• Buro Jansen & Janssen is een onderzoeksburo dat politie, justitie, inlichtingendiensten, de overheid in Nederland en Europa kritisch volgt. Een grond-rechten kollektief dat al 30 jaar publiceert over uitbreiding van repressieve wetgeving, publiek-private samenwerking, bevoegdheden, overheids-optreden en andere staatsaangelegenheden.
    Buro Jansen & Janssen Postbus 10591, 1001EN Amsterdam, 020-6123202, 06-34339533, signal +31684065516, info@burojansen.nl (pgp)
    Steun Buro Jansen & Janssen. Word donateur, NL43 ASNB 0856 9868 52 of NL56 INGB 0000 6039 04 ten name van Stichting Res Publica, Postbus 11556, 1001 GN Amsterdam.

  • Categorieën

  • Prozess in München; Hat ein V-Mann den NSU radikalisiert?

    Überraschung im NSU-Prozess: Wenn Beate Zschäpe, Uwe Mundlos und Uwe Böhnhardt mit Weggefährten über den Einsatz von Gewalt diskutierten, war ein V-Mann des Thüringer Verfassungsschutzes dabei. Das Bundeskriminalamt geht davon aus, dass Tino Brandt zu denen gehörte, die Gewalt befürworteten.
    Aus dem Gericht von Annette Ramelsberger

    Möglicherweise hat ein V-Mann des Verfassungsschutzes die Mitglieder des NSU überhaupt erst in die Gewalt getrieben. Wie nun überraschend im NSU-Prozess vor dem Oberlandesgericht in München bekannt wurde, hat Tino Brandt, der langjährige V-Mann des Thüringer Landesamtes für Verfassungsschutz in der rechten Szene, mitdiskutiert, wenn Beate Zschäpe, Uwe Mundlos und Uwe Böhnhardt mit ihren Weggefährten in den neunziger Jahren darüber redeten, ob man Gewalt anwenden müsse oder nicht. Das Bundeskriminalamt geht davon aus, dass Brandt zu denen gehörte, die Gewalt befürworteten.

    Bisher war nur bekannt gewesen, dass es solche Diskussionen zwischen Zschäpe, Mundlos und Böhnhardt auf der einen und dem früheren NPD-Funktionär Ralf Wohlleben und dem wegen Beihilfe angeklagten Holger G. auf der anderen Seite gab. Dass Brandt bei diesen Debatten dabei war, davon war bisher nie die Rede gewesen. Ein BKA-Beamter sagte nun vor Gericht: “Wir sind davon ausgegangen, dass Tino Brandt auf der Seite der Gewalt war.”

    Holger G. habe immer nur betont, wer nicht für Gewalt gewesen sei – nämlich er selbst und der Mitangeklagte Wohlleben. Die anderen seien für Gewalt gewesen. Im Umkehrschluss ging das BKA davon aus, dass Brandt auch zu denen gehörte, die Gewalt befürworteten.

    Herausgearbeitet hat diesen Zusammenhang die Anwältin von Ralf Wohlleben. Der Verteidigung ist daran gelegen, den Einfluss des Staates auf die Szene deutlich zu machen. Brandt gilt dabei als Dreh- und Angelpunkt. Er hat quasi im Auftrag des Staates den Thüringer Heimatschutz, ein rechtsradikales Sammelbecken, gegründet – und sich damit gebrüstet, seinen Spitzellohn für den Aufbau rechter Netzwerke verwendet zu haben.

    Anzeige
    SCHILLER OPUS
    Das neue Album. Zeitlos schöne Musik
    Jetzt bestellen
    Espresso Kapsel ab 0,24€!
    Sparen Sie über 30% mit alternativen Kaffee Kapseln für Ihre Nespresso® Maschine!
    Jetzt zu Gourmesso!
    Sparen auf TUIfly.com.
    Schnell & günstig buchen und schon ab 37€* in die Sonne fliegen.
    Mehr erfahren.

    Wenn er nun auch noch zur Radikalisierung der mutmaßlichen NSU-Mitglieder beigetragen hat, könnte sich das auf die Bewertung der Schuld der Angeklagten und auf das Strafmaß auswirken.

    Bundesanwalt Herbert Diemer bestätigte am Abend am Rande des Prozesses, dass es eine Stelle in den Vernehmungen von Holger G. gibt, wo der Angeklagte darauf hinweist, dass der später als V-Mann enttarnte Brandt bei den Theoriedebatten des rechten Zirkels über Gewalt dabei war. Allerdings wertete die Bundesanwaltschaft diesen Hinweis nicht als Beitrag des V-Manns zur Radikalisierung der Gruppe. “Nach unseren bisherigen Ermittlungen gib es keine Anhaltspunkte, dass Brandt die drei radikalisiert oder unterstützt hat. Wäre es so, dann säße er hier auf der Anklagebank”, sagte Bundesanwalt Diemer.

    Annette Ramelsberger
    18. Juli 2013 17:17

    Find this Story at 18 July 2013
    © 2013 Süddeutsche.de

    Döner-Morde: Aufklärung verhindert; Offenbar hat ein Informant angeboten, die Tatwaffe der „Döner-Morde“ zu liefern. Weil die Ermittler seine Bedingungen nicht akzeptierten, soll er untergetaucht sein.

    Eine mit der Mordwaffe baugleiche Pistole wird im Polizeipräsidium in Dortmund vor eine Bilderwand mit den Porträts von Opfern einer deutschlandweiten Mordserie, der so genannten Döner- Morde

    Der Schlüssel zu einer der unheimlichsten Mordserien Deutschlands ist eine tschechische Pistole, Marke Ceska, Typ 83, Kaliber 7,65 Millimeter. Mit dieser Waffe wurden von 2000 bis 2006 neun Männer umgebracht. Der Münchner Gemüsehändler Habil K. zum Beispiel. Oder die beiden Nürnberger Opfer: Enver S., ein Blumenhändler, und Ismayl Y., Inhaber einer Dönerbude. Zuletzt wurde im April 2006 der 21-jährige Betreiber eines Internetcafés in Kassel erschossen. Acht der Opfer waren Türken, eines ein Grieche, sie alle wurden in ihren kleinen Läden erschossen, mitten ins Gesicht, am helllichten Tag.

    Warum sie sterben mussten, ist ungeklärt. Möglicherweise sind kriminelle Geschäfte der Hintergrund. Die Soko „Bosporus“, die ihren Sitz in Nürnberg hatte, ist inzwischen aufgelöst – endgültig zu den Akten sind die Fälle aber noch nicht gelegt. Jetzt waren die Ermittler offenbar ganz nah dran, die sogenannten Döner-Morde aufzuklären – doch laut einem „Spiegel“-Bericht hat die Staatsanwaltschaft einen wichtigen Informanten verprellt.

    Wie das Magazin in seiner aktuellen Ausgabe berichtet, hatte ein Mann Ende 20 den Ermittlern angeboten, die mögliche Mordwaffe zu liefern. Der Informant namens Mehmet stamme aus dem Milieu mafiöser türkischer Nationalisten und arbeite seit längerem mit dem Verfassungsschutz zusammen – auch, um aus der Organisation auszusteigen. Mehmet, so schreibt der „Spiegel“, wollte die Ermittler zu einer Schweizer Villa nahe des Bodensees führen, „hinter deren Mauern sich angeblich der Schlüssel zur Lösung“ verberge. Tatsächlich gehen die Ermittler davon aus, dass die Tatwaffe in den Döner-Morden zu einer Lieferung von 24 Pistolen desselben Typs gehörte, die 1993 von dem tschechischen Hersteller an einen Schweizer Waffenimporteur verschickt wurde. Die meisten Pistolen aus dieser Lieferung konnten die Beamten aufspüren und als Tatwaffe ausschließen. Bis Frühjahr dieses Jahres waren acht Waffen noch nicht auffindbar.

    Der Informant hatte also eine heiße Spur geliefert – und stellte dafür auch seine Bedingungen. Mehmet soll laut „Spiegel“ 40 000 Euro und die Umwandlung seiner drohenden zweijährigen Gefängnisstrafe in eine Bewährungsstrafe gefordert haben – der vorbestrafte Mann war mit einem gefälschten Führerschein Auto gefahren. Mit der Belohnung seien die Ermittler einverstanden gewesen, die andere Forderung schlugen sie aus. Man könne höchstens Mehmets Mitarbeit dem Richter gegenüber loben. Die Ermittler wollten den Mann laut Bericht dazu überreden, die Waffe selbst zu holen, über die Grenze nach Deutschland zu bringen und sie an einem Rastplatz zu deponieren. Sollte er dabei bei zufälligen Kontrollen erwischt werden, wolle man „nur zum Schein“ gegen ihn ermitteln, heißt es in dem Bericht. Die Staatsanwaltschaft Nürnberg bestätigte dem „Spiegel“, dass es Verhandlungen mit dem V-Mann gegeben hatte, erklärte jedoch, eine Einflussnahme auf Gerichte komme nicht in Frage.

    Dem Informant wurde der Fall offenbar zu heiß. Er beendete die Zusammenarbeit mit der Polizei. Und die Aufklärung der rätselhaften Döner-Morde rückt möglicherweise wieder in die Ferne.

    Carina Lechner
    Nürnberg – 21.08.11 Bayern

    Find this story at 21 August 2013

    © www.merkur-online.de

    NYPD secrets: How the cops launched a spy shop to rival CIA; After 9/11, the NYPD wanted an intelligence unit to investigate threats to the city. This is how it began

    Adapted from “Enemies Within”

    Note: After a long career in Washington, David Cohen, a former CIA official, was, according to the authors, “one of most unpopular and divisive figures in modern CIA history.”

    [CIA Director George] Tenet sent Cohen packing for New York, a plum pre-retirement assignment that made him the CIA’s primary liaison with Wall Street titans and captains of industry. After three decades in Washington, he had become one of the most unpopular and divisive figures in modern CIA history. He left feeling that the agency was hamstrung by the people overseeing it. The White House micromanaged operations, slowing down everything. And Congress used its oversight authority to score political points. The CIA was stuck in the middle, an impossible position.

    Now [Police Commissioner Ray] Kelly was offering a chance to start something new in the New York Police Department, without any of the bureaucratic hand-wringing or political meddling. The World Trade Center attacks had changed the world. Cohen was being given an opportunity to change policing in response.

    He didn’t need a couple days to think about it. He called Kelly back two hours later and took the job.

    [Mayor] Bloomberg and Kelly introduced Cohen as the deputy commissioner for intelligence at a city hall press conference on January 24, 2002. Cohen spoke for just two minutes, mostly to praise the NYPD. He had been raised in Boston’s Mattapan neighborhood, and though he’d been gone for decades, he still spoke with a heavy accent.

    “We need to understand what these threats are, what form they take, where they’re coming from, and who’s responsible,” Cohen said.

