Slides reveal Canada’s powerful espionage tool8 november 2013
Security experts say that Canadian intelligence has developed a powerful spying tool to scope out and target specific phones and computers so as to better set up hacking and bugging operations.
The outlines of the technology are contained in the slides of a PowerPoint presentation made to allied security agencies in June, 2012. Communications Security Establishment Canada (CSEC) called the tool “Olympia,” showing how its analysts sifted through an immense amount of communications data and zeroed in on the phones and computer servers they determined merited attention – in the demonstration case, inside the Brazilian Ministry of Energy and Mines.
Within weeks, CSEC figured out who was talking to whom by plugging phone numbers and Internet protocol addresses into an array of intelligence databases. In this way it “developed a detailed map of the institution’s communications,” Paulo Pagliusi, a Brazilian security expert who examined the slides, told The Globe.
The slides are part of a large trove of documents that have been leaked by Edward Snowden, the former contractor with the U.S. National Security Agency (NSA) whose disclosures have set off a debate over whether the agency has improperly intruded on the privacy of Americans. Other disclosures have raised questions about its spying on foreign governments, sometimes with the assistance of allied intelligence agencies.
The Globe and Mail has collaborated with the Brazil-based American journalist Glenn Greenwald, based on information obtained from the Snowden documents. Mr. Snowden, who went into hiding in Hong Kong before the first cache of NSA documents was leaked, has been charged by the United States with espionage and theft of government property. Russia has granted him temporary sanctuary.
Canadian officials declined to comment on the slides. Responding to an e-mail requesting comment on whether Canada co-operated with its U.S. counterpart in tapping into Brazilian communications, CSEC spokesman Andy McLaughlin said the agency “cannot comment on its foreign intelligence activities or capabilities.” Prime Minister Stephen Harper said earlier this month that he is “very concerned” about reports CSEC focused on the Brazil ministry.
Any ability to sift through telecommunications data for specific leads can be valuable for electronic-eavesdropping agencies, especially the capacity to map out – without necessarily listening into – an organization’s Internet or voice communications. This, in turn, can help isolate specific devices for potential hacking operations. By developing “Olympia” as a method for doing just this, Canada added to its spymasters’ toolkit.
The PowerPoint presentation by CSEC was first reported by Brazil’s Fantastico TV program, which earlier reported the NSA spying, in conjunction with Mr. Greenwald. Brazilian officials expressed outrage at the United States, but their criticism of Canada was more fleeting. They say they now intend to put public employees on an encrypted e-mail system.
The CSEC presentation – titled Advanced Network Tradecraft – described a technological reconnaissance mission aimed at the Brazilian energy ministry in April and May of 2012. According to the presentation, the agency knew very little about the ministry going in, apart from its Internet domain name and a few associated phone numbers. The presentation never makes clear CSEC’s intentions for targeting the Brazilian ministry.
The leaked slides also suggest Canada sought to partner with the NSA, with one slide saying CSEC was “working with TAO to further examine the possibility” of a more aggressive operation to intercept Internet communications.
“TAO” refers to “tailored access operations,” said Bruce Schneier, a privacy specialist for the Berkman Center for the Internet and Society at Harvard. “It’s the NSA ‘blackbag’ people.” (A “blackbag job” refers to a government-sanctioned break-and-enter operation – hacking in this case – to acquire intelligence.)
It is not clear whether CSEC or the NSA followed up with other actions involving the Brazilian ministry.
COLIN FREEZE AND STEPHANIE NOLEN
WASHINGTON and RIO DE JANEIRO — The Globe and Mail
Published Saturday, Oct. 19 2013, 8:00 AM EDT
Find this story at 19 October 2013
© Copyright 2013 The Globe and Mail Inc.
Canadian spies met with energy firms, documents reveal; Government agency that allegedly spied on Brazil had secret meetings with energy companies8 november 2013
Observers have suggested that Canada’s actions are related to potential competition to its tar sands. Photograph: Orjan F Ellingvag/Corbis
The Canadian government agency that allegedly hacked into the Brazilian mining and energy ministry has participated in secret meetings in Ottawa where Canadian security agencies briefed energy corporations, it has emerged.
Claims of spying on the ministry by Communications Security Establishment Canada (CSEC) come amid the Canadian government’s increasingly aggressive promotion of resource corporations at home and abroad, including unprecedented surveillance and intelligence sharing with companies.
According to freedom of information documents obtained by the Guardian, the meetings – conducted twice a year since 2005 – involved federal ministries, spy and police agencies, and representatives from scores of companies who obtained high-level security clearance.
Meetings were officially billed to discuss “threats” to energy infrastructure but also covered “challenges to energy projects from environmental groups”, “cyber security initiatives” and “economic and corporate espionage”.
The documents – heavily redacted agendas – do not indicate that any international espionage was shared by CSEC officials, but the meetings were an opportunity for government agencies and companies to develop “ongoing trusting relations” that would help them exchange information “off the record”, wrote an official from the Natural Resources ministry in 2010.
At the most recent meeting in May 2013, which focused on “security of energy resources development”, meals were sponsored by Enbridge, a Canadian oil company trying to win approval for controversial tar sands pipelines.
Since coming to power, Conservative prime minister, Stephen Harper, has used his government apparatus to serve a natural resources development agenda, while creating sweeping domestic surveillance programs that have kept close tabs on indigenous and environmental opposition and shared intelligence with companies.
Harper has transformed Canada’s foreign policy to offer full diplomatic backing to foreign mining and oil projects, tying aid pledges to their advancement and jointly funding ventures with companies throughout Africa, South America and Asia.
Keith Stewart, an energy policy analyst with Greenpeace Canada, said: “There seems to be no limit to what the Harper government will do to help their friends in the oil and mining industries. They’ve muzzled scientists, gutted environmental laws, reneged on our international climate commitments, labelled environmental critics as criminals and traitors, and have now been caught engaging in economic espionage in a friendly country. Canadians, and our allies, have a right to ask who exactly is receiving the gathered intelligence and whose interests are being served.”
Observers have suggested that Canadian spying on Brazil is related to the country’s auctioning of massive offshore oil finds, potential competition to Canada’s tar sands, and Canada’s desire to gain competitive advantage for more than 40 Canadian companies involved in Brazil’s mining sector.
“There is very substantial evidence that the spying Canada was doing for economic reasons aimed at Brazil is far from an aberration,” Guardian columnist Glenn Greenwald told Canadian media on Tuesday. Greenwald hinted that he will be publishing further documents on CSEC.
“We’ve already seen how Canadian embassies around the world essentially act as agents for Canadian companies – even when they’re implicated in serious human rights abuses,” said Jamie Kneen of MiningWatch Canada, an NGO watchdog. “We just had no idea how far they were willing to go.”
Martin Lukacs and Tim Groves
theguardian.com, Wednesday 9 October 2013 12.08 BST
Find this story at 9 October 2013
© 2013 Guardian News and Media Limited or its affiliated companies. All rights reserved.
Brazil spying allegations part of a ‘war game scenario,’ former official says8 november 2013
A former high-ranking member of Canada’s spy service says he suspects the leaked documents that purport to show Ottawa was spying on Brazil are in fact part of a pretend “wargame scenario.”
“There’s no smoking gun here. It’s again more little snippets and snapshots from the Snowden revelations; they actually mislead more than they inform,” says Ray Boisvert, until last year a deputy director of the Canadian Security Intelligence Service.
“I don’t believe it’s likely Brazil was targeted.”
A Brazilian television report on Sunday said Canada’s electronic eavesdropping agency, the Communication Security Establishment Canada (CSEC) targeted the ministry that manages the South American nation’s vast mineral and oil resources. The report was based on documents leaked by former U.S. National Security Agency contractor Edward Snowden.
Mr. Boisvert, who left the Canadian Security Intelligence Service in 2012, said the top priority for CSIS and CSEC is counter-terrorism. The directive from on high was national security, not infiltrating a Brazilian government department of mining.
“When I worked there, very closely with CSEC and I was a top-line operational leader, we were all too busy chasing bad guys who want to kill people,” the former CSIS official said.
“At the end of the day CSIS and CSEC have a mandate to go after foreign powers if those are acting in a way that’s inimical to our interests, so the poster child for that would be Iran. Everything from nuclear proliferation to state-sponsored terror,” he said.
“Brazil seems highly unlikely to me,” Mr. Boisvert said.
He said one regular practice of security organizations, however, is war-gaming.
“I’m more inclined to think that this is probably a case of a hypothetical scenario,” Mr. Boisvert said.
“CSEC does war gaming just like the military and in their case they look at [computer] networks. Before they go after a target, they will play a game on paper,” he said.
“I have got a funny feeling that is all Snowden has: is just that exploratory war game piece saying ‘OK, what would we do, boys and girls, if we had to do this?’ ”
When pressed Monday for comment on allegations that CSEC spied on Brazilians, the Harper government gave repeated indirect answers to the question, saying the CSE does not conduct surveillance on Canadians.
“This organization cannot and does not target Canadians under Canadian law,” Defence Minister Rob Nicholson said.
Canadians and Brazilians are both working on a United Nations peacekeeping mission in Haiti and Mr. Nicholson rejected the suggestion the revelations might hurt relations between Canada and Brazil. “I believe our collaboration and friendship will continue,” Mr. Nicholson said.
“It’s wise not to get involved with commenting on foreign intelligence gathering activities and so I don’t do that.”
Mr. Boisvert said he assumes the Canadian government is reaching out to Brazil to explain what really happened.
STEVEN CHASE
OTTAWA — The Globe and Mail
Published Monday, Oct. 07 2013, 1:12 PM EDT
Find this story at 7 October 2013
© Copyright 2013 The Globe and Mail Inc.
Charges that Canada spied on Brazil unveil CSEC’s inner workings8 november 2013
Leaked documents showing that Canada’s electronic intelligence-gathering agency targeted the Brazilian government threaten to disrupt relations between the countries – and thrust the secretive CSEC into the public spotlight.
On Sunday night, Brazil’s flagship Fantastico investigative program on the Globo television network revealed leaked documents suggesting that Communications Security Establishment Canada (CSEC) has spied on computers and smartphones affiliated with Brazil’s mining and energy ministry in a bid to gain economic intelligence.
The report, attributed to documents first obtained by the former U.S. government contractor Edward Snowden, includes frames of a CSEC-earmarked presentation that was apparently shared with the United States and other allies in June, 2012.
“Brazilian Ministry of Mines and Energy (MME),” a title page of the leaked case study reads. “New target to develop.”
The presentation then rhetorically asks “How can I use the information available in SIGINT [signals-intelligence] data sources to learn about the target?” before delving into specific hacking techniques.
The documents were part of a collaboration with Globo by Glenn Greenwald. The Rio de Janeiro-based journalist and confidante of Mr. Snowden has spent the past four months steadily disclosing a treasure trove of leaked materials recording the electronic eavesdropping practices of the United States and its allies.
Washington has been reeling from the disclosures. In Brazil, they have caused the most serious rift between the two nations in years – after the first revelations about NSA espionage were made last month, Brazilian president Dilma Rousseff canceled an official state visit to Washington; it was to be the first in 18 years and was intended to showcase the growing economic and political ties between the two countries. Instead Ms. Rousseff went to the UN General Assembly where she complained of “totally unacceptable” U.S. spying in her country. She gained a considerable bump in personal approval ratings after lashing out at the U.S. over the NSA activity, which has elicited a reaction of deep offense from many Brazilians.
***
http://www.theglobeandmail.com/news/world/five-highlights-from-the-canada-brazil-spying-revelations/article14721506/
Five highlights from the Canada-Brazil spying revelations Add to
…
GLOBE STAFF
The Globe and Mail
Published Monday, Oct. 07 2013, 11:02 AM EDT
Canada’s signals-intelligence agency has been spying on Brazil’s Mines and Energy Ministry, according to documents the former U.S. government contractor Edward Snowden leaked to Brazil’s Globo television network.
Globo obtained a copy of a slide presentation made by someone at the Communications Security Establishment Canada (CSEC). The document was shown at a June 2012 gathering of members of the “Five Eyes,” the signals-intelligence alliance of Canada, the United States, Britain, Australia and New Zealand.
Here are some highlights that can be gleaned from the slides:
1. Using a program called Olympia, CSEC took aim at Brazil’s Ministry of Mines and Energy, describing it as a “new target to develop” despite “limited access/target knowledge.”
2. One of the slide shows that CSEC focused on ministry portable devices and was able to identify their carriers (such as Brasil Telecom S.A. or Global Village Telecom), the kind of hardware being used (for example a Nokia 3120 or an Android-based Motorola MRUQ7) and metadata about where calls were placed, in countries such as Peru, Venezuela, Poland, Singapore, Great Britain.
Another slide in the presentation explains how analysts cross-referenced a handset’s SIM card with the network telephone number assigned to it and the handset’s unique number (IMEI).
3. CSEC metadata collection included calls made from the Ministry of Mines and Energy to the Brazilian embassy in Peru and the head office of OLADE, the Latin American Energy Organization, in Quito, Ecuador.
One slide titled showed how the Canadians connected an IP addresses assigned to the ministry to e-mail communications with Canada, Eritrea, Saudi Arabia, Thailand, Afghanistan, Jordan and South Africa.
4. Another phone monitored by CSEC belonged to Paulo Cordeiro de Andrade Pinto, a career diplomat who was ambassador to Canada from 2008 to 2011, and is now Brazil’s Under Secretary for Middle East and Africa.
5. CSEC’s next step was going to be the collection of e-mails and cooperation with a hacking specialists working for a secret unit of the U.S. National Security Agency.
“I have identified MX [email] servers which have been targeted to passive collection by the Intel analysts,” says a slide titled “Moving Forward.”
The slide mentions TAO (Tailored Access Operations), an NSA unit specializes in installing spyware and tracking devices and has been reported to have played a role in the hunt for Osama Bin Laden.
“I am working with TAO to further examine the possibility for a Man on the Side operation,” the CSEC slide says, alluding to a form of online eavesdropping.
The impact for Canada of these revelations could be equally grave: they come at a time when Brazil has become a top destination for Canadian exports, when a stream of delegations from the oil and gas industries are making pilgrimages to Rio de Janeiro to try to get a piece of the booming offshore oil industry, and when the Canadian government is eager to burnish ties with Brasilia. Foreign Affairs Minister John Baird visited Brazil in August, and spoke repeatedly about the country as a critical partner for Canadian business.
American lawmakers have introduced several bills that aim to rein in the U.S. National Security Agency’s domestic surveillance programs.
Throughout all this, Canada’s electronic eavesdropping agency has kept a relatively low profile, never before emerging as the central figure in any Snowden-leaked spying program. Although it has existed since the Second World War, CSEC has rarely discussed any of its operations in public.
CSEC has a $350-million budget and 2,000 employees. By law, it has three mandates – to safeguard Canadian government communications and computers from foreign hackers, to help other federal security agencies where legally possible, and to gather “foreign intelligence.”
The federal government is building a new $1-billion headquarters for CSEC on the outskirts of Ottawa.
Given wide latitude by its political and bureaucratic masters to collect what “foreign intelligence” it can, CSEC is exceedingly discreet. The spy agency’s leaders rarely make any public remarks. When they do, they tend only to speak vaguely of the agency’s role in fighting terrorism.
But economic espionage appears to be a business line for CSEC. Former Carleton University Professor Martin Rudner has pointed out that the spy agency started recruiting economists and business analysts in the mid-1990s.
“CSE[C] operations in economic intelligence have gone rather beyond the strictly defensive to also help promote Canadian economic competitiveness,” Mr. Rudner wrote in an essay published in 2000. He added that the spy agency is rumoured to have given the Canadian government a leg up during NAFTA negotiations with Mexico, and also eavesdropped on the 1997 APEC summit.
Mr. Rudner added that Ottawa officials don’t necessarily share with Canadian businesses what CSEC surveillance turns up. Instead, he writes, they “sometimes provide advice and counsel by way of helping to promote Canadian trade, without necessarily revealing their sources in economic intelligence.”
While CSEC’s role in conducting economic espionage has been alluded to before, how it does this job has not. The significance of the documents obtained by Globo in Brazil is that they speak to how “metadata” analysis by CSEC can be used to exploit a rival country’s computer systems.
The CSEC-labeled slides about the “Olympia” program describe the “Brazilian Ministry of Mines and Energy” as a “new target to develop” despite “limited access/target knowledge.”
The presentation goes on to map out how an individual’s smartphone – “target’s handset” – can be discerned by analysis, including by cross-referencing the smartphone’s Sim card with the network telephone number assigned to it and also to the handset’s unique number (IMEI).
The “top secret” presentation also refers to attacks on email servers.
“I have identified MX [email] servers which have been targeted to passive collection by the Intel analysts,” one slide says, without explaining who the speaker is.
The slide suggests the presenter hoped to reach out to American superhackers – the NSA’s “Tailored Access Operations” group – for a more specialized operation: “I am working with TAO to further examine the possibility for a Man on the Side operation.”
A “Man on the Side” operation is a form of interception. According to a recent Guardian column, the NSA has installed secret servers on the Internet that can be used “impersonate a visited Web site” that a target plans to visit. The rerouting of the target’s traffic opens his or her computer or mobile device to invasion by the impersonating website.
The “Top Secret” presentation obtained by Globo is an exceedingly rare disclosure. In Ottawa, CSEC’s employees are sworn to secrecy and visitors to its complex have to check their smartphones, iPads, laptops and memory sticks at the door.
The CSEC-labeled presentation appears to have been shared with the NSA, the agency Mr. Snowden once worked for. He had retained access to the NSA’s data repositories as a security-cleared private contractor, prior to copying reams of material early this year and then flying with it to Hong Kong this summer.
Mr. Snowden leaked the materials to Mr. Greenwald in Hong Kong, prior to flying to Russia to seek asylum. The U.S. government wants to try him on espionage charges.
The leaked “CSEC – Advanced Network Tradecraft” presentation about the Olympia spying program kicks off with an allusion to Greek mythology.
It alludes to how Zeus and his sibling deities waged a 10-year battle to overthrow an older order of gods, known as the Titans. “And they said to the Titans ‘Watch Out OLYMPIAns in the house!” reads a slide in the presentation.
COLIN FREEZE AND STEPHANIE NOLEN
TORONTO AND RIO DE JANEIRO — The Globe and Mail
Published Monday, Oct. 07 2013, 7:14 AM EDT
Find this story at 7 October 2013
© Copyright 2013 The Globe and Mail Inc.
NSA Documents Show United States Spied Brazilian Oil Giant8 november 2013
One week after revealing USA surveillance of the presidents of Brazil and Mexico, Fantastico brings another exclusive.
One of the prime targets of American spies in Brazil is far away from the center of power – out at sea, deep beneath the waves. Brazilian oil. The internal computer network of Petrobras, the Brazilian oil giant partly owned by the state, has been under surveillance by the NSA, the National Security Agency of the United States.
The spying is confirmed by top secret documents leaked by Edward Snowden, and obtained exclusively by Fantastico. Snowden, an ex-intelligence analyst employed by the NSA, made these and thousands of other documents public last June. He has been given asylum by Russia.
These new disclosures contradict statements by the NSA denying espionage for economic purposes.
saiba mais
The information was found by journalist Glen Greenwald, co-author of this story along with TV Globo Reporter Sonia Bridi, amid the thousands of documents given to him by Edward Snowden in June.
This statement addressed to “The Washington Post” this week highlights that ‘The department does ***not*** engage in economic espionage in any domain, including cyber.'”
However, a top secret presentation dated May 2012 is used by the NSA to train new agents step-by-step how to access and spy upon private computer networks – the internal networks of companies, governments, financial institutions – networks designed precisely to protect information.
The name of Petrobras – Brazil’s largest company – appears right at the beginning, under the title: “MANY TARGETS USE PRIVATE NETWORKS.”
Besides Petrobras, e-mail and internet services provider Google’s infrastructure is also listed as a target. The company, often named as collaborating with the NSA, is shown here as a victim.
Other targets include French diplomats – with access to the private network of the Ministry of Foreign Affairs of France – and the SWIFT network, the cooperative that unites over ten thousand banks in 212 countries and provides communications that enable international financial transactions. All transfers of money between banks across national borders goes through SWIFT.
Names of other companies and institutions on the list were blacked out in order not to compromise operations involving targets linked to terrorism.
Greenwald defends the decision to omit the names. “It’s a question of responsible journalism”, says Greenwald. “These documents contain information regarding spying against terrorists, matters of national security which should not be published, because nobody doubts that the United States, just as any other country, has the right to spy in order to guarantee national security. But there is much more information on spying on innocents, against people who have nothing to do with terrorism, or on industrial issues, which need to be made public.”
The documents are classified as “top-secret”, to be seen only by those named by the Americans as “Five Eyes” – the five countries allied in spying: the United States, Australia, Canada, Great Britain and New Zealand.
The name of Petrobras appears on several slides, as the training goes deeper in explaining how date from the target companies is monitored.
Individual folders are created for each target – and contain all the intercepted communications and IP addresses – the identification of each computer on the network – which should be immune to these attacks.
Paulo Pagliusi has a PhD in information security and has written books on the subject. He analyzed the documents for Fantastico.
“The networks in the presentation all belong to real companies. These are not made-up situations”, says Pagliusi. “Some details stand out. For instance, some numbers were blacked out. Why would they be blacked out if they weren’t real? It’s as if the instructors didn’t want the trainees to see them.”
Pagliusi points to signs that this is part of systematic spying. “You don’t obtain all of this in a single run. From what I see, this is a very consistent system that yields powerful results; it’s a very efficient form of spying,” he says.
Pagliusi concludes that this has been going on for a while: “There’s no place for amateurs in this area.”
The yearly profits of Petrobras are over 280 billion reais – US$ 120 billion. More than the GDP of many countries. And there are plenty of motives for spies to want access to the company’s protected network.
Petrobras has two supercomputers, used mainly for seismic research – which evaluate oil reserves from samples collected at sea. This is how the company mapped the Pre-salt layer, the largest discovery of new oil reserves in the world in recent years.
There is no information on the extent of the spying, nor if it managed to access the data contained in the company’s computers. It’s clear Petrobras was a target, but no documents show exactly what information the NSA searched for. But at any rate, Petrobras has strategic knowledge of deals involving billions of dollars.
For example, the details of each lot in an auction set for next month: for exploration of the Libra Field, in the Bay of Santos, part of the Pre-salt. Whether the spies had access to this information is one of the questions the Brazilian government will have to put to the United States.
Former Petrobras Director Roberto Villa considers this the greatest action in the history of oil exploration. “It’s a very peculiar auction. The auction of an area where we already know there’s oil, there’s no risk”, he says. What no one else should know, Villa says, is which are the richest lots. “Petrobras knows. And I hope only they know.” He considers that such information, if stolen, could give someone an advantage. “Someone would have an edge. If this information was leaked and someone else has obtained it, he would be in a privileged position at the auction. He’ll know where to invest and where not to. It’s a handy little secret.”
Another former Petrobras Director considers this a serious matter. “Commercially, internationally, this means a game with marked cards for some places, some countries, some friends,” says Antonio Menezes.
The Pre-salt oil is found at high seas, at depths of two thousand meters – below a layer of rocky salt, four kilometers below the ocean floor. Reaching this oil requires a lot of technology, and Petrobras is a world leader in deep-sea oil extraction.
Adriano Pires, a specialist in infrastructure, considers that spies could be specially interested in ocean-floor exploration technology. “Petrobras is the world’s number one in drilling for oil at sea. Pre-salt layers exist all around the world – there’s a pre-salt in Africa, in the Gulf of Mexico, in the North Sea. If I have this technology, I can drill for oil anywhere I want,” says Pires.
The NSA presentation contains documents prepared by the GCHQ – the British Spy agency, from a country that appears as an ally of the United States in spying. The British agency shows how two spy programs operate. “Flying Pig” and “Hush Puppy” also monitor private networks which carry supposedly secure information. These networks are known as TLS/SSL.
The presentation explains how data is intercepted, through an attack known as “Man in the Middle”. In this case, data is rerouted to the NSA central, and then relayed to its destination, without either end noticing.
A few pages ahead, the document lists the results obtained. “Results – what do we find?” “Foreign government networks”, “airlines”, “energy companies” – like Petrobras – and “financial organisations.”
TLS/SSL networks are also the security system used in financial transactions, such as when someone accesses their bank account through an ATM. The connection between a remote terminal and the bank’s central goes through a sort of secure tunnel through the internet. No one is supposed to see what travels through it.
Later, the NSA presentation shows in detail how the data of a chosen target is rerouted through spy filters beginning at the very source, until they reach the NSA’s supercomputers.
In this document the NSA names Latin America as a key target of the “SILVERZEPHYR” program, which collects the contents of voice recordings, faxes, as well as metadata, which is the overall information being transmitted in the network.
Last Sunday, Fantastico showed exclusively how the President of Brazil is a direct target of espionage.
On Thursday, President Dilma Rousseff met American counterpart Barack Obama at the G20 Summit in Russia, and she demanded explanations.
“This is what I asked: It’s very complicated for me to learn about these things through the press. I read something one day, then two days later I learn something else, and this goes on piece by piece. I’d like to know what exists (about spying). I want to know what’s going on. If there is something or not, I want to know. Is it real or not? Besides what’s been published by the press, I want to know everything they have regarding Brazil. The word ‘everything’ is very comprehensive. It means all. Every bit. In English, ‘everything’.” – the President told a press conference on Friday.
On the day Rousseff and Obama met, a story published simultaneously by British newspaper The Guardian and the American New York Times revealed that the NSA and the British GCHQ broke the protected communication codes of several internet providers – enabling them to spy on the communications of millions of people, and also on banking transactions.
The story shows that cryptography, the system of codes provided by some internet operators, comes with a built-in vulnerability, inserted on purpose by the NSA, which allows the spies to enter the system, copy, snoop, even make alterations, without leaving footprints. There is also evidence that some equipment put together in the United States comes with factory-installed spying devices.
The “New York Times” says this was done with at least one foreign government that bought American computers. But it does not reveal which government payed to be spied upon.
Lastly, another document obtained by Fantastico shows who are the spies’ clients – who gets the information obtained: American diplomats, the intelligence agencies, and the White House. It proves that spying doesn’t have as its sole purpose the fight against terrorism. On this list of objectives are also diplomatic, political and economic information.
Petrobras declined to comment. President Dilma Rousseff awaits clarifications by the U.S. government later this week.
The NSA has sent a statement attributed to James Clapper, director of National Intelligence, declaring that the agency collects information in order to give the United States and their allies early warning of international financial crises which could negatively impact the global economy and also to provide insight into other countries’ economic policy or behavior which could affect global markets.
The statement also stresses that the collected intelligence is not used “to steal the trade secrets of foreign companies on behalf of – or give intelligence we collect to – US companies to enhance their international competitiveness or increase their bottom line.”
The UK Foreign Office in London and the British Embassy in Brasilia declared they do not comment on intelligence-related issues.
Globo TV – Fantástico
Edição do dia 08/09/2013
08/09/2013 22h52 – Atualizado em 09/09/2013 00h07
Find this story at 9 September 2013
© Copyright 2013 Globo Comunicação e Participações S.A. Política de Privacidade
NSA ‘spied on Brazil and Mexico’ – Brazilian TV report8 november 2013
Brazil says it will demand an explanation from the US after allegations that the National Security Agency (NSA) spied on Brazilian government communications.
The allegations were made by Rio-based journalist Glenn Greenwald in a programme on TV Globo on Sunday.
Mr Greenwald obtained secret files from US whistle-blower Edward Snowden.
Communications from the Mexican president were also accessed by the NSA, Mr Greenwald said.
The US ambassador to Brazil, Thomas Shannon, was briefly summoned to the Brazilian foreign ministry, “to explain” the claims made by the American journalist.
He did not speak to reporters when he left, and there have been no comments from the foreign ministry either.
‘Attack on sovereignty’
Mr Greenwald, a columnist for the British Guardian newspaper, told TV Globo’s news programme Fantastico that secret documents leaked by Edward Snowden showed how US agents had spied on communications between aides of Brazil’s President Dilma Rousseff.
Brazil’s Justice Minister Jose Eduardo Cardozo said that “if these facts prove to be true, it would be unacceptable and could be called an attack on our country’s sovereignty”.
According to the report, the NSA also used a programme to access all internet content that Ms Rousseff visited online.
Her office said the president was meeting top ministers to discuss the case.
The BBC’s Julia Carneiro in Sao Paulo says that the suspicion in Brazil as to why the United States is allegedly spying Brazilian government communications is because Brazil is a big player and there are lots of commercial interests involved.
Mexican connection
The report also alleges that the NSA monitored the communications of Mexican President Enrique Pena Nieto, even before he was elected in July last year.
Mr Greenwald said that a document dating from June 2012 showed that Mr Pena Nieto’s emails were being read.
A spokesman for the Mexican foreign ministry told the Agence France Presse news agency that he had seen the report but had no comment.
The documents were provided to Mr Greenwald by ex-US intelligence analyst Edward Snowden, who was granted temporary asylum in Russia after leaking secret information to media in the US and Britain.
Mr Greenwald was the first journalist to reveal the secret documents leaked by Mr Snowden on 6 June. Since then, he has written a series of stories about surveillance by US and UK authorities.
The detention last month for nine hours at London’s Heathrow airport of Mr Greenwald’s partner, David Miranda, caused widespread controversy in the UK and abroad.
Mr Greenwald said the detention of his partner amounted to “bullying” and was “clearly intended to send a message of intimidation” to those working on the NSA revelations.
2 September 2013 Last updated at 12:20 ET
Find this story at 2 September 2013
BBC © 2013 The BBC
Turkey denies exposing Israeli spies to Iran7 november 2013
Washington Post report accuses Ankara of blowing the cover of 10 Iranians who met in Turkey with Mossad handlers.
Davutoglu said the Washington Post allegations were “without any foundation” [Reuters]
Turkey denied on Thursday a US newspaper report claiming it had revealed an Israeli spy ring working with Iranians on its soil to the authorities in Tehran, a sign of the souring ties between the once-close allies.
Washington Post columnist David Ignatius said Prime Minister Recep Tayyip Erdogan’s government had last year revealed to Iranian intelligence the identities of up to 10 Iranians who had been meeting in Turkey with Mossad handlers.
But Turkish Foreign Minister Ahmet Davutoglu said the allegations were “without any foundation”.
“[Turkish intelligence chief Hakan] Fidan and other security agents report only to the Turkish government and the parliament,” he said.
The allegation angered officials in Ankara, already on the defensive after a Wall Street Journal article last week suggested Washington was concerned that Fidan had shared sensitive information with Iran.
Other officials in Ankara, speaking on condition they not be named, described the article as part of an attempt to discredit Turkey by foreign powers uncomfortable with its growing influence in the Middle East.
“Turkey is a regional power and there are power centres which are uncomfortable with this… stories like these are part of a campaign,” a Turkish official said, asking not to be identified because of the sensitivity of the subject.
‘Very complex’
There was no immediate comment from Israel, but Israeli ministers have accused Erdogan of adopting an anti-Israeli stance in recent years. Deputy Israeli Foreign Minister Zeev Elkin declined to comment on the report, but said relations with Turkey were “very complex.”
“The Turks made a strategic decision … to seek the leadership of our region, in the Middle East, and they chose the convenient anti-Israeli card in order to build up leadership,” he told Israel Radio.
The relationship hit the rocks in 2010 after Israeli commandos killed nine Turkish activists seeking to break Israel’s long-standing naval blockade of the Gaza Strip.
Relations between the two US allies have been fraught ever since, with military cooperation frozen and mutual distrust scuppering attempts to restore ties, despite efforts by US President Barack Obama to broker a reconciliation.
Iran has long accused Israel of spying on it soil and of killing several Iranian nuclear scientists, the last in January 2012.
In April 2012, Iran announced that it had broken up a large Israeli spy network and arrested 15 suspects. It was not clear if this was connected to the alleged Turkish leak.
Last Modified: 17 Oct 2013 17:15
Find this story at 17 October 2013
Turkey blows Israel’s cover for Iranian spy ring7 november 2013
The Turkish-Israeli relationship became so poisonous early last year that the Turkish government of Prime Minister Recep Tayyip Erdogan is said to have disclosed to Iranian intelligence the identities of up to 10 Iranians who had been meeting inside Turkey with their Mossad case officers.
Knowledgeable sources describe the Turkish action as a “significant” loss of intelligence and “an effort to slap the Israelis.” The incident, disclosed here for the first time, illustrates the bitter, multi-dimensional spy wars that lie behind the current negotiations between Iran and Western nations over a deal to limit the Iranian nuclear program. A Turkish Embassy spokesman had no comment.
Israeli anger at the deliberate compromise of its agents may help explain why Prime Minister Benjamin Netanyahu became so entrenched in his refusal to apologize to Erdogan about the May 2010 Gaza flotilla incident . In that confrontation at sea, Israeli commandos boarded a Turkish-organized convoy of ships carrying humanitarian aid to Gaza. Nine Turks were killed.
Netanyahu finally apologized to Erdogan by phone in March after President Obama negotiated a compromise formula. But for more than a year before that, the Israeli leader had resisted entreaties from Obama and Secretary of State Hillary Clinton to heal the feud.
Top Israeli officials believe that, despite the apology, the severe strain with Erdogan continues. The Turkish intelligence chief, Hakan Fidan, is also suspect in Israel because of what are seen as friendly links with Tehran; several years ago, Israeli intelligence officers are said to have described him facetiously to CIA officials as “the MOIS station chief in Ankara,” a reference to Iran’s Ministry of Intelligence and Security. The United States continued to deal with Fidan on sensitive matters, however.
