Canada’s security posture at home and abroad.”

    In February, MacKay was also briefed about the poor state of DND security. Among the points raised in the presentation was that the Defence Department’s “security posture does not currently meet government standards,” according to documents obtained by Postmedia.

    The case of Royal Canadian Navy officer Jeffrey Delisle, who spied for the Russians, was specifically mentioned on the same page as the presentation noted that “repeated audits have called for improvement, but insufficient action has occurred.” Those audits calling for improved security included reviews by internal auditors and the federal auditor general’s office.

    Phil McNeely, Liberal MPP for Ottawa-Orléans, said he is concerned the government and the DND did not do its due diligence before the Nortel campus was purchased. McNeely, who opposes the DND move to Nortel, said he is worried taxpayers are “now stuck with a $208 million lemon.”

    An internal security study by Nortel suggested that the hackers had been able to download research and development studies and business plans starting in 2000. The hackers also placed spyware so deep into some employee computers it escaped detection, the Wall Street Journal reported last year.

    Another spy operation was launched against Nortel from the Philippines, security officials determined. That operation involved freelance computer hackers who were working for a “foreign power.”

    By David Pugliese, OTTAWA CITIZEN October 1, 2013

    Find this story at 1 October 2013

    © Copyright (c) The Ottawa Citizen

    Mysterious listening devices found at future headquarters of defence department

    Former Nortel campus was subject of decade-long industrial espionage
    A bird’s eye view of the former Nortel campus in Ottawa, bought by the Department of National Defence in 2010.

    OTTAWA — Workers preparing the former Nortel complex as the new home for the Department of National Defence have discovered electronic eavesdropping devices, prompting new fears about the security of the facility.

    It’s not clear whether the devices were recently planted or left over from an industrial espionage operation when Nortel occupied the complex.

    Asked for details about the listening devices and whether they were still functioning, the DND responded with a statement to the Citizen that it takes security at its installations seriously.

    The DND/CAF must maintain a safe and secure environment at all of its facilities

    “The Department of National Defence and Canadian Armed Forces cannot provide any information regarding specific measures and tests undertaken to secure a location or facility for reasons of national security,” noted an email from DND spokeswoman Carole Brown. “The DND/CAF must maintain a safe and secure environment at all of its facilities, in order to maintain Canada’s security posture at home and abroad.”

    Recently released DND documents, however, indicate that concerns about the security surrounding the former Nortel campus at 3500 Carling Ave. were raised last year.

    A briefing document for then Defence Minister Peter MacKay warned that the public announcement the DND was moving into the complex before it could be properly secured created a major problem. “This not only raises the level of difficulty of verifying appropriate security safeguards in the future, it will probably dramatically increase security costs and cause delays to reach full operational capability,” MacKay was told in April 2012 by Canadian Forces security officers.

    The briefing note was released under the Access to Information law.

    Last year it was also revealed that Nortel had been the target of industrial espionage for almost a decade, with the main culprits thought to be hackers based in China. An internal security study by Nortel suggested that the hackers had been able to download research and development studies and business plans starting in 2000.

    The hackers also placed spyware so deep into some employee computers it escaped detection, the Wall Street Journal reported last year.

    The Conservative government has earmarked almost $1 billion for its plan to move military personnel and Department of National Defence staff to the former Nortel campus. That includes $208 million to buy the property, with an additional $790 million to be spent to renovate the buildings for DND’s needs, according to a presentation made to the Senate by Treasury Board officials. The cost to prepare the site involves everything from creating new offices to installing secure computer networks.

    Recently, however, the federal government has noted it could be open to revisiting its plans to have the DND occupy the facility. Public Works has been considering whether other government departments might make their home there instead.

    “Public Works and Government Services Canada is currently reviewing its plans for the renovation and future occupancy of the Carling Campus in light of the current environment of fiscal restraint to ensure that the use of the campus provides best value for taxpayers,” Brown added in her email.

    The DND originally estimated the cost of preparing the Nortel site for its needs would be $633 million, according to department documents obtained by the Citizen through the Access to Information law.