    The new deputy commissioner offered no specifics about what he had planned. Weeks before his sixtieth birthday, he even declined to give his age, telling reporters only that he was between twenty-eight and seventy. The brief remarks from behind the lectern would amount to one of Cohen’s longest media appearances ever.

    “I look forward to just getting on with the job,” he said.

    Cohen’s appointment was not front-page news. The New York Times put the story on page B3. The Daily News ran a 165-word brief on page 34. It was four months after 9/11, and the country was focused on doing whatever it took to prevent another attack. Nobody questioned the wisdom of taking someone trained to break the laws of foreign nations and putting him in a department responsible for upholding the rule of law. Nobody even checked out Cohen’s hand-prepared résumé, which said he had a master’s degree in international relations from Boston University. In fact, his degree was in government.15 The misstatement itself was inconsequential. That it went entirely unquestioned was indicative of the lack of media scrutiny Cohen could expect in his new job.
    advertisement

    It didn’t take him long to realize that he was not walking back into the CIA. The NYPD had an intelligence division, but in name only. Working primarily out of the waterfront offices of the old Brooklyn Army Terminal, across the Hudson River, facing New Jersey, the detectives focused on drugs and gangs. They were in no way prepared to detect and disrupt a terrorist plot before it could be carried out. Mostly, they were known as the glorified chauffeurs who drove visiting dignitaries around the city.

    Cohen knew that more was possible.

    Force of will alone, however, would not transform a moribund division into something capable of stopping a terrorist attack. If Cohen wanted to remake the NYPD into a real intelligence service, there were four men—four graying hippies—standing in his way.

    * * *

    Martin Stolar first began hearing stories about the NYPD Intelligence Division in 1970 while working as a young lawyer for the New York Law Commune. A recently formed law firm for leftists, hippies, radicals, and activists, the commune operated entirely by consensus. It didn’t take a case unless everyone agreed. They saw themselves as part of the New Left, lawyers who didn’t merely represent their clients but who fully embraced their politics and were part of their struggle. They represented Columbia University students who’d taken over campus buildings during a protest in 1968. They stood beside members of the Weather Underground, the Black Panthers, and other radical groups, and activists such as Abbie Hoffman. And they never, ever, represented landlords in disputes with tenants.

    It was a new way of thinking about the law. The firm pooled all its fees and then paid one another based on need, not ability or performance. Operating out of a converted loft in Greenwich Village, the lawyers paid the bills thanks to well-to-do parents who hired them to keep their sons out of Vietnam. But about half their time was dedicated to political, nonpaying clients.

    Every now and again, one of the lawyers would come across something—a news clipping, a document, or a strong hunch—that suggested the NYPD was infiltrating activist groups and building dossiers on protesters. When they did, they’d add it to a plain manila folder, as something to revisit.

    Stolar had no problem questioning government authority. In 1969 he applied for admission to the bar in Ohio, where he was an antipoverty volunteer. When asked if he’d ever been “a member of any organization which advocates the overthrow of the government of the United States by force,” Stolar refused to answer. Nor would he answer when asked to list every club or organization he’d ever joined. The questions were holdovers from the Red Scare days of the 1950s. Stolar, a liberal New York lawyer, would have none of it. He took his case to the United States Supreme Court, which, in 1971, declared such questions unconstitutional. “[W]e can see no legitimate state interest which is served by a question which sweeps so broadly into areas of belief and association protected against government invasion,” Justice Hugo Black wrote.

    Stolar had moved back to New York by then and never bothered to return to Ohio to take the bar exam. He’d proven his point.

    In 1971 he was among the many lawyers working on the Panther 21 case, the trial of Black Panther Party members accused of conspiring to bomb police stations, businesses, and public buildings. While preparing their defense, the Law Commune attorneys came across something unusual: The case against the Panthers was built largely on the testimony of some of the earliest members of the New York chapter of the Black Panthers. There was Gene Roberts, a former security guard for Malcolm X who was present on February 21, 1965, when the Nation of Islam leader was assassinated in Manhattan’s Audubon Ballroom. There was Ralph White, the head of the Panther unit in the Bronx who’d once represented the entire New York chapter at a black power conference in Philadelphia. And there was Carlos Ashwood, who’d sold Panther literature in Harlem.

    They were founding fathers of the New York Panthers. And all three, it turned out, were undercover detectives. The NYPD had essentially set up the New York chapter of the Black Panther Party and built files on everyone who signed up.

    That convinced Stolar that something had to be done with his manila folder. He called another young lawyer, Jethro Eisenstein, who taught at New York University. The two knew each other from their work with the liberal National Lawyers Guild, and Stolar regarded Eisenstein as a brilliant legal writer. If they were going to have a shot at challenging the NYPD, the lawsuit had to sing.

    Together they put out the word to their clients and friends that they were looking for stories about the NYPD. The anecdotes came pouring in, both from activists and from other lawyers who, it turned out, had been keeping folders of their own. The mass of materials described a police department run amok. There was evidence that police were collecting the names of people who attended events for liberal causes. Detectives posed as journalists and photographed war protesters. Police infiltrated organizations that they considered suspect and maintained rosters of those who attended meetings.

    * * *

    On May 13, 1971, the Panthers were acquitted of all charges. At the time, it was the longest criminal trial in New York history, spanning eight months. Closing arguments alone had stretched over three weeks. But the jury was out only three hours before voting for acquittal. And the first hour was for lunch.

    In the courthouse lobby, jurors milled about, congratulating the Panthers and their lawyers. Some exchanged hugs. Jurors said there wasn’t enough evidence that the conspiracy was anything more than radical talk. Defense lawyer Gerald Lefcourt called the verdict “a rejection of secret government all the way from J. Edgar Hoover down to the secret police of New York City.”

    The New York Times editorial page read:

    It is not necessary to have any sympathy whatever with Panther philosophy or Panther methods to find some reassurance in the fact that—at a time when the government so often confuses invective with insurrection—a New York jury was willing to insist on evidence of wrong-doing rather than wrong-thinking.

    Five days after the verdict, Stolar and Eisenstein filed a twenty-one-page federal lawsuit against the NYPD. It accused the department of widespread constitutional violations.

    The plaintiffs represented a grab bag of the New Left. There were Black Panthers, members of the War Resisters League, and gay-rights advocates. There were well-known figures such as Abbie Hoffman and obscure groups like the Computer People for Peace. One young man, Stephen Rohde, sued because when he applied for admission to the New York bar, he’d been asked whether he’d ever opposed the Vietnam War. He had once signed a petition in a basement at Columbia University, and his views had ended up in a police file.

    The lawsuit became known as the Handschu case, after lawyer and activist Barbara Handschu, who was listed first among the plaintiffs. Stolar and Eisenstein argued that the NYPD was using its surveillance tactics to squelch free speech. Police Commissioner Patrick Murphy did not deny using those tactics. Rather, he said, they were necessary to protect the city. Murphy devoted eighteen pages to explaining to the court why the NYPD needed an effective intelligence division. He said the effort began in the early 1900s as a response to the Black Hand Society, an extortion racket run by new Sicilian immigrants. As the threat evolved over the decades, so did the unit. The 1960s, Murphy said, was a dangerous time to be in New York. Along with antiwar protests, student unrest, and racial conflicts, he cited a list of terrorist bombings and what he called “urban guerrilla warfare.”

    In response to that threat, Murphy explained, the NYPD stepped up its investigations of political groups that “because of their conduct or rhetoric may pose a threat to life, property, or governmental administration.” It was true, Murphy conceded, that a portion of that rhetoric might be political speech, protected by the Constitution. But that was the reality of a world in which some people used violence to achieve political goals. The police needed informants and undercover officers to figure out whether political groups were planning criminal acts.

    “Without an effectively operating intelligence unit, the department would be unable to deal effectively with the many problems that arise each day in the largest, most complex, and most unique city in the world,” Murphy wrote.

    It would take nearly another decade before the lawsuit over the NYPD’s surveillance was resolved. In 1985 the city settled the Handschu case and agreed to court-established rules about what intelligence the NYPD could collect on political activity. Under the rules, the department could investigate constitutionally protected activities only when it had specific information that a crime was being committed or was imminent. Undercover officers could be used only when they were essential to the case, not as a way to keep tabs on groups. Police could no longer build dossiers on people or keep their names in police files without specific evidence of criminal activity.

    To ensure that the rules were being followed, the court created a three-person oversight committee. Two senior police officials and one civilian appointed by the mayor would review each police request for an investigation. Only with the majority approval of that board could an investigation proceed into political activity.

    On the morning of September 11, 2001, Intelligence Division detectives rushed to Lower Manhattan, but when they arrived, they realized their helplessness. They stood there on the street for hours, waiting for someone to tell them what to do. “Stand by” was all they heard. They stood by as World Trade Center 7 collapsed in a plume of dust and smoke and they waited as darkness began to fall on New York. Some were sent toward ground zero to escort surgeons onto the pile, where they conducted emergency amputations or other lifesaving procedures. Others gathered at the Police Academy, where Deputy Chief John Cutter, the head of the Intelligence Division, put them on twelve-hour shifts. He told them to contact their informants.

    It was both the right command and a useless one. Nobody there had informants plugged into the world of international terrorism. But the detectives did what they were told. They called dope dealers and gang members and asked what they knew about the worst terrorist attack in US history.

    They worked alongside the FBI out of makeshift command centers aboard the decommissioned aircraft carrier and museum USS Intrepid and in an FBI parking garage, where some detectives sat on the concrete floor. They responded to the many tips called in by a jittery public. They questioned Muslims whose neighbors suddenly deemed them suspicious and visited businesses owned by Arab immigrants.

    This was exactly the kind of reactive, aimless fumbling that Cohen wanted to do away with when he came aboard. He envisioned a police force that was plugged into the latest intelligence from Washington and that generated its own intelligence from the city. If an al-Qaeda bomber were ever to set his sights on New York again, Cohen wanted his team to be able to identify the plot and disrupt the plan. The rules needed to change.

    * * *

    Stolar, the attorney who’d brought the Handschu lawsuit decades earlier, listened on September 20, 2001, as President George W. Bush went to Congress and declared war on terrorism. He knew things were about to change. The way he saw it, once the government declares war on something—whether it be poverty, drugs, crime, or terrorism—the public quickly falls in line and supports it.

    But this former radical, who witnessed police fire tear gas and beat antiwar demonstrators during Chicago’s 1968 Democratic National Convention and who was part of some of New York’s most turbulent times, was surprisingly naive about what was to come. He talked to his wife, Elsie, a public defense lawyer, and told her it was only a matter of time before the FBI hunted down the people who planned the World Trade Center attacks. They would be prosecuted in Manhattan’s federal court, he said, and they would need lawyers. Even the worst people in the world deserved a fair hearing and staunch defense. If the choice presented itself, Stolar and his wife agreed, he should take the case. As it turned out, there would never be any criminal trials. The suspected terrorists would be shipped to a military prison in Guantánamo Bay, where the government created a new legal system.