Though U.S. officials regarded exposure of the Israeli network as an unfortunate intelligence loss, they didn’t protest directly to Turkish officials. Instead, Turkish-American relations continued warming last year to the point that Erdogan was among Obama’s key confidants. This practice of separating intelligence issues from broader policymaking is said to be a long-standing U.S. approach.
U.S. officials were never sure whether the Turkish disclosure was done in retaliation for the flotilla incident or was part of a broader deterioration in Turkish-Israeli relations.
Israeli intelligence had apparently run part of its Iranian spy network through Turkey, which has relatively easy movement back and forth across its border with Iran. The Turkish intelligence service, known as the Milli Istihbarat Teskilati, or MIT, conducts aggressive surveillance inside its borders, so it had the resources to monitor Israeli-Iranian covert meetings.
U.S. officials assessed the incident as a problem of misplaced trust, rather than bad tradecraft. They reasoned that the Mossad, after more than 50 years of cooperation with Turkey, never imagined the Turks would “shop” Israeli agents to a hostile power, in the words of one source. But Erdogan presented a unique challenge, as he moved in 2009 to champion the Palestinian cause and, in various ways, steered Ankara away from what had been, in effect, a secret partnership with Jerusalem.
The Israeli-Turkish intelligence alliance was launched in a secret meeting in August 1958 in Ankara between David Ben-Gurion, then Israel’s prime minister, and Adnan Menderes, then Turkey’s prime minister. “The concrete result was a formal but top-secret agreement for comprehensive cooperation” between the Mossad and Turkish intelligence, wrote Dan Raviv and Yossi Melman in their 2012 book, “Spies Against Armageddon.”
The groundwork had been laid secretly by Reuven Shiloah, the founding director of the Mossad, as part of what he called a “peripheral alliance strategy.” Through that partnership, Israelis provided training in espionage to the Turks and, ironically, also to Iranians under the shah’s government, which was toppled in 1979.
Fidan, the Turkish spy chief, is a key Erdogan adviser. He became head of the MIT in 2010 after serving as a noncommissioned officer in the Turkish army and gaining a bachelor’s degree from the University of Maryland and a doctorate in Ankara. After Fidan took over the Turkish service, “he rattled Turkey’s allies by allegedly passing to Iran sensitive intelligence collected by the U.S. and Israel,” according to a recent profile in the Wall Street Journal. The Journal also noted U.S. fears that Fidan was arming jihadist rebels in Syria.
The Netanyahu-Erdogan quarrel, with its overlay of intelligence thrust and parry, is an example of the kaleidoscopic changes that may be ahead in the Middle East. The United States, Israel, Iran, Saudi Arabia and Egypt are all exploring new alliances and struggling to find a new equilibrium — overtly and covertly.
Read more from David Ignatius’s archive, follow him on Twitter or subscribe to his updates on Facebook.
Read more about this issue: David Ignatius: Rouhani sees a nuclear deal in 3 months Soli Ozel: The protests in Turkey won’t be the last Fareed Zakaria: Israel dominates the new Middle East Sonet Cagaptay: Syria becomes a wedge between the United States and Turkey Dani Rodrik: Turkey’s miscarriage of justice
By David Ignatius, Published: October 17
Find this story at 17 October 2013
© The Washington Post Company
Surveillance : la DGSE a transmis des données à la NSA américaine7 november 2013
Une semaine après les manifestations d’indignation exprimées par les autorités politiques françaises après les révélations du Monde sur l’ampleur des interceptions électroniques réalisées, en France, par l’Agence nationale de sécurité (NSA) américaine, de nouveaux éléments montrent que cette émotion pouvait être, en partie, feinte.
Mardi 29 octobre, devant la commission du renseignement de la Chambre des représentants, le chef de la NSA, le général Keith Alexander, a juré que les informations du Monde ainsi que celles d’El Mundo, en Espagne, et de L’Espresso, en Italie, sur l’interception de communications de citoyens européens par la NSA étaient « complètement fausses ». Il a précisé qu’il s’agissait de « données fournies à la NSA » par ces mêmes partenaires européens.
Quelques heures plus tôt, le quotidien américain The Wall Street Journal, s’appuyant sur des sources anonymes, affirmait que les 70,3 millions de données téléphoniques collectées en France, par la NSA, entre le 10 décembre 2012 et le 8 janvier 2013, ont été communiquées par les services français eux-mêmes. Ces éléments auraient été transmis, selon ce journal, conformément à un accord de coopération en matière de renseignement entre les Etats-Unis et la France.
UN ACCORD DE COOPÉRATION CONNU SOUS LE NOM DE « LUSTRE »
Ces informations, qui tendent à dédouaner la NSA de toute intrusion, ne permettent de progresser dans la compréhension de l’espionnage américain dans le monde qu’à condition de les mettre en résonance avec l’éclairage apporté, le 28 octobre, par la Süddeutsche Zeitung. La presse allemande a signalé, grâce à une note dévoilée par l’ex-consultant de la NSA Edward Snowden, l’existence d’un accord de coopération sur la surveillance entre la France et les Etats-Unis connu sous le nom de « Lustre ».
Selon nos informations, recueillies auprès d’un haut responsable de la communauté du renseignement en France, la direction des services extérieurs français, la DGSE, a, en effet, établi, à partir de la fin 2011 et début 2012, un protocole d’échange de données avec les Etats-Unis.
La France bénéficie d’un positionnement stratégique en matière de transport de données électroniques. Les câbles sous-marins par lesquels transitent la plupart des données provenant d’Afrique et d’Afghanistan atterrissent à Marseille et à Penmarc’h, en Bretagne. Ces zones stratégiques sont à la portée de la DGSE française, qui intercepte et stocke l’essentiel de ce flux entre l’étranger et la France.
“UN TROC ENTRE LA DIRECTION DE LA NSA ET CELLE DE LA DGSE”
« C’est un troc qui s’est institué entre la direction de la NSA et celle de la DGSE, explique la même source. On donne des blocs entiers sur ces zones et ils nous donnent, en contrepartie, des parties du monde où nous sommes absents, mais la négociation ne s’est pas effectuée en une fois, le périmètre du partage s’élargit au fil des discussions qui se prolongent encore aujourd’hui. »
Il paraît donc, a priori, en partie exact, qu’une partie des données téléphoniques transitant sur le sol français soit transmise, conformément aux accords de coopération, et sans tri préalable, par la DGSE à la NSA. Il s’agit donc de données concernant aussi bien des citoyens français recevant des communications de ces zones géographiques que d’étrangers utilisant ces canaux.
Il paraît peu probable que le gouvernement français, qui supervise le financement des infrastructures d’interception et de stockage de la DGSE, ne soit pas au courant de ces pratiques. Ce qui relativise la sincérité des récriminations françaises après l’annonce, par Le Monde, de ces interceptions américaines.
GÉOGRAPHIE SOUS-MARINE
L’absence de statut juridique clair des métadonnées en France et l’étrange discrétion de la Commission nationale de contrôle des interceptions de sécurité (CNCIS) paraissent, de plus, avoir facilité la transmission à la NSA par la DGSE de millions de données relevant de la vie privée de millions de Français.
Au regard de la quantité des interceptions réalisées en un seul mois, la justification avancée par les services de renseignement concernant des questions liées à la lutte contre le terrorisme peut également être sujette à caution.
D’après un responsable à Matignon, la France n’est pas la seule à « troquer » ainsi les données passant sur son territoire. Elle appartiendrait à « une amicale » qui comprend des pays tels qu’Israël, la Suède ou l’Italie, vers lesquels convergent également des câbles sous-marins stratégiques pour les Américains. Depuis 2011, une nouvelle redistribution des cartes de la coopération en matière de renseignement s’est ainsi réalisée sur le seul fondement de cette géographie sous-marine.
RESPONSABILITÉ DES AUTORITÉS POLITIQUES FRANÇAISES
Ces informations viennent donc préciser celles déjà publiées par Le Monde concernant la collecte, en un mois, par la NSA, de 70,3 millions de données téléphoniques concernant la France. Qu’une partie de ces informations soient transmises avec l’assentiment de la DGSE ne change en rien son caractère attentatoire aux libertés. Ce nouvel éclairage pose avant tout la responsabilité des autorités politiques françaises. Sollicitée sur cette coopération, la DGSE s’est refusée à tout commentaire.
Par ailleurs, Le Monde maintient, sur la base des documents dévoilés par Edward Snowden permettant de décrypter les tableaux d’interceptions de données téléphoniques et numériques à travers le monde, qu’il s’agit d’opérations « contre » un pays nommé. Dans ce cas précis, la France.
Un haut responsable du renseignement français, joint, mercredi matin, a admis, sous couvert d’anonymat, l’existence de « ces échanges de données ». Il a néanmoins démenti « catégoriquement » que la DGSE puisse transférer « 70,3 millions de données à la NSA ».
LE MONDE | 30.10.2013 à 12h51
Par Jacques Follorou
Find this story at 30 October 2013
© Le Monde.fr
Que dit le document sur la surveillance téléphonique de la NSA en France ?7 november 2013
Le général Keith Alexander, le chef de la NSA, a mis en cause, mardi 29 octobre lors d’une audition devant la Chambre des représentants, les informations publiées par plusieurs journaux européens, dont Le Monde, sur la surveillance exercée par l’agence de renseignement dans leurs pays respectifs.
Que disent les autorités américaines ?
Selon Keith Alexander, les informations publiées par plusieurs journaux européens sont fondées sur des documents qui n’ont pas été “compris”.
A l’instar du général américain, des sources anonymes ont affirmé au Wall Street Journal que ces documents, sur lesquels se sont appuyés les journaux européens, ne montrent pas des données interceptées par la NSA au sein de ces pays, mais des informations captées par les services de renseignement européens eux-mêmes, à l’extérieur de leurs frontières.
D’où vient ce document ?
DOCUMENT
Le document sur lequel Le Monde s’est appuyé pour ses révélations fait partie des documents exfiltrés de la NSA par l’ancien sous-traitant de l’agence Edward Snowden, auxquels nous a donné accès notre collaboration avec Glenn Greenwald.
Il est issu d’un logiciel, Boundless Informant, qui agrège et organise les données contenues dans les innombrables bases de données de la NSA et permet aux analystes de l’agence d’en avoir un aperçu en quelques clics. Son existence, ainsi que la carte du monde qui en est tirée et montre l’ampleur des données collectées pour chaque pays, a été révélée par le Guardian en juin.
Ce logiciel permet aussi d’afficher un récapitulatif par pays des données le concernant. C’est le cas du document reproduit par Le Monde, sur lequel nous nous sommes fondés pour évoquer le chiffre de près de 70,3 millions de données téléphoniques interceptées.
C’est également ce type de document que El Mundo en Espagne, L’Espresso en Italie et, avant eux, Der Spiegel en Allemagne ont utilisé pour étayer leurs révélations sur la surveillance.
Que montre-t-il ?
Le document montre clairement que 70 271 990 données téléphoniques concernant la France ont été incorporées dans les bases de données de l’agence entre le 10 décembre 2012 et le 8 janvier 2013.
Pour s’y retrouver dans les nombreux “tuyaux” qui lui fournissent les données, la NSA utilise une nomenclature spécifique. Ainsi, au bas du document que nous reproduisons, on apprend que le “canal” “US-985D” – celui qui fournit l’ensemble des 70 millions de données françaises – est alimenté via deux outils techniques : “DRTBOX” et “WHITEBOX”. Le premier se taille la part du lion en récoltant près de 89 % des données affichées sur le document.
Extratit du document obtenu par “Le Monde”
Qu’est-ce qui reste flou ?
Selon la version défendue par les sources anonymes du Wall Street Journal et par Keith Alexander, ce document ne montre pas des données de Français interceptées par la NSA, mais des informations collectées par la France et ses services, en dehors du territoire hexagonal et visant avant tout des cibles non françaises. Autrement dit, les données sont-elles fournies par la France, ou sont-elles issues d’une surveillance de la France ? L’intitulé du document – “France, 30 derniers jours” – ne permet pas de trancher.
Extrait d’un document obtenu par “Le Monde”
L’existence des deux techniques d’interception “DRTBOX” et “WHITEBOX” pourrait accréditer l’existence d’un partenariat avec les services français, dont les informations du Monde fournissent la preuve.
Mais un document d’aide destiné aux analystes de la NSA répondant à leurs questions sur Boundless Informant permet, sinon de contredire, au moins de fortement nuancer l’hypothèse de la NSA, accréditant les informations du Monde. Publié par le site du Guardian en juin, il précise à plusieurs reprises que les informations qui y sont affichées sont issues de collecte “contre” les pays spécifiés.
Le document explique par exemple qu'”un clic sur un pays [depuis la carte] montre la posture de collecte (…) contre ce pays en particulier”.
Extrait d’un document publié par le “Guardian”. Le surlignage a été effectué par le “Monde”.
Ailleurs, le document précise que “l’outil [Boundless Informant] permet à ses utilisateurs de selectionner un pays [ainsi que] les détails de la collecte contre ce pays”, est-il ainsi écrit. La question “combien de données sont collectées contre un pays en particulier ?” figure, elle, dans les exemples de requêtes que peuvent formuler les analystes dans le logiciel. Enfin, il est fait mention des “capacités de collecte de la NSA” que les analystes peuvent évaluer grâce à Boundless Informant.
Extrait d’un document publié par le “Guardian”. Le surlignage a été effectué par le “Monde”.
Comme Le Monde l’a écrit lors de ses révélations, les modalités techniques précises et le périmètre de cette surveillance sont inconnus.
Pourquoi les autorités américaines démentent-elles aujourd’hui ?
Il y a plusieurs semaines déjà, des médias partenaires de M. Greenwald ont utilisé des documents similaires à celui reproduit par Le Monde. Lorsque le Spiegel annonce que 500 millions de communications de citoyens allemands sont surveillées, il le fait en se fondant notamment sur un document issu de Boundless Informant. A l’époque, la NSA n’a ni commenté ni démenti ces informations.
De fait, ce démenti public formulé par Keith Alexander intervient alors que la pression politique, domestique et internationale, s’est considérablement accrue sur son agence.
Notons enfin que les informations concernant la surveillance d’intérêts économiques hexagonaux, tout comme celle d’importants diplomates, n’a pas été démentie par le chef de l’agence de renseignement américaine.
Le Monde.fr | 30.10.2013 à 18h39
Par Martin Untersinger
Find this story at 30 October 2013
© Le Monde.fr
Codename “Lustre”; Frankreich liefert Informationen an britische und US-Geheimdienste7 november 2013
Während Hollande den jüngsten Lauschangriff heftig kritisiert, arbeitet Frankreich längst mit amerikanischen und britischen Geheimdiensten zusammen. Unter dem Codenamen “Lustre” hat die Regierung vor einiger Zeit einen Kooperationsvertrag geschlossen – sie ist damit nicht alleine.
Hollande kritisiert den Lauschangriff der US-Dienste und rückt näher an Merkel. Doch der Geheimdienst seines Landes arbeitet indes unter dem Codenamen “Lustre” mit dem Geheimdienstbündnis “Five Eyes” zusammen, dem neben den USA und Großbritannien auch Neuseeland, Kanada und Australien angehören. Paris liefert ihnen systematisch Informationen.
Frankreich hat ein entsprechendes Kooperationsabkommen – ein sogenanntes Drittparteiabkommen – geschlossen, wie aus Dokumenten des Whistleblowers Edward Snowden hervorgeht, die der Norddeutsche Rundfunk und die Süddeutsche Zeitung einsehen konnten.
Demnach kooperieren auch Israel (Codename Ruffle), Schweden (Codename Sardine) und Italien mit dem britischen und amerikanischen Geheimdienst. Die “Five Eyes”-Mitglieder sollen sich versprochen haben, sich nicht gegenseitig auszuspionieren. Das italienische Magazin L’Espresso berichtete unterdessen, dass Italiens Regierung ebenfalls von der NSA ausgespäht worden sein soll.
Süddeutsche Zeitung
26. Oktober 2013
Von John Goetz und Frederik Obermaier
Find this story at 26 October 2013
© Süddeutsche Zeitung Digitale Medien GmbH / Süddeutsche Zeitung GmbH
The U.S. Has Been Spying on France Since Before the NSA Existed7 november 2013
On Monday, the news broke that the National Security Agency has been actively intercepting French telephone calls and email traffic — collecting over 70 million French calls in a single month, according to Le Monde.
Turns out this is only the latest surveillance operation in a long, long history of America spying on France. A newly declassified intelligence document reveals that the NSA and its antecedents have been intercepting French communications and breaking French codes and ciphers for more than 70 years.
Monday’s Le Monde report may have generated enormous controversy in France, leading the French foreign minister to call in the U.S. ambassador and read him the riot act. But it’s hardly a new development. American eavesdroppers began listening on France during World War II. They continued doing so during the Cold War. The NSA even spied on France during the run-up to the 2003 invasion of Iraq.
A 1947 top-secret code-word NSA document, titled “The General Cryptanalytic Problems,” reveals that in April 1941, eight months before the Japanese attack on Pearl Harbor, a small U.S. Army code-breaking unit, headed by French linguist Herrick F. Bearce, began trying to solve the diplomatic codes and ciphers of the Vichy French regime headed by Marshal Philippe Pétain, which had actively collaborated with Nazi Germany since the fall of France in 1940. A few months earlier, in January 1941, U.S. Army and Navy listening posts had begun intercepting Vichy diplomatic radio traffic between France and its colonies in North and West Africa, Martinique, Madagascar, Indochina, French Guiana, Djibouti, and St. Pierre et Miquelon off the Canadian coast.
Success quickly followed, indicating that the French codes and ciphers were not particularly secure. The report shows that Bearce’s cryptanalysts broke their first Vichy French code, designated FBT, shortly after the Pearl Harbor attack in mid-December 1941. The size of Bearce’s section grew by leaps and bounds as his cryptanalysts, with considerable help from their counterparts in Britain and Canada, solved several dozen Vichy encryption systems with increasing ease. The Army continued to read all of the Vichy French codes and ciphers being used until Pétain’s regime collapsed following the Allied landings in North Africa in November 1942. Within a matter of weeks, Vichy communications traffic disappeared from the airwaves except for occasional cables to the sole French colony controlled by Vichy in French Indochina (in what is now Vietnam, Laos, and Cambodia).
After Pétain’s Vichy government collapsed, in April 1943 the U.S. Army code breakers turned their attention to the diplomatic codes and ciphers then being used by America’s nominal ally, Gen. Charles de Gaulle’s Free French government in exile, which was based in London but maintained embassies in the United States and elsewhere around the world. The report shows that in October 1943, the U.S. Army’s French code-breaking specialists, then headed by Maj. William F. Edgerton, solved the first of de Gaulle’s most important diplomatic cipher systems, designated FMD. In the months that followed, a half dozen other Free French diplomatic ciphers were solved.
With the solutions of these systems, decrypted French diplomatic traffic became the single most important source of intelligence information being produced by the U.S. Army’s code-breaking unit after Germany and Japan. By the time Japan surrendered in August 1945, the U.S. Army’s code breakers had broken or were working on the solution to 60 French diplomatic or military code and cipher systems, including nearly all of the high-level encryption systems used by de Gaulle and his top ministers to communicate with French diplomats and generals around the world.
The amount of intelligence information produced from decrypted French diplomatic traffic was enormous and incredibly valuable. For example, the French FMT diplomatic code, which the U.S. Army broke in February 1945, proved to be an intelligence bonanza for the United States since the messages encrypted in the system contained all of the high-level diplomatic traffic between Paris and the French delegation at an April 1945 conference in San Francisco that led to the establishment of the United Nations. In other words, the State Department officials at the San Francisco conference knew everything about the French negotiating positions even before the conference began.
But that is not the extent of the surprises contained in the newly declassified report. Buried all the way at the back of the document is a nine-page chapter titled simply “Assistance From Espionage,” which describes in some detail how the FBI and the predecessor to the CIA, then known as the Office of Strategic Services (OSS), stole countless foreign code books and cipher materials in order to help the Army’s code breakers at their work.
It turns out that much of the success enjoyed by the Army’s code breakers against the French codes and ciphers during World War II was because FBI and OSS burglars repeatedly broke into French embassies in Washington, D.C., and elsewhere around the world to steal French cryptographic materials. These “black-bag jobs” proved to be enormously useful in allowing the Army to break French codes and ciphers. The report states (p. 302) that “The French Section has been the recipient of more compromised [stolen] material than any other language group [within the Army code-breaking organization],” with the document showing that FBI and OSS burglars surreptitiously copied at least nine French codes and ciphers between 1941 and 1945.
But this is only the beginning of a story that has yet to be told. It might surprise people to learn that the NSA and its partners in Britain, Canada, Australia, and New Zealand have never stopped intercepting French diplomatic and military communications, or trying to break French codes and ciphers, since the day Japan surrendered on Aug. 14, 1945. The NSA’s intercept operators monitored French military communications in Indochina in the 1950s, as well as French military and diplomatic traffic during the Algerian insurgency in the 1960s. Much of what the U.S. intelligence community knew about the Israeli nuclear weapons program in the late 1950s and early 1960s came from intercepted French communications. And when the French government led the fight in the United Nations against the U.S. government’s plans to invade Iraq in 2002 and 2003, the NSA was listening then as well.
France may be a friend and ally of the United States, but that means very little in the U.S. intelligence community, where spying on America’s friends is as much a fact of life as spying on America’s enemies. As senior U.S. intelligence officials are fond of saying, “We have no friends, only targets.”
Matthew M. Aid is the author of Intel Wars: The Secret History of the Fight Against Terror and The Secret Sentry: The Untold History of the National Security Agency.
Posted By Matthew M. Aid
Tuesday, October 22, 2013 – 5:32 PM
Find this story at 22 October 2013
©2013 The Slate Group, LLC.
US National Security Agency ‘spied on French diplomats’7 november 2013
The US National Security Agency has spied on French diplomats in Washington and at the UN, according to the latest claims in Le Monde newspaper.
NSA internal memos obtained by Le Monde detailed the use of a sophisticated surveillance programme, known as Genie.
US spies allegedly hacked foreign networks, introducing the spyware into the software, routers and firewalls of millions of machines.
It comes a day after claims the NSA tapped millions of phones in France.
The details in the latest Le Monde article are based on leaks from ex-intelligence analyst Edward Snowden, through Glen Greenwald, the outgoing Guardian journalist, who is feeding the material from Brazil, says the BBC’s Christian Fraser in Paris.
It comes on the day the US Secretary of State, John Kerry, is in London meeting foreign counterparts to discuss Syria.
‘Spy implants’
The Le Monde report sets out details of Genie, an NSA surveillance programme in which spyware implants were introduced remotely to overseas computers, including foreign embassies.
It claims bugs were introduced to the French Embassy in Washington (under a code name “Wabash”) and to the computers of the French delegation at the UN, codenamed “Blackfoot”.
The article suggests that in 2011, the US allocated $652m (£402m) in funding for the programme, which was spent on “spy implants”. Tens of millions of computers were reported to have been hacked that year.
A document dated August 2010 suggests intelligence stolen from foreign embassy computers ensured the US knew ahead of time the positions of other Security Council members, before a UN vote for a resolution imposing new sanctions on Iran.
The US was worried the French were drifting to the Brazilian side – who were opposed to implementing sanctions – when in truth they were always aligned to the US position, says our correspondent.
The intelligence agency quotes Susan Rice, then-US ambassador to the UN, who praises the work done by the NSA: “It helped me know… the truth, and reveal other [countries’] positions on sanctions, allowing us to keep one step ahead in the negotiations.”
On Monday, Le Monde alleged that the NSA spied on 70.3 million phone calls in France between 10 December 2012 and 8 January 2013.
At a breakfast meeting with the US secretary of state on Tuesday, French Foreign Minister Laurent Fabius demanded a full explanation.
Referring to a telephone call between the French and US presidents, Mr Fabius told reporters: “I said again to John Kerry what Francois Hollande told Barack Obama, that this kind of spying conducted on a large scale by the Americans on its allies is something that is unacceptable.”
Asked if France was considering reprisals against the US, government spokeswoman Najat Vallaud-Belkacem replied: “It is up to Foreign Minister Fabius to decide what line we take but I don’t think there is any need for an escalation.
“We have to have a respectful relationship between partners, between allies. Our confidence in that has been hit but it is after all a very close, individual relationship that we have.”
Both French officials made their comments before the latest revelations appeared in Le Monde.
Mr Snowden, a former NSA worker, went public with revelations about US spying operations in June.
The information he leaked led to claims of systematic spying by the NSA and CIA on a global scale.
Targets included rivals like China and Russia, as well as allies like the EU and Brazil.
The NSA was also forced to admit it had captured email and phone data from millions of Americans.
Mr Snowden is currently in Russia, where he was granted a year-long visa after making an asylum application.
The US wants him extradited to face trial on criminal charges.
22 October 2013 Last updated at 13:36 ET
Find this story at 22 October 2013
© 2013 The BBC
NSA leaks: France summons US ambassador over phone surveillance revealed by Edward Snowden7 november 2013
Latest leaks from Edward Snowden say American agents recorded more than 70 million French phone calls in just 30 days – including those of politicians and businessmen
The French government has summoned the US ambassador in Paris to provide an explanation for fresh Edward Snowden revelations about the NSA.
According to reports this morning in Le Monde, the American National Security Agency recorded more than 70 million phone calls made France over the course of just 30 days.
If accurate, the reports are the latest indicator of the extraordinary reaching of US electronic spying, and come alongside the news that agents also hacked the email account of former Mexican president Felipe Calderon.
The French interior minister, Manuel Valls, told reporters at an EU meet in Luxembourg: “I have immediately summoned the US ambassador and he will be received this morning at the Quai d’Orsay [French Foreign Ministry].”
“Rules are obviously needed when it comes to new communication technologies, and that’s something that concerns every country,” he the Europe-1 radio station. “If a friendly country – an ally – spies on France or other European countries, that is completely unacceptable.”
Le Monde’s story, which included the byline of the outgoing Guardian journalist Glenn Greenwald, said that the communications of prominent businessmen and politicians were spied on alongside those of suspected security threats.
It said the NSA had targeted Orange and Alcatel-Lucent – two of the biggest network operators in France – and that it used keyword technology and lists of certain types of numbers to automatically pick up millions of records a day.
The 70.3 million pieces of data came from 10 December 2012 and 8 January 2013, and it was not made clear whether they included the full content of conversations or just the metadata – the information of who, when and where the call was made.
The programme of surveillance, codenamed US-985D, also reportedly stored millions of intercepted text messages.
The article followed reports in the German weekly Der Spiegel that the NSA accessed the email account of Felipe Calderon, the former Mexican president. Mexico said it would be seeking an explanation from US officials “as soon as possible”.
Mr Snowden, a former contractor with the NSA who first went public about US surveillance techniques in June, warned then that he had gigabytes of data full of other revelations, to be released over time.
He is currently a refugee at an unknown location in Russia, after he was granted one year’s asylum on the condition, president Vladimir Putin said, that he stop leaking US secrets.
It is not known whether today’s revelations come straight from Mr Snowden himself, or if they are part of a large stock of data given in bulk to journalists at an earlier date.
The US has, as with other Snowden stories, refused to comment on what it calls confidential information.
Officials nonetheless referred Le Monde to a statement made in June, in which US director of national intelligence James Clapper defended the NSA’s programmes.
“They are lawful and conducted under authorities widely known and discussed, and fully debated and authorised by Congress,” he said. “Their purpose is to obtain foreign intelligence information, including information necessary to thwart terrorist and cyber-attacks against the United States and its allies.”
Adam Withnall
Monday, 21 October 2013
Find this story at 21 October 2013
© independent.co.uk
France in the NSA’s crosshair : phone networks under surveillance7 november 2013
The future will perhaps tell us one day why France has remained so discreet in comparison with Germany or Brazil, for example, after the first revelations about the extent of the American electronic espionage programmes in the world as revealed by Edward Snowden, the ex-employee of an NSA (National Security Agency) sub-contractor. France was also concerned and today has at its disposition tangible proof that its interests are targeted on a daily basis.
According to the documents retrieved from the NSA database by its ex-analyst, telephone communications of French citizens are intercepted on a massive scale. Le Monde has been able to obtain access to documents which describe the techniques used to violate the secrets or simply the private life of French people. Some elements of information about this espionage have been referred to by Der Speigel and The Guardian, but others are, to date, unpublished.
Amongst the thousands of documents extracted from the NSA by its ex-employee there is a graph which describes the extent of telephone monitoring and tapping (DNR – Dial Number Recognition) carried out in France. It can be seen that over a period of thirty days – from 10 December 2012 to 8 January 2013, 70,3 million recordings of French citizens’ telephone data were made by the NSA. This agency has several methods of data collection. According to the elements obtained by Le Monde, when a telephone number is used in France, it activates a signal which automatically triggers the recording of the call. Apparently this surveillance system also picks up SMS messages and their content using key words. Finally, the NSA apparently stores the history of the connections of each target – or the meta-data.
This espionage is listed under the programme US-985D. The precise explanation of this acronym has not been provided, to date, by the Snowden documents nor by the former members of the NSA. By way of comparison, the acronyms used by the NSA for the same type of interception targeting Germany are US-987LA and US-987LB. According to some sources, this series of numbers corresponds to the circle referred to by the United States as the ’third party’, to which belong France, Germany but also Austria, Poland or again Belgium. ‘The second party’ concerns the English-speaking countries historically close to Washington: the United Kingdom, Canada, Australia and New Zealand – this group is known by the name the ‘five eyes’. ‘The first party’ concerns the sixteen American secret services of which today the NSA has become the most important, according to a senior official from the French Intelligence community.
The techniques used for these interceptions appear under the codenames ‘DRTBOX’ and ‘WHITEBOX’. Their characteristics are not known either. But we do know that, thanks to DRTBOX, 62.5 million data were collected in France and that WHITEBOX enables the recording of 7.8 million elements. The documents which Le Monde has been able to see have not enabled the provision of further details on these methods. But they give sufficient explanation to lead us to think that the NSA targets concerned both people suspected of association with terrorist activities as well as people targeted simply because they belong to the worlds of business, politics or French state administration.
The NSA graph shows an average of 3 million data intercepts per day with peaks at almost 7 million on 24 December 2012 and 7 January 2013. But between 28 and 31 December no interception seems to have taken place. This apparent stoppage of activity could be explained, in particular, by the time required at the end of December 2012, for the American Congress to renew section 702 of the law dealing with electronic espionage abroad. Similarly nothing appears on the 3, 5 and 6 January 2013; this time we cannot suggest any plausible reason. Many questions are still posed by this diagram – to start with the precise identity of the targets and the justifications for such a large-scale collection of data in a foreign country which is both sovereign and an ally.
When questioned, the American authorities did not wish to comment on these documents which they considered to be ‘classified’. Nevertheless, they do refer to the statement made on 8 June 2013 by the Director of National Intelligence according to which, ’the government cannot target anyone under the court-approved procedures for Section 702 collection unless there is an appropriate, and document foreign intelligence purpose for the acquisition (such as for the prevention of terrorism, hostile cyber activities, or nuclear proliferation) and the foreign target is reasonably believed to be outside the United States. We cannot target even foreign persons overseas without a valid foreign intelligence purpose.
France is not the country in which the NSA intercepts the most digital or telephone connections. The ‘Boundless Informant’ system, revealed in June by Edward Snowden to the British daily The Guardian, enabled an overall vision and in real time of the information gathered throughout the world, by means of the various NSA wire-tapping systems. This system gathers not only telephone data (DNR) but also digital data (DNI Digital Network Intelligence). One of the documents which Le Monde was able to consult notes that between 8 February and 8 March 2013, the NSA collected, throughout the world, 124,8 billion telephone data items and 97,1 billion computer data items. In Europe, only Germany and the United Kingdom exceed France in terms of numbers of interceptions.
Le Monde.fr
21.10.2013 à 06h08
Par Jacques Follorou et Glenn Greenwald (Journaliste)
Find this story at 21 October 2013
© Le Monde.fr
Was ISRAEL behind the hacking of millions of French phones and NOT the U.S.? Extraordinary twist in spying saga revealed7 november 2013
Agents said to have intercepted 70 million calls and text messages a month
France had previously blamed the United States of America
U.S. was first suspected of hacking into Nicolas Sarkozy’s phone in 2012
Americans insisted they have never been behind hacking in France
Comes after it emerged German officials are planning trip to U.S. to discuss allegations Angela Merkel’s phone was hack by the NSA
The German Chancellor said President Obama’s reputation has been shattered on an international scale because of espionage scandal
Israel and not America was behind the hacking of millions of French phones, it was claimed today.
In the latest extraordinary twist in the global eavesdropping scandal, Israeli agents are said to have intercepted more than 70 million calls and text messages a month.
Up until now the French have been blaming the U.S., even summoning the country’s Paris ambassador to provide an explanation.
Scroll down for video
France first suspected the U.S. of hacking into former president Nicolas Sarkozy’s communications network when he was unsuccessfully trying for re-election in 2012
But today’s Le Monde newspaper provides evidence that it was in fact Israeli agents who were listening in.
France first suspected the U.S. of hacking into former president Nicolas Sarkozy’s communications network when he was unsuccessfully trying for re-election in 2012.
Intelligence officials Bernard Barbier and Patrick Pailloux travelled from Paris to Washington to demand an explanation, but the Americans hinted that the Israelis were to blame.
More…
Teenager, 18, sentenced for biting officer while being arrested for wearing a niqab appears in French appeal court…in full burkha
The terrible truth about Gaddafi’s harem: How Libyan dictator kidnapped and raped dozens of women to fulfil his perverted desires
French opposition leader pledges to ban citizenship for children of illegal immigrants born in France
Teenager, 18, sentenced for biting officer while being arrested for wearing a niqab appears in French appeal court…in full burkha
Cameron attacks ‘lah-di-dah, airy-fairy’ ideas about spy agencies, as he reveals his own mobile was NOT targeted by the US
The Americans insisted they have never been behind any hacking in France, and were always keen to get on with the French, whom they viewed as some of their closest allies.