    Although DND is planning for the move, cabinet has not yet made the final decision authorizing the department to occupy the Nortel site.

    Some have questioned the move at a time of cost-cutting, particularly since the DND will still continue to occupy key buildings such as its main headquarters, the Major-General George R. Pearkes Building on Colonel By Drive, as well as its facility on Star Top Road. The DND’s presence in the Louis St. Laurent Building, the National Printing Bureau building and the Hotel de Ville building in Gatineau will also continue.

    The department has estimated it would save $50 million a year by moving many of its employees in the Ottawa area into the Nortel campus but it has not provided a breakdown on how it came up with that figure.

    In justifying the move, the department noted it would save money through reduced cab fares, less need for commissionaires to guard offices and an atmosphere that allows people to work better together.

    David Pugliese, Ottawa Citizen
    Published: September 30, 2013, 10:38 am

    Find this story at 30 September 2013

    © COPYRIGHT – POSTMEDIA NEWS

    Spy agency won’t say if it uses Canadian embassies; The national eavesdropping agency is refusing to comment on allegations that it mounts foreign operations through Canada’s embassies abroad.

    The German magazine Der Spiegel this week cites presentation slides leaked by Edward Snowden, a former contractor with the National Security Agency, CSEC’s American counterpart.
    OTTAWA—The national eavesdropping agency is refusing to comment on allegations that it mounts foreign operations through Canada’s embassies abroad.

    Lauri Sullivan, a spokeswoman for Communications Security Establishment Canada, says the agency does not comment “on our foreign intelligence collection activities or capabilities.”

    German magazine Der Spiegel says Canada is using diplomatic facilities to support surveillance operations in league with key allies the United States, Britain and Australia.

    Word of the Canadian reference — first reported by blogger Bill Robinson, who closely tracks CSEC — came as the NDP unsuccessfully sought support in the House of Commons to create a parliamentary committee that would look into stronger oversight for the intelligence community.

    The magazine report published this week cites presentation slides leaked by Edward Snowden, a former contractor with the National Security Agency, CSEC’s American counterpart.

    One slide indicates the Canadian spy agency hosts “Stateroom” sites — a term for covert signals-intelligence gathering bases hidden in consulates and embassies.

    “These sites are small in size and in number of personnel staffing them,” says the slide. “They are covert, and their true mission is not known by the majority of the diplomatic staff at the facility where they are assigned.”

    Der Spiegel alleges that the U.S. NSA, Britain’s Government Communications Headquarters and Australia’s Defense Signals Directorate also host such covert stations, with equipment installed on rooftops or upper floors of embassy buildings — protected from view by screens or false structures.

    It’s just the latest of several references to the Ottawa-based spy service in Snowden’s cache of leaked materials.

    Earlier documents suggest Canada helped the U.S. and Britain spy on participants at the London G20 summit four years ago. Britain’s Guardian newspaper published slides describing the operation, including one featuring the CSEC emblem.

    More recently, Brazil demanded answers following accusations CSEC initiated a sophisticated spy operation against the South American country’s ministry of mines and energy.

    CSEC, tasked with gathering foreign intelligence of interest to Canada, has a staff of more than 2,000 — including skilled mathematicians, linguists and computer analysts — and a budget of about $350 million.

    The recent revelations — including concerns that CSEC gathers information about Canadians in the course of its foreign spying — have sparked criticism from civil libertarians and opposition politicians.

    An NDP motion put forward Tuesday by defence critic Jack Harris called for a special committee to study the intelligence oversight systems of other countries and make recommendations “appropriate to Canada’s unique circumstances.” The committee would have reported its findings by May 30 next year.

    The motion quickly went down to defeat. The Conservative government maintains CSEC is already subject to scrutiny by an independent commissioner who has never found an instance of the spy service straying outside the law.

    By: Jim Bronskill The Canadian Press, Published on Tue Oct 29 2013

    Find this story at 29 October 2013

    © Copyright Toronto Star Newspapers Ltd. 1996-2013

    << oudere artikelen  nieuwere artikelen >>