    Stolar and his fellow Handschu lawyers also misjudged the NYPD’s response to the attacks. In early 2002, Eisenstein wrote to the city and said that, despite the tragedy, the Handschu guidelines represented an important safeguard of civil liberties. Eisenstein said that he and his colleagues were available if the city wanted to discuss the rules in light of the attacks. The city lawyers said they would consider it. Eisenstein didn’t hear anything for months. Then, on September 12, 2002, a twenty-three-page document arrived from someone named David Cohen.

    Cohen’s name wasn’t familiar to Stolar, but as he skimmed the document, it didn’t take long to reach a conclusion: “This guy wants to get rid of us completely.”

    The document, filed in federal court in Manhattan, had been months in the making, and Cohen had chosen his words carefully. He explained his background; his thirty-five-year career in the analytical and operational arms of the CIA. Invoking the recent attacks on the World Trade Center, he said the world had changed.

    “These changes were not envisioned when the Handschu guidelines were agreed upon,” he wrote, “and their continuation dangerously limits the ability of the NYPD to protect the people it is sworn to serve.”

    Like Commissioner Murphy’s affidavit about NYPD surveillance on radical groups in the 1960s, Cohen painted a picture of a nation—in particular a city—under siege from enemies within. Terrorists, he said, could be lurking anywhere. They could be your classmates, your friends, or the quiet family next door.

    “They escape detection by blending into American society. They may own homes, live in communities with families, belong to religious or social organizations, and attend educational institutions. They typically display enormous patience, often waiting years until the components of their plans are perfectly aligned,” Cohen said.

    He recounted the 1993 World Trade Center bombing, the attacks on embassies in Africa, the 1995 bombing of the Alfred P. Murrah Federal Building in Oklahoma City, and plots against landmarks in New York. America’s freedoms of movement, privacy, and association gave terrorists an advantage, he said.

    “This success is due in no small measure to the freedom with which terrorists enter this country, insinuate themselves as apparent participants in American society, and engage in secret operations,” he wrote, adding, “The freedom of our society has also made it possible for terrorist organizations to maintain US‑based activities.”

    The stakes, Cohen said, could not be higher.

    “We now understand that extremist Muslim fundamentalism is a worldwide movement with international goals. It is driven by a single-minded vision: Any society that does not conform to the strict al‑Qaeda interpretation of the Koran must be destroyed. Governments such as ours which do not impose strict Muslim rule must be overthrown through Jihad,” he said.

    Faced with this threat, Cohen said, the police could no longer abide by the Handschu guidelines. Terrorists, like the violent radicals of the previous generation, often cloaked themselves behind legitimate organizations. The police had to be able to investigate these groups, even when there was no evidence that a crime was in the works.

    “In the case of terrorism,” Cohen wrote, “to wait for an indication of crime before investigating is to wait far too long.”

    Sunday, Sep 1, 2013 01:30 PM +0200
    By Matt Apuzzo and Adam Goldman

    Find this story at 1  September 2013

    Copyright © 2013 by A&G Books, Inc.

    NYPD: The Domestic CIA?

    Just days after the release of our investigation of the FBI’s use of informants in Muslim communities around the US comes a probe by the AP into the NYPD’s collaboration with the CIA to spy on Muslims in the greater New York area. The AP’s Adam Goldman and Matt Apuzzo reveal that the “NYPD operates far outside its borders and targets ethnic communities in ways that would run afoul of civil liberties rules if practiced by the federal government.”

    Some background: In 2002, the NYPD hired former CIA official David Cohen to run their civilian intelligence program. Cohen got help from a CIA official to train and run a surveillance program in Muslim-American communities in the New York City area. Under Cohen, the NYPD utilized the diversity of its force to dispatch undercover officers in ethnic neighborhoods where they could “blend in.” Officers were looking for “hot spots,” areas needing further investigation, like a bookstore selling “radical” literature. They still call this investigative team the “Demographic Unit.”

    The Demographic Unit, according to the AP investigation, monitors “daily life in bookstores, bars, cafes and nightclubs. Police have also used informants, known as ‘mosque crawlers,’ to monitor sermons, even when there’s no evidence of wrongdoing. NYPD officials have scrutinized imams and gathered intelligence on cab drivers and food cart vendors, jobs often done by Muslims.”

    Sound familiar? The FBI has engaged in similar activities with the help of a former CIA official, Phil Mudd. Mudd helped create a program called “Domain Management” to strategically focus the FBI’s resources on particular communities. A New York Times reporter once described how Mudd “displayed a map of the San Francisco area, pocked with data showing where Iranian immigrants were clustered—and where, he said, an F.B.I. squad was ‘hunting.'” When asked to comment, an FBI spokesperson told the AP: “If you’re sending an informant into a mosque when there is no evidence of wrongdoing, that’s a very high-risk thing to do…You’re running right up against core constitutional rights. You’re talking about freedom of religion.”

    In our own year-long investigation into the FBI’s activities with informants in Muslim communities, reporter Trevor Aaronson notes: “Informants have said in court testimony that FBI handlers have tasked them with infiltrating mosques without a specific target or ‘predicate’—the term of art for the reason why someone is investigated. They were, they say, directed to surveil law-abiding Americans with no indication of criminal intent.”

    Advertise on MotherJones.com

    There are other similarities between the NYPD’s actions and the FBI’s intelligence operations in Muslim-American communities, like the NYPD’s method of gathering informants for its investigations. In one instance, the AP finds that the NYPD “asked the taxi commission to run a report on all the city’s Pakistani cab drivers, looking for those who got licenses fraudulently and might be susceptible to pressure to cooperate, according to former officials who were involved in or briefed on the effort.”

    And the NYPD isn’t limiting itself to investigations in New York City alone. They have expanded with, the AP reports, “officers deputized as federal marshals,” who are allowed to work out of state, such as in Pennsylvania, New Jersey and Massachusetts. According to the investigation, the information the NYPD obtains is sometimes passed on to the CIA. The AP notes that “the NYPD was looking more and more like a domestic CIA.”

    Faiza Patel, co-director of the Liberty and National Security Program at NYU’s Brennan Center for Justice, says the program is potentially against the law. “Selecting neighborhoods for infiltration and surveillance as the NYPD has done is, at bottom, ethnic or religious profiling. Such discrimination runs afoul of our nation’s commitment to ‘liberty and justice for all.’ To the extent that the NYPD is monitoring the exercise of Muslims free speech rights and their right to practice their religion, it may also be running afoul of the First Amendment.”

    According to Patel, the NYPD’s program is the wrong use of the department’s resources. She said, “New York City has approximately 800,000 thousand Muslims—monitoring all of these people in the hopes of identifying suspicious activity is simply not effective. It would be more effective to build solid relations with the communities so that they would be comfortable reporting suspicious activity to the NYPD.”

    —By Hamed Aleaziz
    | Thu Aug. 25, 2011 3:40 AM PDT
    Tweet

    Find this story at 25 August 2013

    ©2013 Mother Jones and the Foundation for National Progress.

    Five police forces investigated over alleged Stephen Lawrence smear campaign; Police fractured my arm, says ‘smear victim’

    The investigation into alleged police attempts to smear the Stephen Lawrence campaign and undermine the credibility of witnesses attending the Macpherson inquiry into the black teenager’s racist murder is focusing on the activities of five forces, The Independent has learnt.

    Investigators are understood to be waiting for senior officers from Avon and Somerset Constabulary and West Midlands Police to complete urgent trawls of their records in relation to possible surveillance or intelligence gathering operations carried out in Bristol and Birmingham.

    The cities, alongside Bradford and Manchester, hosted regional sittings of the Macpherson Inquiry in 1998 where race relations campaigners aired a string of grievances against their local forces over stop and search and other flashpoint issues.

    The former Chief Constable of West Yorkshire Police, Sir Norman Bettison, who is already at the centre of an Independent Police Complaints Commission (IPCC) inquiry into an alleged cover-up in the wake of the Hillsborough disaster, was referred to the watchdog this week by Police and Crime Commissioner Mark Burns-Williamson.

    It followed revelations that leading anti-racism campaigner Mohammed Amran was the subject of a potentially damaging special branch report prior to his giving evidence to the inquiry in Bradford. A number of junior officers from West Yorkshire are also being investigated by the IPCC after being referred by the present Chief Constable.

    Greater Manchester Police has also been referred over an internal memo suggesting intelligence was gathered on individuals or groups attending the inquiry in the city.

    The cases are likely to be reviewed by Mark Ellison QC – who successfully prosecuted Gary Dobson and David Norris for Stephen’s murder in 2012 – as part of an investigation into the Metropolitan Police following claims of a smear campaign against the teenager’s family and friends made by a former undercover officer.

    The inquiry will need to uncover whether the regional forces were acting on behalf of the Met, which was embroiled in one of the biggest crises in its history following the repeated failings to investigate the student’s 1993 murder. It was eventually found to be “institutionally racist” by Macpherson.

    West Midlands Police and Crime Commissioner Bob Jones met Chief Constable Chris Sims on Monday to discuss the issue. In a statement the force confirmed it was examining material to see whether any potentially inappropriate intelligence or surveillance activity had taken place.

    A team of officers from Avon and Somerset Constabulary have now begun a second trawl of documents after the Home Secretary Theresa May ordered forces nationwide to search their records. A first hunt carried out by an assistant chief constable was said to have discovered no incriminating material. Forces have until next Wednesday to report their findings to Ms May.

    Mr Amran, 37, who became the youngest ever Commissioner for Racial Equality (CRE) following his role as a peacemaker in the 1995 Bradford riots, has been told he will not know for at least two weeks what evidence was gathered against him although it is not believed he was placed under surveillance.

    His lawyer, Ruth Bundey, said: “He is someone who has helped and advised the authorities in the past and it is very disconcerting for him not to know what is involved here – other than to have been told that it is ‘alarming.’”

    It is unclear whether evidence allegedly gathered about Mr Amran resurfaced in a further dossier put together by West Yorkshire Police as part of its alleged attempt to prevent him being re-elected by the CRE. The dossier led Ms Bundey to pursue a successful case of racial discrimination against the force, who settled out of court in 2002.

    Mr Amran told The Independent that he was repeatedly arrested after publicly questioning the policing of in Bradford’s multi-racial community.

    Despite widespread concern over policing and community relations leading up to the 1995 riots, more disturbances took place in the city in the summer of 2001.

    “I challenged the police openly after the 1995 riots and that created a reaction that made my life very difficult,” Mr Amran said. “The arrest I remember most vividly came when I was going to my family home and three officers grabbed me and told me I was under arrest.

    “They said ‘You should not be here.’ I was letting myself into my house at the time and they said ‘drop the keys. You are under arrest.’ I sustained a hairline fracture of my arm. They just let me go. On another occasion I was dragged from my car by police. I told them who I was and they didn’t believe me.”