They were so determined to be friends with the French, that U.S. briefing notes included details of how to pronounce the names of the Gallic officials.
A note published in Le Monde shows that the Americans refused to rule out Mossad, Israel’s notoriously uncompromising intelligence agency, or the ISNU, Israel’s cyber-intelligence unit.
Today’s newspaper report was co-written by Glenn Greenwald, whose main contact is NSA whistleblower Edward Snowden (pictured)
Tailored Access Operations (TAO), the branch of the US National Security Agency (NSA) which deals with cyber-attacks, is referred to throughout the note.
It reads: ‘TAO intentionally did not ask either Mossad or ISNU whether they were involved as France is not an approved target for joint discussions.’
Le Monde’s article, co-authored by U.S. journalist Glenn Greenwald, whose main contact is NSA whistleblower Edward Snowden, however, hints that the Israelis were doing the spying.
Both US and French intelligence work closely with Mossad, but there is known to be a great deal of suspicion between all the agencies.
A 2008 NSA note says that the Israelis are ‘excellent partners in terms of sharing information’, but it also says that Mossad is ‘the third most aggressive intelligence service in the world against the United States’.
A spokesman for the Israeli government told Le Monde: ‘Israel is a country which is a friend, ally and partner of France and does not carry out any hostile activity which could pose a threat to its security.’
France has complained in the past about Mossad’s use of its soil to plan so called black operations including the 2010 assassination in Dubai of Mahmoud Al-Mabhouh of the Palestinian movement Hamas.
The revelation comes after senior German officials said they would be travelling to the U.S. ‘shortly’ to talk about allegations the NSA bugged Angela Merkel’s phone.
Obama orders review of surveillance activities
Anger: German Chancellor Angela Merkel (left) and Brazil’s Dilma Rousseff (right) have both voiced concerns over the NSA’s infiltration of the online communications of foreigners
The heads of Germany’s foreign and domestic intelligence agencies will participate in high-level discussions with the White House and National Security Agency, government spokesman Georg Streiter said.
News of the talks signals an escalation in the diplomatic tensions between the U.S. and its allies after it was claimed the NSA had monitored the calls of 35 world leaders.
Brazil and Germany have joined forces in an attempt to pile pressure on the United Nations to rein in the snooping activities. They want a UN General Resolution that promotes the right to online privacy.
This step, the first major international response to the NSA’s infiltration of the online communications of foreigners, comes after German Chancellor Merkel said the recent U.S. espionage scandal has shattered international trust in Barack Obama.
Angela Merkel said the recent espionage scandal has shattered international trust in President Obama
Not hacked: The White House has denied that David Cameron’s communications were ever monitored
A month earlier Brazil’s president Dilma Rousseff branded the NSA’s clandestine activities ‘a breach of international law’ in a speech to the UN General Assembly and demanded steps be made to stop ‘cyberspace from being used as a weapon of war’.
Brazilian and German diplomats met in New York yesterday to thrash out a draft resolution demanding the strengthening of privacy rights in the International Covenant Civil and Political Rights.
While the UN has no real power to reign in the NSA, there are fears among security experts that the effort alone could signal a growing consensus to freeze the US out of future international security dialogues.
By Nabila Ramdani
PUBLISHED: 16:32 GMT, 25 October 2013 | UPDATED: 20:46 GMT, 25 October 2013
Find this story at 25 October 2013
© Associated Newspapers Ltd
France feared US hacked president, was Israel involved?7 november 2013
AFP – France believed the United States attempted to hack into its president’s communications network, a leaked US intelligence document published on Friday suggests.
US agents denied having anything to do with a May 2012 cyber attack on the Elysee Palace, the official residence of French presidents, and appeared to hint at the possible involvement of Mossad, Israel’s intelligence agency, a classified internal note from the US National Security Agency suggests.
Extracts from the document, the latest to emerge from the NSA via former contractor Edward Snowden, were published by Le Monde newspaper alongside an article jointly authored by Glenn Greenwald, the US journalist who has been principally responsible for a still-unravelling scandal over large-scale US snooping on individuals and political leaders all over the world.
The document is a briefing note prepared in April this year for NSA officials who were due to meet two senior figures from France’s external intelligence agency, the DGSE. The French agents had travelled to Washington to demand explanations over their discovery in May 2012 of attempts to compromise the Elysee’s communications systems.
The note says that the branch of the NSA which handles cyber attacks, Tailored Access Operations (TAO), had confirmed that it had not carried out the attack and says that most of its closest allies (Australia, Britain, Canada and New Zealand) had also denied involvement.
It goes on to note: “TAO intentionally did not ask either Mossad or (Israel’s cyber intelligence unit) ISNU whether they were involved as France is not an approved target for joint discussions.”
Le Monde interpreted this sentence as being an ironic reference to a strong likelihood that Mossad had been behind the attack.
The cyber attacks on the Elysee took place in the final weeks of Nicolas Sarkozy’s term, between the two rounds of the presidential election which he ended up losing to Francois Hollande.
The attacks had been previously reported by French media, who have described them as an attempt to insert monitoring devices into the system but it remains unclear whether the presidential networks were compromised for any time.
There was no immediate response from the Elysee on Friday when asked for comment by AFP.
Sarkozy enjoyed warmer relations with the United States than any French president of recent times, to the extent that the media sometimes referred to him as “Sarko the American.”
The revelations about the Elysee attacks followed damaging revelations that the US had tapped the mobile phone of German Chancellor Angela Merkel and spied on other allies.
“Spying between friends, that’s just not done,” Merkel said Thursday at the start of a summit of European Union leaders which has been overshadowed by the issue.
On a lighter note, the leaked document published by Le Monde on Friday underlines that NSA officials were anxious not to cause any further offence to their angry French counterparts.
Along with the technical details, the briefing note contains a phonetic guide to the pronunciation of the names of the French visitors.
They included DGSE technical director Bernard Barbier, who was to be addressed as bear-NAR bur-BYAY, and Patrick Pailloux, or pah-TREEK pie-YOO.
25 OCTOBER 2013 – 12H58
Find this story at 25 October 2013
© 2006 – 2013 Copyright FRANCE 24. All rights reserved
NSA Targeted French Foreign Ministry7 november 2013
Espionage by the US on France has already strained relations between the two countries, threatening a trans-Atlantic trade agreement. Now a document seen by SPIEGEL reveals that the NSA also spied on the French Foreign Ministry.
America’s National Security Agency (NSA) targeted France’s Foreign Ministry for surveillance, according to an internal document seen by SPIEGEL.
Dated June 2010, the “top secret” NSA document reveals that the intelligence agency was particularly interested in the diplomats’ computer network. All of the country’s embassies and consulates are connected with the Paris headquarters via a virtual private network (VPN), technology that is generally considered to be secure.
Accessing the Foreign Ministry’s network was considered a “success story,” and there were a number of incidents of “sensitive access,” the document states.
An overview lists different web addresses tapped into by the NSA, among them “diplomatie.gouv.fr,” which was run from the Foreign Ministry’s server. A list from September 2010 says that French diplomatic offices in Washington and at the United Nations in New York were also targeted, and given the codenames “Wabash” and “Blackfoot,” respectively. NSA technicians installed bugs in both locations and conducted a “collection of computer screens” at the one at the UN.
A priority list also names France as an official target for the intelligence agency. In particular, the NSA was interested in the country’s foreign policy objectives, especially the weapons trade, and economic stability.
US-French relations are being strained by such espionage activities. In early July, French President François Hollande threatened to suspend negotiations for a trans-Atlantic free trade agreement, demanding a guarantee from the US that it would cease spying after it was revealed that the French embassy in Washington had been targeted by the NSA.
“There can be no negotiations or transactions in all areas until we have obtained these guarantees, for France but also for all of the European Union, for all partners of the United States,” he said at the time.
The NSA declined to comment to SPIEGEL on the matter. As details about the scope of the agency’s international spying operations continue to emerge, Washington has come under increasing pressure from its trans-Atlantic partners. Officials in Europe have expressed concern that negotiations for the trade agreement would be poisoned by a lack of trust.
09/01/2013 09:32 AM
Find this story at 1 September 2013
© SPIEGEL ONLINE 2013
US also eavesdrops on Israel, says former Mossad head7 november 2013
Americans want to know what Netanyahu is thinking about Iran, Palestinian issues, says Danny Yatom; follows reports NSA listened in to 35 world leaders
A day after it was revealed that the US National Security Agency monitored the private conversations of some 35 world leaders, former head of the Mossad Danny Yatom said Friday that the US listens in on its ally Israel as well.
“I can tell you with certain knowledge that [America] has been listening in on its allies, including Israel,” Yatom said, and “not necessarily in [Benjamin] Netanyahu’s tenure” as prime minister.
“The US doesn’t really care about anyone [but itself] and the Americans are vehemently denying the incidents,” Yatom told the Israeli daily Maariv on Friday. ”It could very well be that these things [monitoring calls] are happening here [in Israel] too. When the Americans think they need to listen in on someone, they’ll do just that.”
Yatom explained that there are two issues around which the Americans are likely spying on Israel — negotiations with Palestinians and the Iranian nuclear program.
“It is important for them to know what Prime Minister Benjamin Netanyahu really thinks… They have interests here because they want to be able to contend with Israeli claims that arise when talking about these issues,” the ex-Mossad chief said.
Yatom also stressed that the US seeks to obtain information on Israel’s “real” position vis-a-vis-negotiations and what obstacles stand in the way of advancing peace talks.
He also criticized the US for misusing its power as a world leader.
“The Americans rightly see themselves as a superpower, but wrongly feel that they can do whatever they want, including the eavesdropping,” he said.
Yatom served from 1996-1998 as head of the Mossad. The Israeli intelligence agency is smarting from recent reports that Turkey deliberately exposed a ring of Israeli agents in Iran, and further reports that US did not sanction or protest to Turkey over this alleged betrayal. Yatom has been particularly outspoken over the matter.
Yatom’s statements came a day after the the British newspaper The Guardian said it had obtained a confidential memo suggesting the NSA was able to monitor 35 world leaders’ communications in 2006.
The memo said the NSA encouraged senior officials at the White House, Pentagon and other agencies to share their contacts so the spy agency could add foreign leaders’ phone numbers to its surveillance systems, the report said.
The report drew furious reactions in Germany, Spain — both of whom summoned the US ambassador in their countries for talks over the report — and France.
European Union leaders, meeting Friday at a summit in Brussels, vowed to maintain a strong trans-Atlantic partnership despite their anger over allegations of widespread US spying on allies. Still, France and Germany are insisting the United States agree upon new surveillance rules with them this year to stop US eavesdropping on their leaders, innocent civilians and companies.
“We are seeking a basis for cooperation between our (intelligence) services, which we all need and from which we have all received a great deal of information … that is transparent, that is clear and is in keeping with the character of being partners,” German Chancellor Angela Merkel told reporters.
“The United States and Europe are partners, but this partnership must be built on trust and respect,” Merkel said early Friday. “That of course also includes the work of the respective intelligence services.”
Several European leaders noted Friday that the continent’s close political and commercial ties to the US must be protected as EU nations demand more assurances from the Obama administration.
“What is at stake is preserving our relations with the United States,” said French President Francois Hollande. “Trust has to be restored and reinforced.”
“The main thing is that we look to the future. The trans-Atlantic partnership was and is important,” said Lithuanian President Dalia Grybauskaite, whose nation holds the rotating presidency of the 28-country bloc.
Merkel complained to President Barack Obama on Wednesday after her government received information that her cellphone may have been monitored. Merkel and Hollande insisted that, beyond being fully briefed on what happened in the past, the European allies and Washington need to set up common rules for US surveillance that does not impede the fundamental rights of its allies.
Lazar Berman and AP contributed to this report.
By Times of Israel staff October 25, 2013, 7:50 pm 13
Find this story at 25 October 2013
© 2013 The Times of Israel, All rights reserved
No Morsel Too Minuscule for All-Consuming N.S.A.7 november 2013
When Ban Ki-moon, the United Nations secretary general, sat down with President Obama at the White House in April to discuss Syrian chemical weapons, Israeli-Palestinian peace talks and climate change, it was a cordial, routine exchange.
The National Security Agency nonetheless went to work in advance and intercepted Mr. Ban’s talking points for the meeting, a feat the agency later reported as an “operational highlight” in a weekly internal brag sheet. It is hard to imagine what edge this could have given Mr. Obama in a friendly chat, if he even saw the N.S.A.’s modest scoop. (The White House won’t say.)
But it was emblematic of an agency that for decades has operated on the principle that any eavesdropping that can be done on a foreign target of any conceivable interest — now or in the future — should be done. After all, American intelligence officials reasoned, who’s going to find out?
From thousands of classified documents, the National Security Agency emerges as an electronic omnivore of staggering capabilities, eavesdropping and hacking its way around the world to strip governments and other targets of their secrets, all the while enforcing the utmost secrecy about its own operations. It spies routinely on friends as well as foes, as has become obvious in recent weeks; the agency’s official mission list includes using its surveillance powers to achieve “diplomatic advantage” over such allies as France and Germany and “economic advantage” over Japan and Brazil, among other countries.
Mr. Obama found himself in September standing uncomfortably beside the president of Brazil, Dilma Rousseff, who was furious at being named as a target of N.S.A. eavesdropping. Since then, there has been a parade of such protests, from the European Union, Mexico, France, Germany and Spain. Chagrined American officials joke that soon there will be complaints from foreign leaders feeling slighted because the agency had not targeted them.
James R. Clapper Jr., the director of national intelligence, has repeatedly dismissed such objections as brazen hypocrisy from countries that do their own share of spying. But in a recent interview, he acknowledged that the scale of eavesdropping by the N.S.A., with 35,000 workers and $10.8 billion a year, sets it apart. “There’s no question that from a capability standpoint we probably dwarf everybody on the planet, just about, with perhaps the exception of Russia and China,” he said.
Since Edward J. Snowden began releasing the agency’s documents in June, the unrelenting stream of disclosures has opened the most extended debate on the agency’s mission since its creation in 1952. The scrutiny has ignited a crisis of purpose and legitimacy for the N.S.A., the nation’s largest intelligence agency, and the White House has ordered a review of both its domestic and its foreign intelligence collection. While much of the focus has been on whether the agency violates Americans’ privacy, an issue under examination by Congress and two review panels, the anger expressed around the world about American surveillance has prompted far broader questions.
If secrecy can no longer be taken for granted, when does the political risk of eavesdropping overseas outweigh its intelligence benefits? Should foreign citizens, many of whom now rely on American companies for email and Internet services, have any privacy protections from the N.S.A.? Will the American Internet giants’ collaboration with the agency, voluntary or otherwise, damage them in international markets? And are the agency’s clandestine efforts to weaken encryption making the Internet less secure for everyone?
Matthew M. Aid, an intelligence historian and author of a 2009 book on the N.S.A., said there is no precedent for the hostile questions coming at the agency from all directions.
“From N.S.A.’s point of view, it’s a disaster,” Mr. Aid said. “Every new disclosure reinforces the notion that the agency needs to be reined in. There are political consequences, and there will be operational consequences.”
A review of classified agency documents obtained by Mr. Snowden and shared with The New York Times by The Guardian, offers a rich sampling of the agency’s global operations and culture. (At the agency’s request, The Times is withholding some details that officials said could compromise intelligence operations.) The N.S.A. seems to be listening everywhere in the world, gathering every stray electron that might add, however minutely, to the United States government’s knowledge of the world. To some Americans, that may be a comfort. To others, and to people overseas, that may suggest an agency out of control.
The C.I.A. dispatches undercover officers overseas to gather intelligence today roughly the same way spies operated in biblical times. But the N.S.A., born when the long-distance call was a bit exotic, has seen its potential targets explode in number with the advent of personal computers, the Internet and cellphones. Today’s N.S.A. is the Amazon of intelligence agencies, as different from the 1950s agency as that online behemoth is from a mom-and-pop bookstore. It sucks the contents from fiber-optic cables, sits on telephone switches and Internet hubs, digitally burglarizes laptops and plants bugs on smartphones around the globe.
Mr. Obama and top intelligence officials have defended the agency’s role in preventing terrorist attacks. But as the documents make clear, the focus on counterterrorism is a misleadingly narrow sales pitch for an agency with an almost unlimited agenda. Its scale and aggressiveness are breathtaking.
The agency’s Dishfire database — nothing happens without a code word at the N.S.A. — stores years of text messages from around the world, just in case. Its Tracfin collection accumulates gigabytes of credit card purchases. The fellow pretending to send a text message at an Internet cafe in Jordan may be using an N.S.A. technique code-named Polarbreeze to tap into nearby computers. The Russian businessman who is socially active on the web might just become food for Snacks, the acronym-mad agency’s Social Network Analysis Collaboration Knowledge Services, which figures out the personnel hierarchies of organizations from texts.
The spy agency’s station in Texas intercepted 478 emails while helping to foil a jihadist plot to kill a Swedish artist who had drawn pictures of the Prophet Muhammad. N.S.A. analysts delivered to authorities at Kennedy International Airport the names and flight numbers of workers dispatched by a Chinese human smuggling ring.
The agency’s eavesdropping gear, aboard a Defense Department plane flying 60,000 feet over Colombia, fed the location and plans of FARC rebels to the Colombian Army. In the Orlandocard operation, N.S.A. technicians set up what they called a “honeypot” computer on the web that attracted visits from 77,413 foreign computers and planted spyware on more than 1,000 that the agency deemed of potential future interest.
The Global Phone Book
No investment seems too great if it adds to the agency’s global phone book. After mounting a major eavesdropping effort focused on a climate change conference in Bali in 2007, agency analysts stationed in Australia’s outback were especially thrilled by one catch: the cellphone number of Bali’s police chief.
“Our mission,” says the agency’s current five-year plan, which has not been officially scheduled for declassification until 2032, “is to answer questions about threatening activities that others mean to keep hidden.”
The aspirations are grandiose: to “utterly master” foreign intelligence carried on communications networks. The language is corporate: “Our business processes need to promote data-driven decision-making.” But the tone is also strikingly moralistic for a government bureaucracy. Perhaps to counter any notion that eavesdropping is a shady enterprise, signals intelligence, or Sigint, the term of art for electronic intercepts, is presented as the noblest of callings.
“Sigint professionals must hold the moral high ground, even as terrorists or dictators seek to exploit our freedoms,” the plan declares. “Some of our adversaries will say or do anything to advance their cause; we will not.”
The N.S.A. documents taken by Mr. Snowden and shared with The Times, numbering in the thousands and mostly dating from 2007 to 2012, are part of a collection of about 50,000 items that focus mainly on its British counterpart, Government Communications Headquarters or G.C.H.Q.
While far from comprehensive, the documents give a sense of the agency’s reach and abilities, from the Navy ships snapping up radio transmissions as they cruise off the coast of China, to the satellite dishes at Fort Meade in Maryland ingesting worldwide banking transactions, to the rooftops of 80 American embassies and consulates around the world from which the agency’s Special Collection Service aims its antennas.
The agency and its many defenders among senior government officials who have relied on its top secret reports say it is crucial to American security and status in the world, pointing to terrorist plots disrupted, nuclear proliferation tracked and diplomats kept informed.
But the documents released by Mr. Snowden sometimes also seem to underscore the limits of what even the most intensive intelligence collection can achieve by itself. Blanket N.S.A. eavesdropping in Afghanistan, described in the documents as covering government offices and the hide-outs of second-tier Taliban militants alike, has failed to produce a clear victory against a low-tech enemy. The agency kept track as Syria amassed its arsenal of chemical weapons — but that knowledge did nothing to prevent the gruesome slaughter outside Damascus in August.
The documents are skewed toward celebration of the agency’s self-described successes, as underlings brag in PowerPoints to their bosses about their triumphs and the managers lay out grand plans. But they do not entirely omit the agency’s flubs and foibles: flood tides of intelligence gathered at huge cost that goes unexamined; intercepts that cannot be read for lack of language skills; and computers that — even at the N.S.A. — go haywire in all the usual ways.
Mapping Message Trails
In May 2009, analysts at the agency learned that Iran’s supreme leader, Ayatollah Ali Khamenei, was to make a rare trip to Kurdistan Province in the country’s mountainous northwest. The agency immediately organized a high-tech espionage mission, part of a continuing project focused on Ayatollah Khamenei called Operation Dreadnought.
Working closely with the National Geospatial-Intelligence Agency, which handles satellite photography, as well as G.C.H.Q., the N.S.A. team studied the Iranian leader’s entourage, its vehicles and its weaponry from satellites, and intercepted air traffic messages as planes and helicopters took off and landed.
They heard Ayatollah Khamenei’s aides fretting about finding a crane to load an ambulance and fire truck onto trucks for the journey. They listened as he addressed a crowd, segregated by gender, in a soccer field.
They studied Iranian air defense radar stations and recorded the travelers’ rich communications trail, including Iranian satellite coordinates collected by an N.S.A. program called Ghosthunter. The point was not so much to catch the Iranian leader’s words, but to gather the data for blanket eavesdropping on Iran in the event of a crisis.
This “communications fingerprinting,” as a document called it, is the key to what the N.S.A. does. It allows the agency’s computers to scan the stream of international communications and pluck out messages tied to the supreme leader. In a crisis — say, a showdown over Iran’s nuclear program — the ability to tap into the communications of leaders, generals and scientists might give a crucial advantage.
On a more modest scale, the same kind of effort, what N.S.A. calls “Sigint development,” was captured in a document the agency obtained in 2009 from Somalia — whether from a human source or an electronic break-in was not noted. It contained email addresses and other contact details for 117 selected customers of a Mogadishu Internet service, Globalsom.
While most on the list were Somali officials or citizens, presumably including some suspected of militancy, the document also included emails for a United Nations political officer in Mogadishu and a local representative for the charity World Vision, among other international institutions. All, it appeared, were considered fair game for monitoring.
This huge investment in collection is driven by pressure from the agency’s “customers,” in government jargon, not only at the White House, Pentagon, F.B.I. and C.I.A., but also spread across the Departments of State and Energy, Homeland Security and Commerce, and the United States Trade Representative.
By many accounts, the agency provides more than half of the intelligence nuggets delivered to the White House early each morning in the President’s Daily Brief — a measure of success for American spies. (One document boasts that listening in on Nigerian State Security had provided items for the briefing “nearly two dozen” times.) In every international crisis, American policy makers look to the N.S.A. for inside information.
Pressure to Get Everything
That creates intense pressure not to miss anything. When that is combined with an ample budget and near-invisibility to the public, the result is aggressive surveillance of the kind that has sometimes gotten the agency in trouble with the Foreign Intelligence Surveillance Court, a United States federal court that polices its programs for breaches of Americans’ privacy.
In the funding boom that followed the Sept. 11 attacks, the agency expanded and decentralized far beyond its Fort Meade headquarters in Maryland, building or expanding major facilities in Georgia, Texas, Colorado, Hawaii, Alaska, Washington State and Utah. Its officers also operate out of major overseas stations in England, Australia, South Korea and Japan, at overseas military bases, and from locked rooms housing the Special Collection Service inside American missions abroad.
The agency, using a combination of jawboning, stealth and legal force, has turned the nation’s Internet and telecommunications companies into collection partners, installing filters in their facilities, serving them with court orders, building back doors into their software and acquiring keys to break their encryption.
But even that vast American-run web is only part of the story. For decades, the N.S.A. has shared eavesdropping duties with the rest of the so-called Five Eyes, the Sigint agencies of Britain, Canada, Australia and New Zealand. More limited cooperation occurs with many more countries, including formal arrangements called Nine Eyes and 14 Eyes and Nacsi, an alliance of the agencies of 26 NATO countries.
The extent of Sigint sharing can be surprising: “N.S.A. may pursue a relationship with Vietnam,” one 2009 G.C.H.Q. document reported. But a recent G.C.H.Q. training document suggests that not everything is shared, even between the United States and Britain. “Economic well-being reporting,” it says, referring to intelligence gathered to aid the British economy, “cannot be shared with any foreign partner.”
As at the school lunch table, decisions on who gets left out can cause hurt feelings: “Germans were a little grumpy at not being invited to join the 9-Eyes group,” one 2009 document remarks. And in a delicate spy-versus-spy dance, sharing takes place even with governments that are themselves important N.S.A. targets, notably Israel.
The documents describe collaboration with the Israel Sigint National Unit, which gets raw N.S.A. eavesdropping material and provides it in return, but they also mention the agency’s tracking of “high priority Israeli military targets,” including drone aircraft and the Black Sparrow missile system.
The alliances, and the need for stealth, can get complicated. At one highly valued overseas listening post, the very presence of American N.S.A. personnel violates a treaty agreed to by the agency’s foreign host. Even though much of the eavesdropping is run remotely from N.S.A.’s base at Fort Gordon, Ga., Americans who visit the site must pose as contractors, carry fake business cards and are warned: “Don’t dress as typical Americans.”
“Know your cover legend,” a PowerPoint security briefing admonishes the N.S.A. staff members headed to the overseas station, directing them to “sanitize personal effects,” send no postcards home and buy no identifiably local souvenirs. (“An option might be jewelry. Most jewelry does not have any markings” showing its place of origin.)
Bypassing Security
In the agency’s early years, its brainy staff members — it remains the largest employer of mathematicians in the country — played an important role in the development of the first computers, then largely a tool for code breaking.
Today, with personal computers, laptops, tablets and smartphones in most homes and government offices in the developed world, hacking has become the agency’s growth area.
Some of Mr. Snowden’s documents describe the exploits of Tailored Access Operations, the prim name for the N.S.A. division that breaks into computers around the world to steal the data inside, and sometimes to leave spy software behind. T.A.O. is increasingly important in part because it allows the agency to bypass encryption by capturing messages as they are written or read, when they are not encoded.
In Baghdad, T.A.O. collected messages left in draft form in email accounts maintained by leaders of the Islamic State of Iraq, a militant group. Under a program called Spinaltap, the division’s hackers identified 24 unique Internet Protocol addresses identifying computers used by the Lebanese militant group Hezbollah, making it possible to snatch Hezbollah messages from the flood of global communications sifted by the agency.
The N.S.A.’s elite Transgression Branch, created in 2009 to “discover, understand, evaluate and exploit” foreign hackers’ work, quietly piggybacks on others’ incursions into computers of interest, like thieves who follow other housebreakers around and go through the windows they have left ajar.
In one 2010 hacking operation code-named Ironavenger, for instance, the N.S.A. spied simultaneously on an ally and an adversary. Analysts spotted suspicious emails being sent to a government office of great intelligence interest in a hostile country and realized that an American ally was “spear-phishing” — sending official-looking emails that, when opened, planted malware that let hackers inside.
The Americans silently followed the foreign hackers, collecting documents and passwords from computers in the hostile country, an elusive target. They got a look inside that government and simultaneously got a close-up look at the ally’s cyberskills, the kind of intelligence twofer that is the unit’s specialty.
In many other ways, advances in computer and communications technology have been a boon for the agency. N.S.A. analysts tracked the electronic trail left by a top leader of Al Qaeda in Africa each time he stopped to use a computer on his travels. They correctly predicted his next stop, and the police were there to arrest him.
And at the big N.S.A. station at Fort Gordon, technicians developed an automated service called “Where’s My Node?” that sent an email to an analyst every time a target overseas moved from one cell tower to another. Without lifting a finger, an analyst could follow his quarry’s every move.
The Limits of Spying
The techniques described in the Snowden documents can make the N.S.A. seem omniscient, and nowhere in the world is that impression stronger than in Afghanistan. But the agency’s capabilities at the tactical level have not been nearly enough to produce clear-cut strategic success there, in the United States’ longest war.
A single daily report from June 2011 from the N.S.A.’s station in Kandahar, Afghanistan, the heart of Taliban country, illustrates the intensity of eavesdropping coverage, requiring 15 pages to describe a day’s work.
The agency listened while insurgents from the Haqqani network mounted an attack on the Hotel Intercontinental in Kabul, overhearing the attackers talking to their bosses in Pakistan’s tribal area and recording events minute by minute. “Ruhullah claimed he was on the third floor and had already inflicted one casualty,” the report said in a typical entry. “He also indicated that Hafiz was located on a different floor.”
N.S.A. officers listened as two Afghan Foreign Ministry officials prepared for a meeting between President Hamid Karzai of Afghanistan and Iranian officials, assuring them that relations with the United States “would in no way threaten the interests of Iran,” which they decided Mr. Karzai should describe as a “brotherly country.”
The N.S.A. eavesdropped as the top United Nations official in Afghanistan, Staffan de Mistura, consulted his European Union counterpart, Vygaudas Usackas, about how to respond to an Afghan court’s decision to overturn the election of 62 members of Parliament.
And the agency was a fly on the wall for a long-running land dispute between the mayor of Kandahar and a prominent local man known as the Keeper of the Cloak of the Prophet Muhammad, with President Karzai’s late brother, Ahmed Wali Karzai, as a mediator.
The agency discovered a Taliban claim to have killed five police officers at a checkpoint by giving them poisoned yogurt, and heard a provincial governor tell an aide that a district police chief was verbally abusing women and clergymen.
A Taliban figure, Mullah Rahimullah Akhund, known on the United States military’s kill-or-capture list by the code name Objective Squiz Incinerator, was overheard instructing an associate to buy suicide vests and a Japanese motorbike, according to the documents.
And N.S.A. listened in as a Saudi extremist, Abu Mughira, called his mother to report that he and his fellow fighters had entered Afghanistan and “done victorious operations.”
Such reports flowed from the agency’s Kandahar station day after day, year after year, and surely strengthened the American campaign against the Taliban. But they also suggest the limits of intelligence against a complex political and military challenge. The N.S.A. recorded the hotel attack, but it had not prevented it. It tracked Mr. Karzai’s government, but he remained a difficult and volatile partner. Its surveillance was crucial in the capture or killing of many enemy fighters, but not nearly enough to remove the Taliban’s ominous shadow from Afghanistan’s future.
Mining All the Tidbits
In the Afghan reports and many others, a striking paradox is the odd intimacy of a sprawling, technology-driven agency with its targets. It is the one-way intimacy of the eavesdropper, as N.S.A. employees virtually enter the office cubicles of obscure government officials and the Spartan hide-outs of drug traffickers and militants around the world.
Venezuela, for instance, was one of six “enduring targets” in N.S.A.’s official mission list from 2007, along with China, North Korea, Iraq, Iran and Russia. The United States viewed itself in a contest for influence in Latin America with Venezuela’s leader then, the leftist firebrand Hugo Chávez, who allied himself with Cuba, and one agency goal was “preventing Venezuela from achieving its regional leadership objectives and pursuing policies that negatively impact U.S. global interests.”
A glimpse of what this meant in practice comes in a brief PowerPoint presentation from August 2010 on “Development of the Venezuelan Economic Mission.” The N.S.A. was tracking billions of dollars flowing to Caracas in loans from China (radar systems and oil drilling), Russia (MIG fighter planes and shoulder-fired missiles) and Iran (a factory to manufacture drone aircraft).
But it was also getting up-close and personal with Venezuela’s Ministry of Planning and Finance, monitoring the government and personal emails of the top 10 Venezuelan economic officials. An N.S.A. officer in Texas, in other words, was paid each day to peruse the private messages of obscure Venezuelan bureaucrats, hunting for tidbits that might offer some tiny policy edge.
In a counterdrug operation in late 2011, the agency’s officers seemed to know more about relations within a sprawling narcotics network than the drug dealers themselves. They listened to “Ricketts,” a Jamaican drug supplier based in Ecuador, struggling to keep his cocaine and marijuana smuggling business going after an associate, “Gordo,” claimed he had paid $250,000 and received nothing in return.
The N.S.A., a report said, was on top of not just their cellphones, but also those of the whole network of “buyers, transporters, suppliers, and middlemen” stretching from the Netherlands and Nova Scotia to Panama City and Bogotá, Colombia. The documents do not say whether arrests resulted from all that eavesdropping.
Even with terrorists, N.S.A. units can form a strangely personal relationship. The N.S.A.-G.C.H.Q. wiki, a top secret group blog that Mr. Snowden downloaded, lists 14 specialists scattered in various stations assigned to Lashkar-e-Taiba, the Pakistani terrorist group that carried out the bloody attack on Mumbai in 2008, with titles including “Pakistan Access Pursuit Team” and “Techniques Discovery Branch.” Under the code name Treaclebeta, N.S.A.’s hackers at Tailored Access Operations also played a role.
In the wiki’s casual atmosphere, American and British eavesdroppers exchange the peculiar shoptalk of the secret world. “I don’t normally use Heretic to scan the fax traffic, I use Nucleon,” one user writes, describing technical tools for searching intercepted documents.
But most striking are the one-on-one pairings of spies and militants; Bryan is assigned to listen in on a man named Haroon, and Paul keeps an ear on Fazl.
A Flood of Details
One N.S.A. officer on the Lashkar-e-Taiba beat let slip that some of his eavesdropping turned out to be largely pointless, perhaps because of the agency’s chronic shortage of skilled linguists. He “ran some queries” to read intercepted communications of certain Lashkar-e-Taiba members, he wrote in the wiki, but added: “Most of it is in Arabic or Farsi, so I can’t make much of it.”
It is a glimpse of the unsurprising fact that sometimes the agency’s expensive and expansive efforts accomplish little. Despite the agency’s embrace of corporate jargon on goal-setting and evaluation, it operates without public oversight in an arena in which achievements are hard to measure.