    Ian Herbert, Jonathan Brown
    Saturday, 6 July 2013

    Find this story at 6 July 2013

    © independent.co.uk

    Dozens of undercover officers could face prosecution, says police chief

    Chief constable leading investigation also says he will look at claims that Stephen Lawrence campaigners were spied on

    Dozens of police officers could be put on trial for stealing the identities of dead children, and sleeping with female activists they were spying on, according to the police chief leading an inquiry into Metropolitan police undercover work against protest groups.

    Mick Creedon, the chief constable of Derbyshire, also said his team would investigate claims from a police whistleblower, Peter Francis, that senior officers wanted him to spy on, and even undermine, the Stephen Lawrence campaign.

    In an interview, Creedon offered a “100%” assurance the matter would be properly investigated. He said prosecutors were already being asked to consider whether criminal offences had been committed by generations of undercover operatives planted in protest groups over the past 45 years.

    Earlier on Monday, David Cameron said he was “deeply concerned by revelations from Francis, a former undercover police officer who said he was asked to gather intelligence that could be used to “smear” the campaign for justice for Stephen Lawrence, who was stabbed to death in a racist attack in 1993.

    The prospect that police officers could be prosecuted will alarm senior officers, who have struggled to manage the fallout from the revelations

    On Monday morning, the prime minister’s spokesman hinted that the government may order an independent inquiry into Francis’s revelations. Any inquiry would have to “command the family’s confidence as well as that of the public”, he said.

    Creedon is already investigating two top-secret Met units: the SDS, which was disbanded in 2008, and another squad – the National Public Order Intelligence Unit (NPOIU) – which still operates.

    He said his review was particularly focused on the role of commanding officers: “It’s looking right up the chain of command,” he said. “We have mapped, putting it bluntly, every senior officer, every commander, every deputy citizen commissioner, right up to and including home secretaries.”

    The chief constable refused to be drawn on the specifics of Francis’s allegations, but he said that, if proved, they would be “not something that would sit comfortably with any police officer”.

    Creedon was asked to take over the inquiry, Operation Herne, in February after it was revealed that operatives working for the two spy units had used the identities of dead children. Weeks later, he conceded that the use of dead children’s identities had been “common practice” in the SDS, and had continued in the NPOIU until around 2001.

    In the interview, parts of which are being broadcast on Channel 4 on Monday night, he told the Guardian and the Dispatches programme that he was getting advice on whether dozens of undercover police who used the identities had committed criminal acts. “That is a consideration. We are getting legal advice on that,” he said.

    “I am looking to operatives to explain why they did it and why they were trained to do it and how they did it.”

    Keith Vaz, the MP and chair of the home affairs select committee, has already called on Scotland Yard to inform parents whose children’s identities were used.

    But Creedon said it was highly unlikely he would contact the parents, because to do so would require confirming the false identities used by former operatives.

    “The way the world is now, that will fizz around the internet networks instantly,” he said, adding that he saw little benefit in “raking up” the issue with parents who would otherwise remain oblivious.

    He also declined to apologise to women who had been duped into relationships with police spies. But he added: “This is completely abhorrent. I use that term carefully. It should not have happened and I’ve always been clear about that. Was it routine? Was it actually part of the tactics? Was it quite deliberate and was it a way of infiltrating, or was it an occasional consequence? I don’t know the answer to that question right now.”

    Creedon said prosecutors would also decide whether operatives who had sexual relationships were breaking the law.

    “Well, we need to get advice from the CPS [Crown Prosecution Service] about whether an undercover officer having a sexual relationship would be a criminal offence,” he said. “We’re waiting for that advice from the CPS, and it will be wrong for me to speculate.”

    Asked if the officers may end up in court, he replied: “It’s a possibility, yes.”

    However, he said the use by police of deception in sexual relationships needed to be understood in a wider context. “Around the country there are many people involved in sexual relationships who lie about their status,” he said. “There are many people who say they’re not married when they are married. It happens.”

    Operation Herne, which is costing the Met £1.6m a year, was launched in 2011. A staff of around 30 officers – almost all of them Met employees – have been sifting through 55,000 documents and interviewing former undercover police officers and their supervisors. Four specific cases are being separately supervised by the Independent Police Complaints Commission.Creedon refused to be drawn on when the inquiry would be complete but Craig Mackey, the deputy commissioner of the Met, has previously indicated it may not conclude until 2016, meaning the five-year inquiry would have cost over £7.5m.

    Creedon said he did not know if the findings of his inquiry would ever be made public.

    He said he was determined to “keep some balance” in his investigation: “Herne is not about castigating the 100 or so SDS officers that served over 40 years, some of whom were incredibly brave.”

    The chief constable rejected the suggestion that it would be more appropriate for the inquiry to be conducted by an independent figure or regulator.

    “There has always been public concern about police investigating the police, but I’ll be brutally honest: there is no one as good at doing it as the police,” he said. “We don’t seek to hide things. We do actually seek to get the truth and we do it properly and I frankly find it almost insulting that people suggest that in some way, because I’m a police officer, I’m not going to search the truth.”

    Paul Lewis and Rob Evans
    The Guardian, Monday 24 June 2013 14.08 BST

    Find this story at 24 June 2013
    © 2013 Guardian News and Media Limited or its affiliated companies.

    How police spies ’tried to smear the family of Stephen Lawrence’: Undercover officer reveals how superiors wanted him to find ‘dirt’

    Peter Francis claims officers told him to dig into murdered teenager’s family
    He posed as an anti-racist activist following the death
    Victim’s mother said: ‘Nothing can justify… trying to discredit the family’
    Raises further questions about police surveillance of activist groups
    David Cameron demands that Scotland Yard investigates the damaging claim

    An undercover policeman revealed last night that he took part in an operation to smear the family of Stephen Lawrence.

    Peter Francis said his superiors wanted him to find ‘dirt’ that could be used against members of the murdered teenager’s family.

    The spy said he was also tasked with discrediting Stephen’s friend who witnessed the stabbing and campaigners angry at the failure to bring his killers to justice.

    Spy: Peter Francis said he was asked by senior officers in the Met Police to find information to smear the family of murdered teenager Stephen Lawrence

    Worried: The Prime Minister said today that Scotland Yard must investigate the damaging claims

    He added that senior officers deliberately withheld his role from Sir William Macpherson, who led a public inquiry into the bungled police investigation.
    ‘They wanted any intelligence’ Peter Francis on ‘spying’

    And this one’s for Stephen… stars sing for Lawrence fund: Emeli Sandé and Jessie J to perform at concert to mark 20th anniversary of his murder
    NHS chief ‘offered bribe to hush up death of my baby’: Father’s shock at scandal-hit boss’s £3,000 cash deal
    The secrets of my friend the Moors murderer: For 25 years he has been visiting Britain’s most notorious killer, now Ian Brady’s only confidant – and heir – reveals all

    Francis said senior officers were afraid that anger at the failure to investigate the teenager’s racist killing would spiral into disorder on the streets. They had ‘visions of Rodney King’, whose beating at the hands of police led to the 1992 LA riots, he said.

    David Cameron has this morning urged Scotland Yard to launch a probe into what happened.

    ‘The Prime Minister is deeply concerned by reports that the police wanted to smear Stephen Lawrence’s family and would like the Metropolitan police to investigate immediately,’ A No10 spokesperson said.

    The revelations mark the most extraordinary chapter so far in the sorry history of Scotland Yard’s jaw-dropping undercover operations.

    Stephen Lawrence was the victim of a racist murder in 1993. It was one of the highest profile racial killings in UK history

    The whistleblower is one of several to come forward to reveal deeply suspect practices by those ordered to infiltrate political protest groups from the 1980s onwards.

    Yesterday Stephen’s mother Doreen said being targeted by an undercover officer was the most surprising thing she had learned about the marathon inquiry. She said: ‘Out of all the things I’ve found out over the years, this certainly has topped it.

    ‘Nothing can justify the whole thing about trying to discredit the family and people around us.’

    The news will further inflame critics of covert policing of activist groups and raises questions over whether a police review will flush out all malpractice.’

    The 20-year-old operation was revealed in a joint investigation by The Guardian and Channel 4’s Dispatches being broadcast tonight.

    Francis posed as an anti-racist activist during four years he spent living undercover among protest groups following Stephen’s murder in April 1993.

    The former officer said he came under ‘huge and constant pressure’ to ‘hunt for disinformation’ that might be used to undermine those arguing for a better investigation into the murder.

    He now wants a full public inquiry into the undercover policing of protest groups, which he labelled ‘morally reprehensible’ in the past.

    He said: ‘I had to get any information on what was happening in the Stephen Lawrence campaign.

    ‘They wanted the campaign to stop. It was felt it was going to turn into an elephant. Throughout my deployment there was almost constant pressure on me personally to find out anything I could that would discredit these campaigns.’

    Mr Francis joins a number of whistle blowers who infiltrated protest groups for the Met Police

    Francis was also involved in an ultimately failed effort to discredit Duwayne Brooks, a close friend of Lawrence who was with him on the night he was murdered.

    The former spy trawled through hours of CCTV from a demonstration to find evidence that led to Mr Brooks being arrested and charged with violent disorder in October 1993. However, the case was thrown out by a judge as an abuse of the legal process.

    Family: Stephen Lawrence’s mother Doreen and ex-husband Neville, Stephen’s father

    The spy monitored a number of ‘black justice’ campaigns, involving relatives of mostly black men who had died in suspicious circumstances in police custody.

    But he said his handlers were most interested in any information he could gather about the several groups campaigning over the death of Stephen.

    Although Francis did not meet the Lawrence family, he passed back ‘hearsay’ about them to his superiors.

    Mrs Lawrence said she was always baffled why family liaison officers were recording the identities of everyone entering and leaving their household following her son’s murder.

    She said the family had always suspected police had been gathering evidence about her visitors to discredit them but had no ‘concrete evidence’.

    In 1997, Francis argued that the Met should ‘come clean’ over the existence of its undercover operation to Sir William and his inquiry.

    But commanders opted for secrecy and claimed it was for the public good as there would be ‘battling on the streets’ if the public ever found out.
    ‘It just makes me really angry’: Doreen Lawrence

    Francis was a member of a covert unit known as the Special Demonstration Squad. Set up to combat protests against the Vietnam war in 1968, the SDS was funded by the Home Office to operate under the radar for four decades.

    Using the undercover alias Pete Black, he worked between 1993 and 1997 infiltrating a group named Youth Against Racism in Europe.

    He said he was one of four undercover officers who were also required to feed back intelligence about the campaigns for justice over the death of Stephen. The now disbanded unit has already been struck by controversy after its spies fathered children with their targets.

    An external investigation of past undercover deployments is being undertaken by a team of officers led by Derbyshire chief constable Mick Creedon.