In a world of ballooning communications, the agency is sometimes simply overwhelmed. In 2008, the N.S.A.’s Middle East and North Africa group set about updating its Sigint collection capabilities. The “ambitious scrub” of selectors — essentially search terms — cut the number of terms automatically searched from 21,177 to 7,795 and the number of messages added to the agency’s Pinwale database from 850,000 a day to 450,000 a day.
The reduction in volume was treated as a major achievement, opening the way for new collection on Iranian leadership and Saudi and Syrian diplomats, the report said.
And in a note that may comfort computer novices, the N.S.A. Middle East analysts discovered major glitches in their search software: The computer was searching for the names of targets but not their email addresses, a rather fundamental flaw. “Over 500 messages in one week did not come in,” the report said about one target.
Those are daily course corrections. Whether the Snowden disclosures will result in deeper change is uncertain. Joel F. Brenner, the agency’s former inspector general, says much of the criticism is unfair, reflecting a naïveté about the realpolitik of spying. “The agency is being browbeaten for doing too well the things it’s supposed to do,” he said.
But Mr. Brenner added that he believes “technology has outrun policy” at the N.S.A., and that in an era in which spying may well be exposed, “routine targeting of close allies is bad politics and is foolish.”
Another former insider worries less about foreign leaders’ sensitivities than the potential danger the sprawling agency poses at home. William E. Binney, a former senior N.S.A. official who has become an outspoken critic, says he has no problem with spying on foreign targets like Brazil’s president or the German chancellor, Angela Merkel. “That’s pretty much what every government does,” he said. “It’s the foundation of diplomacy.” But Mr. Binney said that without new leadership, new laws and top-to-bottom reform, the agency will represent a threat of “turnkey totalitarianism” — the capability to turn its awesome power, now directed mainly against other countries, on the American public.
“I think it’s already starting to happen,” he said. “That’s what we have to stop.”
Whatever reforms may come, Bobby R. Inman, who weathered his own turbulent period as N.S.A. director from 1977 to 1981, offers his hyper-secret former agency a radical suggestion for right now. “My advice would be to take everything you think Snowden has and get it out yourself,” he said. “It would certainly be a shock to the agency. But bad news doesn’t get better with age. The sooner they get it out and put it behind them, the faster they can begin to rebuild.”
November 2, 2013
By SCOTT SHANE
Find this story at 2 November 2013
© 2013 The New York Times Company
NSA shares raw intelligence including Americans’ data with Israel7 november 2013
• Secret deal places no legal limits on use of data by Israelis
• Only official US government communications protected
• Agency insists it complies with rules governing privacy
• Read the NSA and Israel’s ‘memorandum of understanding’
The agreement for the US to provide raw intelligence data to Israel was reached in principle in March 2009, the document shows. Photograph: James Emery
The National Security Agency routinely shares raw intelligence data with Israel without first sifting it to remove information about US citizens, a top-secret document provided to the Guardian by whistleblower Edward Snowden reveals.
Details of the intelligence-sharing agreement are laid out in a memorandum of understanding between the NSA and its Israeli counterpart that shows the US government handed over intercepted communications likely to contain phone calls and emails of American citizens. The agreement places no legally binding limits on the use of the data by the Israelis.
The disclosure that the NSA agreed to provide raw intelligence data to a foreign country contrasts with assurances from the Obama administration that there are rigorous safeguards to protect the privacy of US citizens caught in the dragnet. The intelligence community calls this process “minimization”, but the memorandum makes clear that the information shared with the Israelis would be in its pre-minimized state.
The deal was reached in principle in March 2009, according to the undated memorandum, which lays out the ground rules for the intelligence sharing.
The five-page memorandum, termed an agreement between the US and Israeli intelligence agencies “pertaining to the protection of US persons”, repeatedly stresses the constitutional rights of Americans to privacy and the need for Israeli intelligence staff to respect these rights.
But this is undermined by the disclosure that Israel is allowed to receive “raw Sigint” – signal intelligence. The memorandum says: “Raw Sigint includes, but is not limited to, unevaluated and unminimized transcripts, gists, facsimiles, telex, voice and Digital Network Intelligence metadata and content.”
According to the agreement, the intelligence being shared would not be filtered in advance by NSA analysts to remove US communications. “NSA routinely sends ISNU [the Israeli Sigint National Unit] minimized and unminimized raw collection”, it says.
Although the memorandum is explicit in saying the material had to be handled in accordance with US law, and that the Israelis agreed not to deliberately target Americans identified in the data, these rules are not backed up by legal obligations.
“This agreement is not intended to create any legally enforceable rights and shall not be construed to be either an international agreement or a legally binding instrument according to international law,” the document says.
In a statement to the Guardian, an NSA spokesperson did not deny that personal data about Americans was included in raw intelligence data shared with the Israelis. But the agency insisted that the shared intelligence complied with all rules governing privacy.
“Any US person information that is acquired as a result of NSA’s surveillance activities is handled under procedures that are designed to protect privacy rights,” the spokesperson said.
The NSA declined to answer specific questions about the agreement, including whether permission had been sought from the Foreign Intelligence Surveillance (Fisa) court for handing over such material.
The memorandum of understanding, which the Guardian is publishing in full, allows Israel to retain “any files containing the identities of US persons” for up to a year. The agreement requests only that the Israelis should consult the NSA’s special liaison adviser when such data is found.
Notably, a much stricter rule was set for US government communications found in the raw intelligence. The Israelis were required to “destroy upon recognition” any communication “that is either to or from an official of the US government”. Such communications included those of “officials of the executive branch (including the White House, cabinet departments, and independent agencies), the US House of Representatives and Senate (member and staff) and the US federal court system (including, but not limited to, the supreme court)”.
It is not clear whether any communications involving members of US Congress or the federal courts have been included in the raw data provided by the NSA, nor is it clear how or why the NSA would be in possession of such communications. In 2009, however, the New York Times reported on “the agency’s attempt to wiretap a member of Congress, without court approval, on an overseas trip”.
The NSA is required by law to target only non-US persons without an individual warrant, but it can collect the content and metadata of Americans’ emails and calls without a warrant when such communication is with a foreign target. US persons are defined in surveillance legislation as US citizens, permanent residents and anyone located on US soil at the time of the interception, unless it has been positively established that they are not a citizen or permanent resident.
Moreover, with much of the world’s internet traffic passing through US networks, large numbers of purely domestic communications also get scooped up incidentally by the agency’s surveillance programs.
The document mentions only one check carried out by the NSA on the raw intelligence, saying the agency will “regularly review a sample of files transferred to ISNU to validate the absence of US persons’ identities”. It also requests that the Israelis limit access only to personnel with a “strict need to know”.
Israeli intelligence is allowed “to disseminate foreign intelligence information concerning US persons derived from raw Sigint by NSA” on condition that it does so “in a manner that does not identify the US person”. The agreement also allows Israel to release US person identities to “outside parties, including all INSU customers” with the NSA’s written permission.
Although Israel is one of America’s closest allies, it is not one of the inner core of countries involved in surveillance sharing with the US – Britain, Australia, Canada and New Zealand. This group is collectively known as Five Eyes.
The relationship between the US and Israel has been strained at times, both diplomatically and in terms of intelligence. In the top-secret 2013 intelligence community budget request, details of which were disclosed by the Washington Post, Israel is identified alongside Iran and China as a target for US cyberattacks.
While NSA documents tout the mutually beneficial relationship of Sigint sharing, another report, marked top secret and dated September 2007, states that the relationship, while central to US strategy, has become overwhelmingly one-sided in favor of Israel.
“Balancing the Sigint exchange equally between US and Israeli needs has been a constant challenge,” states the report, titled ‘History of the US – Israel Sigint Relationship, Post-1992′. “In the last decade, it arguably tilted heavily in favor of Israeli security concerns. 9/11 came, and went, with NSA’s only true Third Party [counter-terrorism] relationship being driven almost totally by the needs of the partner.”
In another top-secret document seen by the Guardian, dated 2008, a senior NSA official points out that Israel aggressively spies on the US. “On the one hand, the Israelis are extraordinarily good Sigint partners for us, but on the other, they target us to learn our positions on Middle East problems,” the official says. “A NIE [National Intelligence Estimate] ranked them as the third most aggressive intelligence service against the US.”
Later in the document, the official is quoted as saying: “One of NSA’s biggest threats is actually from friendly intelligence services, like Israel. There are parameters on what NSA shares with them, but the exchange is so robust, we sometimes share more than we intended.”
The memorandum of understanding also contains hints that there had been tensions in the intelligence-sharing relationship with Israel. At a meeting in March 2009 between the two agencies, according to the document, it was agreed that the sharing of raw data required a new framework and further training for Israeli personnel to protect US person information.
It is not clear whether or not this was because there had been problems up to that point in the handling of intelligence that was found to contain Americans’ data.
However, an earlier US document obtained by Snowden, which discusses co-operating on a military intelligence program, bluntly lists under the cons: “Trust issues which revolve around previous ISR [Israel] operations.”
The Guardian asked the Obama administration how many times US data had been found in the raw intelligence, either by the Israelis or when the NSA reviewed a sample of the files, but officials declined to provide this information. Nor would they disclose how many other countries the NSA shared raw data with, or whether the Fisa court, which is meant to oversee NSA surveillance programs and the procedures to handle US information, had signed off the agreement with Israel.
In its statement, the NSA said: “We are not going to comment on any specific information sharing arrangements, or the authority under which any such information is collected. The fact that intelligence services work together under specific and regulated conditions mutually strengthens the security of both nations.
“NSA cannot, however, use these relationships to circumvent US legal restrictions. Whenever we share intelligence information, we comply with all applicable rules, including the rules to protect US person information.”
Glenn Greenwald, Laura Poitras and Ewen MacAskill
The Guardian, Wednesday 11 September 2013 15.40 BST
Find this story at 11 September 2013
© 2013 Guardian News and Media Limited or its affiliated companies. All rights reserved.
From Mosques to Soccer Leagues: Inside the NYPD’s Secret Spy Unit Targeting Muslims, Activists23 september 2013
Since 9/11, the New York City Police Department has established an intelligence operation that in some ways has been even more aggressive than the National Security Agency. At its core is a spying operation targeting Arab- and Muslim-Americans where they live, work and pray. The NYPD’s “Demographics Unit,” as it was known until 2010, has secretly infiltrated Muslim student groups, sent informants into mosques, eavesdropped on conversations in restaurants, barber shops and gyms, and built a vast database of information. The program was established with help from the CIA, which is barred from domestic spying. Just last month, it emerged the NYPD has labeled at least 50 Muslim organizations, including a dozen mosques, as terrorist groups. This has allowed them to carry out what are called “Terrorism Enterprise Investigations,” sending undercover informants into mosques to spy on worshipers and make secret recordings. We’re joined by the Pulitzer-winning duo who exposed the NYPD’s spy program, Associated Press reporters Matt Apuzzo and Adam Goldman, co-authors of the new book, “Enemies Within: Inside the NYPD’s Secret Spying Unit and Bin Laden’s Final Plot Against America.” We’re also joined by Linda Sarsour, executive director of the Arab American Association of New York, which was among the groups targeted by the NYPD.
Transcript
This is a rush transcript. Copy may not be in its final form.
AARON MATÉ: Yes, well, it’s been 12 years since the 9/11 attacks, but only now is a full picture emerging of what could be one of its most controversial legacies. In the aftermath of 9/11, the New York City Police Department established an intelligence operation that in some ways has even been even more aggressive than the National Security Agency. At its core, a spying operation targeting Muslim Americans, where they live, work, and pray. The NYPD’s demographics unit, as it was known until 2010, has a secretly infiltrated Muslim student groups, sent informants into mosques, eavesdropped on conversations and restaurants, barber shops, and gyms, and built a vast database of information on Muslim Americans. The program was established with help from the CIA, which is barred from spying on Americans.
AMY GOODMAN: Just last month, it emerged that the NYPD has labeled at least 50 Muslim organizations including a dozen mosques as terrorist groups. This has allowed them to carry out what are called terrorism enterprise investigations, sending undercover informants into mosques to spy on worshipers and make secret recordings. That news came just weeks after a group of Muslim Americans filed a federal lawsuit against the NYPD’s spy program, alleging what they call unconstitutional religious profiling and suspicionless surveillance. At a news conference, plaintiff Asad Dandia described his run-in with the man who turned out to be a police informant.
ASAD DANDIA: In March of 2012, I was approached by a 19-year-old man. He came to me telling me that he was looking for spirituality, and that he was looking to change his ways. He said he had a very dark past and wanted to be a better practicing Muslim. So, I figured what better way to have him perform his obligations than to join this organization? In October of 2012 he released a public statement saying he was an informant for the NYPD. When I found out, I had a whole mixture of feelings. Number one, I was terrified and I was afraid for my family, especially my younger sisters who were exposed to all of this. I felt betrayed and hurt because someone I took in as a friend and brother was lying to me.
AARON MATÉ: That’s Asad Dandia, one of the plaintiffs in the suit by Muslim Americans against the NYPD for spying. Arguments in the case began last week. While the spy program has been intrusive, it has also been ineffective. The NYPD has even admitted that the demographics unit failed to yield a single terrorism investigation or even a single lead. In a deposition last year, the commanding officer of the intelligence division, assistant NYPD chief, Thomas Galati, said “I could tell you that I have never made a lead from rhetoric that came from a Demographics report and I’m here since 2006. I don’t recall other ones prior to my arrival.”
AMY GOODMAN: Well, the NYPD spy program was first exposed in a Pulitzer Prize-winning series by the Associated Press. Two lead reporters on the story have just come out the new book that expands on their ground breaking reporting. Their book is called, “Enemies Within: Inside the NYPD’s Secret Spying Unit and Bin Laden’s Final Plot Against America.” Co-authors Matt Apuzzo and Adam Goldman join us here in New York. They shared the 2012 Pulitzer Prize for investigative reporting. We welcome you both to Democracy Now! Matt, lay it out. Lay out this book for us. In a nutshell, how you got on this story, and what you found.
MATT APPUZO: Sure, well, our book really goes a lot deeper and a lot broader than we were able to do even in all the many stories we wrote for the AP. What we really focused on is how in the aftermath of 9/11, about how the NYPD working hand-in-hand with the CIA, built an intelligence apparatus that focuses on American citizens like no other police department in the country. This active-duty CIA officer and a retired CIA officer built in apparatus by which, you know, a sort of army of informants is out there and we have these demographics officers who their job is just to hang out in neighborhoods and listen for what people are talking about.
Some of what we have seen in these files, it’s a file says, we saw two men speaking at a cafe and they were talking about what they thought about the president’s state of the union address, and here’s what they thought. What do they think about drones, what do they think about foreign policy, what do they think about American policies toward civil liberties, you know, TSA. Are we too discriminatory against Muslims? All the stuff ends up in police files and their justification is, we need to know what the sentiment of these communities are so we can look for hotspots.
AARON MATÉ: Adam, talk to us about how this plays out. So, you have NYPD Commissioner, Ray Kelly, working with David Cohen from the CIA, and they set out to create basically a map of all New York’s ethnic neighborhoods?
ADAM GOLDMAN: Yeah, that’s right, I mean, that is what the demographics unit was doing. They wanted to literally map the human terrain of the five boroughs of New York. And they went beyond too, they went into Newark, they went into other places as well; Newark, New Jersey. So, they had this fear after 9/11, and they looked out into the Queens and Brooklyn and these other places where there were a lot of Muslim Americans and thought, we don’t know much about these communities and they looked, as an example, at people like Mohammed Atta, who was one of the 9/11 hijackers. Mohammed Atta had radicalized, he had grown more religious, and he was — he had given off the signals in front of the community, and they wanted to be in the communities in New York, so if there is anyone like Mohammed Atta, in fact anybody who was radicalizing they would have listening posts. They would have eyes and ears in the community to pick up on that.
AMY GOODMAN: One of the things you write about is how the undercover officers would go to the best Arab food restaurants, not coming up with leads, but because the food was good and just “spy” there.
ADAM GOLDMAN: We found a lot that these plainclothes officers working with the demographics unit were gravitating toward the better restaurants. There is a bakery, the Damascus Bakery in Brooklyn that serves excellent pastries. There is a kebab house in Flushing, Queens that serves excellent kebab. And what the commanding officer in charge of the demographics unit started to see was there were many reports being filed from similar locations. And how do spend you $40 at the pastry shop? And so, eventually, he determined they were going there, following these reports, simply because the food was good.
AMY GOODMAN: Matt Appuzo, talk about the main players here. Talk about Larry Sanchez, talk about David Cohen who’d come from the CIA and went to the NYPD.
MATT APPUZO: Sure, Ray Kelly comes on board as police commissioner after 9/11, and says, look, we can’t rely solely on the federal government. And I think really smartly said, we can’t do business as usual. We need to start developing our own intelligence and have a better sense of what is going on in the city. So, the guy he hired to do that is a man named Dave Cohen, who we profile really deeply in the book, who made his career at the CIA, rose to the level of the deputy director for operations, basically a nation’s top spy.
So, he retired as the head of the clandestine service. And he was basically recruited out of retirement to start what is, basically a mini-CIA at the NYPD. One of Cohen’s first things, is he then calls down to the CIA and says, hey, I need an active-duty guy who can be my right-hand man. George tenet, the director of the CIA, sends Larry Sanchez to New York. And Larry is this very likable guy, skydiver, scuba diver, a guy’s guy, and he’s active duty, so he’s got a blue CIA badge. So, he can start the morning — early morning at the CIA station in New York and then kind of go over to the NYPD and he is directing domestic operations for NYPD and he is telling officers how to do collection or where to focus their efforts. And he really was the architect of the demographics unit. So, this guy, active-duty for the CIA, was really the intellectual father of the demographics unit.
AMY GOODMAN: We’re going to break and then come back to this discussion. We are speaking with the prize-winning reporters Matt Apuzzo and Adam Goldman, who have written the book, “Enemies Within: Inside the NYPD’s Secret Spying Unit and Bin Laden’s Final Plot Against America.” We will be back with them in a moment.
[Music]
AMY GOODMAN: Our guests are Matt Apuzzo and Adam Goldman, reporters for the Associated Press, co-authors of the brand-new book, “Enemies Within: Inside the NYPD’s Secret Spying Unit and Bin Laden’s Final Plot Against America.” We are also joined by Linda Sarsour. She is here in New York City, a leading Arab-American activist with the Arab American Association of New York, a national network for Arab American communities. I’m Amy Goodman with Aaron Maté.
AARON MATÉ: Well, before break, we were talking about Larry Sanchez who came to the NYPD from the CIA. Let’s turn to a part of a 2007 hearing before the Senate Committee on Homeland Security and Government Affairs that looked at the NYPD’s counterterrorism efforts. This is, then Senator, Joe Lieberman questioning New York City Assistant Police Commissioner Larry Sanchez, the analyst who came to the NYPD from the CIA.
JOSEPH LIEBERMAN: I’m paraphrasing, but I think you said that the aim of this investigation and of the NYPD was not just to prevent terrorist attacks, obviously, post-9/11 in New York City, but to try to prevent — understand and then prevent the radicalization that leads to terrorist attacks. So, in the end of it, what are the steps that you come away with that you feel in this very usual area, unremarkable people, not on the screen of law enforcement — how do you begin to try to prevent the radicalization that leads to terrorism?
LARRY SANCHEZ: Let me try to answer this way; the key to it was, first, to understand it, and to start appreciating what most people would say would be noncriminal, would be innocuous, looking at behaviors that could easily be argued in a western democracy, especially in the United States, to be protected by First and Fourth Amendment rights, but not to look at them in a vacuum, but to look across to them as potential precursors to terrorism. New York City, of course, has created its own methods to be able to understand them better, to be able to identify them and to be able to make judgment calls if these are things that we need to worry about.
AARON MATÉ: That’s Larry Sanchez, testifying in 2007. Matt Apuzzo?
MATT APPUZO: Adam and I have watched that clip and read the transcript, I don’t know, dozens of times, and one of our great regrets is that this happened in 2007 and nobody, and including us, said, hey, that guy just got up and said stuff that is protected by the First Amendment shouldn’t be viewed as such and should be viewed as potential precursor to terrorism and that the NYPD has these sort of unspecified methods to decide how to ferret that out. I kind of watch that now, and I remember when that happened, and now I’m kind of like, how the heck did I not — how did the reporter in me not say, geez, well what are these methods? Why the heck did it take four years before…? You know, Adam and I look back now and we’re like, jeez, they told us they were doing this stuff, they told us — they laid it all out there. And why weren’t we as journalists, as a public, more skeptical and why weren’t we willing to ask more questions?
AMY GOODMAN: The FBI, Adam Goldman, and the NYPD were also competing with each other, so much so they were going to sue each other. Can you explain what was happening?
ADAM GOLDMAN: Well, there was enormous friction between the FBI and the NYPD, mainly the NYPD intelligence division. And these two outfits would sometimes not work in harmony. Mainly because Dave Cohen thought that the intelligence division and his detectives should go on their own. He didn’t want to be part of the part of what they called group think. So, they said, look, we’ll go out and we’re going to investigate and if we find something, we’;ll bring it to you. But, the problem with doing that is that, sometimes these investigations were in late stages and the FBI had concerns about how they had developed these cases. And it flared up in the newspaper. And in the end, the FBI felt like, look, you just can’t go out and do your own thing. We’re going to stop this, we got to work as a team and that is how you build — cooperation is how you build stronger cases.
AARON MATÉ: Matt, and the spying of course, also extended beyond the Muslim community. There’s reports in your book about spying on left-wing activists, on bicycle protests?
MATT APPUZO: Yeah, so, everybody remembers the bombing of the Times Square recruiting station. The pipe bomb, thankfully didn’t injure injure anyone, but it was 3:00 in the morning and blew out a window. Well, in the aftermath of that, the NYPD, and we’ve seen this in the files, the NYPD did an investigation were they said, you know, we have identified this blog that posts links to protests, news stories about protests and pictures of protests all around the world, confrontations, anarchist protests, radical protests, people throwing people throwing Molotov cocktails. That’s what this blog does, and they said, boy, that blog had a link up to a Fox news story about the Times Square bombing within three hours. And to the NYPD, the three hours seemed awfully quick. And so, they said, well, maybe that suggests that the guy who runs the blog knew in advance. And it turns out that at one point years earlier, one of the guys who ran the blog, this guy named Dennis Burke, he had ties to Critical Mass, the guys who ride the bikes, and Time’s Up New York, the protest group in New York City.
AMY GOODMAN: And friends of Brad Will.
MATT APPUZO: And friends of Brad Will, the group that wants to get to the bottom of the death of American journalists in Mexico. So, they actually open an investigation based on those facts. They open an investigation not only into Burke, but also into his associates in these other groups. And so, they infiltrated the Times Up guys, the Critical Mass guys, the Friends of Brad Will. They actually sent an undercover officer as part of this investigation out to the People’s Summit in New Orleans, which is a group of sort of anti-globalization groups, and the NYPD was there. Because of this investigation into the bombing, they actually put into the files, people who were organized — labor organizing for nannies, people who were talking about the Palestinian conflict with the Israelis, people who are writing newsletters from, sort of, left-wing organizations, this stuff that had no connection — nobody believed there was any connection to the bombing, but it just shows you how this stuff spirals away from its central focus.
AMY GOODMAN: Linda Sarsour, can you talk about, as your with the Arab-American Association of New York, how the investigations that the NYPD was conducting that Adam and Matt are describing, affected you and your community?
LINDA SARSOUR: So, Adam and Matt basically confirmed everything that our community already knew was happening, at least since immediately after 9/11. And the terrorist enterprise investigations that you heard also included, I believe, my organization. And what the NYPD wanted to do to my organization, they clearly lay this out in a secret document, they wanted to recruit a confidential informant to sit on my board. So, not only were they creating listening posts and going into our restaurants, coming to our events, coming — acting as clients in our organization, they wanted to actually have someone who would be a deciding figure on my board, have access donors, have access to information, access to financial information, and I think that we keep learning that the program is just more outrageous. And what it does is it creates psychological warfare in our community.
How am I supposed to know if the NYPD was successful in that endeavor? That’s number one. Number two is, the community, right now, is in a position where, how do we even know the guy next to us that’s praying at the mosque or the guy at the restaurant that’s like trying to open a conversation with us about something that is happening in Egypt, for example, and for those people who know, Arabs, particularly, we love to talk about politics. And a lot of our families came to the United States so we could have a place to practice our religion freely, to have our own political views, and now that we know that the NYPD wants to hear what our sentiment is, people probably don’t want to share their sentiment.
The most disturbing of all is our Muslim student association who are calling us to consult about how political should their events be. Now, when I was in college, I wanted my events to be as political as possible. And if they weren’t, I wanted to figure out how to make them controversial. And the fact that our students feel that they can’t do that because there are going to be NYPD informants, because they can be taken out of context and because they think that something like what happened to Fahad Hashmi is going to happen to them, I think it is a valid concern.
So, I’m a New Yorker and I hope others are outraged to know that the New York Police Department is spying on innocent Americans in their neighborhood. The last point that I want to make is that these terrorist investigations, what happens is, is that if they open one, anyone who comes into that facility that’s under investigation is subject to that investigation. So, if my organization has this terrorist enterprise investigation, that means every client, every staff member, every family member, every vendor that we work with is subject to this investigation by the New York Police Department.
AMY GOODMAN: Tell us about the NYPD Soccer League.
LINDA SARSOUR: A program that the NYPD touts as a community outreach program, and something we that believed as a community we were involved in because we wanted to get kids off the street, we wanted kids to play sports and it was organized sports competition between kids from different boroughs. It was fun. We joined, as the Arab American Association of New York. We had a team, Brooklyn United. In 2009 we beat the Turks from Queens, and it was great, and it was fun, and we have a huge trophy from the New York Police Department. What we learned later learned through secret documents is that the New York Police Department was using a sports league — now imagine that your child is part of this league and is being spied on by the New York Police Department. And what the New York Police Department did is they actually mapped out for you two different documents. One was, where did the South Asians play cricket and watch cricket, and where did the Arabs play soccer and watch soccer? For those of you who know soccer, Arabs are not the only ones that play soccer. Definitely not in New York City anyway.
So, I feel the information just gets more outrageous that even something as simple as sports, as playing soccer, is something that is under the terrain of the New York Police Department, that our kids were subject to intelligence gathering and spying by the New York Police Department when all they wanted to do was beat some people or some other kids in another borough. And I think our kids, right now, you know, their families are like what’s this. How am I supposed to explain to them that I didn’t know, that I was not — that I had no intention of subjecting their children to intelligence gathering by the New York Police Department? And so, I personally get put in a situation that Commissioner Kelly and his people put us in. And actually the Arab officers who worked in the Community Affairs Department, I don’t know if they knew, but if they did know, shame on them for allowing us to be a part of something where they knew had ultimate if reasons.
AARON MATÉ: Now, Linda, hear in New York, there is obviously a lot of public protest against stop-and-frisk. How has it been to organize resistance to this spying on your community? What are you finding in terms of the public’s perception to this program?
LINDA SARSOUR: In New York right now, and I think in the country as a whole, I think that you’ll find it is more likely for people to say, oh, stopping 685,000 blacks and Latino young people, that’s a little racist, you know, that’s kind of a little too much. I think we’re finding more people, and I’m part of the stop-and-frisk movement as a person who is not black or Latino. So, I’ve seen that sentiment. But, with the spying, it has been hard to get people to understand that it is the same thing. They are both discriminatory policies that target communities of color. No matter what way somebody tries to explain it to me.
The problem with our movement is that it’s framed in the sense of personal security, so people are like, well, if you are not doing anything wrong, what’s the problem? What’s the inconvenience of some guy who listens to, like, your conversations. And I think that’s where the fundamental principles of who we are as Americans and what our rights are, right to privacy — I shouldn’t have to worry about working in an organization that — that’s infiltrated by the New York Police Department. I hope no one else has to worry about that. But, it’s been a little difficult for us to organize around this, but continue to do so.
AMY GOODMAN: Speaking to MSNBC last month, New York Police Commissioner Ray Kelly responded to the report by our guests Matt Appuzo and Adam Goldman that the NYPD has labeled mosques as terrorist organizations. Kelly insisted the NYPD’s operations are legal.
RAYMOND KELLY: I haven’t seen the story, but they’re hyping a book coming out next week. Actually, the book is based on a compilation of about 50 articles that two AP reporters did on the department. It’s a reflection of the articles and the book will be a fair amount of fiction, it will be half-truths, it will be lots of quotes from unnamed sources. And our sin is to have the temerity, the chutzpah, to go into the federal government’s territory of counter-terrorism and trying to protect the city by supplementing what the federal government has done.
JOE SCARBOROUGH: You do agree that entire mosques should not be labeled terrorist organizations, right?
RAYMOND KELLY: Absolutely, of course, of course. And again, we do according to law, what we are investigating, and how we investigated is now pursuant to a federal judge’s direction.
AMY GOODMAN: That’s New York Police Commissioner Ray Kelly, who is reportedly one of the people being considered to head the Department of Homeland Security. Adam Goldman, there was a lot there, accusations that your reports are fiction and based on unnamed sources. Go ahead.
ADAM GOLDMAN: Well, one of the things we tried to do with this book that the NYPD doesn’t do is we tried to be incredibly transparent. If Ray Kelly gets the chance, he can read the book, he’ll find that many people spoke on record about what the NYPD was doing. Named individuals, including Hector Berdecia who ran the demographics unit. Another thing we tried to do is end note all these secret documents that were leaked to us so the reader themselves can go and look at the end note and then go to our website, enemieswithinbook.com, and read the secret files them self, and come to their own conclusions. So we lay all that out and in an effort to be completely transparent. The book is, as The Wall Street Journal said, assiduously reported. The other point I’d like to make about Ray’s comments is that he won’t engage with us on the book and he’s never engaged with us either on the book or our reporting. And Matt and I went to great lengths in the book to make a good case for why the NYPD felt like they needed these programs in the aftermath of 9/11.
AMY GOODMAN: Talk about the head of the demographics unit who then came to be completely disturbed about what his unit was doing.
ADAM GOLDMAN: Yeah, he was guy, he was a legendary narcotics detective. I mean, he was taking down drug dealers, taking guns off the streets. He was also a military reservist.
AMY GOODMAN: His name?
>> Hector Berdecia. And after 9/11, he spent time in Iraq and he was there post-invasion. And he came back to New York and they offered him this job to run this secretive unit that he was unfamiliar with. And he took this job. And he felt that, you know, hey, there are bad guys in New York, there are bad guys in New York, there’s Al Qaeda in New York, and he believed it. He, himself, had said himself he sort of drank the Kool-Aid. As he went on running this unit, he began to get frustrated and he began to see that he had really talented detectives, right, with really great language skills, right, and they weren’t making any cases. It was just and effective way — it was more about effectiveness, is this an effective way to use resources of talented police investigators? These were guys who are used to putting bad guys in jail, right? Taking drugs off the street, taking guns off the streets. Guns kill people. And he, instead, was writing intelligence reports about what people think of the state of the union address. And eventually, I think he got frustrated and disillusioned with the program.
AARON MATÉ: Matt, can you talk about the issue of oversight? First of all, this raises a lot of civil rights issues. Has there been a response from White House or from the Justice Department? And then also talk about what kind of oversight exists here in the city.
AMY GOODMAN: Right, and what — is this happening now?
MATT APPUZO: Everything that we talk about in the book, with the exception of a few sort of ancillary programs, but the core of the book, to our knowledge, is still happening now. Fascinating the issue of oversight, the NYPD gets money from the City Council every year, obviously, the City Council never held a hearing to actually look into the intelligence division’s programs. They have never been subjected to an audit. The intelligence division gets money from the White House under a drug trafficking grant. The White House says, we don’t have any — we don’t know what the money is used for. You can’t hold us to account with what the NYPD does with our money. Congress has funded these programs. They don’t know, they’re not equipped to know, they don’t ask. Homeland Security and the Department of Justice have spent $1 billion, $2 billion at the NYPD since 9/11. They say they don’t know what goes on, and the way the grants are set up they they don’t have the ability to know.
There is essentially, no outside oversight at the NYPD intelligence division. The programs are opened in house. They don’t have to be approved by a judge, they don’t have to be approved by a prosecutor. Kelly likes to talk about we have all the federal prosecutors and the district attorney, but they don’t actually decide when the Intel division can open the case. So there isn’t the kind of outside review that you would see at the CIA or the FBI. And, you know what, from our standpoint, the lack of transparency, the fact this was all done in secret with no public airing, was really what drove us to write this book, because you can’t — people can’t give their informed consent to a program that they don’t know exists, they don’t know what they’re giving up, they don’t know what they’re getting in exchange.
AMY GOODMAN: Very quickly, as we come to the end of this conversation, Najibullah Zazi, of course, a key figure in your book?
MATT APPUZO: The book, in its essence, is a thriller book, I mean, it’s a chase. This is essentially 48 hours inside New York City as the entire intelligence apparatus of the United States tries to unravel the most serious Al Qaeda plot since 9/11, inside the United States, three young men led by Najibullah Zazi, with a bomb, bearing down on the New York City subways, had this been successful, it would caused hundreds if not thousands of fatalities. And we take a real hard look, a real critical look — or we think a thorough look, at what works and what doesn’t. And what we found is at every opportunity, that Zazi is interacts with these intelligence programs of the NYPD Intelligence Division, the [Unintelligible].
AARON MATÉ: They were in his neighborhood.
MATT APPUZO: They were in his neighborhood, they were in his mosque, they had turned his Imam into a cooporative, they had an undercover in his mosque, they were in his co-conspirator student group, they were in all the restaurants in his neighborhood, they were in the travel agency where he bought tickets to go to Pakistan — the train. This was not a failure of resources and manpower.
AMY GOODMAN: So, what happened?
MATT APPUZO: Well, they didn’t — they missed him. Well, you have to read the book to find out how they stop him, come on. The subways don’t blow up, so the real rush is good collaboration, good cooperation is what saves the day.
AMY GOODMAN: And Adam, what most surprised you in doing this series of articles? You did scores of articles, and of course, the book is more than the compilation of the articles.
ADAM GOLDMAN: I think what most surprised us is while we were doing the series that led to the Pulitzer, we knew they were in the mosques and we knew they had informants in the mosques, they had under covers in the mosques. And Ray said, well, we’re just following leads, and this is all legal. That’s been Ray’s — that’s Ray’s phrase, it’s all legal. And we didn’t really didn’t understand how is this all legal. How can you just be a mosque?
AMY GOODMAN: People might be surprised that the CIA is involved in local surveillance.
ADAM GOLDMAN: Right, right. Then while we were reporting at the book we obtained documents this is how they were doing it. We learned about the terrorism enterprise investigation. And so, now, holistically, we understood, oh, right, so, they open this investigation on sometimes reed-thin suspicions and they use that to gather their intelligence on these mosques — the leadership of the mosques for years and years and years and years. They never made a terrorism enterprise case. And by designating the mosque a terrorism enterprise, they could send in their informants and undercovers, you now, they send in people with spy gadgets, listening devices in their watches and their [] and that was really extraordinary. I want to make a point —- one last point about Ray, and why we make the -—
AMY GOODMAN: Ray Kelly, the Commissioner.
ADAM GOLDMAN: Ray Kelly, and why we wrote this book. We’re not questioning Ray Kelly’s patriotism, and we’re not questioning his authority as Police Chief to keep this city better. I guess what we’re doing is, and maybe to use one of Ray’s words, is it’s chutzpah. I guess we have the chutzpah to ask questions about what the police department is doing and whether these tactics work.
AMY GOODMAN: We’re going to leave it there, but we will continue to talk to you as you continue to uncover what is taking place. I want to thank you both for being with us, and congratulations on your Pulitzer for your series of articles. The new book is, “Enemies Within: Inside the NYPD’s Secret Spying Unit and Bin Laden’s Final Plot Against America.” Matt Apuzzo and Adam Goldman. And thank you so much, Linda Sarsour; Arab American Association of New York and the National Network for Arab American Communities. This is Democracy Now!, democracynow.org, The War and Peace Report. When we come back, we look at a terrorist attack that occurred 50 years ago this past Sunday. It was September 15, 1963, and it happened in the Birmingham Baptist Church. Four little girls were the fatalities. We’re going to speak to the fifth who did not die, but lost her eye. We’ll go to Birmingham, Alabama. Stay with us.
Tuesday, September 17, 2013
Find this story at 17 September 2013
The original content of this program is licensed under a Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 United States License. Please attribute legal copies of this work to democracynow.org. Some of the work(s) that this program incorporates, however, may be separately licensed. For further information or additional permissions, contact us.
Snowden Documents Reveal NSA Gave Israeli Spies Raw Emails, Texts, Calls of Innocent Americans23 september 2013
Despite assurances from President Obama, the scandal around the National Security Agency continues to grow. The Guardian reports the NSA has routinely passed raw intelligence to Israel about U.S. citizens. “The NSA was sharing what they call raw signals intelligence, which includes things like who you are calling and when you are calling, the content of your phone call, the text of your emails, your text messages, your chat messages,” says Alex Abdo of the American Civil Liberties Union. “It sounds like all of that was handed over.” Abdo also discusses the ACLU’s successful fight to force the government to declassify documents that show the NSA wrongly put 16,000 American phone numbers on an “alert list.”
Transcript
This is a rush transcript. Copy may not be in its final form.
JUAN GONZÁLEZ: The Guardian newspaper reported Wednesday the National Security Agency routinely has passed raw intelligence to Israel without first removing details about U.S. citizens. Documents leaked by NSA contractor Edward Snowden revealed details of a secret intelligence-sharing agreement between the NSA and its Israeli counterpart, that shows the U.S. government handed over intercepted communications containing phone calls and emails of U.S. citizens. The agreement places no legally binding limits on the use of the data by the Israelis.
Meanwhile, newly declassified documents show the NSA wrongly put 16,000 phone numbers on an “alert list” so their incoming calls could be monitored in violation of court-ordered privacy protections.
AMY GOODMAN: When the NSA notified the Foreign Intelligence Surveillance Court about the error, Judge Reggie Walton of the Foreign Intelligence Surveillance Court wrote, quote, “The court is exceptionally concerned about what appears to be a flagrant violation of its order in this matter.” The documents were declassified after a long fight with the Electronic Frontier Foundation and the American Civil Liberties Union that filed a Freedom of Information Act lawsuit two years ago.
In other NSA news, Brazilian President Dilma Rousseff is facing pressure at home to cancel an upcoming state visit to the White House after documents leaked by Snowden revealed the NSA had hacked into the computer networks of Brazil’s state-run oil company Petrobras. On Wednesday, President Obama’s national security adviser, Susan Rice, met with Brazilian Foreign Minister Luiz Alberto in an attempt to smooth relations between the countries.
To talk more about all of these latest developments, we’re joined by Alex Abdo. He is staff attorney at the National Security Project at the American Civil Liberties Union.
Alex, let’s take these in order. The information about the NSA, the U.S. intelligence agency, handing over raw data that it’s collected—legally or illegally, I think remains to be determined—to Israel, can you explain what’s taken place?
ALEX ABDO: It’s difficult to explain. And it’s, you know, of course, not surprising that the NSA is sharing foreign intelligence with our intelligence partners, but what’s troubling is that along with the foreign intelligence is information about innocent Americans that hasn’t been taken out of the data that’s being shared with our intelligence partners. And it’s troubling for a couple of reasons, the first of which, we haven’t known about this, and this may have been going on for years, and the second of which, there’s no avenue for Americans, innocent Americans who are swept up into these dragnets and have their information handed over to our intelligence partners, to stop that flow of information, to assert their rights and prevent it. So this has been going on for some time, it seems, and it raises new questions about the NSA’s—the extent to which we should trust the NSA with information, very sensitive, about innocent Americans.
JUAN GONZÁLEZ: And what limitations were placed on the information that was—that was handed over to the Israelis, in terms of what they could do with it or how long they could hold it?
ALEX ABDO: Well, based on the documents that were released, it seems as though we basically had a “trust us” regime in place for the sharing of data with Israel. And that’s cold comfort, I think, to the potentially thousands or millions of Americans who find their way into these international surveillance dragnets of the NSA. But there’s simply no way of knowing right now how many Americans were affected, how the information was used, or what other measures the NSA may have taken or may not have taken to protect our privacy.
AMY GOODMAN: And what the information was that was handed over, is it the actual—is it the metadata of phone calls, who you called, when you called them? Is it the actual phone call?
ALEX ABDO: It sounds as though it was all of that. The NSA was sharing what they call raw signals intelligence, which includes things like who you’re calling and when you’re calling, but also the content of your phone calls, the text of your emails, your text messages, your chat messages. It sounds as though all of that was handed over in what they call this raw intelligence.
AMY GOODMAN: And who was targeted?
ALEX ABDO: It’s hard to say. It sounds as though the information sharing was indiscriminate, that they handed over large amounts of information without actually targeting at the outset, and allowing the Israeli analog to the NSA to then scour this information for what was useful. And like I said, they, you know, apparently had in place a clause asking Israel not to abuse this information, but there really didn’t seem to be any legally enforceable way to prevent Americans’ privacy from being violated in the course of this intelligence sharing.
JUAN GONZÁLEZ: Now, the documents you have referred to appear between 2006 and 2009, which would be the tail end of the Bush administration, but your battle to get access to the documents occurred during the Obama administration. Can you talk about that battle to be able to get these documents released?
ALEX ABDO: Sure. In 2011, two senators, Senators Wyden and Udall, started raising red flags, warnings to America about a secret interpretation that the government was relying on to collect an extraordinary amount of information about innocent Americans. And on the heels of that discussion, the ACLU and other organizations, including the Electronic Frontier Foundation, filed requests with the government for these secret interpretations of law. And the Obama administration, which had come into power on a promise of a new era of transparency, fought bitterly to keep these documents secret for years. And they were—it’s actually a bit ironic. In the midst of the disclosures, Obama was in the course of defending very vigorously in court extreme secrecy about these very same documents that were released two days ago. So, it’s—the secrecy was troubling. The fact that they’re now public is a good first step toward greater transparency, but this is information that did not come easily out of the Obama administration.
AMY GOODMAN: One of the documents released was a March 2nd, 2009, court order written by Judge Reggie Walton, now the presiding judge on the Foreign Intelligence Surveillance Court. Walton writes of the NSA’s bulk collection of phone records, quote, “To approve such a program, the Court must have every confidence that the government is doing its utmost to ensure that those responsible for implementation fully comply with the Court’s orders. The Court no longer has such confidence.” This is the judge.
ALEX ABDO: This is extremely troubling, and it should be very disturbing. We have trusted for years a secret and one-sided judicial process to safeguard Americans’ right to privacy when it comes to NSA surveillance. And the disclosures over the past few months have confirmed that we shouldn’t trust that system to safeguard our right to privacy. And at the end of the day, the battle is between a system in which the NSA is required to go to court to engage in lawful surveillance versus the system that it has now, where it rarely has to go to court to spy even on innocent Americans. And we shouldn’t have confidence in that system, and now we know that there are even more reasons than we suspected not to have confidence in the system. But at the end of the day, that’s the debate, whether the NSA, when it wants to spy on Americans, should be forced to go to a court to justify that spying. The NSA hasn’t been doing that for years, and we need to change that, to force the NSA to justify its surveillance in court.
JUAN GONZÁLEZ: Of course, President Obama has been justifying that surveillance. I want to turn to a clip from him speaking last month about the leaks by Edward Snowden.
PRESIDENT BARACK OBAMA: If you look at the reports, even the disclosures that Mr. Snowden’s put forward, all the stories that have been written, what you’re not reading about is the government actually abusing these programs and, you know, listening in on people’s phone calls or inappropriately reading people’s emails. What you’re hearing about is the prospect that these could be abused. Now, part of the reason they’re not abused is because these checks are in place, and those abuses would be against the law and would be against the orders of the FISC.
JUAN GONZÁLEZ: What about President Obama’s claim that the checks are in place?
ALEX ABDO: Well, I think it’s quite obvious now that the checks are not in place, that the very authorities that the government says are carefully overseen by the secret court in D.C. and by regulators within the intelligence communities are failing, that there are violations of even these very permissive rules. But at the end—you know, a core problem is not just that there are violations, but that the law authorizes an extraordinary amount of surveillance in the first place. And that underlying authorization is far too broad. It allows the NSA to engage in a form of dragnet surveillance of even Americans’ communications, that’s not tied to a particular investigation. It’s not tied to a particular terrorist plot that the NSA is trying to stop. That, I think, is the most troubling aspect of these revelations, is that these powers are simply too broad, to begin with.
AMY GOODMAN: On Wednesday, the Yahoo CEO, Marissa Mayer, responded to critics who have accused Internet companies of working with the NSA. During an interview at the TechCrunch Disrupt conference in San Francisco, she was asked why tech companies had not simply decided to tell the public more about what the NSA was doing.
MARISSA MAYER: We can’t talk about those things.
MICHAEL ARRINGTON: Why?
MARISSA MAYER: Because they’re classified.
MICHAEL ARRINGTON: What is—I mean, why?
MARISSA MAYER: And so—so, I mean—just to—
MICHAEL ARRINGTON: Let’s just say, look, right now you were just to tell us the truth about what’s going on, the stuff that’s classified, like what do you think would happen to you?
MARISSA MAYER: I mean, releasing classified information is treason.
MICHAEL ARRINGTON: And then what happens?
MARISSA MAYER: Just generally, and you—you know, incarcerated.
AMY GOODMAN: That was Marissa Mayer. She is the head of Yahoo. Alex Abdo?
ALEX ABDO: You know, Ms. Mayer is correct that there are extraordinary limits on what these companies can say, but it’s not correct to say that they can’t be doing more to protect the privacy of their users. There are a number of steps that these companies can take and should take, and Yahoo recently took one of those steps in joining Google and Microsoft in pushing the secret court in D.C. to allow them to say more about the government surveillance. Those companies want to be able to tell the public how many Americans are affected by the government’s surveillance, the numbers of court orders they get to turn over this information, and, very generally, the type of information they’re being asked to turn over. That’s all information that the government should allow these companies to disclose. It would allow Americans to better understand the surveillance that’s taking place in our name, and it would allow us to make a decision for ourselves whether the surveillance is lawful and whether it’s necessary.
JUAN GONZÁLEZ: Not only that, but I think there is a—as I’ve said before on this show, there is a conflict between the economic needs of these companies, because they’re all global companies, and no matter what happens in the United States, this is going to affect their businesses in other parts of the world as more and more countries decide you can’t trust American technology companies to use their search engines or use their products if they are allowing the government to serveil not only American citizens, but people around the world, so that it seems to me there’s a need to meet the needs of their own shareholders, the business interests of the company, to oppose these kind of government policies.
ALEX ABDO: I think that’s right. We’re putting our American companies at a competitive disadvantage when it comes to their business. They’re being forced to compete with companies outside the U.S. that aren’t receiving these NSA surveillance orders. But it’s important to note, too, that these companies can do more to protect the privacy of their consumers, even when they are not allowed to talk about the surveillance of the NSA. They can put in place technological fixes that allow users to trust their services more. And we’re starting to see that type of a response by the tech industry. They’re starting to compete over privacy. One of Microsoft’s—for example, its new campaigns is “Don’t get Scroogled.” It’s their way of competing against Google’s skimming of our emails for ad tracking. And as Americans, I think, come to appreciate the value of our privacy and the vastness of the information we trust with these companies, they’ll come to demand greater assurances from the Googles and the Microsofts and the Yahoos.
AMY GOODMAN: We want to thank you very much for being with us, and just end with what surprised you most by all of these revelations that have come out from Ed Snowden. I mean, the president says this debate has—would have happened anyway. You’re a longtime—and certainly the ACLU has been deeply concerned about civil liberties issues. Would it have happened anyway? And what have you found most shocking in the last few months?
ALEX ABDO: I don’t think this transparency would have happened. This is an involuntary debate that the administration is now welcoming after the fact, and it’s a long overdue one. And one of the things that has shocked me the most, I think, is, in reading these documents, to see how much information is kept secret that should never have been kept secret in the first place. Americans deserve to be a part of this conversation, but they’re being kept out of it by unnecessary overclassification of this information.
AMY GOODMAN: Thanks so much, Alex Abdo, staff attorney at the National Security Project of the American Civil Liberties Union. This is Democracy Now!, democracynow.org, The War and Peace Report. Back in a minute.
Thursday, September 12, 2013
Find this story at 12 September 2013
The original content of this program is licensed under a Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 United States License. Please attribute legal copies of this work to democracynow.org. Some of the work(s) that this program incorporates, however, may be separately licensed. For further information or additional permissions, contact us.
NSA shares raw intelligence including Americans’ data with Israel23 september 2013
The agreement for the US to provide raw intelligence data to Israel was reached in principle in March 2009, the document shows. Photograph: James Emery
The National Security Agency routinely shares raw intelligence data with Israel without first sifting it to remove information about US citizens, a top-secret document provided to the Guardian by whistleblower Edward Snowden reveals.
Details of the intelligence-sharing agreement are laid out in a memorandum of understanding between the NSA and its Israeli counterpart that shows the US government handed over intercepted communications likely to contain phone calls and emails of American citizens. The agreement places no legally binding limits on the use of the data by the Israelis.
The disclosure that the NSA agreed to provide raw intelligence data to a foreign country contrasts with assurances from the Obama administration that there are rigorous safeguards to protect the privacy of US citizens caught in the dragnet. The intelligence community calls this process “minimization”, but the memorandum makes clear that the information shared with the Israelis would be in its pre-minimized state.
The deal was reached in principle in March 2009, according to the undated memorandum, which lays out the ground rules for the intelligence sharing.
The five-page memorandum, termed an agreement between the US and Israeli intelligence agencies “pertaining to the protection of US persons”, repeatedly stresses the constitutional rights of Americans to privacy and the need for Israeli intelligence staff to respect these rights.
But this is undermined by the disclosure that Israel is allowed to receive “raw Sigint” – signal intelligence. The memorandum says: “Raw Sigint includes, but is not limited to, unevaluated and unminimized transcripts, gists, facsimiles, telex, voice and Digital Network Intelligence metadata and content.”
According to the agreement, the intelligence being shared would not be filtered in advance by NSA analysts to remove US communications. “NSA routinely sends ISNU [the Israeli Sigint National Unit] minimized and unminimized raw collection”, it says.
Although the memorandum is explicit in saying the material had to be handled in accordance with US law, and that the Israelis agreed not to deliberately target Americans identified in the data, these rules are not backed up by legal obligations.
“This agreement is not intended to create any legally enforceable rights and shall not be construed to be either an international agreement or a legally binding instrument according to international law,” the document says.
In a statement to the Guardian, an NSA spokesperson did not deny that personal data about Americans was included in raw intelligence data shared with the Israelis. But the agency insisted that the shared intelligence complied with all rules governing privacy.
“Any US person information that is acquired as a result of NSA’s surveillance activities is handled under procedures that are designed to protect privacy rights,” the spokesperson said.
The NSA declined to answer specific questions about the agreement, including whether permission had been sought from the Foreign Intelligence Surveillance (Fisa) court for handing over such material.
The memorandum of understanding, which the Guardian is publishing in full, allows Israel to retain “any files containing the identities of US persons” for up to a year. The agreement requests only that the Israelis should consult the NSA’s special liaison adviser when such data is found.
Notably, a much stricter rule was set for US government communications found in the raw intelligence. The Israelis were required to “destroy upon recognition” any communication “that is either to or from an official of the US government”. Such communications included those of “officials of the executive branch (including the White House, cabinet departments, and independent agencies), the US House of Representatives and Senate (member and staff) and the US federal court system (including, but not limited to, the supreme court)”.
It is not clear whether any communications involving members of US Congress or the federal courts have been included in the raw data provided by the NSA, nor is it clear how or why the NSA would be in possession of such communications. In 2009, however, the New York Times reported on “the agency’s attempt to wiretap a member of Congress, without court approval, on an overseas trip”.
The NSA is required by law to target only non-US persons without an individual warrant, but it can collect the content and metadata of Americans’ emails and calls without a warrant when such communication is with a foreign target. US persons are defined in surveillance legislation as US citizens, permanent residents and anyone located on US soil at the time of the interception, unless it has been positively established that they are not a citizen or permanent resident.
Moreover, with much of the world’s internet traffic passing through US networks, large numbers of purely domestic communications also get scooped up incidentally by the agency’s surveillance programs.
The document mentions only one check carried out by the NSA on the raw intelligence, saying the agency will “regularly review a sample of files transferred to ISNU to validate the absence of US persons’ identities”. It also requests that the Israelis limit access only to personnel with a “strict need to know”.
Israeli intelligence is allowed “to disseminate foreign intelligence information concerning US persons derived from raw Sigint by NSA” on condition that it does so “in a manner that does not identify the US person”. The agreement also allows Israel to release US person identities to “outside parties, including all INSU customers” with the NSA’s written permission.
Although Israel is one of America’s closest allies, it is not one of the inner core of countries involved in surveillance sharing with the US – Britain, Australia, Canada and New Zealand. This group is collectively known as Five Eyes.
The relationship between the US and Israel has been strained at times, both diplomatically and in terms of intelligence. In the top-secret 2013 intelligence community budget request, details of which were disclosed by the Washington Post, Israel is identified alongside Iran and China as a target for US cyberattacks.
While NSA documents tout the mutually beneficial relationship of Sigint sharing, another report, marked top secret and dated September 2007, states that the relationship, while central to US strategy, has become overwhelmingly one-sided in favor of Israel.
“Balancing the Sigint exchange equally between US and Israeli needs has been a constant challenge,” states the report, titled ‘History of the US – Israel Sigint Relationship, Post-1992′. “In the last decade, it arguably tilted heavily in favor of Israeli security concerns. 9/11 came, and went, with NSA’s only true Third Party [counter-terrorism] relationship being driven almost totally by the needs of the partner.”
In another top-secret document seen by the Guardian, dated 2008, a senior NSA official points out that Israel aggressively spies on the US. “On the one hand, the Israelis are extraordinarily good Sigint partners for us, but on the other, they target us to learn our positions on Middle East problems,” the official says. “A NIE [National Intelligence Estimate] ranked them as the third most aggressive intelligence service against the US.”
Later in the document, the official is quoted as saying: “One of NSA’s biggest threats is actually from friendly intelligence services, like Israel. There are parameters on what NSA shares with them, but the exchange is so robust, we sometimes share more than we intended.”
The memorandum of understanding also contains hints that there had been tensions in the intelligence-sharing relationship with Israel. At a meeting in March 2009 between the two agencies, according to the document, it was agreed that the sharing of raw data required a new framework and further training for Israeli personnel to protect US person information.
It is not clear whether or not this was because there had been problems up to that point in the handling of intelligence that was found to contain Americans’ data.
However, an earlier US document obtained by Snowden, which discusses co-operating on a military intelligence program, bluntly lists under the cons: “Trust issues which revolve around previous ISR [Israel] operations.”
The Guardian asked the Obama administration how many times US data had been found in the raw intelligence, either by the Israelis or when the NSA reviewed a sample of the files, but officials declined to provide this information. Nor would they disclose how many other countries the NSA shared raw data with, or whether the Fisa court, which is meant to oversee NSA surveillance programs and the procedures to handle US information, had signed off the agreement with Israel.
In its statement, the NSA said: “We are not going to comment on any specific information sharing arrangements, or the authority under which any such information is collected. The fact that intelligence services work together under specific and regulated conditions mutually strengthens the security of both nations.
“NSA cannot, however, use these relationships to circumvent US legal restrictions. Whenever we share intelligence information, we comply with all applicable rules, including the rules to protect US person information.”
Glenn Greenwald, Laura Poitras and Ewen MacAskill
The Guardian, Wednesday 11 September 2013 15.40 BST
Find this story at 11 September 2013
Read the NSA and Israel’s ‘memorandum of understanding’
© 2013 Guardian News and Media Limited or its affiliated companies. All rights reserved.
Ex-Mossad-Agent; Israel zahlt Schweigegeld an Familie von Häftling X23 september 2013
Ben Zygier war ein Mossad-Agent, der Geheimnisse an Israels Feinde weitergab. Während der Isolationshaft erhängte sich der Spion. Die genauen Umstände seiner Haft will Jerusalem unter keinen Umständen preisgeben – und bezahlt Zygiers Familie für ihr Schweigen.
Tel Aviv – Einer der spektakulärsten Justizfälle der israelischen Geschichte hat ein finanzielles Nachspiel. Israels Regierung will die Familie des sogenannten Häftling X mit vier Millionen Schekel entschädigen – umgerechnet etwa 842.000 Euro.
Das Geld fließt an die Familie des früheren Mossad-Agenten Ben Zygier. Der australisch-israelische Doppelstaatsbürger hatte jahrelang für den Geheimdienst gearbeitet, war dann aber Anfang 2010 verhaftet worden. Nach Erkenntnissen des SPIEGEL hatte Zygier Informationen an die libanesische Hisbollah-Miliz weitergegeben, die zur Verhaftung zweier Mossad-Agenten im Libanon führten.
Zygier wurde in der Hochsicherheitsanstalt Ajalon im israelischen Ramle in Einzelhaft unter Videoüberwachung gehalten. Das Gefängnispersonal kannte weder seinen Namen noch den Grund für seine Haft. Trotz der Überwachung konnte er sich im Dezember 2010 in seiner Zelle erhängen. Eine Untersuchungsrichterin hatte daher im April festgestellt, dass Zygier nicht ausreichend überwacht worden sei. Der Fall wurde erst Jahre später durch australische Medienberichte publik.
“Ihr werdet schweigen, wir werden bezahlen”
Israels Regierung betont, dass die nun getroffene Einigung mit den Hinterbliebenen kein Eingeständnis eines “vorgeblichen Fehlverhaltens” sei. Vielmehr solle vermieden werden, die Angelegenheit vor Gericht zu bringen, weil dann Einzelheiten an die Öffentlichkeit kämen und die nationale Sicherheit ernsten Schaden nehmen können.
Zygiers Familie hat sich zu Stillschweigen verpflichtet. “Ihr werdet schweigen, wir werden bezahlen”, titelte die israelische Tageszeitung “Jedioth Achronoth” am Mittwoch. Die Hinterbliebenen von Häftling X hatten direkt mit dem Büro des Premierministers Benjamin Netanjahu und dem Justizministerium verhandelt.
Jahrelang war die Familie über die Umstände des Todes falsch informiert worden. Den Hinterbliebenen wurde erzählt, dass Zygier als Mossad-Agent hinter feindlichen Linien ums Leben gekommen war.
11. September 2013, 13:06 Uhr
Find this story at 11 September 2013
© SPIEGEL ONLINE 2013
Prisoner X: Israel to pay $1m to Ben Zygier’s family23 september 2013
Family of Australian-born Mossad agent who died in jail in 2010 while facing treason charges, is offered settlement
Ben Zygier, known as Prisoner X, picture in a still from an ABC TV report. Photograph: AAP/ABC TV
Israel is to pay more than $1m to the family of Ben Zygier, an Australian-born Mossad agent who hanged himself in an Israeli prison, in order to avoid damaging disclosures in a court case.
The agreement will see Zygier’s family receive four million shekels, or around $1.19m, in staged payments in return for the state of Israel being absolved of responsibility for the death.
Zygier, who held Australian and Israeli citizenships, hanged himself in the Ayalon Prison in 2010. He was known as Prisoner X due to his secret incarceration, where he was facing a 10-year sentence for treason.
A judicial inquiry found that guards did not properly check his cell and that at least one CCTV camera wasn’t working. Central district court president, Daphna Blatman, said: “Failure by various elements in the Israel prison service caused his death.”
The Israeli government has said that there was not enough evidence to bring charges over Zygier’s death.
Zygier’s parents – who are leading figures in Melbourne’s Jewish
community – threatened to bring a legal case against the state of
Israel, claiming negligence and seeking compensation.
According to a statement from the Israeli justice ministry,
negotiations between the state of Israel and the Zygiers led to the
settlement, “under which the state agreed to pay the family of the
deceased the sum of four million shekels”. The agreement was made
“without admitting claims raised against”, it said.
Israel made the payment in order to avoid court action, which might have
involved the disclosure of information “which could cause real damage
to national security”, the statement added.
Earlier this year, the ABC’s Foreign Correspondent program reported that the Israeli government attempted to cover up the story of Zygier’s death, urging editors of Israeli newspapers not to report the incident.
The program claimed that Zygier was imprisoned for sabotaging a Mossad mission to recover the bodies of soldiers killed in action in Lebanon. Israel has refused to comment on the reasons for his incarceration.
Oliver Milman in Sydney and Harriet Sherwood in Jerusalem
The Guardian, Wednesday 11 September 2013 09.07 BST
Find this story at 11 September 2013
© 2013 Guardian News and Media Limited or its affiliated companies. All rights reserved.
‘Prisoner X’ family to get Israeli payout23 september 2013
Justice ministry says $1.1 million to be paid to family of alleged Mossad spy who hanged himself in prison.
Zygier known as “Prisoner X” was found hanged in his isolation cell in Ayalon prison near in December 2010. [EPA]
Israel is to pay more than $1 million to the family of an alleged Mossad spy who hanged himself in prison in 2010, the justice ministry has said.
“After negotiations, the two parties have reached an agreement whereby the state will pay $1.1 million to the deceased’s family,” the ministry said in a statement late on Tuesday.
The family of Ben Zygier, an Australian-Israeli known as “Prisoner X,” had accused Israel of negligence in dealing with his case, according to the statement.
Zygier was found hanged in his isolation cell in Ayalon prison near Tel Aviv in December 2010 — a case Israel went to extreme lengths to cover up.
A court document released on April 25 this year said Israel’s prison service had caused Zygier’s death by failing to prevent him from committing suicide.
The document revealed details about his background and imprisonment, indicating he was suicidal and had an emotionally-charged exchange with his wife the day he was found hanged.
It also said that his cell was not properly watched by prison guards.
The justice ministry statement stressed that the deal with Zygier’s family was not an “admission of alleged wrongdoing.”
It was instead “to avoid the affair going to court, which would lead to the publication of numerous details of the case which could cause serious harm to national security.”
The reasons for Zygier’s detention were unclear, but the Australian Broadcasting Corporation said in a report in May that the 34-year-old, who was allegedly working for Israel’s foreign spy service Mossad, had unwittingly sabotaged a top secret spy operation in Lebanon.
Last Modified: 11 Sep 2013 08:52
Find this story at 11 September 2013
www.aljazeera.com
Israel pays £714,000 to the family of ‘Prisoner X’23 september 2013
The move is designed to keep their allegation of negligence from becoming a public lawsuit that could expose state secrets
Israel has agreed to pay four million shekels (£714,000) in compensation to the family of an Australian-Israeli Mossad agent who apparently committed suicide while being held in secret detention in 2010.
The settlement with relatives of Ben Zygier, who was known as “Prisoner X” during his detention for unspecified crimes, is designed to keep their allegation of negligence from becoming a public lawsuit that could expose state secrets, the justice ministry said in a statement.
“It is possible that in the course [of a trial] details would be liable to be made public which could cause tangible damage to the security of the state,” the statement said. The justice ministry stressed that the payment was not tantamount to admitting that state was negligent in its care of Mr Zygier.
The Australian Broadcasting Corporation broke the story of Mr Zygier’s secret incarceration in February. Before then, the Israeli media had been subject to a blackout on the “Prisoner X” case. A judicial inquiry later found that Mr Zygier’s death was a suicide enabled by “neglect of duty’’ on the part of those holding him.
Uri Misgav, an investigative reporter for the Israeli newspaper Haaretz, said he doubted that security was the real reason for the state keeping the matter out of court. “There is at least suspicion of a cover up of failures in all aspects of this matter including recruitment, handling of him as an agent and his handling as a prisoner by the state,” he added.
The case has been an embarrassment to Israel, raising the question of whether the judiciary, which approved the secret incarceration, had acted as a rubber stamp of the security branches.
Ben Lynfield
Wednesday, 11 September 2013
Find this story at 11 September 2013
© independent.co.uk
US stops jailed activist Barrett Brown from discussing leaks prosecution6 september 2013
Federal court order prohibits Brown from talking to the media in what critics say is latest in crackdown on investigative journalism
Brown’s lawyer says the gagging order is a breach of Brown’s first amendment rights. Photograph: Nikki Loehr
A federal court in Dallas, Texas has imposed a gag order on the jailed activist-journalist Barrett Brown and his legal team that prevents them from talking to the media about his prosecution in which he faces up to 100 years in prison for alleged offences relating to his work exposing online surveillance.
The court order, imposed by the district court for the northern district of Texas at the request of the US government, prohibits the defendant and his defence team, as well as prosecutors, from making “any statement to members of any television, radio, newspaper, magazine, internet (including, but not limited to, bloggers), or other media organization about this case, other than matters of public interest.”
It goes on to warn Brown and his lawyers that “no person covered by this order shall circumvent its effect by actions that indirectly, but deliberately, bring about a violation of this order”.
According to Dell Cameron of Vice magazine, who attended the hearing, the government argued that the gag order was needed in order to protect Brown from prejudicing his right to a fair trial by making comments to reporters.
But media observers seen the hearing in the opposite light: as the latest in a succession of prosecutorial moves under the Obama administration to crack-down on investigative journalism, official leaking, hacking and online activism.
Brown’s lead defence attorney, Ahmed Ghappour, has countered in court filings, the most recent of which was lodged with the court Wednesday, that the government’s request for a gag order is unfounded as it is based on false accusations and misrepresentations.
The lawyer says the gagging order is a breach of Brown’s first amendment rights as an author who continues to write from his prison cell on issues unconnected to his own case for the Guardian and other media outlets.
In his memo to the court for today’s hearing, Ghappour writes that Brown’s July article for the Guardian “contains no statements whatsoever about this trial, the charges underlying the indictment, the alleged acts underlying the three indictments against Mr Brown, or even facts arguably related to this prosecution.”
The gag order does give Brown some room to carry on his journalistic work from prison. It says that he will be allowed to continue publishing articles on topics “not related to the counts on which he stands indicted”.
Following the imposition of the order, Ghappour told the Guardian: “The defense’s overriding concern is that Mr Brown continue to be able to exercise his first amendment right as a journalist. The order preserves that ability.”
The lawyer adds that since the current defence team took over in May, Brown has made only three statements to the media, two of which where articles that did not concern his trial while the third ran no risk of tainting the jury pool. “Defendant believes that a gag order is unwarranted because there is no substantial, or even reasonable, likelihood of prejudice to a fair trial based on statements made by defendant or his counsel since May 1, 2013.”
Brown, 32, was arrested in Dallas on 12 September last year and has been in prison ever since, charged with 17 counts that include threatening a federal agent, concealing evidence and disseminating stolen information. He faces a possible maximum sentence of 100 years in custody.
Before his arrest, Brown became known as a specialist writer on the US government’s use of private military contractors and cybersecurity firms to conduct online snooping on the public. He was regularly quoted by the media as an expert on Anonymous, the loose affiliation of hackers that caused headaches for the US government and several corporate giants, and was frequently referred to as the group’s spokesperson, though he says the connection was overblown.