    Pete Francis monitored a number of ‘black justice’ campaigns, involving relatives of mostly black men who had died in suspicious circumstances in police custody

    Mr Brooks always suspected he was a victim of a dirty tricks campaign by police. In an interview six years after the murder he said he felt the police ‘investigated us more thoroughly than they investigated the boys’ – referring to those behind the killing.

    Jack Straw, the former home secretary who in 1997 ordered the inquiry that led to the Macpherson report, said he was stunned.

    He said: ‘I should have been told of anything that was current, post the election of Tony Blair’s government in early May 1997. But much more importantly, [the] Macpherson inquiry should have been told.’

    Lord Condon, Met Commissioner between 1993 and 2000, said he was not aware any information had been withheld from Sir William.

    A Met spokesman said: ‘The claims in relation to Stephen Lawrence’s family will bring particular upset to them and we share their concerns.’

    These revelations and others about undercover police officers are contained in the book Undercover by Paul Lewis and Rob Evans.

    UNDERCOVER: THE TRUE STORY OF BRITAIN’S SECRET POLICE by Rob Evans and Paul Lewis is published by Guardian Faber at £12.99. Please follow this link to order a copy.

    By Chris Greenwood

    PUBLISHED: 21:50 GMT, 23 June 2013 | UPDATED: 11:12 GMT, 25 June 2013

    Find this story at 23 June 2013

    © Associated Newspapers Ltd

    Police ‘smear’ campaign targeted Stephen Lawrence’s friends and family

    Exclusive: former undercover officer Peter Francis says superiors wanted him to find ‘dirt’ shortly after 1993 murder

    Stephen Lawrence who was murdered in 1993 and whose death has been the subject of a long-running police investigation. Photograph: Rex Features

    A police officer who spent four years living undercover in protest groups has revealed how he participated in an operation to spy on and attempt to “smear” the family of murdered teenager Stephen Lawrence, the friend who witnessed his fatal stabbing and campaigners angry at the failure to bring his killers to justice.

    Peter Francis, a former undercover police officer turned whistleblower, said his superiors wanted him to find “dirt” that could be used against members of the Lawrence family, in the period shortly after Lawrence’s racist murder in April 1993.

    He also said senior officers deliberately chose to withhold his role spying on the Lawrence campaign from Sir William Macpherson, who headed a public inquiry to examine the police investigation into the death.

    Francis said he had come under “huge and constant pressure” from superiors to “hunt for disinformation” that might be used to undermine those arguing for a better investigation into the murder. He posed as an anti-racist activist in the mid-1990s in his search for intelligence.

    “I had to get any information on what was happening in the Stephen Lawrence campaign,” Francis said. “They wanted the campaign to stop. It was felt it was going to turn into an elephant.

    “Throughout my deployment there was almost constant pressure on me personally to find out anything I could that would discredit these campaigns.”

    Francis also describes being involved in an ultimately failed effort to discredit Duwayne Brooks, a close friend of Lawrence who was with him on the night he was killed and the main witness to his murder. The former spy found evidence that led to Brooks being arrested and charged in October 1993, before the case was thrown out by a judge.
    Peter Francis, the former undercover police officer turned whistleblower. Photograph: Graham Turner for the Guardian

    The disclosures, revealed in a book about undercover policing published this week, and in a joint investigation by the Guardian and Channel 4’s Dispatches being broadcast on Monday, will reignite the controversy over covert policing of activist groups.

    Lawrence’s mother, Doreen, said the revelations were the most surprising thing she had learned about the long-running police investigation into her son’s murder: “Out of all the things I’ve found out over the years, this certainly has topped it.”

    She added: “Nothing can justify the whole thing about trying to discredit the family and people around us.”

    In a statement, the Metropolitan police said it recognised the seriousness of the allegations – and acknowledged their impact. A spokesman said the claims would “bring particular upset” to the Lawrence family and added: “We share their concerns.”

    Jack Straw, the former home secretary who in 1997 ordered the inquiry that led to the 1999 Macpherson report, said: “I’m profoundly shocked by this and by what amounts to a misuse of police time and money and entirely the wrong priorities.” Straw is considering personally referring the case to the Independent Police Complaints Commission.

    Francis was a member of a controversial covert unit known as the Special Demonstration Squad (SDS). A two-year investigation by the Guardian has already revealed how undercover operatives routinely adopted the identities of dead children and formed long-term sexual relationships with people they were spying on.

    The past practices of undercover police officers are the subject of what the Met described as “a thorough review and investigation” called Operation Herne, which is being overseen by Derbyshire’s chief constable, Mick Creedon.

    A spokesman said: “Operation Herne is a live investigation, four strands of which are being supervised by the Independent Police Complaints Commission, and it would be inappropriate to pre-judge its findings.”

    Francis has decided to reveal his true identity so he can openly call for a public inquiry into undercover policing of protest. “There are many things that I’ve seen that have been morally wrong, morally reprehensible,” he said. “Should we, as police officers, have the power to basically undermine political campaigns? I think that the clear answer to that is no.”

    Francis has been co-operating with the Guardian as a confidential source since 2011, using his undercover alias Pete Black. He assumed the undercover persona between 1993 and 1997, infiltrating a group named Youth Against Racism in Europe. He said he was one of four undercover officers who were also required to feed back intelligence about the campaigns for justice over the death of Lawrence.

    Francis said senior officers were afraid that anger at the failure to investigate the teenager’s racist killing would spiral into disorder on the streets, and had “visions of Rodney King”, whose beating at the hands of police led to the 1992 LA riots.

    Francis monitored a number of “black justice” campaigns, involving relatives of mostly black men who had died in suspicious circumstances in police custody.

    However, he said that his supervising officers were most interested in whatever information he could gather about the large number of groups campaigning over the death of Lawrence.

    Although Francis never met the Lawrence family, who distanced themselves from political groups, he said he passed back “hearsay” about them to his superiors. He said they wanted information that could be used to undermine the campaign.

    One operation Francis participated in involved coming up with evidence purporting to show Brooks involved in violent disorder. Francis said he and another undercover police officer trawled through hours of footage from a May 1993 demonstration, searching for evidence that would incriminate Brooks.

    Police succeeded in having Brooks arrested and charged with criminal damage, but the case was thrown out by a judge as an abuse of the legal process. Francis said the prosecution of Brooks was part of a wider drive to damage the growing movement around Lawrence’s death: “We were trying to stop the campaign in its tracks.”

    Doreen Lawrence said that in 1993 she was always baffled about why family liaison officers were recording the identities of everyone entering and leaving their household. She said the family had always suspected police had been gathering evidence about her visitors to discredit the family.

    “We’ve talked about that several times but we never had any concrete [evidence],” she said.

    There is no suggestion that the family liaison officers knew the purpose of the information they collected.

    Francis claims that the purpose of monitoring people visiting the Lawrence family home was in order “to be able to formulate intelligence on who was going into the house with regards to which part of the political spectrum, if any, they were actually in”. The former policeman added: “It would determine maybe which way the campaign’s likely to go.”

    In 1997, Francis argued that his undercover operation should be disclosed to Macpherson, who was overseeing the public inquiry into the Met’s handling of the murder. “I was convinced the SDS should come clean,” he said.

    However his superiors decided not to pass the information on to the inquiry, he said. He said he was told there would be “battling on the streets” if the public ever found out about his undercover operation.

    Straw said that neither he nor Macpherson were informed about the undercover operations. “I should have been told of anything that was current, post the election of Tony Blair’s government in early May 1997,” he said.

    “But much more importantly, [the] Macpherson inquiry should have been told, and also should have been given access to the results of this long-running and rather expensive undercover operation.”

    Rob Evans and Paul Lewis
    The Guardian, Monday 24 June 2013

    Find this story at 24 June 2013
    © 2013 Guardian News and Media Limited or its affiliated companies.

    Stephen Lawrence evidence was mislabelled, trial told

    Forensic science workers made series of mistakes handling evidence relating to one of original murder suspects

    Stephen Lawrence trial: mistakes were made in the handling of crucial evidence. Photograph: PA

    A police forensic science worker made a series of mistakes in handling evidence relating to one of two men accused of murdering Stephen Lawrence, the Old Bailey heard on Wednesday .

    Yvonne Turner, a forensic science assistant, put the wrong case number on a jacket belonging to Gary Dobson, who was a suspect in the fatal stabbing of Lawrence in April 1993. She went on to wrongly record that no tapings of fibres had been taken from the jacket – a yellow and grey bomber jacket – and a cardigan belonging to Dobson.

    Evidence secured from the cardigan and jacket belonging to Dobson as a result of advances in science, and from trousers and a sweatshirt belonging to David Norris, are key to the crown’s case that the two men were in a group of white youths who attacked Lawrence 18 years ago.

    The jury at the Old Bailey was told yesterday that exhibits relating to five suspects – including Norris, Dobson, and two other men not on trial, Jamie and Neil Acourt – were all stored together in 1993 in a disused cell at Eltham police station.

    Dobson, 36, and David Norris, 35, deny murder. They claim their clothes became contaminated with blood, hair and textile fibres belonging to Lawrence while being stored and handled by the police and forensic scientists.

    Working out of a laboratory in Lambeth, south London, Turner had been asked to examine a jacket belonging to Dobson in October 1993. But she wrote a case number relating to a robbery case she was also working on, at the top of the paperwork for the jacket.

    “I wasn’t concentrating and I wasn’t focused at the stage when I wrote the case number in, but I’ve clearly got to grips with the case as I’ve written the correct item number,” Turner told the jury.

    The court heard she also marked “no tapings” for fibres had been taken from Dobson’s jacket, even though they had.

    Turner, who had been working in forensic science full-time for seven years by 1993, made the same mistake with Dobson’s cardigan. She then admitted there had subsequently been “difficulty locating the tapings as they had been annotated with the incorrect case number”.

    The scientist, who now runs her own company as a trainer and consultant in forensic science, said she was unable to say when the exhibits were taped for fibres. Her mistakes on the case notes were corrected before 1995 when her work was reviewed.

    Detective Constable Robert Crane told the jury that the homes of five suspects, including Norris, Dobson, the Acourts and a fifth unnamed man, were searched in simultaneous dawn raids on 7 May 1993, 15 days after Lawrence was killed.

    Crane, who had responsibility for all the items of clothing seized and items belonging to Lawrence, said that some items such as the teenager’s rucksack were stored on a bed inside a disused cell at Eltham police station.

    The exhibits from the suspects were placed on the floor of the same cell, either in boxes or large rubbish sacks, he said. But he said he did not mix them up.

    The case continues.

    • The headline on this article was amended on 24 November 2011. The original headline said: Stephen Lawrence evidence was mislabelled by police, trial told. The mislabelling was done by a forensic scientist.

    Sandra Laville, crime correspondent
    The Guardian, Wednesday 23 November 2011 21.53 GMT

    Find this story at 23 November 2011

    © 2013 Guardian News and Media Limited or its affiliated companies. All rights reserved.