In 2011, through the research site he set up called Project PM, he investigated thousands of emails that had been hacked by Anonymous from the computer system of a private security firm, HB Gary Federal. His work helped to reveal that the firm had proposed a dark arts effort to besmirch the reputations of WikiLeaks supporters and prominent liberal journalists and activists including the Guardian’s Glenn Greenwald.
In 2012, Brown similarly pored over millions of emails hacked by Anonymous from the private intelligence company Stratfor. It was during his work on the Stratfor hack that Brown committed his most serious offence, according to US prosecutors – he posted a link in a chat room that connected users to Stratfor documents that had been released online.
The released documents included a list of email addresses and credit card numbers belonging to Stratfor subscribers. For posting that link, Brown is accused of disseminating stolen information – a charge with media commentators have warned criminalises the very act of linking.
As Geoffrey King, Internet Advocacy Coordinator for the Committee to Protect Journalists, has put it, the Barrett Brown case “could criminalize the routine journalistic practice of linking to documents publicly available on the internet, which would seem to be protected by the first amendment to the US constitution under current doctrine”.
In its motion to the Dallas district court, US prosecutors accuse Brown and his associates of having “solicited the services of the media or media-types to discuss his case” and of continuing to “manipulate the public through press and social media comments”.
It further accuses Ghappour of “co-ordinating” and “approving” the use of the media, and alleges that between them they have spread “gross fabrications and substantially false recitations of facts and law which may harm both the government and the defence during jury selection”.
But Ghappour in his legal response has pointed out that several of the specific accusations raised by the government are inaccurate. Prosecutors refer to an article in the Guardian by Greenwald published on 21 March 2013 based partly on an interview between the journalist and Brown, yet as Ghappour points out that piece was posted on the Guardian website before the accused’s current legal team had been appointed.
Under his legal advice, Ghappour writes, Brown has maintained “radio silence” over his case and has given no further interviews, thus negating the government’s case for a gagging order.
Ed Pilkington in New York
theguardian.com, Wednesday 4 September 2013 22.50 BST
Find this story at 4 September 2013
© 2013 Guardian News and Media Limited or its affiliated companies.
Barrett Brown Faces 105 Years in Jail; But no one can figure out what law he broke. Introducing America’s least likely political prisoner6 september 2013
The mid-June sun is setting on the Mansfield jail near Dallas when Barrett Brown, the former public face of Anonymous, shuffles into the visitors hall wearing a jumpsuit of blazing orange. Once the nattiest anarchist around, Brown now looks like every other inmate in the overcrowded North Texas facility, down to his state-issued faux-Crocs, the color of candy corn.
Who Are America’s New Political Prisoners?
Brown sits down across from his co-counsel, a young civil-liberties lawyer named Ahmed Ghappour, and raises a triumphant fist holding several sheets of notebook paper. “Penned it out,” he says. “After 10 months, I’m finally getting the hang of these archaic tools.” He hands the article, titled “The Cyber-Intelligence Complex and Its Useful Idiots,” to his lawyer with instructions to send it to his editor at The Guardian. Brown used to write for the British daily, but since he’s been in prison, it’s written about him and his strange legal ordeal that has had him locked up for nearly a year while he awaits trial next month. Should he be found guilty of all the charges the federal government is bringing against him – 17 counts, ranging from obstruction of justice to threatening a federal officer to identity fraud – he’ll face more than 100 years in prison.
Given the serious nature of his predicament, Brown, 32, seems shockingly relaxed. “I’m not worried or panicked,” he says. “It’s not even clear to me that I’ve committed a crime.” He describes his time here as a break from the drug-fueled mania of his prior life, a sort of digital and chemical fast in which he’s kicked opiates and indulged his pre-cyber whims – hours spent on the role-playing game GURPS and tearing through the prison’s collection of what he calls “English manor-house literature.”
Brown has been called many things during his brief public career – satirist, journalist, author, Anonymous spokesman, atheist, “moral fag,” “fame whore,” scourge of the national surveillance state. His commitment to investigating the murky networks that make up America’s post-9/11 intelligence establishment set in motion the chain of events that culminated in a guns-drawn raid of his Dallas apartment last September. “For a long time, the one thing I was happy not to see in here was a computer,” says Brown. “It appears as though the Internet has gotten me into some trouble.”
Encountering Barrett Brown’s story in passing, it is tempting to group him with other Anonymous associates who have popped up in the news for cutting pleas and changing sides. Brown’s case, however, is a thing apart. Although he knew some of those involved in high-profile “hacktivism,” he is no hacker. His situation is closer to the runaway prosecution that destroyed Aaron Swartz, the programmer-activist who committed suicide in the face of criminal charges similar to those now being leveled at Brown. But unlike Swartz, who illegally downloaded a large cache of academic articles, Brown never broke into a server; he never even leaked a document. His primary laptop, sought in two armed FBI raids, was a miniature Sony netbook that he used for legal communication, research and an obscene amount of video-game playing. The most serious charges against him relate not to hacking or theft, but to copying and pasting a link to data that had been hacked and released by others.
“What is most concerning about Barrett’s case is the disconnect between his conduct and the charged crime,” says Ghappour. “He copy-pasted a publicly available link containing publicly available data that he was researching in his capacity as a journalist. The charges require twisting the relevant statutes beyond recognition and have serious implications for journalists as well as academics. Who’s allowed to look at document dumps?”
Brown’s case is a bellwether for press freedoms in the new century, where hacks and leaks provide some of our only glimpses into the technologies and policies of an increasingly privatized national security-and-surveillance state. What Brown did through his organization Project PM was attempt to expand these peepholes. He did this by leading group investigations into the world of private intelligence and cybersecurity contracting, a $56 billion industry that consumes 70 percent of the U.S. intelligence budget.
Meet Jacob Applelaum, the American Wikileaks Hacker
“Barrett was an investigative journalist who was merely doing his professional duty,” says Christophe Deloire of Reporters Without Borders. “The sentence that he is facing is absurd and dangerous.”
B
rown grew up in the affluent North Dallas neighborhood of Preston Hollow, where, following his parents’ divorce, he lived with his New Age mother. Karen Lancaster always believed her only son was special – he once wrote that she called him “an indigo child with an alien soul.” Among her house rules was that mother and son meditate together daily. She instructed him in the predictions of Nostradamus and made sure he kept a dream journal for the purpose, as Brown described it, “of helping him divine the future by way of my external connection to the collective unconscious.” (For her part, Brown’s mother says she was progressive, but not “New Age”, and that her son’s comments were made in jest.)
The Rise and Fall of Jeremy Hammond, Enemy of the State
A precocious pre-adolescent reader and writer, Brown produced a newspaper on his family’s desktop computer while in elementary school. When he started writing for the student paper at his private high school in the mid-Nineties, he quickly clashed with the paper’s censors over his right to criticize the administration. “Barrett always challenged authority, even as a kid, and anytime you go up against authority, you’re going to get in trouble,” says Brown’s father, Robert. “You could sort of always see this coming.”
By the time he reached high school, Brown had discovered Ayn Rand and declared himself an atheist. He founded an Objectivist Society at school and distinguished himself from other Randians by placing second out of 5,000 entrants in a national Ayn Rand essay contest. (Brown now expresses regret over this.) By all accounts, Brown hated everything about organized education, preferring to follow his own curricula and chat up girls on the bulletin-board systems of a still-embryonic Internet.
After his sophomore year, Brown told his parents he wasn’t going back. He signed up for online courses and spent his junior year in Tanzania with his father, a Maserati-driving conservative, safari hunter and serial entrepreneur who was trying to launch a hardwood-harvesting business. “Barrett loved living in Africa,” says his father. “He preferred adventure to being in school with his peers. We weren’t far from the embassy that was bombed that year.”
Brown returned to the U.S. and in 2000 joined some of his childhood friends in Austin, where he spent two semesters taking writing classes at the University of Texas. After dropping out, he spent a summer doing what one friend calls a “heroic” amount of Ecstasy and acid before settling into the charmed life of a pre-crisis Austin slacker – working part-time, smoking pot and paying cheap rent in a series of group houses with enormous porches. Brown’s roommates remember his rooms as being strewn with leaning towers of books and magazines – he especially liked Gore Vidal, P.J. O’Rourke and Hunter S. Thompson – but say he was not especially political. “After 9/11 and Iraq, there were a lot of protests in Austin,” says Ian Holmes, a childhood friend of Brown’s. “I don’t remember him participating in it or being extra vocal, but he was against it all like everyone else.”
As Brown built up his clip book and matured as a writer, his ambitions began to outgrow Austin. In 2007, Brown moved to Brooklyn with a group of old friends that called itself “the Texadus.” Their Bushwick apartment emerged as a hub for Lone Star State refugees who liked to get high, crush beers and play video games. “People were always hanging out and coming and going,” says Caleb Pritchard, a childhood friend of Brown’s who lived with him in Austin and Brooklyn. Among the apartment’s large cast of characters were a crew of weed-delivery guys from Puerto Rico and Honduras who used the apartment as a daytime base of business operations. “They brought over an Xbox, bought us beer and food and played strategy games with us,” Pritchard says. “It was a good cultural exchange for a bunch of skinny white kids from Dallas.”
As virtual-world games grew increasingly sophisticated, Brown spent more time in front of his computer. But he didn’t play the games like most people. In Second Life, he linked up with a group of people known as “griefers,” the term for hackers who in the mid-00s became known for generating chaos inside video-game worlds. Socializing on the bulletin board 4chan.org, they formed the first cells of what would later become Anonymous. In the documentary We Are Legion, about the hacktivist group, Brown waxes nostalgic over his griefer period, when he’d spend entire nights “on Second Life riding around in a virtual spaceship with the words ‘faggery daggery doo’ written on it, wearing Afros, dropping virtual bombs on little villages while waving giant penises around. That was the most fun time I ever had in my life.”
When everyone else went out to the bars, Brown stayed in. Aside from video games and the odd afternoon of pick-up basketball, he also pounded out columns, diaries and blog posts for Vanity Fair, Daily Kos and McSweeney’s, as well as restaurant reviews and essays for weeklies like New York Press and The Onion’s A.V. Club. Though he had some paying gigs, he published most heavily in unpaid, self-edited community forums like Daily Kos and The Huffington Post. “Barrett wasn’t really working in New York so much as getting by with the help of friends and family,” says Pritchard. Among his unpaid gigs was his work as the spokesman for the Godless Americans PAC, which led to Brown’s first TV appearance, on the Fox News morning show Fox & Friends.
In Brooklyn, Brown resumed shooting heroin, which he’d dabbled in off and on since he was 19. Over the years, doctors have diagnosed him with ADHD and depression. Accurate or not, the diagnoses suggest Brown was drawn to opiates for more than just the high. “When I joined him in Brooklyn in ’08, Barrett was already basically a functional junkie,” says Pritchard.
Heroin did not mellow Brown when it came to America’s pundit class. Brown’s critique made clear he didn’t want to join the journalistic establishment so much as lash it without mercy. Then, in March 2010, he announced in a blog post the goal of replacing it, of making its institutions irrelevant and rebuilding them in the image of an overly self-confident 28-year-old junkie named Barrett Brown. It was perhaps his first public manifestation of extreme self-assurance that could come off as imperious self-importance. Brown himself did not deny it, once saying, “I don’t think arrogance is something I’m in a position to attack anyone on.”
The project envisioned by Brown was a new kind of crowdsourced think tank to be “established with a handful of contributors who have been selected by virtue of intellectual honesty, proven expertise in certain topics and journalistic competence in general.” He named it Project PM, after a gang in William Gibson’s Neuromancer called the Panther Moderns.
Brown conceived his new network partly as a response to what he saw as the sad state of affairs at the two main homes for his work, Daily Kos and HuffPo. After years of vibrancy, both now suffered from “the watering-down of contributor quality,” he said. At Project PM, he assured that “below-average participants will have only very limited means by which to clutter the network.”
How Anonymous Took Down the Music Industry’s Websites
With typical cigarette-waving flourish, Brown declared, “Never has there existed such opportunity for revolution in human affairs.”
Had Project PM developed along the lines of Brown’s original vision – as a kind of exclusive, experts-only, friends-of-Barrett blogger network – it is extremely unlikely that Brown would now be in jail. Or that the FBI would have subpoenaed the company hired to secure its server, as it did in March. But Project PM ended up taking a different route.
Julian Assange: The Rolling Stone Interview
T
he event that locked Brown’s path into a collision course with the federal government came on February 11th, 2010, when he posted an essay on Huffington Post that he grandiloquently titled “Anonymous, Australia and the Inevitable Fall of the NationState.”
At the time, Anonymous was in the news after some of its hackers, in an action they called Operation Titstorm, brought down Australian government servers in retaliation for the government’s attempt to block certain kinds of niche pornography. For Brown, Titstorm was a world-historic game-changer, a portent of an age in which citizens could successfully challenge state power on their laptops and neutralize government propaganda and censorship.
In the comically aggrandizing tone that had become his trademark, Brown concluded, “I am now certain that this phenomenon is among the most important and underreported social developments to have occurred in decades.”
Among those taken by Brown’s interpretation of Titstorm was Gregg Housh, a Boston Web designer and early Anonymous associate, who had emerged as a sort of quasi-spokesman for the group. Through Housh, Brown gained entrance to the online inner sanctums of the hackers he thought were turning history on its head. Housh, who was starting to feel burned out from fielding the barrage of international media requests, saw Brown as someone who could step in and talk to reporters for Anonymous.
“Barrett ‘got it’ in a way few journalists did,” says Housh. “Soon, he was one of us, and that pretty much set the course for everything that happened next.”
Brown always denied holding any official capacity as the spokesman of Anonymous, maintaining such a thing was not even possible given the amorphous nature of the group. Yet he embraced the media role with relish, sometimes using the royal “we” during interviews. In March 2011, Brown described himself to a visiting NBC News crew as a “senior strategist” for Anonymous. He also, along with Housh, began writing a book about the group, detailing the transformation of Anonymous from a community of amoral videogame-playing punks into an ethical crusade, assisting street protests across the globe during the Arab Spring.
From the beginning, Brown’s public role was a subject of internal controversy. A minority dismissed and attacked him as a preening “name fag” – Anonymous slang for people who use their real names and speak to the press. Others were more bothered that Brown was a “moral fag,” the term used by unrepentant griefers to describe the new generation of hacktivists who began flocking to the Anonymous banner in 2008. In We Are Legion, Brown makes his allegiance clear, hailing the hacktivists for turning a “nihilist, ridiculous group” into a “force for good.”
Yet something of the old griefer remained in Brown even after his and the group’s politicization process had converged to take on the world of intelligence outsourcing. “He was just trolling the hell out of these corporate-surveillance guys,” says Joe Fionda, a New York activist who assisted Brown in his investigations. “Not just doing the serious research work no one else was doing – getting tax files and all that – but calling them at their homes to introduce himself, sometimes straight up pranking them. He’s legit funny and sees the humor and the absurd in everything.”
Another former colleague, a Boston Web developer and activist named Lauren Pespisa, shared Brown’s love of prank calls: “Sometimes we’d drink and prank-call lobbyists for fun. We went after this one group, Qorvis, because they were helping the kingdom of Bahrain handle its image when they were shooting people. So we’d call them up and ‘dragon shout’ at them,” she says, referring to a sound effect in one of Brown’s favorite video games, The Elder Scrolls V: Skyrim.
By combining the two ethos of Anonymous, Brown won over more people than he alienated. Part of his appeal was the act of his drily affected pseudo-aristocratic-asshole persona, which he exaggerated during media appearances. He preferred a corduroy sports jacket to the Guy Fawkes mask that Anonymous members favor. A typical portrait showed Brown’s arm slung over a chair, a Marlboro dangling off his bottom lip and a stuffed bobcat on the wall behind him. He was oth loved and hated for being one of the more colorful characters found in the Internet Relay Chat rooms where hackers gathered. He famously once conducted a strategy session while drinking red wine in a bubble bath.
“Barrett became a bit like the court jester of Anonymous,” says Gabriella Coleman, a professor at McGill University who has written about the network. “His behavior was legendary because he was the ethical foil. Anonymous isn’t just for hackers. People like Barrett Brown can thrive: the organizer, the media-maker, the spectacle-maker.”
W
hen Brown met Housh, he was nearing the end of his three-year stint in Brooklyn. In the spring of 2010, Brown called his parents and told them he had a heroin problem. At their urging, he returned to Dallas and began an outpatient treatment that included the heroin replacement Suboxone. It was from a tiny Dallas apartment that Brown deepened his involvement with Anonymous. Since most of his friends lived in Austin, his new social life consisted of the IRC rooms populated by hacktivists. It was a world of nonstop, petty cyberintrigue, which to outsiders can appear like a hellish fusion of The Hollywood Squares, WarGames and Degrassi Junior High.
Bradley Manning Explains His Motives
Pritchard remembers the first time Brown crashed on his couch in Austin after his return to Dallas. “I’d wake up, and he’d be online having conversations with these kids on Skype or something,” he says. “Barrett would say, ‘I know what you’re doing!’ The other guy would be stroking his chin like he’s Dr. Claw, saying, ‘No, I know what you’re doing.’ It was nonstop cyberwar, with these dorks just dorking it out with each other. It seemed like a bunch of kids trolling each other.”
Still, Pritchard appreciated that beneath the dorkery, Brown was involved in serious business. This was Brown’s first year as an unofficial spokesman for Anonymous, and it was eventful. The hackers were aiding the uprisings of the Arab Spring, and assaulted PayPal and credit-card companies in retaliation for their refusal to process donations to WikiLeaks. This latter action, called Operation PayBack, earned the attention of the Justice Department. In the summer of 2011, the FBI issued 35 search warrants and arrested 14 suspected hackers.
The Trials of Bradley Manning
By the time of the arrests, Brown’s focus had settled squarely on the nexus between government agencies, private intelligence firms and the information-security industry – known as InfoSec – contracted to build programs and technologies of surveillance, disruption and control that Brown suspected were in many cases unconstitutional. What’s more, he was as bratty as ever about it. He phoned CEOs and flacks at their homes and called them liars. He boasted about bringing the whole system down. As the first raids and arrests took place following Operation PayBack, some observers of Brown’s antics began to suspect that the court jester of Anonymous was not a very safe thing to be.
“You could just tell it was going to end badly,” says an Anonymous member and veteran hacker. “When he really started making noise about going after these intel-contracting companies, I was like, ‘You’re going to get locked up, kid.'”
A
fter Operation Payback, Anonymous was on the radar of every private security firm looking to build a quick reputation. In the office of Aaron Barr, CEO of a struggling digital-security contractor called HBGary Federal, it was the biggest thing on the radar. Barr was convinced that taking down Anonymous before it struck again was a fast track to industry juice and massive contracts. In February 2011, he bragged to The Financial Times about the supersecret sleuthing techniques he had developed to get the goods on Anonymous. He claimed to know the identities of the group’s leaders. Implicit in Barr’s comments was the possibility of federal raids on those identified.
Partly to avoid that outcome, and partly out of curiosity, an Anonymous cell hacked HBGary’s servers. They discovered that Barr’s techniques involved hanging out on major social-media sites and compiling lists of mostly innocent people. It wasn’t the only example of his staggering miscalculation: Within minutes, the hackers easily got around the firm’s security defenses, ransacking company servers, wiping Barr’s personal tablet and absconding with 70,000 internal e-mails. Stephen Colbert devoted a segment to the fiasco, based around the image of Barr sticking his penis in a hornets’ nest.
Once the hackers who broke into HBGary’s servers discovered that Barr was basically a clown, they abandoned pursuit. “There were tens of thousands of e-mails and no one wanted to go through them,” says an Anonymous associate who observed the HBGary hack. “Everyone was like, ‘We’re not even going to dump these, because there’s no point.'”
Brown disagreed. When the hackers posted the e-mails on a BitTorrent site, he used Project PM to organize the painstaking work of collating and connecting the dots to see what picture emerged.
“Nobody was reading more than a couple of the e-mails before getting bored,” says the Anonymous associate. “But Barrett has this strangely addictive and journalistic kind of mind, so he could stare at those e-mails for 10 hours. He’d be sitting alone in the HBGary channel, yelling at everyone, ‘You’ve got to pay attention! Look at the crap I found!'” Brown quickly drew in some 100 volunteers to help him trawl through and make sense of the e-mails.
The HBGary cache offered one of the fullest looks ever at how corporate-state partnerships were targeting groups they considered subversive or inimical to the interests of corporate America. The projects under consideration at HBGary ranged from cyberattacks and disinformation campaigns targeting civic groups and journalists to Weird Science-supermodel avatars built to infiltrate and disrupt left-wing and anarchist networks.
Project PM volunteer investigator Joe Fionda remembers the disturbing thrill of uncovering HBGary’s use of a Maxim pinup to create online personas designed to spy for corporate and government clients. “I couldn’t believe how much crazy shit they were up to,” Fionda says. “My brain still feels like it’s going to explode.”
The biggest fish flopping in Brown’s net was the story of a cluster of contractors known as Team Themis. The origins of Team Themis dated to Bank of America’s alarm over Julian Assange’s 2010 claim to possess documents that “could take down a bank or two.” The Department of Justice recommended Bank of America retain the services of the white-shoe D.C. law firm Hunton & Williams and the high-powered intelligence contractor Booz Allen Hamilton. On behalf of Bank of America, Hunton & Williams turned to the large and growing world of InfoSec subcontractors to come up with a plan, settling on HBGary and two dataintelligence shops, Berico Technologies and Palantir Technologies.
The Themis three were also preparing a proposal for Hunton & Williams on behalf of another client, the U.S. Chamber of Commerce. The leaked HBGary documents revealed that Themis was exploring ways of discrediting and disrupting the activities of organized labor and its allies for the Chamber. The potential money at stake in these contracts was considerable. According to Wired, the trio proposed that the Chamber create a $2-milliona-month sort of cyber special-forces team “of the kind developed and utilized by the Joint Special Operations Command.” They also suggested targeting a range of left-of-center organizations, including the SEIU, watchdog groups like U.S. Chamber Watch, and the Center for American Progress. (The Chamber of Commerce and Bank of America have denied ever hiring Team Themis or having any knowledge of the proposals.)
In pursuit of the Chamber and Bank of America contracts, the Themis three devised multipronged campaigns amounting to a private-sector information-age COINTELPRO, the FBI’s program to infiltrate and undermine “subversive” groups between 1956 and 1971. Among the The mis ideas presented to Hunton & Williams: “Feed the fuel between the feuding groups. Disinformation. Create messages around actions to sabotage or discredit the opposing organization. Submit fake documents and then call out the error.”
The revelations represented a triumph for Brown and his wiki. A group of Democratic congressmen asked four Republican committee chairs to hold hearings on the “deeply troubling” question of whether “tactics developed for use against terrorists may have been unleashed illegally against American citizens.” But the calls for investigation went nowhere. The lack of outrage in Washington or on influential editorial pages didn’t shock Brown, who had long ago lost hope in the politicians and pundits who are “clearly intent on killing off even this belated scrutiny into the invisible empire that so thoroughly scrutinizes us – at our own expense and to unknown ends.”
It was Brown’s finest moment, but his relationship with Anonymous was rapidly deteriorating. By May 2011, Brown had begun turning on the network. “There’s little quality control in a movement like [Anonymous],” Brown told an interviewer. “You attract a lot of people whose interest is in fucking with video-game companies.”
Brown’s haughty dismissal of the new crop of hacktivists was not a feeling shared by the FBI. The government continued to see Anonymous as a major and growing threat. And in the summer of 2011, it acquired a key piece in its operation to destroy the network. On the night of June 7th, four months after the HBGary hack, two federal agents visited the Jacob Riis publichousing project on Manhattan’s Lower East Side and introduced themselves to a 27-year-old unemployed hacker named Hector Monsegur, known inside Anonymous as “Sabu.” As a leader of an Anonymous offshoot called Lulzsec, he had hacked a number of state and corporate servers. In early 2011, he made some rookie errors that led the FBI to his door: Facing the prospect of being indicted on 12 counts of criminal conspiracy, Sabu rolled over on his old hacker associates. He signed a cooperation agreement and began feeding the FBI information on Anonymous plots. The biggest of these involved a private global intelligence contractor located in Barrett Brown’s backyard, the Austin-based Stratfor.
I
n early December 2011, a young Chicago Anon named Jeremy Hammond cracked Stratfor’s server and downloaded some 5 million internal documents. With the apparent blessing and supervision of the FBI, Sabu provided the server for Hammond to store the docs. Hammond then proceeded to release them to the public. Sifting through the data dump would require a massive coordinated effort of exactly the kind Project PM had been training for. Brown and his dedicated volunteers attacked the mountains of e-mails. “We had between 30 and 50 people involved, usually 15 at a time,” says Lauren Pespisa, the Boston Project PM volunteer who now helps organize Brown’s legaldefense fund.
Did the Mainstream Media Fail Bradley Manning?
After six months of work, Brown would discover what he considered the fattest spider amid the miles of Stratfor web: a San Diego-based cybersecurity firm called Cubic. As Brown followed the strings, he discovered links between Cubic and a data-mining contractor known as TrapWire, which had ties to CIA vets. Brown thought that he had stumbled on a major find illuminating new technologies for spying and surveillance, but the media pickup was not what Brown had hoped. Major dailies shrugged off the story, and Gawker and Slate poured cold water on his alarm, calling it “outlandish.” Brown responded to the criticism with a rambling, connect-the-conspiracy-dots YouTube video.
It wasn’t just gossip sites that viewed Brown’s reading of the Stratfor docs with a skeptical eye. Even sympathetic students of intelligence contracting urged caution about interpreting the TrapWire materials. “I applaud anyone digging into this stuff, but you can’t really draw conclusions from what these contractors say in these e-mails because they’re bragging and they’re trying to land business,” says Tim Shorrock, whose 2008 book Spies for Hire first exposed the scope of the intelligence-contracting industry. “Some of the quote-unquote intelligence that Stratfor was reporting on was ludicrous. Why would an intelligence agency buy this stuff?”
WikiLeaks Stratfor Emails: A Secret Indictment Against Julian Assange?
Meanwhile, deeply buried in the TrapWire debate was the fact that included in the Stratfor docs were the credit-card numbers of 5,000 Stratfor clients. Brown likely did not give the numbers a second thought. But it’s these numbers that form the most serious charges against Brown. The government alleges that when Brown pasted a link in a chat room to the alreadyleaked documents, he was intentionally “transferring” data for the purpose of credit-card and identity fraud.
“If the Pentagon Papers included creditcard info, then would The New York Times have been barred from researching them?” says Brown’s co-counsel Ghappour. “There is nothing to indicate Barrett wanted to profit from this information, or that he ever had the information in his possession. He was openly critical of such motives and disapproved of hacking for the sake of it. This was a big part of his rift with Anonymous – why he was considered a ‘moral fag’ by some.”
The FBI raided Brown’s Dallas apartment on the morning of March 6th, 2012, three months after the Stratfor hack, and one day after Jeremy Hammond was arrested in Chicago. More than a dozen feds led by agent Robert Smith knocked down the door with warrants for Brown’s computers and seized his Xbox. Brown was staying at his mother’s house nearby. Later that morning, the agents appeared at the home of Brown’s mother with a second warrant. They found his laptop in a kitchen cabinet, and she was later charged with obstruction. Brown, who was in the shower preparing for a TV interview when the agents arrived, was not arrested. The agents left with his laptop.
Among hacktivists, theories differ on the motive behind the FBI action. As one of the few public figures associated with Anonymous, Brown made a soft target with a potentially very valuable hard drive or two. Some say it was meant as a warning; others say Brown had simply pissed off too many powerful people, or was getting too close to something big.
Then there is the theory, advanced by Gregg Housh, that Brown and Hammond were targeted out of frustration with a blown sting against WikiLeaks founder Julian Assange. After looking into the Stratfor hack, Housh believes that the FBI allowed the hack to proceed not in order to arrest Hammond but Assange. “The idea was to have Sabu sell the stolen Stratfor material to Assange,” says Housh. “This would give them a concrete charge that he had knowingly bought stolen material to distribute on WikiLeaks.”
Housh believes Hammond got wind of Sabu’s plan to sell the documents to Assange and dumped them before the transaction could take place. While there is no proof of contact between Sabu and Assange, Sabu reportedly communicated with Sigurdur Thordarson, a teenage Icelandic WikiLeaks volunteer and an FBI informant.
“Hammond had no idea what he’d done,” says Housh. “The FBI were a day away from having evidence against Assange, and Hammond screwed it up for them. That’s why they went after him so hard.”
Yet Hammond, who led the Stratfor hack, faced only 30 years before cutting a plea deal for 10. Why is Brown facing 105?
F
ollowing the March raid, Brown continued his investigations and planned for the future of Project PM. 2012 was going to be a big year. He had a new nucleus of friends and colleagues in Boston, where he was going to move and live in an activist group house. His investigations increasingly took place outside the Anonymous network. Brown had new allies in groups like Telecomix, a collective that operated its own crowdsourcing investigations into the cybersurveillance industry. That summer, he visited New York for the Hackers on Planet Earth conference, an annual gathering of hackers and activists, where he met a few of his Project PM colleagues offline for the first time. “I remember he was wearing a full suit in this crazy heat, sweating profusely in the lobby of the Hotel Pennsylvania,” says Fionda. “He was still struggling with kicking heroin, he had tremors and looked like he was in a lot of pain. But he was full of energy. He was telling everyone, ‘We’re going to the center of the Earth with this story!'”
But Brown’s mental state seemed to deteriorate during the summer of 2012. Having battled depression throughout his life, he had gone off his meds and was simultaneously struggling with cold-turkey breaks from Suboxone for heroin withdrawal. His YouTube channel documents the effects. In August, Brown posted a clip that showed him skeet-shooting over the words of Caligula’s lament: “If only all of Rome had just one neck.” In early September, as Brown planned his move to Boston, he struggled to contain his rage at the local FBI agent Robert Smith, who had raided his mother’s home and taken his beloved Xbox.
In September, Brown uploaded a discombobulated three-part video series, the last one titled “Why I’m Going to Destroy FBI Agent Robert Smith.” In the videos, Brown struggles to maintain focus. He demands the return of his Xbox and warns that he comes from a military family that has trained him with weapons – weapons he says he’ll use to defend his home. He calls Smith a “fucking chickenshit little faggot cocksucker” before uttering the words he has since admitted were ill-considered, as well as the result of a chemically combustive mental state.
Why Shouldn’t Freedom of the Press Apply to WikiLeaks?
“Robert Smith’s life is over,” says Brown. “And when I say his life is over, I don’t say I’m going to go kill him, but I’m going to ruin his life and look into his fucking kids. How do you like them apples?”
It takes a suspension of disbelief to hear a credible physical threat as defined by law. The rail-thin Brown appears a desperate, pathetic character in need of psychiatric help. A more humane FBI office might have sent a doctor rather than a car of armed agents. But the FBI didn’t send a shrink. That evening a team of armed agents stormed Brown’s apartment, threw him violently to the ground and arrested him for threatening a federal officer.
WikiLeaks Releases ‘Beat the Blockade’ Benefit CD
Over the next four months, federal grand juries issued three multicount indictments for obstruction and “access devicefraud” related to the Stratfor link. It is the last of these that concern civil-liberties activists and that could have a possible chilling effect. “One can’t apply the transfer provision of the statute to someone conducting research,” says Ghappour. “If cutting and pasting a link is the same as the transfer of the underlying data, then anyone on the Internet is prone to violating the Computer Fraud and Abuse Act.”
The FBI has shown interest in expanding that theoretical “anyone” to include Brown’s circle of volunteers. In March, the bureau went hunting for the digital fingerprints of Project PM administrators with a subpoena. The action has shaken the group’s inner circle, as it was surely intended. “It was a pretext to sow discord and fear in Barrett’s project,” says Alan Ross, a U.K. investigator for Project PM. “They were desperate to bolster their case. After the subpoena, people began to worry about being monitored. I worry about my personal safety even though I acted within the confines of the law. I worry about travel.”
Travel is one thing Brown does not have to worry about at the moment. Nor, if the government gets its way, will he have to worry about handling the media, his former specialty. In August, the prosecution requested a gag be placed on Brown and his lawyers, a move that suggests they understand the dangers of public scrutiny of the legal peculiarities of United States vs. Barrett Lancaster Brown.
Meanwhile, Brown has not joined the prison tradition of mastering the law behind bars. Rather than study up on cyberfraud statutes, he has resumed his writing on intel contractors and the pundits who defend them. “Nobody talks to me here,” Brown says of his year in jail, “but I was pretty unsociable on the outside too.” One of the hardest things about incarceration for the atheist has been contending with his cellmates’ singing of hymns. “Prison is great for reading and for thought, until they start in with their Pentecostal nonsense,” says Brown. “It ruins everything.”
His friends keep him supplied with articles and printouts, which lately have included material related to the Edward Snowden leak. Snowden gained access to information about secret NSA spying on private citizens while working for the intelligence subcontractor Booz Allen Hamilton, a company that had been on Brown’s radar long before most Americans learned of it in the wake of Snowden’s bombshells.
“This is all much bigger than me,” Brown says in the visiting room. “What matters is this.” He leans over to tap his handwritten manuscript. The pages of the essay are messy on the table, and sticking out from under the pile is the last sentence on the last page. “This is the world that we accept if we continue to avert our eyes,” it says. “And it promises to get much worse.”
This story is from the August 29th, 2013 issue of Rolling Stone.
http://www.rollingstone.com/culture/news/barrett-brown-faces-105-years-in-jail-20130905
by Alexander Zaitchik
SEPTEMBER 05, 2013
Find this story at 5 September 2013
Copyright ©2013 Rolling Stone
In Secret AT&T Deal, U.S. Drug Agents Given Access to 26 Years of Americans’ Phone Records6 september 2013
The New York Times has revealed the Drug Enforcement Administration has an even more extensive collection of U.S. phone records than the National Security Agency. Under a secretive DEA program called the Hemisphere Project, the agency has access to records of every phone call transmitted via AT&T’s infrastructure dating back to 1987. That period covers an even longer stretch of time than the NSA’s collection of phone records, which started under President George W. Bush. Each day, some four billion call records are swept into the database, which is stored by AT&T. The U.S. government then pays for AT&T employees to station themselves inside DEA units, where they can quickly hand over records after agents obtain an administrative subpoena. The DEA says the collection allows it to catch drug dealers who frequently switch phones, but civil liberties advocates say it raises major privacy concerns. We speak with Scott Shane, national security reporter for The New York Times and co-author of the report, “Drug Agents Use Vast Phone Trove, Eclipsing NSA’s.”
Transcript
This is a rush transcript. Copy may not be in its final form.
AMY GOODMAN: In a moment we’ll be talking about the death of David Frost with the director Ron Howard, but first we turn to news that one government agency has an even more extensive collection of U.S. phone records than the National Security Administration, the NSA. That agency is the Drug Enforcement Administration. In a front-page article, The New York Times has revealed a secretive operation inside the DEA called the Hemisphere Project. Under this program, the DEA has access to records of every phone call over AT&T’s network dating back to 1987. That period covers a longer stretch of time than the NSA’s collection of phone records, which began under President George W. Bush. Some four billion call records are gathered to the DEA’s database every day. It’s unclear if other major phone companies are involved.
Unlike with the NSA, the DEA’s phone records are actually stored by AT&T. The U.S. government then pays for AT&T employees to station themselves inside DEA units, where they can quickly hand over data after agents obtain an administrative subpoena. The U.S. government says the program allows DEA agents to keep up with those in the drug trade who often switch phones. In a statement, Justice Department spokesperson Brian Fallon said that “subpoenaing drug dealers’ phone records is a bread-and-butter tactic in the course of criminal investigations” and that Hemisphere “simply streamlines the process.”
The disclosure of the DEA’s Hemisphere program follows another major revelation involving the DEA and government surveillance. It was revealed last month a secretive DEA unit has used information taken from NSA wiretaps for cases unrelated to terrorism. The DEA has also provided classified intelligence obtained by the NSA and other sources to the Internal Revenue Service to help in their investigations of Americans.
Well, for more, we’re joined by Scott Shane, national security reporter for The New York Times. His front-page article, co-written with Colin Moynihan, appeared in Monday’s New York Times, “Drug Agents Use Vast Phone Trove, Eclipsing N.S.A.’s.”
Welcome to Democracy Now!, Scott Shane. Explain exactly how it’s done and how you found out about this.
SCOTT SHANE: Well, as you mentioned, I wrote this article with Colin Moynihan, a colleague at The New York Times, and he received from an activist in Washington state, named Drew Hendricks, a 27-slide PowerPoint, which was prepared by AT&T and government agents, apparently DEA or possibly other government agencies, and essentially they’re training slides to introduce folks who are going to be working on the Hemisphere Project, how it works and what it can do. And Drew Hendricks, the activist in Washington, got these slides as part of a series of public information requests. He’s sort of a peace activist out there, and he had been helping some folks with a lawsuit and just, you know, fired off a bunch of public information requests to police agencies in Washington state and other places on the West Coast. This set of slides came back with one of those requests.
Drew Hendricks believes it may have been sent actually by accident, included by accident. And so—but, in fact, it’s unclassified. It’s marked “Law enforcement sensitive,” but it’s unclassified, and it actually states that the Hemisphere Project is unclassified. What’s kind of remarkable to us is that this has been going on for at least six years under the name Hemisphere Project, and it’s unclassified, but no one has ever learned about it. I couldn’t find a single reference to it in the Nexis database or on the web. And so, they’ve kept it very well hidden, and indeed some of the slides say, if you get information from Hemisphere, never reveal the source of the information. So, the government has kept this very, very well hidden, along with AT&T.
AMY GOODMAN: And explain what exactly it is, what AT&T is keeping records of and how the government uses this information.
SCOTT SHANE: AT&T operates what are called switches, through which telephone calls travel all around the country. And what AT&T does in this program is it collects all the—what are called the CDRs, the call data records, the so-called metadata from the calls that we’ve heard about in the NSA context. This is the phone number—phone numbers involved in a call, its time, its duration, and in this case it’s also the location. Some are cellphone calls; some are land line calls. Anything that travels through an AT&T switch, even if it’s not made by an AT&T customer—for example, if you’re using your T-Mobile cellphone but your call travels through an AT&T switch somewhere in the country, it will be picked up by this project and dumped into this database. So AT&T collects the information on all these calls, basically who called who when all over the country. And as you mentioned, there is a slide that says four billion—with a B—call data records are added to the database every day. I’m told by some technical experts that it’s possible one call can create more than one call data record. Apparently, if a cellphone, for example, in a moving car switches from one tower to another, that could be another record, so—because those numbers sound pretty high, 12—you know, maybe 12 or so calls per American per day.
But anyway, all that call data goes into this giant database, and then when a drug agent at one of three centers around the country—in Los Angeles, Houston and Atlanta—finds a number of interest, they can ask the AT&T person sitting next to them, “Check this out.” The AT&T person accesses the database, the Hemisphere database, and they can come back with a record of, you know, “Here’s the other numbers called by this number, the number you’re interested in,” and when and where, in many cases, and then they can follow up.
I should say that in order to access the database, the government says that the agent asking AT&T to make the search has to produce at least what’s called an administrative subpoena, which is essentially a form, a DEA form, not approved by a court or by a judge, but simply a DEA form saying, you know, here’s why we’re interested in this number. So there’s no judicial oversight, but it is—these administrative subpoenas are used routinely in a criminal investigation. So the government’s side of the story is that this is no different from kind of routine criminal investigation that happens every day.
AMY GOODMAN: Scott Shane, very quickly, my final question is about the issue of privacy. What does this raise for Americans?
SCOTT SHANE: Well, I think what it shows is that, apart from the program we’ve learned about with the NSA in recent months, there are many other programs that the government has, many of them related to law enforcement as well as to intelligence gathering, and also that the government works extremely closely with some telecommunications and Internet companies, sometimes using court orders but often using voluntary arrangements like this one, and often paying the companies to participate, so that the universe of data that’s gathered and has implications for American privacy goes way beyond any one agency or even beyond the government itself into the corporate sector.
AMY GOODMAN: Scott Shane, I want to thank you for being with us, national security reporter for The New York Times. We’ll link to your front-page article yesterday, “Drug Agents Use Vast Phone Trove, Eclipsing N.S.A.’s.”
Tuesday, September 3, 2013
Find this story at 3 September 2013
The original content of this program is licensed under a Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 United States License. Please attribute legal copies of this work to democracynow.org. Some of the work(s) that this program incorporates, however, may be separately licensed. For further information or additional permissions, contact us.
DEA has more extensive domestic phone surveillance op than NSA6 september 2013
For at least six years, US anti-drug agents have used subpoenas to routinely gain access to an enormous AT&T database. It’s an intrusion greater in scale and longevity than the NSA’s collection of phone calls, revealed by Edward Snowden’s leaks.
As part of the secret Hemisphere Project the government has been paying AT&T to place its employees in drug-fighting units around the country, the New York Times reports.
The US’s largest telecoms operator has been supplying phone data to the Drug Enforcement Administration since 1987.
The project covers every call that passes through an AT&T switch, including those made by clients of other operators, with some four billion call records added to the database on a daily basis.
And, unlike the much debated NSA data, the Hemisphere data includes information on the location of those, making the calls.
The New York Times found out about the surveillance program after it received slides, describing the Hemisphere Project, from peace activist, Drew Hendricks.
The activist said he was sent the PowerPoint presentation – which is unclassified, but marked “Law enforcement sensitive” – in response to a series of public information requests to West Coast police agencies.
The slides revealed that the program was launched back in 2007 and has been carried out in great secrecy since then.
“All requestors are instructed to never refer to Hemisphere in any official document,” one of the slides said.
The paper performed a search of the Nexis database, but found no reference to the program in news reports or Congressional hearings.
The US administration has acknowledged that Hemisphere is operational in three states, adding that the project employed routine investigative procedures used in criminal cases for decades and posed no novel privacy issues.
Justice Department spokesman, Brian Fallon, stressed that it’s crucial that the phone data is stored by AT&T, and not by the government like in the NSA case. It has requested phone numbers of interest mainly using what are called “administrative subpoenas,” those issued not by a grand jury or a judge, but by a federal agency, the DEA.
According to the spokesman, Hemisphere proved especially effective in finding criminals, who frequently discard their cellphones in order to avoid being tracked by polices.
“Subpoenaing drug dealers’ phone records is a bread-and-butter tactic in the course of criminal investigations,” he said in a statement.
The 27-slide PowerPoint presentation highlights several cases, in which Hemisphere solved big crimes, with not all of them being drug-related.
For example, this March it found the new phone number and location of a man, who impersonated a general at a San Diego Navy base and then ran over a Navy intelligence agent.
In 2011, Hemisphere tracked Seattle drug dealers, who were rotating prepaid phones, leading to the seizure of 136 kilos of cocaine and $2.2 million.
AT&T spokesman, Mark A. Siegel, declined to answer detailed questions on Hemisphere, only saying that AT&T “like all other companies, must respond to valid subpoenas issued by law enforcement.”
Representatives from Verizon, Sprint and T-Mobile all declined to comment when asked by the New York Times whether their companies participated in Hemisphere or any other similar programs.
An undisclosed federal law enforcement official told the paper the Hemisphere Project was “singular” and that he knew of no comparable program involving other phone companies.
It’s not the first time AT&T has been involved in federal surveillance programs, the company operated a telecommunication interception facility for the NSA between 2003 and 2006.
Published time: September 02, 2013 23:41
Edited time: September 04, 2013 09:04
Find this story at 4 September 2013
© Autonomous Nonprofit Organization “TV-Novosti”, 2005–2013.
Drug Agents Use Vast Phone Trove, Eclipsing N.S.A.’s6 september 2013
For at least six years, law enforcement officials working on a counternarcotics program have had routine access, using subpoenas, to an enormous AT&T database that contains the records of decades of Americans’ phone calls — parallel to but covering a far longer time than the National Security Agency’s hotly disputed collection of phone call logs.
The Hemisphere Project, a partnership between federal and local drug officials and AT&T that has not previously been reported, involves an extremely close association between the government and the telecommunications giant.
The government pays AT&T to place its employees in drug-fighting units around the country. Those employees sit alongside Drug Enforcement Administration agents and local detectives and supply them with the phone data from as far back as 1987.
The project comes to light at a time of vigorous public debate over the proper limits on government surveillance and on the relationship between government agencies and communications companies. It offers the most significant look to date at the use of such large-scale data for law enforcement, rather than for national security.
The scale and longevity of the data storage appears to be unmatched by other government programs, including the N.S.A.’s gathering of phone call logs under the Patriot Act. The N.S.A. stores the data for nearly all calls in the United States, including phone numbers and time and duration of calls, for five years.
Hemisphere covers every call that passes through an AT&T switch — not just those made by AT&T customers — and includes calls dating back 26 years, according to Hemisphere training slides bearing the logo of the White House Office of National Drug Control Policy. Some four billion call records are added to the database every day, the slides say; technical specialists say a single call may generate more than one record. Unlike the N.S.A. data, the Hemisphere data includes information on the locations of callers.
The slides were given to The New York Times by Drew Hendricks, a peace activist in Port Hadlock, Wash. He said he had received the PowerPoint presentation, which is unclassified but marked “Law enforcement sensitive,” in response to a series of public information requests to West Coast police agencies.
The program was started in 2007, according to the slides, and has been carried out in great secrecy.
“All requestors are instructed to never refer to Hemisphere in any official document,” one slide says. A search of the Nexis database found no reference to the program in news reports or Congressional hearings.
The Obama administration acknowledged the extraordinary scale of the Hemisphere database and the unusual embedding of AT&T employees in government drug units in three states.
But they said the project, which has proved especially useful in finding criminals who discard cellphones frequently to thwart government tracking, employed routine investigative procedures used in criminal cases for decades and posed no novel privacy issues.
Crucially, they said, the phone data is stored by AT&T, and not by the government as in the N.S.A. program. It is queried for phone numbers of interest mainly using what are called “administrative subpoenas,” those issued not by a grand jury or a judge but by a federal agency, in this case the D.E.A.
Brian Fallon, a Justice Department spokesman, said in a statement that “subpoenaing drug dealers’ phone records is a bread-and-butter tactic in the course of criminal investigations.”
Mr. Fallon said that “the records are maintained at all times by the phone company, not the government,” and that Hemisphere “simply streamlines the process of serving the subpoena to the phone company so law enforcement can quickly keep up with drug dealers when they switch phone numbers to try to avoid detection.”
He said that the program was paid for by the D.E.A. and the White House drug policy office but that the cost was not immediately available.
Officials said four AT&T employees are now working in what is called the High Intensity Drug Trafficking Area program, which brings together D.E.A. and local investigators — two in the program’s Atlanta office and one each in Houston and Los Angeles.
Daniel C. Richman, a law professor at Columbia, said he sympathized with the government’s argument that it needs such voluminous data to catch criminals in the era of disposable cellphones.
“Is this a massive change in the way the government operates? No,” said Mr. Richman, who worked as a federal drug prosecutor in Manhattan in the early 1990s. “Actually you could say that it’s a desperate effort by the government to catch up.”
But Mr. Richman said the program at least touched on an unresolved Fourth Amendment question: whether mere government possession of huge amounts of private data, rather than its actual use, may trespass on the amendment’s requirement that searches be “reasonable.” Even though the data resides with AT&T, the deep interest and involvement of the government in its storage may raise constitutional issues, he said.
Jameel Jaffer, deputy legal director of the American Civil Liberties Union, said the 27-slide PowerPoint presentation, evidently updated this year to train AT&T employees for the program, “certainly raises profound privacy concerns.”
“I’d speculate that one reason for the secrecy of the program is that it would be very hard to justify it to the public or the courts,” he said.
Mr. Jaffer said that while the database remained in AT&T’s possession, “the integration of government agents into the process means there are serious Fourth Amendment concerns.”
Mr. Hendricks filed the public records requests while assisting other activists who have filed a federal lawsuit saying that a civilian intelligence analyst at an Army base near Tacoma infiltrated and spied on antiwar groups. (Federal officials confirmed that the slides are authentic.)
Mark A. Siegel, a spokesman for AT&T, declined to answer more than a dozen detailed questions, including ones about what percentage of phone calls made in the United States were covered by Hemisphere, the size of the Hemisphere database, whether the AT&T employees working on Hemisphere had security clearances and whether the company has conducted any legal review of the program
“While we cannot comment on any particular matter, we, like all other companies, must respond to valid subpoenas issued by law enforcement,” Mr. Siegel wrote in an e-mail.
Representatives from Verizon, Sprint and T-Mobile all declined to comment on Sunday in response to questions about whether their companies were aware of Hemisphere or participated in that program or similar ones. A federal law enforcement official said that the Hemisphere Project was “singular” and that he knew of no comparable program involving other phone companies.
The PowerPoint slides outline several “success stories” highlighting the program’s achievements and showing that it is used in investigating a range of crimes, not just drug violations. The slides emphasize the program’s value in tracing suspects who use replacement phones, sometimes called “burner” phones, who switch phone numbers or who are otherwise difficult to locate or identify.
In March 2013, for instance, Hemisphere found the new phone number and location of a man who impersonated a general at a San Diego Navy base and then ran over a Navy intelligence agent. A month earlier the program helped catch a South Carolina woman who had made a series of bomb threats.
And in Seattle in 2011, the document says, Hemisphere tracked drug dealers who were rotating prepaid phones, leading to the seizure of 136 kilos of cocaine and $2.2 million.
September 1, 2013
By SCOTT SHANE and COLIN MOYNIHAN
Find this story at 1 September 2013
© 2013 The New York Times Company
Release of DEA Agent Kiki Camarena’s “Murderer” Is Game Changer for CIA6 september 2013
Narco-Trafficker Rafael Caro Quintero Knows Where All the Skeletons Are Buried in the US’ Dirty Drug War
The recent release from a Mexican prison of Rafael Caro Quintero — a godfather in Mexico’s narco-trafficking world — rips a scab off a long metastasizing tumor in the US drug war.
A Mexican federal court on Friday, Aug. 9, overturned Caro Quintero’s 40-year sentence after 28 years served because, the court contends, he was tried wrongly in a federal court for a state offense. Caro Quintero was convicted of orchestrating the brutal torture and murder of US DEA agent Enrique “Kiki” Camarena — who was abducted on Feb. 7, 1985, after leaving the US Consulate in Guadalajara, Mexico, to meet his wife for lunch. His body was found several weeks later buried in a shallow grave some 70 miles north of Guadalajara.
Caro Quintero’s release from prison brings to the surface once again some longstanding, unsettled questions about the US government’s role in the war on drugs. The recent mainstream media coverage of Caro Quintero’s release has focused, in the main, on the shock and anger of US officials — who are now waving the Camarena case in the public arena like a bloody flag, arguing his honor, and that of the nation’s, must be avenged in the wake of Mexico’s affront in allowing Caro Quintero to walk free.
What is not being discussed is the US government’s complicity in Caro Quintero’s narco-trafficking business, and, yes, even in the Camarena’s gruesome murder.
Breaking It Down
In his definitive book about the US drug war, titled “Down by the River,” journalist Charles Bowden reveals that DEA special agent Camarena spent some time in Mexico with another DEA agent, Phil Jordan, in May 1984, prior to Camarena’s abduction. Jordan, at the time, pointed out to Camarena that they were being followed.
Camarena replied calmly that the individuals who were tailing them worked for Mexico’s intelligence service, the Federal Security Directorate, or DFS in its Spanish initials.
From Bowden’s book:
Camarena brushes off Jordan’s alarm by noting that DFS is trained by the CIA and is functionally a unit in their mysterious work. And he says they are also functionally “the eyes and ears of the cartels.”
That is a stunning revelation, that the CIA and DFS were “functionally” working in unison and simultaneously the DFS also was in league with Mexico’s narco-traffickers — which at the time included Caro Quintero along with his partners Miguel Angel Felix Gallardo and Ernesto Fonseca Carrillo, considered the top dogs in Mexico’s then-dominate drug organization, The Guadalajara Cartel.
In fact, the DFS also was accused of being complicit in the kidnapping and murder of Camarena and the subsequent attempt to provide protection to Caro Quintero — who was eventually apprehended in Costa Rica after allegedly getting to that country with the help of the DFS.
Caro Quintero and Fonseca Carrillo were eventually convicted and jailed for their roles in Camarena’s murder and the killing of his pilot, Alfrado Zavala Avelar. Each was sentenced to serve 40 years in a Mexican prison. Caro Quintero was 37 at the time.
But Camarena was not the only victim of DFS corruption during that era. A famous Mexican journalist, Manuel Buendia, who in the mid-1980s was investigating the connections between corrupt Mexican officials and narco-traffickers, including Caro Quintero, was murdered in 1984 allegedly with the assistance of DFS’ leadership.
A story by noted Mexican newspaper columnist Carlos Ramirez, translated and published by Narco News in 2000, describes the circumstances surrounding Buendia’s murder as follows:
Buendía was assassinated on May 30, 1984, on a street near the Zona Rosa of México City. The investigation was covered-up by the Federal Security Agency [DFS]. The last investigations undertaken by Buendía into drug trafficking led him into the rural indigenous areas of the country. Buendía had responded to a newspaper ad by the Catholic bishops in the south of the country where they denounced the penetration of the narco in rural Mexico but also the complicity of the Army and police corps.
Buendía did not finish his investigation. His assassination came almost a year before… the assassination of US anti-drug agent Enrique Camarena Salazar in Guadalajara had exposed the penetration of drug traffickers in the Mexican police.
… Agents of the the Political and Social Investigations Agency and of the Federal Security Agency were discovered as protectors of drug trafficking in México. The Attorney General of the Republic, in the investigation of the assassination of Camarena, found credentials of the Federal Security police in the name of drug traffickers. Caro Quintero escaped to Costa Rica using a credential of the Federal Security Agency [DFS] with his photo but with another name. ….
That which Buendía was investigating months before was confirmed by the assassination of Camerena, a DEA agent assigned to the US Consulate in Guadalajara. …
Documents
The DFS was disbanded in 1985, after Camarena’s murder, and integrated into Mexico’s version of the CIA, called CISEN in its Spanish initials. CISEN still works closely with US agencies and officials, including the CIA, but it is the legacy of DFS and its partnership with the CIA that is being brought to the surface once again with the recent release of Caro Quintero.
In particular, a DEA Report of Investigation, prepared in February 1990 and obtained by Narco News, provides some detailed insight into the DFS/CIA connection. The DEA report was referenced in media coverage of the US trial of four individuals accused of playing a role in Camarena’s murder.
From a July 5, 1990, report in the Los Angeles Times:
The [DEA] report is based on an interview two Los-Angeles based DEA agents conducted with Laurence Victor Harrison, a shadowy figure who, according to court testimony, ran a sophisticated communications network for major Mexican drug traffickers and their allies in Mexican law enforcement in the early and mid 1980s.
On Feb. 9, according to the report, Harrison told DEA agents Hector Berrellez and Wayne Schmidt that the CIA used Mexico’s Federal Security Directorate (DFS) “as a cover, in the event any questions were raised as to who was running the training operation.”
That training operation, according to the DEA Report of Investigation, involved “Guatemalan Guerrillas” who “were training at a ranch owned by Rafael Caro-Quintero” in Veracruz on Mexico’s East Coast.
More from the DEA report:
The operations/training at the camp were conducted by the American CIA, using the DFS as cover, in the event any questions were raised as to who was running the [camp].
…. Representatives of the DFS, which was the front for the training camp were in fact acting in consort with major drug overlords to insure a flow of narcotics through Mexico and into the United States.
… Using the DFS as cover, the CIA established and maintained clandestine airfields to refuel aircraft loaded with weapons, which were destined for Honduras and Nicaragua.
Pilots of these aircrafts would allegedly load up with cocaine in Barranquilla, Colombia, and in route to Miami, Florida, refuel in Mexico at narcotic trafficker operated and CIA maintained airstrips.
Tosh Plumlee was one of the CIA contract pilots flying drug loads into the US at the time. Plumlee told Narco News that among the places where his aircraft landed while working these missions was the Caro Quintero-owned ranch in Veracruz, Mexico.
“I was flying sanctioned operations transporting cocaine out of Colombia and into the United States,” Plumlee says. “[DEA agent Kiki] Camarena knew all about those operations.”
Plumlee attempted to blow the whistle on the arms-and-drugs transshipment operations in the early 1980s, prior to Camarena’s death.
The following excerpts are from a February 1991 letter written by former US Sen. Gary Hart and sent to US Sen. John Kerry, then chairman of the Subcommittee on Terrorism, Narcotics and International Communications.
In March of 1983, Plumlee contacted my Denver Senate Office and met with Mr. Bill Holen of my Senate Staff. During the initial meeting, Mr. Plumlee raised certain allegations concerning U.S. foreign and military policy toward Nicaragua and the use of covert activities by U.S. Intelligence agencies.
… Mr. Plumlee also stated that Mexico, Costa Rica, Guatemala and El Salvador were providing U.S. military personnel access to secret landing field and various staging areas scattered throughout Central America.
He specifically cited the Mexican government’s direct knowledge of illegal arms shipments and narcotic smuggling activities that were taking place out of a civilian ranch in the Veracruz area which were under the control and sponsorship of Rafael Caro-Quintero and the Luis Jorge Ochoa branch of the Medellin Escobar Cartel.
… Mr. Plumlee raised several issues including that covert U.S. intelligence agencies were directly involved in the smuggling and distribution of drugs to raise funds for covert military operations against the government of Nicaragua. …
Heads in the Sand
Even prior to Caro Quintero’s surprise prison release on Aug. 9, it appears he was being allowed to carry out his narco-business from a comfortable jailhouse condo with little interference from authorities in Mexico. As evidence of that fact, in June of this year DEA announced that the US Department of the Treasury had “designated 18 individuals and 15 [business] entities” as being linked to Rafael Caro Quintero.
“Today’s action,” the DEA press release states, “pursuant to the Kingpin Act, generally prohibits US persons from conducting financial or commercial transactions with these designees, and also freezes any assets they may have under US jurisdiction.”
In other words, the US government is alleging that even while he was incarcerated, Caro Quintero continued to run his drug empire through third parties who were laundering millions of dollars in ill-gotten gains on his behalf.
How is that possible, unless Caro Quintero continues to have extremely good connections within the Mexican government that have an interest in assuring his drug money is laundered?
If that’s the case, why would those same government officials have any interest in extraditing him to the US to stand trial?
Similarly, why would those with any real juice in the US government want to put Caro Quintero on trial, at least in an open court, if he has the knowledge to expose corrupt covert US operations that played a role in the murder of a US DEA agent?
The only way to hide that complicity would be to shield Caro Quintero’s trial from public view under a national-security cloak — even though the charges against him are criminal in nature (drug-trafficking and murder) and should not implicate national security. As further evidence of that fact, the CIA has already told the media that the allegations about the Agency’s involvement in Caro Quintero’s Veracruz ranch are bogus.
”The whole story is nonsense,” CIA spokesman Mark Mansfield told the Associated Press in 1990. ”We have not trained Guatemalan guerrillas on that ranch or anywhere else.”
But its worth noting that since the CIA issued that statement, a UN-sponsored truth commission found that the US, through agencies like the CIA, did play a role in training the death squads responsible for murdering or disappearing some 200,000 Guatemalans – most of them civilians – during the course of that nation’s bloody 34-year civil war. Some 626 massacres played out in the 1980s alone, when the CIA-sponsored Veracruz, Mexico, “Guatemalan Guerrilas” training operation was allegedly underway.
From a 1999 Washington Post story on the truth commission’s findings:
… The commission found that the “government of the United States, through various agencies including the CIA, provided direct and indirect support for some state operations.”
… Documenting the atrocities, the report found the army “completely exterminated Mayan communities, destroyed their dwellings, livestock and crops” and said that in the northern part of the country, where the Mayan population is largest, the army carried out a systematic campaign of “genocide.”
Given that backdrop, it appears Caro Quintero, now 61, is clearly a man who may well know too much about US national security operations.
The DEA issued a statement after Caro Quintero was ordered released from prison, making it clear, at least from a public-relations perspective, that the agency still very much wants to track him down and put him behind bars in the US.
The Drug Enforcement Administration is deeply troubled to learn of the decision by a Mexican court to release infamous drug trafficker Rafael Caro-Quintero from a Mexican prison. Caro-Quintero had been serving a 40 year prison sentence in connection with the kidnapping, torture and murder of DEA Special Agent Enrique “Kiki” Camarena in February 1985.
Caro-Quintero was the mastermind and organizer of this atrocious act. We are reminded every day of the ultimate sacrifice paid by Special Agent Camarena and DEA will vigorously continue its efforts to ensure Caro-Quintero faces charges in the United States for the crimes he committed.
But why stop with Caro Quintero? Why not go after everyone who had a hand in the drug-war corruption that led to Camarena’s death? Why isn’t DEA clamoring for that outcome?
I think we all know the answer to that question. And you can bet Caro Quintero does as well, and will do everything in is power to assure he isn’t held up as the lone scapegoat in some drug-war fairy tale.
So what are our drug-war warriors to do when faced with such a house of mirrors? Well, that’s what rival narco-traffickers and shadowy intelligence-agency assets are used for in the Big Game, no?
Posted by Bill Conroy – August 10, 2013 at 10:17 pm
Find this story at 10 August 2013
Our Policy on Comment Submissions: Co-publishers of Narco News (which includes The Narcosphere and The Field) may post comments without moderation. A ll co-publishers comment under their real name, have contributed resources or volunteer labor to this project, have filled out this application and agreed to some simple guidelines about commenting.
Narco News has recently opened its comments section for submissions to moderated comments (that’s this box, here) by everybody else. More than 95 percent of all submitted comments are typically approved, because they are on-topic, coherent, don’t spread false claims or rumors, don’t gratuitously insult other commenters, and don’t engage in commerce, spam or otherwise hijack the thread. Narco News reserves the right to reject any comment for any reason, so, especially if you choose to comment anonymously, the burden is on you to make your comment interesting and relev ant. That said, as you can see, hundreds of comments are approved each week here. Good luck in your comment submission!
The NSA-DEA police state tango; This week’s DEA bombshell shows us how the drug war and the terror war have poisoned our justice system6 september 2013
So the paranoid hippie pot dealer you knew in college was right all along: The feds really were after him. In the latest post-Snowden bombshell about the extent and consequences of government spying, we learned from Reuters reporters this week that a secret branch of the DEA called the Special Operations Division – so secret that nearly everything about it is classified, including the size of its budget and the location of its office — has been using the immense pools of data collected by the NSA, CIA, FBI and other intelligence agencies to go after American citizens for ordinary drug crimes. Law enforcement agencies, meanwhile, have been coached to conceal the existence of the program and the source of the information by creating what’s called a “parallel construction,” a fake or misleading trail of evidence. So no one in the court system – not the defendant or the defense attorney, not even the prosecutor or the judge – can ever trace the case back to its true origins.
On one hand, we all knew more revelations were coming, and the idea that the government would go after drug suspects with the same dubious extrajudicial methods used to pursue terrorism suspects is a classic and not terribly surprising example of mission creep. Both groups have been held up as bogeymen for years, in order to scare the public into accepting ever nastier and more repressive laws. This gives government officials another chance to talk to us in their stern grown-up voices about how this isn’t civics class, and sometimes they have to bend the rules to catch Really Bad People.
On the other hand, this is a genuinely sinister turn of events with a whiff of science-fiction nightmare, one that has sounded loud alarm bells for many people in the mainstream legal world. Nancy Gertner, a Harvard Law professor who spent 18 years as a federal judge and cannot be accused of being a radical, told Reuters she finds the DEA story more troubling than anything in Edward Snowden’s NSA leaks. It’s the first clear evidence that the “special rules” and disregard for constitutional law that have characterized the hunt for so-called terrorists have crept into the domestic criminal justice system on a significant scale. “It sounds like they are phonying up investigations,” she said. Maybe this is how a police state comes to America: Not with a bang, but with a parallel construction.
By Andrew O’Hehir
Saturday, Aug 10, 2013 06:30 PM +0200
Find this story at 10 August 2013
Copyright © 2013 Salon Media Group, Inc.
Exclusive: IRS manual detailed DEA’s use of hidden intel evidence6 september 2013
WASHINGTON (Reuters) – Details of a U.S. Drug Enforcement Administration program that feeds tips to federal agents and then instructs them to alter the investigative trail were published in a manual used by agents of the Internal Revenue Service for two years.
The practice of recreating the investigative trail, highly criticized by former prosecutors and defense lawyers after Reuters reported it this week, is now under review by the Justice Department. Two high-profile Republicans have also raised questions about the procedure.
A 350-word entry in the Internal Revenue Manual instructed agents of the U.S. tax agency to omit any reference to tips supplied by the DEA’s Special Operations Division, especially from affidavits, court proceedings or investigative files. The entry was published and posted online in 2005 and 2006, and was removed in early 2007. The IRS is among two dozen arms of the government working with the Special Operations Division, including the Federal Bureau of Investigation, the National Security Agency and the Central Intelligence Agency.
An IRS spokesman had no comment on the entry or on why it was removed from the manual. Reuters recovered the previous editions from the archives of the Westlaw legal database, which is owned by Thomson Reuters Corp, the parent of this news agency.
As Reuters reported Monday, the Special Operations Division of the DEA funnels information from overseas NSA intercepts, domestic wiretaps, informants and a large DEA database of telephone records to authorities nationwide to help them launch criminal investigations of Americans. The DEA phone database is distinct from a NSA database disclosed by former NSA contractor Edward Snowden.
Monday’s Reuters report cited internal government documents that show that law enforcement agents have been trained to conceal how such investigations truly begin – to “recreate” the investigative trail to effectively cover up the original source of the information.
DEA officials said the practice is legal and has been in near-daily use since the 1990s. They have said that its purpose is to protect sources and methods, not to withhold evidence.
NEW DETAIL
Defense attorneys and some former judges and prosecutors say that systematically hiding potential evidence from defendants violates the U.S. Constitution. According to documents and interviews, agents use a procedure they call “parallel construction” to recreate the investigative trail, stating in affidavits or in court, for example, that an investigation began with a traffic infraction rather than an SOD tip.
The IRS document offers further detail on the parallel construction program.
“Special Operations Division has the ability to collect, collate, analyze, evaluate, and disseminate information and intelligence derived from worldwide multi-agency sources, including classified projects,” the IRS document says. “SOD converts extremely sensitive information into usable leads and tips which are then passed to the field offices for real-time enforcement activity against major international drug trafficking organizations.”
The 2005 IRS document focuses on SOD tips that are classified and notes that the Justice Department “closely guards the information provided by SOD with strict oversight.” While the IRS document says that SOD information may only be used for drug investigations, DEA officials said the SOD role has recently expanded to organized crime and money laundering.
According to the document, IRS agents are directed to use the tips to find new, “independent” evidence: “Usable information regarding these leads must be developed from such independent sources as investigative files, subscriber and toll requests, physical surveillance, wire intercepts, and confidential source information. Information obtained from SOD in response to a search or query request cannot be used directly in any investigation (i.e. cannot be used in affidavits, court proceedings or maintained in investigative files).”
The IRS document makes no reference to SOD’s sources of information, which include a large DEA telephone and Internet database.