    The Police’s Dirty Secret: Channel 4 Dispatches

    Paul Lewis reports on allegations that members of a clandestine Metropolitan unit employed ethically dubious tactics, including inappropriate sexual relationships and deceit, to spy on people – claims apparently substantiated by the personal testimony of a whistleblower who operated undercover for four years. The programme investigates the actions of those tasked with infiltrating political campaigns and protest groups, and speaks to the women who say they were duped into intimate relationships with men they didn’t know were serving police officers.

    Find this story at july 2013

    True Spies

    Finally, three documentaries on MI5 and Special Branch called ‘True Spies’ that were shown on BBC2 in 2002 are now available in their entirety on Youtube. Each of them is nearly one hour long. They are very interesting and in the first one the SDS is discussed and the theft of dead children’s identities is brought up, 10 years before the ‘revelations’ about it in the Guardian!

     

    This three-part series was broadcast on BBC Two during October – November 2002.

     

    True Spies #1 ‘Subversive My Arse!’ 27 October 2002 

    True Spies #2 ‘Something Better Change’ 3 November 2002 

    True Spies #3 ‘It Could Happen To You’ 10 November 2002 

    There is also a page on the BBC website here:

    CIA Targeted Noam Chomsky, Documents Reveal

    Foreign Policy magazine has obtained documents confirming that the Central Intelligence Agency snooped on famed activist and linguist Noam Chomsky.

    The Central Intelligence Agency (CIA) spied on famed activist and linguist Noam Chomsky in the 1970s, documents obtained by Foreign Policy confirm. While the CIA long denied it kept a file on Chomsky, a Freedom of Information Act (FOIA) request filed by an attorney and given to reporter John Hudson has confirmed that the CIA snooped on the professor from MIT.

    Furthermore, the CIA appears to have scrubbed its record on Chomsky–a potential violation of the law.

    For many years, similar requests for Chomsky’s CIA file were met with responses denying that the record existed. But FOIA attorney Kel McClanahan sent a request to the Federal Bureau of Investigation, and it garnered a document showing FBI and CIA communication about Chomsky.

    The 1970 document is about Chomsky’s anti-war activities and asks the FBI to gather more information about a trip to North Vietnam by anti-war activists. The memo notes that Chomsky endorsed the trip. “The June 1970 CIA communication confirms that the CIA created a file on Chomsky,” Athan Theoharis, an expert on FBI-CIA cooperation, told Foreign Policy.“That file, at a minimum, contained a copy of their communication to the FBI and the report on Chomsky that the FBI prepared in response to this request.”

    Theoharis added that it was clear the CIA “tampered” with the file. “The CIA’s response to the FOIA requests that it has no file on Chomsky confirms that its Chomsky file was destroyed at an unknown time,” he said, referring to the fact that past FOIA requests to the CIA were met with responses that no file on Chomsky existed.

    Destroying records could run afoul of a 1950 law that requires government agencies to obtain advance approval before from the national archives before destroying records.

    Theoharis also said the possible destruction of Chomsky’s file means that other files compiled by the CIA were also likely destroyed. A more recent precedent for that type of behavior was the 2005 destruction of CIA tapes showing high-level terrorism suspects being waterboarded.

    In response to the revelation, Chomsky told Foreign Policy: “Some day it will be realized that systems of power typically try to extend their power in any way they can think of.”

    August 13, 2013 |

    Find this story at 13 august 2013

    © AlterNet

    Exclusive: After Multiple Denials, CIA Admits to Snooping on Noam Chomsky

    For years, the Central Intelligence Agency denied it had a secret file on MIT professor and famed dissident Noam Chomsky. But a new government disclosure obtained by The Cable reveals for the first time that the agency did in fact gather records on the anti-war iconoclast during his heyday in the 1970s.

    The disclosure also reveals that Chomsky’s entire CIA file was scrubbed from Langley’s archives, raising questions as to when the file was destroyed and under what authority.

    The breakthrough in the search for Chomsky’s CIA file comes in the form of a Freedom of Information Act (FOIA) request to the Federal Bureau of Investigation. For years, FOIA requests to the CIA garnered the same denial: “We did not locate any records responsive to your request.” The denials were never entirely credible, given Chomsky’s brazen anti-war activism in the 60s and 70s — and the CIA’s well-documented track record of domestic espionage in the Vietnam era. But the CIA kept denying, and many took the agency at its word.

    Now, a public records request by Chomsky biographer Fredric Maxwell reveals a memo between the CIA and the FBI that confirms the existence of a CIA file on Chomsky.

    Dated June 8, 1970, the memo discusses Chomsky’s anti-war activities and asks the FBI for more information about an upcoming trip by anti-war activists to North Vietnam. The memo’s author, a CIA official, says the trip has the “ENDORSEMENT OF NOAM CHOMSKY” and requests “ANY INFORMATION” about the people associated with the trip.

    After receiving the document, The Cable sent it to Athan Theoharis, a professor emeritus at Marquette University and an expert on FBI-CIA cooperation and information-gathering.

    “The June 1970 CIA communication confirms that the CIA created a file on Chomsky,” said Theoharis. “That file, at a minimum, contained a copy of their communication to the FBI and the report on Chomsky that the FBI prepared in response to this request.”

    The evidence also substantiates the fact that Chomsky’s file was tampered with, says Theoharis. “The CIA’s response to the FOIA requests that it has no file on Chomsky confirms that its Chomsky file was destroyed at an unknown time,” he said.

    It’s worth noting that the destruction of records is a legally treacherous activity. Under the Federal Records Act of 1950, all federal agencies are required to obtain advance approval from the national Archives for any proposed record disposition plans. The Archives is tasked with preserving records with “historical value.”

    “Clearly, the CIA’s file, or files, on Chomsky fall within these provisions,” said Theoharis.

    It’s unclear if the agency complied with protocols in the deletion of Chomsky’s file. The CIA declined to comment for this story.

    What does Chomsky think? When The Cable presented him with evidence of his CIA file, the famous linguist responded with his trademark cynicism.

    “Some day it will be realized that systems of power typically try to extend their power in any way they can think of,” he said. When asked if he was more disturbed by intelligence overreach today (given the latest NSA leaks) or intelligence overreach in the 70s, he dismissed the question as an apples-to-oranges comparison.

    “What was frightening in the ‘60s into early ‘70s was not so much spying as the domestic terror operations, COINTELPRO,” he said, referring to the FBI’s program to discredit and infiltrate domestic political organizations. “And also the lack of interest when they were exposed.”

    Regardless,, the destruction of Chomsky’s CIA file raises an even more disturbing question: Who else’s file has evaporated from Langley’s archives? What other chapters of CIA history will go untold?

    “It is important to learn when the CIA decided to destroy the Chomsky file and why they decided that it should be destroyed,'” said Theoharis. “Undeniably, Chomsky’s was not the sole CIA file destroyed. How many other files were destroyed?”

    Posted By John Hudson Tuesday, August 13, 2013 – 9:18 AM Share

    Find this story at 13 August 2013

    ©2013 The Foreign Policy Group,

    Moscow offers spy swap for sleeper couple

    Moscow wants to exchange a married couple of Russian spies jailed this month in Germany for at least one convict jailed in Russia on charges of spying for the West, a report said Monday.
    Russian spies use ‘safe’ German typewriters – Science & Technology (12 Jul 2013)
    Court jails Russian spy couple – National (2 Jul 2013)
    Alleged Russian spy couple in ‘Cold War’ trial – National (15 Jan 2013)

    Russia’s Kommersant newspaper said that the Russian secret services wanted to bring the pair — known only by their code names Andreas and Heidrun Anschlag — back to Russia after decades as “sleepers” in Germany.

    In a Cold War-style exchange, Moscow would simultaneously hand over to the West at least one spy convicted of passing secrets to Berlin or its allies, the paper said.

    “The process of consultations [with Germany] on a possible exchange was started only recently, after their conviction” on July 2nd, a Russian security source told the paper.

    “We will get our guys out of there,” the source added.

    Another source told the paper that Moscow had waited until after the trial was over to seek the exchange, in case the legal process were toshed further light on how their cover had been blown.

    Kremlin spokesman Dmitry Peskov denied to the paper that any exchange had been discussed at talks in June between President Vladimir Putin and Chancellor Angela Merkel.

    The man known as Andreas Anschlag was jailed for six and a half years and Heidrun Anschlag for five and a half years by the higher regional court in the south western city of Stuttgart.

    The pair had been planted there West Germany from 1988 by the Soviet Union’s KGB secret service and later worked for its successor the SVR, the court heard.

    Kommersant said that the jailed couple’s lawyer Horst-Dieter Petschke confirmed that the swap was expected and told the paper that the exchange could “happen at any moment”.

    It said that possible candidates to be freed in Russia in such an exchange included Andrei Dumenkov, who was jailed in 2006 for 12 years for seeking to hand Germany data on Russian missile designs.

    Another name citied was Valery Mikhailov, a former colonel in the Russian security service who was jailed in 2012 for 18 years for spying for the United States.

    Such spy exchanges, familiar from the Cold War era and John le Carré novels, already have a precedent in post-Soviet Russian history.

    In 2010, Russia and the United States agreed a sensational spy swap of ten Russian “sleeper” agents caught in the United States for four men convicted in Russia of spying for the West.

    The ten Russian spies — including the glamorous female agent Anna Chapman — were brought back to Moscow and subsequently personally welcomed by Putin.

    Published: 15 Jul 2013 09:38 CET | Print version

    Find this story at 15 July 2013

    related story at 4 February 2013

    related story at 4 February 2013

    related story at 4 February 2013

    related story at 4 February 2013

    © The Local Europe GmbH

    Datenleck bei der Nato; Geheimpapiere in der Küche

    Viele Jahre lang arbeitet Manfred K. als Informatiker bei der Nato – bieder, unauffällig, pflichtbewusst. Dann kommt heraus: Der 60-Jährige soll brisante Informationen gestohlen haben und auf geheimen Konten Millionen Euro bunkern. Ist er ein Spion?

    Koblenz – An dem Dorf bei Kaiserslautern ist die Weltgeschichte bislang ohne Zwischenstopp vorbeigesaust. Es gibt wenig Sehenswürdigkeiten und noch weniger Persönlichkeiten, die irgendwie von Bedeutung gewesen wären. Man könnte sagen, in dem 900-Seelen-Nest ist die Welt noch in Ordnung, doch seit einigen Monaten stimmt auch das nicht mehr.

    Damals, es war im Herbst 2012, kamen Bundesanwälte, Staatsschützer des Landeskriminalamts, Agenten des Militärischen Abschirmdiensts. Sie durchsuchten ein schnödes Einfamilienhaus nahe der Hauptstraße und sie taten es gründlich. Lösten die Tapeten von den Wänden, schleppten alle Möbel in den Garten, setzten ein Bodenradargerät ein. Sie sollten fündig werden.

    Unter einer Fliese im Keller und hinter einer Fußleiste in der Küche entdeckten die Ermittler zwei USB-Sticks mit brisanten Geheiminformationen der Nato. Es ging um Einsatzplanungen, Luftlagebilder, um IP-Adressen und Passwörter für Programme, wie sie das Bündnis auch in Kampfeinsätzen verwendet. Ein Offizier nennt das Material “brisant”. Eine “Weitergabe hätte uns sicherlich sehr geschadet”.

    Prozess wegen Landesverrats

    Der Hausherr, Manfred K., der 34 Jahre lang als IT-Fachmann bei der Nato gearbeitet hatte, wurde daraufhin festgenommen. Von Mittwoch an muss sich der Wirtschaftsinformatiker wegen “landesverräterischer Ausspähung” vor dem Oberlandesgericht Koblenz verantworten, ihm drohen bis zu zehn Jahre Haft.

    Dabei ist noch vollkommen unklar, wozu K. die Informationen hortete und ob er bereits in der Vergangenheit Daten an ausländische Nachrichtendienste verkauft hat. Immerhin verfügte der 60-Jährige, der zuletzt auf dem US-Militärflughafen Ramstein arbeitete und monatlich mehr als 7000 Euro netto verdiente, über ein Vermögen von 6,5 Millionen Euro. Das Geld hatte er bei Fondsgesellschaften in Luxemburg und Großbritannien angelegt. Teilweise soll er auch hohe Beträge in bar eingezahlt haben.

    Die entscheidenden Fragen sind daher: Woher stammen die Millionen? Sparten die Eheleute K., die in sehr bescheidenen Verhältnissen lebten, bloß eisern? Ließ sich K., zuständig für die Beschaffung von Computer und Software, vielleicht von Unternehmen schmieren? Oder verkaufte er doch ausländischen Agenten brisante Nato-Papiere? Weder die Bundesanwaltschaft noch die Verteidigerin von Manfred K. wollten sich dazu auf Anfrage äußern.

    Bilder aus Panama

    Unstrittig ist hingegen, dass K. und seine Frau Deutschland zumindest vorübergehend den Rücken kehren wollten. So bemühte sich der IT-Experte seit Längerem intensiv darum, Aufenthaltsgenehmigungen für Panama zu bekommen, wozu Einkommensnachweise nötig waren. Auch fanden die Ermittler auf diversen Sticks zahlreiche Bilder aus Mittelamerika. Wollte Manfred K. flüchten?

    Gegen eine nachrichtendienstliche Tätigkeit des Angeklagten scheint jedoch die Art seines Vorgehens zu sprechen. Nach SPIEGEL-ONLINE-Informationen gelang es ihm im März 2012, die teilweise als geheim eingestuften Unterlagen an einem internen Sicherheitscheck vorbei auf seinen Dienstcomputer zu laden. Von dort aus sandte K. sie wohl über seinen Nato-Account an seine private GMX-Adresse und speicherte sie anschließend auf verschiedenen Medien. Besonders konspirativ war das nicht.

    Die beiden Agenten des russischen Auslandsgeheimdienstes SWR, die kürzlich vom Oberlandesgericht Stuttgart zu mehrjährigen Haftstrafen verurteilt worden waren, gingen anders vor. Sie ließen sich von einem Mitarbeiter des Den Haager Außenministeriums Hunderte vertrauliche Dokumente liefern. Die Übergabe der Papiere erfolgte zumeist in den Niederlanden, danach deponierte der Agent die Akten in “toten Briefkästen” im Raum Bonn, wo sie anschließend von Mitarbeitern der russischen Botschaft abgeholt wurden.

    Und noch etwas erscheint seltsam im Fall Manfred K.: 2010 ließ der Nato-Mitarbeiter über längere Zeit eine große Nähe zur NPD erkennen. Er besuchte öffentliche Veranstaltungen der Partei und spendete ihr 3000 Euro. Angeblich wollte er auf diese Weise einen Verlust seiner Zugangsberechtigung zu Geheiminformationen und damit seine Frühpensionierung provozieren. Doch falls das wirklich sein Plan war, ging der nicht auf. Es dauerte noch geraume Zeit, bis K. dem Verfassungsschutz und der Nato-Spionageabwehr auffiel. Die Militärs wandten sich schließlich an die Bundesanwaltschaft.

    Als Beamte ihn Anfang August 2012 in seinem Heimatdorf festnahmen, war Manfred K. bereits seit einer Woche Rentner.

    16. Juli 2013, 14:28 Uhr
    Von Jörg Diehl

    Find this story at 16 July 2013

    © SPIEGEL ONLINE 2013

    Verrat bei der Nato

    Eine Notfallübung der US-Streitkräfte in Afghanistan: Die gestohlenen Ramstein-Dossiers offenbar die geheime Taktik der Nato-Einsatzkräfte in Krisenfällen
    Fataler Spähangriff auf das Militärbündnis: Ein Deutscher soll die GEHEIMSTEN KRISENPLÄNE gestohlen und verkauft haben
    Ein kleiner Ort in der Pfalz, gerade mal 900 Einwohner. Gepflegte Gemüsebeete, an den Obstbäumen blinken die letzten Äpfel des Jahres. Ab und zu rumpeln Bauern mit ihren Traktoren über die Dorfstraße von Börrstadt, 25 Kilometer östlich von Kaiserslautern. Auf einem vergilbten Plakat, mit Reißnägeln an der dicken Linde befestigt, bittet die Landjugend zum Tanz.

    In dem schmucklosen Einfamilienhaus in der Hintergasse ist niemand willkommen. „Ich sage nichts“, ruft Rosemarie K. mit viel Zorn in der Stimme und lässt sofort die Rollläden herunter.

    Die Nachbarschaft bewegt sich jetzt hinter Gardinen, viele hören wohl zu. Und fragen sich wie schon seit mehreren Wochen: Wo ist bloß der Ehemann von Rosemarie K.? Was mag passiert sein?

    Es ist ein realer Krimi, passiert direkt vor der Tür. Und niemand hat es bemerkt: Das spitzgiebelige Haus stand wochenlang unter heimlicher Beobachtung – auch Telefon, E-Mail und Faxgerät wurden überwacht.

    Anfang August dann, keiner hat es so früh am Morgen gesehen, holten Staatsschützer des Landeskriminalamts (LKA) Rheinland-Pfalz den Hauseigentümer Manfred K. ab. Seitdem sitzt der 60-Jährige auf Anordnung des Ermittlungsrichters am Bundesgerichtshof in Untersuchungshaft.

    Die Karlsruher Bundesanwaltschaft und das LKA in Mainz ermitteln in einem harten Polit- und Spionagethriller:

    Manfred K. soll jahrelang auf dem 1400 Hektar großen US-Militärflughafen Ramstein die geheimsten Programme und Codeschlüssel für weltweite Luftlandeoperationen der US-Streitkräfte gestohlen haben.

    Die Fahnder haben klare Hinweise darauf, dass Manfred K. die brisante Ware bereits verkauft hat – womöglich sogar an Feinde und potenzielle Kriegsgegner der USA.

    Ein Beleg für dieses Geschäft könnten die circa 6,5 Millionen Euro sein, die Fahnder des Mainzer LKA auf Tarnkonten von Manfred K. in Luxemburg und in London entdeckten.

    Die Affäre, die nahezu unbemerkt in der Pfalz begann, hat längst das Pentagon in Washington erreicht. Angespannt verfolgt das US-Verteidigungsministerium die Ermittlungen in Deutschland. Das Allied Command Counterintelligence (ACCI), die Spionageabwehr der Nato, muss über seine Büros in Heidelberg und Ramstein permanent Bericht erstatten.

    Ramstein Air Base, auf dem 35 000 Soldaten und 6000 Nato-Zivilisten wie Manfred K. arbeiten, ist immerhin der größte Luftwaffenstützpunkt außerhalb der USA. Auch die Nato-Kommandobehörde zur Führung von Luftstreitkräften ist hier untergebracht.

    Über zwei Start- und Landebahnen wickeln die USA Truppen-, Fracht- und Evakuierungsflüge ab. Verletzte GIs landen hier und werden anschließend in Landstuhl behandelt. Kampfbrigaden der 101. oder der 82. Luftlandedivision sowie Spezialeinheiten wie Rangers, Delta Force oder Navy Seals fliegen von der Pfalz aus in den Einsatz. Bis 2005 lagerten in Ramsteins Bunkern 130 Atomwaffen.
    Der militärische Schaden, verursacht durch den mutmaßlichen Verräter Manfred K., ist offenbar gigantisch. „Die weltweite Eventualplanung für Krisen- und Kriegseinsätze müsste komplett neu gemacht werden, weil der potenzielle Gegner alles weiß. Das bedeutet jahrelange Generalstabsarbeit“, sagt Erich Schmidt-Eenboom, einst Sicherheitsoffizier der Heeresflugabwehr 1 in Hannover und heute Autor von Geheimdienst-Büchern.
    FOCUS Magazin | Nr. 44 (2012)
    Verrat bei der Nato – Seite 2
    dpa
    Fallschirmspringer der US-Armee verlassen in Ramstein ein Transportflugzeug
    Ob und an wen Manfred K. die Militärdaten aus Ramstein für die bislang entdeckten Millionen verscherbelt hat, ist derzeit noch ungeklärt. Der Spezialist für Informationstechnik und Telekommunikation, den Kollegen und Nachbarn als kontaktscheuen Eigenbrötler beschreiben, macht kaum Angaben zur Sache. Die verdächtigen Millionen will er bei Bankgeschäften verdient haben.

    Die LKA-Leute fanden heraus, dass K., seit 1991 in Ramstein beschäftigt, die auf mehrere Sticks überspielten Geheimdaten ausgedruckt haben muss. Papier fand sich indes nicht mehr – hat also jemand dafür in harter Währung bezahlt?

    „Russlands Militärgeheimdienst GRU würde für solches Material zehn Millionen Dollar auf den Tisch legen – ohne auch nur mit der Wimper zu zucken“, behauptet ein Spionageabwehr-Experte des Bundeskriminalamts im Gespräch mit FOCUS.

    Die Ermittlungen gegen Manfred K., der als Nato-Mitarbeiter im Monat mehr als 6000 Euro netto verdiente und morgens mit seinem koreanischen Kleinwagen nach Ramstein fuhr, orientieren sich derzeit an Paragraf 96 des Strafgesetzbuches. Die „landesverräterische Ausspähung“ von Staatsgeheimnissen wird demnach mit Gefängnis bis zu zehn Jahren bestraft.

    Sollte jedoch ein klarer Kontakt zu einem ausländischen Geheimdienst nachgewiesen werden, könnte die Strafe härter ausfallen. So erging es in den 80er-Jahren einem Mitarbeiter der 8. US-Luftlandedivision in Mainz, der geheime Unterlagen an die Russen verkauft hatte. Der Mann wurde zu 15 Jahren Gefängnis verurteilt.