CONCERN IN CONGRESS
House Intelligence Committee Chairman Mike Rogers, R-Michigan, expressed concern with the concept of parallel construction as a method to hide the origin of an investigation. His comments came on the Mike Huckabee Show radio program.
“If they’re recreating a trail, that’s wrong and we’re going to have to do something about it,” said Rogers, a former FBI agent. “We’re working with the DEA and intelligence organizations to try to find out exactly what that story is.”
Spokespeople for the DEA and the Department of Justice declined to comment.
Sen. Rand Paul, R-Kentucky, a member of the Homeland Security and Government Affairs Committee, said he was troubled that DEA agents have been “trying to cover up a program that investigates Americans.”
“National security is one of government’s most important functions. So is protecting individual liberty,” Paul said. “If the Constitution still has any sway, a government that is constantly overreaching on security while completely neglecting liberty is in grave violation of our founding doctrine.”
Officials have stressed that the NSA and DEA telephone databases are distinct. The NSA database, disclosed by Snowden, includes data about every telephone call placed inside the United States. An NSA official said that database is not used for domestic criminal law enforcement.
The DEA database, called DICE, consists largely of phone log and Internet data gathered legally by the DEA through subpoenas, arrests and search warrants nationwide. DICE includes about 1 billion records, and they are kept for about a year and then purged, DEA officials said.
(Research by Hilary Shroyer of West, a Thomson Reuters business. Additional reporting by David Lawder. Edited by Michael Williams)
© Thomson Reuters 2011. All rights reserved. Users may download and print extracts of content from this website for their own personal and non-commercial use only. Republication or redistribution of Thomson Reuters content, including by framing or similar means, is expressly prohibited without the prior written consent of Thomson Reuters. Thomson Reuters and its logo are registered trademarks or trademarks of the Thomson Reuters group of companies around the world.
Thomson Reuters journalists are subject to an Editorial Handbook which requires fair presentation and disclosure of relevant interests.
Wed, Aug 7 2013
By John Shiffman and David Ingram
Find this story at 7 August 2013
© Thomson Reuters
DEA and NSA Team Up to Share Intelligence, Leading to Secret Use of Surveillance in Ordinary Investigations6 september 2013
UPDATE: Add the IRS to the list of federal agencies obtaining information from NSA surveillance. Reuters reports that the IRS got intelligence tips from DEA’s secret unit (SOD) and were also told to cover up the source of that information by coming up with their own independent leads to recreate the information obtained from SOD. So that makes two levels of deception: SOD hiding the fact it got intelligence from the NSA and the IRS hiding the fact it got information from SOD. Even worse, there’s a suggestion that the Justice Department (DOJ) “closely guards the information provided by SOD with strict oversight,” shedding doubt into the effectiveness of DOJ earlier announced efforts to investigate the program.
A startling new Reuters story shows one of the biggest dangers of the surveillance state: the unquenchable thirst for access to the NSA’s trove of information by other law enforcement agencies.
As the NSA scoops up phone records and other forms of electronic evidence while investigating national security and terrorism leads, they turn over “tips” to a division of the Drug Enforcement Agency (“DEA”) known as the Special Operations Division (“SOD”). FISA surveillance was originally supposed to be used only in certain specific, authorized national security investigations, but information sharing rules implemented after 9/11 allows the NSA to hand over information to traditional domestic law-enforcement agencies, without any connection to terrorism or national security investigations.
But instead of being truthful with criminal defendants, judges, and even prosecutors about where the information came from, DEA agents are reportedly obscuring the source of these tips. For example, a law enforcement agent could receive a tip from SOD—which SOD, in turn, got from the NSA—to look for a specific car at a certain place. But instead of relying solely on that tip, the agent would be instructed to find his or her own reason to stop and search the car. Agents are directed to keep SOD under wraps and not mention it in “investigative reports, affidavits, discussions with prosecutors and courtroom testimony,” according to Reuters.
“Parallel construction” is really intelligence laundering
The government calls the practice “parallel construction,” but deciphering their double speak, the practice should really be known as “intelligence laundering.” This deception and dishonesty raises a host of serious legal problems.
First, the SOD’s insulation from even judges and prosecutors stops federal courts from assessing the constitutionality of the government’s surveillance practices. Last year, Solicitor General Donald Verilli told the Supreme Court that a group of lawyers, journalists and human rights advocates who regularly communicate with targets of NSA wiretapping under the FISA Amendments Act (FAA) had no standing to challenge the constitutionality of that surveillance. But Verrilli said that if the government wanted to use FAA evidence in a criminal prosecution, the source of the information would have to be disclosed. When the Supreme Court eventually ruled in the government’s favor, finding the plaintiffs had no standing, it justified its holding by noting the government’s concession that it would inform litigants when FAA evidence was being used against them.
Although the government has been initially slow to follow up on Verrilli’s promises, it has begrudgingly acknowledged its obligation to disclose when it uses the FAA to obtain evidence against criminal defendants. Just last week DOJ informed a federal court in Miami that it was required to disclose when FAA evidence was used to build a terrorism case against a criminal defendant.
Terrorism cases make up a very small portion of the total number of criminal cases brought by the federal government, counting for just 0.4 percent of all criminal cases brought by all U.S. Attorney offices across the country in 2012. Drug cases, on the other hand, made up 20 percent of all federal criminal cases filed in 2012, the second most prosecuted type of crime after immigration cases. If the government acknowledges it has to disclose when FAA evidence has been used to make a drug case—even if it’s a tip leading to a pretextual traffic stop—the number of challenges to FAA evidence will increase dramatically.
SOD bypasses the Constitution
Even beyond the larger systemic problem of insulating NSA surveillance from judicial review, criminal defendants whose arrest or case is built upon FISA evidence are now deprived of their right to examine and challenge the evidence used against them.
Taken together, the Fifth and Sixth Amendments guarantee a criminal defendant a meaningful opportunity to present a defense and challenge the government’s case. But this intelligence laundering deprives defendants of these important constitutional protections. It makes it harder for prosecutors to comply with their ethical obligation under Brady v. Maryland to disclose any exculpatory or favorable evidence to the defense—an obligation that extends to disclosing evidence bearing on the reliability of a government witness. Hiding the source of information used by the government to initiate an investigation or make an arrest means defendants are deprived of the opportunity to challenge the accuracy or veracity of the government’s investigation, let alone seek out favorable evidence in the government’s possession.
Courts must have all the facts
The third major legal problem is that the practice suggests DEA agents are misleading the courts. Wiretaps, search warrants, and other forms of surveillance authorizations require law enforcement to go to a judge and lay out the facts that support the request. The court’s function is to scrutinize the facts to determine the appropriate legal standard has been met based on truthful, reliable evidence. So, for example, if the government is using evidence gathered from an informant to support its request for a search warrant, it has to establish to the court that the informant is reliable and trustworthy so that the court can be convinced there is probable cause to support the search. But when law enforcement omits integral facts—like the source of a tip used to make an arrest—the court is deprived of the opportunity to fulfill its traditional role and searches are signed off without the full knowledge of the court.
Ultimately, if you build it, they will come. There’s no doubt that once word got out about the breadth of data the NSA was collecting and storing, other law enforcement agencies would want to get their hands in the digital cookie jar. In fact, the New York Times reported on Sunday that other agencies have tried to get information from the NSA to “curb drug trafficking, cyberattacks, money laundering, counterfeiting and even copyright infringement.”
Teaming up to play fast and loose with criminal defendants and the court, the DEA and NSA have made a mockery of the rule of law and the legal frameworks intended to curb abuses.
August 6, 2013 | By Hanni Fakhoury
Find this story at 6 August 2013
© www.eff.org
A Domestic Surveillance Scandal at the DEA? Agents Urged to Cover Up Use of NSA Intel in Drug Probes6 september 2013
The U.S. Department of Justice has begun reviewing a controversial unit inside the Drug Enforcement Administration that uses secret domestic surveillance tactics — including intelligence gathered by the National Security Agency — to target Americans for drug offenses. According to a series of articles published by Reuters, agents are instructed to recreate the investigative trail in order to conceal the origins of the evidence, not only from defense lawyers, but also sometimes from prosecutors and judges. “We are talking about ordinary crime: drug dealing, organized crime, money laundering. We are not talking about national security crimes,” says Reuters reporter John Shiffman. Ethan Nadelmann, executive director of the Drug Policy Alliance, says this is just the latest scandal at the DEA. “I hope it is a sort of wake-up call for people in Congress to say now is the time, finally, after 40 years, to say this agency really needs a close examination.”
Transcript
This is a rush transcript. Copy may not be in its final form.
AMY GOODMAN: The Justice Department has begun reviewing a controversial unit inside the U.S. Drug Enforcement Administration that uses secret domestic surveillance tactics, including intelligence gathered by the National Security Agency, to target Americans for drug offenses. According to a series of articles published by the Reuters news agency, agents are instructed to recreate the investigative trail in order to conceal the origins of the evidence—not only from defense lawyers but also sometimes from prosecutors and judges. DEA training documents instruct agents to even make up alternative versions of how such investigations truly begin, a process known as “parallel construction.”
On Monday, White House Press Secretary Jay Carney was asked about the Reuters investigation.
PRESS SECRETARY JAY CARNEY: It’s my understanding, our understanding, that the Department of Justice is looking at some of the issues raised in the story. But for more, I would refer you to the Department of Justice.
AMY GOODMAN: The unit of the DEA that distributes the secret intelligence to agents is called the Special Operations Division, or SOD. Two dozen partner agencies comprise the unit, including the FBI, CIA, NSA, Internal Revenue Service and the Department of Homeland Security. The unit was first created two decades ago, but it’s coming under increased scrutiny following the recent revelations about the NSA maintaining a database of all phone calls made in the United States. One former federal judge, Nancy Gertner, said the DEA program sounds more troubling than recent disclosures that the NSA has been collecting domestic phone records. She said, quote, “It is one thing to create special rules for national security. Ordinary crime is entirely different. It sounds like they are phonying up investigations.”
For more, we’re joined by the reporter who broke this story, John Shiffman, correspondent for Reuters, which published his exclusive story Monday, “U.S. Tells Agents to Cover Up Use of Wiretap Program.”
Welcome to Democracy Now!, John. Why don’t you start off by just laying it out and what exactly this cover-up is.
JOHN SHIFFMAN: Thanks very much for having me.
Well, my colleague Kristina Cooke and I spoke with about a dozen or two dozen agents and obtained some internal documents that showed that what federal agents, not just DEA agents but other agents who work with the DEA and do drug investigations—what they’re doing is, is they are starting—they are claiming that their investigations start, say, at step two. They are withholding step one from the investigations. And, I should say, it’s not just NSA intercepts. It’s informant information, information obtained from court-ordered wiretaps in one case, and using those for information in a second case. They also have a large database of phone records. Whenever the DEA subpoenas or does a search warrant and gets phone records for someone suspected of involvement in drugs or gang involvement, they put all those numbers into one giant database they call DICE, and they use that information to compare different cases. All of the collection is—seems perfectly legitimate, in terms of being court-ordered. What troubles some critics is the fact that they are hiding that information from drug defendants who face trial. The problem with that is that—is that these defendants won’t know about some potentially exculpatory information that may affect their case and their right to a fair trial.
AMY GOODMAN: So explain exactly how this information is being hidden from judges, prosecutors and sometimes defense attorneys, as well.
JOHN SHIFFMAN: Sure. Well, just to give an example, through any of these four different ways, including the NSA intercepts, the DEA’s Special Operations Division will send the information to a DEA agent in the field or a FBI agent or an ICE agent or state policeman, and they’ll give him the information. Then they’ll say, “Look, you know, we understand that there will be a truck going to a certain park in Texas at a certain time. It’s a red truck. It’ll be two people involved.” And the state trooper or the DEA will find you reason to pull the truck over, say for a broken tail light or for speeding, that sort of thing. And, lo and behold, inside the trunk they’ll find, you know, a kilo of cocaine. The people who have been arrested will never know that—why the police or the DEA pulled them over. They’ll think it’s just luck. And that’s important because if those people try to go to trial, there are pieces of information about how that evidence was obtained and what it shows and what other pieces of it show—might affect their trial.
AMY GOODMAN: On Monday, I spoke with Guardian columnist Glenn Greenwald just after your story broke about how the DEA is using material gathered in part by the NSA in its surveillance of Americans. Glenn Greenwald has, of course, broken several major stories about the NSA’s domestic activity. This was his response.
GLENN GREENWALD: So this should be a huge scandal for the following reason. The essence of the Constitution is that the government cannot obtain evidence or information about you unless it has probable cause to believe that you’ve engaged in a crime and then goes to a court and gets a warrant. And only then is that evidence usable in a prosecution against you. What this secret agency is doing, according to Reuters, it is circumventing that process by gathering all kinds of information without any court supervision, without any oversight at all, using surveillance technologies and other forms of domestic spying. And then, when it gets this information that it believes it can be used in a criminal prosecution, it knows that that information can’t be used in a criminal prosecution because it’s been acquired outside of the legal and constitutional process, so they cover up how they really got it, and they pretend—they make it seem as though they really got it through legal and normal means, by then going back and retracing the investigation, once they already have it, and re-acquiring it so that it looks to defense counsel and even to judges and prosecutors like it really was done in the constitutionally permissible way. So they’re prosecuting people and putting people in prison for using evidence that they’ve acquired illegally, which they’re then covering up and lying about and deceiving courts into believing was actually acquired constitutionally. It’s a full-frontal assault on the Fourth, Fifth and Sixth Amendments and on the integrity of the judicial process, because they’re deceiving everyone involved in criminal prosecutions about how this information has been obtained.
AMY GOODMAN: John Shiffman, if you could elaborate on that and also talk about the differences between what the DEA is doing and what Glenn Greenwald exposed around the NSA?
JOHN SHIFFMAN: Sure. These are two very—I think they’re different topics, for one main reason, which is that the NSA revelations by Mr. Greenwald and Mr. Snowden are related to terrorism—or at least that’s what we’re told by the government. And the DEA, what the DEA is doing is only—very rarely do they get involved in terrorism. I mean, they do some narcoterrorism, but inside the United States we’re talking about ordinary crime. We’re talking about drug dealing, organized crime, money laundering. We’re not talking about national security crimes.
The one thing I would say is that the defense analysts I’ve spoken with, meaning defense attorney analysts, they emphasize less the probable cause aspect of it than they find—they don’t find that as troubling. What they find really troubling is the pretrial discovery aspects of this and a prosecutor’s, you know, obligation to turn over any exculpatory evidence. What they really have a problem with is that this program systematically excludes or appears to systematically exclude all evidence obtained, you know, that’s hidden from view, so the defense doesn’t know to request it. They find that a lot more troubling than the probable cause aspects of it. The Supreme Court has given a pretty wide pro-police interpretation of when probable cause can be obtained, and there are a variety of exceptions. But it’s really the pretrial discovery part of it that seems to trouble a lot of the former judges and defense attorneys and prosecutors.
AMY GOODMAN: One of the two slides Reuters obtained that were used to train agents with the Drug Enforcement Agency instructs them in the use of parallel construction. According to the slide, this is, quote, “the use of normal investigative techniques to recreate the information provided by the [Special Operations Division],” such as subpoenaed domestic telephone calls. A second slide instructs agents that such evidence, quote, “cannot be revealed or discussed.” The slide is titled “Special Operations Division Rules.” Describe what you uncovered about those rules and this concept of parallel construction, which until now had not been publicly discussed in writing.
JOHN SHIFFMAN: Well, what really surprised me was talking to agents, current and former agents, who said, “Sure, we do that.” They—half of them said, “Yeah, you know, I could see how people might have a problem with that.” The other half said, “You know, look, this is a hard job that we do, and we’re going after criminals and drug dealers.” The people that got the most offended, I think, were the lawyers, the prosecutors and the—you know, and the judges and the former judges. One current prosecutor told me that he had a case where—in Florida, where a DEA agent came to him with a case and said that it began with an informant. So they were proceeding with the case, and the prosecutor asked the DEA agent more information. He said, you know, “I need to know more about your informant.” Turns out, ultimately, that he found out that there was no informant. It was an NSA wiretap. And what—overseas. And that really upset the prosecutor, because he said that it really offended his sense of fair play and honesty. And he said, “It’s just a bad way of starting an investigation, if you’re going to start with a lie.”
AMY GOODMAN: I wanted to bring Ethan Nadelmann into this discussion, executive director of the Drug Policy Alliance. Ethan, why is—are the revelations by Reuters, John Shiffman’s investigation, so significant for your work?
ETHAN NADELMANN: Well, I think what it plays into, Amy, is that there’s been this remarkable lack of oversight of DEA by Congress, by other federal oversight agencies, for decades now. I mean, this year marks the 40th anniversary of the DEA, which Nixon created as a merger of police agencies, of drug enforcement agencies, back during the—one of the earlier drug wars. And what you see is an organization with a budget of over $2 billion. You see an organization getting involved in all sorts of shenanigans, hiring informants who land up to be tied up with murderers, you know, locking up some poor drug—you know, I don’t think even drug dealer, drug—low-level offender, and forgetting about him in a prison cell in this case of Daniel Chong, who was left in a prison cell for five days and forgotten. But beyond that, you have the agency serving as a propaganda agency, with no—with none of its statements being compared or held to any sort of scientific standards. You have an administrator who testifies before Congress and is almost a laughing stock when it comes to talking about drugs. So I think that this report by Reuters and by John Shiffman—I hope it’s a sort of wake-up call for people in Congress to say, “Now is the time, finally, after really 40 years, to say this agency really needs a close examination.”
AMY GOODMAN: Ethan, the Drug Enforcement Administration has agreed to pay $4.1 million in a settlement to a San Diego college student who nearly lost his life after being left handcuffed in his cell for more than four days without food or water. He ultimately drank his urine as he lay there, yelling out to agents right outside. His name was Daniel Chong. He was arrested for a 420 celebration of marijuana culture. He was never charged with any crime, and ultimately he was released.
ETHAN NADELMANN: You know, I think—I mean, that’s the case I was mentioning before. I mean, part of—you know, one can say, “Oh, this is just an accident, and accidents happen.” But, of course, accidents like that should never happen when you’re talking about a police agency, much less a federal police agency, being allowed to just sort of forget about somebody. And in the end, what happens? The taxpayers bail out the DEA for almost killing somebody for no cause whatsoever. So, you know, each year the DEA goes through its own little, you know, appropriations hearings in Congress. Each year it gets approved. And each year they just sort of get a ride. I think these things are piling up in a way that can no longer be sustained—should no longer be sustained.
AMY GOODMAN: So what has been, John Shiffman, the response to your investigation by the DEA, by the NSA, by the FBI and others?
JOHN SHIFFMAN: Well, they say it’s perfectly legal, what they do. And they say that—one DEA official told us that, you know, “This is a bedrock principle, parallel construction. We use it every day.” They’re pretty unabashed about it and said that—you know, that they’ve been doing this since the late ’90s, and there’s really nothing wrong with it. Yesterday the Justice Department said they are going to review it. But DEA has said, you know, there’s no problem with this.
AMY GOODMAN: How many people does this impact?
JOHN SHIFFMAN: Well, it would impact—I would think it would impact everyone, because, you know, it’s—we’re talking about a principle of law here. Not to get too legal, but, I mean, if you’re arrested, one of the fundamental rights that you have is to see the evidence against you. You know, when I was at the DEA and doing the interview, they cited the Ted Stevens case, which involved prosecutorial misconduct, which had—in which the senator’s charges were thrown out, because evidence was concealed. They said that after that there had been a review of all of the discovery procedures throughout the Justice Department, including at Special Operations Division. But they said that—and so I asked, I said, “Great, can I see a copy of the review?” And they said, “No.”
AMY GOODMAN: So, Ethan Nadelmann, it’s all legal.
ETHAN NADELMANN: Well, you know, that’s what happens when any agency gets to just do what it wants to do for years and years and years without anybody looking over its shoulder. You know, I mean, Amy, this agency has also done things in the areas of medical marijuana, scientific research, the scheduling process of drugs, whereby they will go through an entirely legal process, through their own administrative law process hearings. It will have an internal judge, an administrative law judge, come down with recommendations that are scientifically based, that are credible, and then they will have the politically appointed head of this agency overrule those recommendations for no purpose whatsoever.
Once again, Congress is not asking any questions. It’s their job to look at the—I mean, obviously, it’s the Obama administration’s job, as well, and Eric Holder’s job, as well, but it’s ultimately Congress, as well, that has to care about these things. And I’m hoping that it’s not just Democrats in the Senate, but also Republicans in the House, who will say, “This agency has gone too far.” Republicans have never been great friends of overextensions of federal police power, and I hope they can find some common cause with Democrats, saying, “Wait a second. Let’s call the DEA in here. Let’s look at what—you know, what John Shiffman has found with his investigative report. Let’s look at all these other patterns of abuse and misbehavior.”
AMY GOODMAN: We want to thank you both for being with us, John Shiffman, for your reporting at Reuters, and Ethan Nadelmann. Thanks so much for joining us. We’ll link to the story at democracynow.org.
JOHN SHIFFMAN: Thanks.
AMY GOODMAN: Ethan Nadelmann, executive director of the Drug Policy Alliance. When we come back, we’re going to Richmond, California, to speak with the mayor. Stay with us.
Tuesday, August 6, 2013
Find this story at 6 August 2013
The original content of this program is licensed under a Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 United States License. Please attribute legal copies of this work to democracynow.org. Some of the work(s) that this program incorporates, however, may be separately licensed. For further information or additional permissions, contact us.
‘Everyday Racism’; Turkish Community Responds to NSU Report6 september 2013
The Turkish Community in Germany has published a report responding to a series of racist murders authorities failed to detect for years. The paper is intended to complement recommendations put forward by a parliamentary committee.
In response to recommendations published last week by a committee in the Bundestag, Germany’s federal parliament, the Turkish Community in Germany (TGD) has put out its own report on the crimes of the National Socialist Underground (NSU) — the murderous neo-Nazi terrorist cell uncovered nearly two years ago.
The 80-page report, presented by TGD chairman Kenan Kolat at a Berlin press conference on Tuesday, calls for Germans to develop “a new sensitivity for hidden forms of everyday prejudice”. It also advocates a complete overhaul of the country’s domestic security operations.
The NSU is believed to have committed 10 murders between 2000 and 2007, and eight of the victims were of Turkish origin. Rather than looking into racial motivations for the murders, police in a number of the slayings immediately suspected the victims were involved in organized crime and drug trafficking.
Time For Change
The TGD report, which was researched and co-authored by Hajo Funke — a well-known political scientist with a focus on right-wing extremism in Germany — suggests a fundamental overhaul of the country’s domestic security operations is necessary.
It recommends that the Federal Office for the Protection of the Constitution — the body tasked with gathering intelligence on racially motivated crimes in Germany — be disbanded. A new, independent and fully financed investigative body, as well as a series of new recruits with fresh ideas would be the only way to institute change, said Kolat.
Also notable among the Turkish Community’s recommendations is a proposed ban on racial profiling by police and other security officials, the elimination of the government’s large network of undercover informants within the far-right scene and the introduction of a permanent parliamentary committee tasked with overseeing racially motivated crime investigations. The report also suggests erecting a memorial site in the German capital to commemorate the victims.
An Institutional Problem
The news comes in response to a report issued last week by a committee of German lawmakers, detailing how members of the NSU were able to commit dozens of crimes without arousing the suspicion of law enforcement.
The report, which lays out 47 recommendations on how to improve the German state security system, has been heavily criticized. In addition to the fact that its suggestions are non-binding, critics also argue they would be difficult to implement on a nationwide basis. In Germany’s decentralized system of federal states, any kind of affirmative action program would face immense challenges.
The report also came under fire from lawyers representing the families of those murdered by the NSU for not addressing what they view as the “decisive problem” in the investigation into the slayings — namely “institutional racism” within the German police and government authorities. Sebastian Edathy, chairman of the parliamentary committee with the center-left Social Democratic Party (SPD), was quick to dismiss the criticism. “I wouldn’t refer to it as institutional racism,” he said in an interview with the Frankfurter Allgemeine Zeitung newspaper last week. “There were isolated cases of racists in our police force who do not belong there.”
‘Structural Racial Prejudices’
Although the Bundestag report does include one recommendation stating that “German society is diverse — and that this diversity should be reflected by the police authorities, who must also be able to competently deal with this diversity,” it does not make any explicit mention of the possibility of institutionalized racism within the police or government agencies. The only such comments come at the end of the report, where individual political parties provided responses.
Neither Merkel’s conservative Christian Democrats, her government’s junior coalition partner, the Free Democratic Party, nor the Green Party said anything in the report on the possibility of institutionalized racism. However, the opposition SPD and Left Party both commented extensively on the phenomenon — at least as it pertains to the NSU investigation.
The SPD wrote that “structural racial prejudices had been a major cause of the lack of openness in the investigation into the murders and bombing attacks committed by the NSU.” The party also lamented “prejudiced routines in the police’s work” that led to “routine prejudicial structures against people with immigrant backgrounds,” although the party said it was a “structural” rather than intentional problem. Such routines, it said, were often racist. The Left Party lamented that “structural and institutional racism had been a trait of the” police work relating to the NSU series of murders. The Green Party does, however, call in the report for regular “anti-racism training” for police, prosecutors and judges.
Kenan Kolat, meanwhile, has been more explicit in his assertions. The aim of the Turkish Community’s efforts, Kolat said at Tuesday’s press conference, was to eliminate “everyday racism, which also exists within institutions.”
08/28/2013 04:38 PM
Find this story at 28 August 2013
© SPIEGEL ONLINE 2013
Neonazi Kai-Uwe Trinkaus; Der V-Mann und die Brandstifter6 september 2013
Der Thüringer Verfassungsschutz setzte den Neonazi Kai-Uwe Trinkaus als Informanten ein – und verstieß damit einem Gutachten zufolge massiv gegen Dienstvorschriften. Und dann kündigte der ehemalige NPD-Spitzenfunktionär einen Gewaltakt an. Doch niemand reagierte.
Kai-Uwe Trinkaus bot seine Dienste selbst an. Der berüchtigte Neonazi und NPD-Funktionär rief am 31. Mai 2006 beim Thüringer Landesamt für Verfassungsschutz an und sagte, er wäre bereit, Informationen aus der Szene und der Partei auszuplaudern. Der Geheimdienst zögerte nicht lange: Es gab Gespräche und Stichproben und ab dem 8. März 2007 bekam Trinkaus den Namen “Ares” verpasst und wurde offiziell als Quelle des Verfassungsschutzes geführt – für 1000 Euro im Monat, wie Trinkaus behauptet. Für 41 Berichte soll er 16.200 Euro erhalten haben. Mit dem Geld habe er Aktivitäten der NPD bezahlt, später wechselte er zur DVU.
Trinkaus als Spitzel einzukaufen war ein Fehler – zu dem Ergebnis kommt das sogenannte Engel-Gutachten. Norbert Engel, ehemaliger Abteilungsleiter im Thüringer Landtag, hat seit Beginn des Jahres die Affäre Trinkaus im Auftrag der Parlamentarischen Kontrollkommission (PKK) untersucht. Sein 80-seitiges Gutachten wurde nun nach Informationen von MDR Thüringen am Dienstag hinter verschlossenen Türen in einer geheimen PKK-Sitzung vorgelegt. Es belegt schwere Versäumnisse von Geheimdienst und der Fachaufsicht im Thüringer Innenministerium.
Demnach hatten die Verfassungsschützer von Trinkaus’ vormaligen politischen Aktivitäten keinen blassen Schimmer: “Dies gilt insbesondere, weil klar sein musste, dass aufgrund seines politischen Werdegangs Herr Trinkaus persönliche Kontakte zu führenden Mitgliedern der Linkspartei.PDS hatte. Obwohl solche Kontakte für die Zuverlässigkeit zur Verwendung als V-Mann von hoher Bedeutung sind, wurde […] nach ihnen nicht einmal gefragt.” Engels Fazit an dieser Stelle: Ein ehemaliger Funktionär der Linkspartei, der in die NPD wechselte und sich selbst beim Verfassungsschutz anbietet, hätte nicht als V-Mann eingesetzt werden dürfen.
Die Behörde hat laut Gutachter damals unter großem Druck gestanden: Eine weitere Quelle im Bereich der NPD – besonders im regionalen Bereich von Erfurt und Mittelthüringen – sei “unbedingt” nötig gewesen, “lieber ein problematischer Zugang als gar keine Quelle”.
Und offensichtlich galt auch: lieber viele Informationen als gute. Denn laut Engel hat Trinkaus dem Verfassungsschutz zwar eine “beachtliche” Menge an Informationen gegeben, diese seien jedoch nicht so profund gewesen, dass sie die Nachteile der “Verwendung von Herrn Trinkaus gerechtfertigt hätten”. Das sei vor allem darauf zurückzuführen, dass Trinkaus nie in den wirklich vertraulichen Runden des Landesvorstandes der Thüringer NPD mitgemischt habe.
Wer legte Feuer im Haus “Topf & Söhne” in Erfurt?
Einmal habe Trinkaus eine Aktion von gewaltbereiten Neonazis verraten: Einen Angriff auf das besetzte Haus “Topf & Söhne” in Erfurt. Laut den Bewohnern legten Brandstifter im April 2007 in dem Gebäude Feuer, etwa 40 Menschen hielten sich zu dem Zeitpunkt darin auf. Bis heute wurden keine Täter ermittelt.
Damals spekulierten die Besetzer über einen rechtsextremen Hintergrund der Tat – Tattag war der Geburtstag Adolf Hitlers. Trinkaus soll laut Mitgliedern des Ausschusses seinem V-Mann-Führer berichtet haben, dass Neonazis einen Angriff auf das Hausprojekt gemeinsam mit sächsischen Kameraden trainierten. Ob vor oder nach der Tat, ist unklar. Aus weiteren Unterlagen, die dem Ausschuss vorliegen, finden sich keine Hinweise über die Weitergabe dieser Informationen an das Landeskriminalamt (LKA) oder die örtliche Polizei.
Dabei soll Trinkaus auch davon gesprochen haben, dass es nicht ausgeschlossen sei, dass das Gebäude abgebrannt werde, wie SPIEGEL ONLINE von Ausschussmitgliedern erfuhr. Damals erlosch das Feuer von selbst, es gab keine Verletzten.
Trinkaus ging auf in seinem Doppelleben als Neonazi und V-Mann: Er gründete oder unterwanderte Vereine, die nach außen hin unscheinbar wirkten, in denen sich aber tatsächlich Rechtsextremisten organisierten. Laut Gutachten hatte der Thüringer Verfassungsschutz auch davon keine oder nur ansatzweise Ahnung.
Auch habe Trinkaus die Anweisung seiner V-Mann-Führer, Provokationen gegenüber der Linkspartei und anderen politischen Parteien zu unterlassen, ignoriert. Erst im September 2010 wurde Trinkaus abgeschaltet, als durch einen MDR-Bericht bekannt geworden war, dass Trinkaus einen getarnten Neonazi als Praktikanten in die Linksfraktion eingeschleust hatte.
Gab der Verfassungsschutz Interna an Trinkaus weiter?
Trinkaus’ doppeltes Spiel sei “einmalig” im Verfassungsschutz, resümiert Engel. Ermöglicht habe dies auch die mangelnde Kontrolle des zuständigen Referats im Verfassungsschutz. Der Grund: Der verantwortliche Mitarbeiter war ein Jahr lang krank, Ersatz für ihn gab es keinen.
Engels Vorwürfe richten sich auch gegen das Thüringer Innenministerium, dem die Fachaufsicht für den Verfassungsschutz untergeordnet ist. Das Verhalten des Innenministeriums sei “nicht akzeptabel”. Der damalige Abteilungsleiter ist der heutige Innenstaatssekretär Bernhard Rieder, der von Beginn an in den kompletten Fall Trinkaus eingebunden war. Aber auch der damalige Innenminister Karl-Heinz Gasser soll informiert gewesen sein: Die Informationen erhielt er vom ehemaligen Verfassungsschutzchef Thomas Sippel.
Das Gutachten rückt den Thüringer Verfassungsschutz zudem in den Verdacht, Trinkaus mit polizeilichen Ermittlungsunterlagen versorgt zu haben: Im Juni 2007 hatten Linksautonome einen Neonazi-Treff in Erfurt überfallen. Die interne Polizeiliste mit den Namen und Adressen der Verdächtigen tauchte im Oktober 2007 auf der Internetseite der Thüringer NPD auf.
Laut Engel deuten “gewisse Indizien” darauf hin, dass Trinkaus die Liste aus dem Thüringer Verfassungsschutz bekommen hat. Engel hatte die Originalliste der Polizei mit der damaligen Internetveröffentlichung verglichen. Dabei stellte er fest, dass auf der NPD-Homepage drei Namen fehlten. Laut Gutachten waren diese drei Personen in einer geheimen Datenbank des Verfassungsschutzes als Rechtsextremisten eingestuft. Die Einstufung sei nur dem Geheimdienst bekannt gewesen. Weil exakt diese drei Namen auf der NPD-Internetseite fehlten, kommt Engel zu dem Schluss, das Trinkaus “diese Information nur aus dem TLfV haben” konnte.
Trinkaus hatte bei seiner Enttarnung im Dezember 2012 MDR Thüringen gesagt, dass er die Liste von seinem V-Mann-Führer abgeschrieben habe. Der Verfassungsschutz bestreitet entschieden, die Namen an Trinkaus gegeben zu haben. Die Staatsanwaltschaft Erfurt hatte erfolglos versucht zu klären, wie die Liste auf die NPD-Internetseite gekommen war.
27. August 2013, 19:08 Uhr
Von Maik Baumgärtner und Julia Jüttner
Find this story at 27 August 2013
© SPIEGEL ONLINE 2013
<< oudere artikelen nieuwere artikelen >>