    Die Ermittler haben in diesen Tagen ziemlich viel Spaß daran, dass sich der mutmaßliche Datenräuber Manfred K. letztlich selbst ans Messer geliefert hat. Der Delinquent wollte schlauer als alle Sicherheitsbehörden sein – und fiel damit voll auf die Nase.

    „60 Jahre“, sagte der stets gepflegte 1,75 Meter große Mann zu einem Nachbarn, „sind doch kein Alter.“ K. und seine Frau, obwohl schwer zuckerkrank, schwärmten davon, nach Mittelamerika auszuwandern. Seinen vorzeitigen Ruhestand wollte K. mit einem Trick erzwingen.

    Schritt eins: K. spendete eine größere Geldsumme an die vom Verfassungsschutz beobachtete – aber nicht verbotene – NPD.

    Schritt zwei: K. schrieb anonym an das Kölner Bundesamt für Verfassungsschutz und teilte als angeblich treuer Staatsbürger mit, dass ein gewisser Herr Manfred K. aus 67725 Börrstadt/Pfalz, Datenspezialist auf dem US-Fliegerhorst Ramstein und befugt zum Umgang mit Geheimpapieren, ein Unterstützer der rechtsradikalen NPD sei. Schritt drei – wie K. hoffte: Das Bundesamt für Verfassungsschutz wird dem Nato-Mitarbeiter K. keinen weiteren Zugang zu Dossiers gestatten.

    Schritt vier – wie K. glaubte: Die Nato wird K. mit guten Bezügen in den vorzeitigen Ruhestand schicken. Und tschüss!
    So kam es aber nicht. Die Kölner Behörde ließ K. pro forma den Sicherheitscheck bestehen und verständigte parallel die Kollegen vom Nato-Abwehrdienst ACCI.
    FOCUS Magazin | Nr. 44 (2012)
    Verrat bei der Nato – Seite 3
    dpa
    Drehscheibe Ramstein: Die gestohlenen Dossiers liefern Informationen über die Logistik der Nato
    Jetzt begann die konzertierte Aktion gegen den vermeintlichen Maulwurf. Spezialisten der US-Streitkräfte stellten mit Entsetzen fest, dass Manfred K. wohl seit Jahren auf sensibelste Daten zugreifen konnte. Das Mainzer LKA, mittlerweile von der Bundesanwaltschaft eingeschaltet, fand bei seinen verdeckten Ermittlungen heraus: K. hatte offenbar einen über Funk gesteuerten und von außen nicht zu knackenden Datentunnel geschaffen. Mit ihm konnte er die illegal abgezweigten Infos direkt von seinem Büro in Ramstein auf den Heimcomputer in Börrstadt überspielen.

    Nach Feierabend war´s dann wohl ein Kinderspiel: K. soll die erbeuteten Daten auf USB-Sticks gespeichert haben.

    Die zeitgleiche Überwachung des Informatikers brachte keine Erkenntnisse. Das Ehepaar lebt völlig isoliert in Börrstadt. Niemand rief an. Niemand kam ins Haus, keine Freunde, keine Verwandten. Gelegentlich telefonierte K. mit seinem 88-jährigen Schwiegervater, der ganz in der Nähe einen Bauernhof besitzt und gegenüber FOCUS beteuerte: „Der Manfred ist ein lieber, ehrlicher und fleißiger Mensch. Bei Reparaturen auf dem Hof hat er mir stets geholfen. Der spioniert doch nicht, nie und nimmer.“

    Kurz nach K.´s Verhaftung setzte eine penible Hausdurchsuchung ein. Beschlagnahmte Unterlagen, zum Teil verschlüsselt, lieferten Hinweise auf die versteckten Millionenkonten.

    Die allerbesten Beweise waren raffiniert versteckt. Einen USB-Stick entdeckten die Fahnder in einem Einweckglas mit Kompott, ein anderer lag unter gut duftenden Lavendelblättern. Als die Beamten damit drohten, bei der Suche nach weiteren Beweisen den Fußboden aufzustemmen und die recht neue Küche auseinanderzunehmen, soll die Pfälzer Hausfrau Rosemarie K. schnell nachgegeben haben: Somit fanden die Ermittler schließlich zwei weitere Sticks mit zunächst seltsamen Inhalten.

    Bei der ersten Überprüfung der Datenspeicher stießen die LKA-Ermittler auf Bilder aus Panama, auf Fotos von Schiffen und auf lustige Seemannslieder. Manfred K. hatte sofort eine Erklärung dafür: Er wolle womöglich mit seiner Frau nach Panama auswandern, und die Seefahrt mitsamt ihren Liedern, die habe ihn schon immer fasziniert.

    Die anderen Daten konnte der Untersuchungshäftling überhaupt nicht erklären: Im Umfeld der gespeicherten Reise- und Seemannsfolklore waren, handwerklich sehr geschickt, geheime Daten von der Ramstein Air Base versteckt. Ein Volltreffer für das LKA.

    So viel Raffinesse hatten die meisten Fahnder noch nie erlebt. Deshalb baten sie um eine ungewöhnliche Amtshilfe: Der Militärische Abschirmdienst (MAD), der Geheimdienst der Bundeswehr, wurde um die Bereitstellung eines Bodenradars gebeten. Mit diesem High-Tech-Gerät können die besten Verstecke im Boden aufgespürt werden.

    Zunächst wieherte der Amtsschimmel. Der MAD zierte sich, da er das gesetzlich geregelte Trennungsgebot bei der Kooperation von Nachrichtendienst und Polizei verletzt sah. Schließlich kam das grüne Licht – und Rosemarie K. wurde wirklich wütend.

    Vor dem Einsatz des Bodenradars räumte ein Trupp der Polizei das gesamte Haus aus – alles landete im Garten, mit einer großen Plane tagelang vor Wind und Wetter geschützt. Doch der Aufwand sollte sich lohnen. Zwei weitere Sticks wurden entdeckt – und ein Gelddepot mit ein paar tausend Euro unter der Badewanne.

    Ein Videoteam der Polizei dokumentierte die Zwangsräumung und die anschließende Handwerkerleistung: Alle Tapeten, zumeist noch mit Blümchenmuster aus den 50er-Jahren, mussten runter.
    Rosemarie K. kennt da kein Pardon. Für das staatliche Stühlerücken verlangt sie jetzt Schadensersatz.

    Montag, 29.10.2012, 00:00 · von FOCUS-Reporter Josef Hufelschulte und FOCUS-Redakteur Marco Wisniewski
    AFP

    Find this story at 29 October 2012

    © FOCUS Online 1996-2013

    Jonathan Pollard: Restoring Israel to greatness

    “Only a re-awakening can guarantee the future. Political process devoid of fundamental values will never end the agony or the fear for the State of Israel.”

    FREED PRISONER Atiya Salem Moussa returns to a hero’s welcome in the Gaza Strip on Tuesday. Photo: REUTERS

    When tragedy strikes anywhere in the world, the State of Israel is always among the first to offer help, sending experienced rescue teams, portable hospitals and world-class medical experts to the scene. Israel is a world leader in medical research, farming technology, and military innovation. The country that made the desert bloom is the undisputed champion of hi-tech innovation, all of which it generously shares with the world.

    Unfortunately, when it comes to morale, the State of Israel has the distinction of holding a number of world records which no other country would want.
    Related:

    US Jewish leaders, Kerry discuss Pollard

    Peace talks resume against backdrop of prisoner release

    Over the last six decades, Israel’s leaders and its judiciary have practiced the art of political expedience to such a degree that Israel is now the first and only country in the world to hold the following dubious “honors”:

    • Israel is the only country in the world ever to voluntarily expel its own citizens from chunks of its homeland in order to hand over the land to its enemies.

    • It is the only country in the world ever to voluntarily destroy the homes and businesses of its own citizens, leaving them with shattered lives and broken promises.

    • Israel is the only country in the world ever to voluntarily dig up and transport the graves of its dead so that the land could be turned over to its enemies.

    The State of Israel also holds unenviable world records for betraying those who serve the state, including the following:

    • Israel is the only country in the world to restrain its military from rescuing a wounded soldier, for fear of provoking the enemy and risking its approval ratings with the world. The soldier, injured by enemy gunfire at a Jewish holy site, slowly bled to death needlessly while the IDF stood by and watched.

    • Israel also remains the only country in the world ever to voluntarily cooperate in the prosecution of its own intelligence agent, refusing him sanctuary, turning over the documents to incriminate him, denying that the state knew him, and then allowing him to rot in a foreign prison for decades on end, cravenly forgoing its right to simple justice for the nation and for the agent.

    • Additionally, Israel is still the only country in the world ever to violate its own system of justice by repeatedly releasing dangerous, unrepentant murderers and terrorists back into the civilian population with impunity. No other country in the world has ever done this!

    In summary, Israel has the dubious distinction of being the only country in the world so befuddled by moral ambiguity that it is willing to dishonor its dead, betray its bereaved, and disgrace its citizens for the sake of political expediency.

    Earlier this week, the State of Israel began the staged release of some of the worst murderers and terrorists the world has ever seen. Twenty-six out of the 104 murderers scheduled for release went free on Tuesday. Many are serving multiple life sentences for their heinous crimes and their many victims.

    The blood of their victims cries out from the grave at this affront to human decency. Their cries go unheard.

    The bereaved families of the victims beg and plead not to free the savage murderers of their loved ones. Their entreaties are ignored.

    All the polls indicate that the overwhelming majority of Israeli citizens are opposed to the release of the murderers. It is a strange kind of democracy that pays no heed whatsoever to the will of the people.

    No Israeli official has advanced a single compelling reason in support of the wholesale release of these murderers and terrorists. The claim that it “serves national interests” is spurious. There is no national interest that supersedes morality.

    The second-most touted excuse is that the government of Israel was given three existentially threatening choices by its best ally, and the least damaging choice of the three was the release of murderers and terrorists.

    Did anyone at the helm ever consider that given three life-threatening choices, the only response is: “No, no and no!”?

    Overriding all objections, the government of the State of Israel is bound and determined to release the murderers, whose victims are not all dead. Some have been maimed, crippled and disfigured for life. Others show no external scars but have had parents, children and loved ones amputated from their lives. No one sees the broken hearts that will never stop bleeding for their loss.

    Authentic Jewish tradition teaches in great detail how to relate to the dead with honor and reverence. The dead are not only keepers of the past; they are our teachers, our moral guides and our inspiration for the future. A country with no respect for the dead has no respect for the living.

    A sovereign state which is capable of dishonoring its dead by freeing their murderers and tormenting their bereaved loved ones has, in essence, discarded all of the moral underpinnings of its own existence.

    Nor should it come as any surprise – as any student of history knows – that no country can survive without a clearly defined moral infrastructure.

    The Land of Israel is eternal and the State of Israel has temporal stewardship over the land. The corrosive moral ambiguity that has brought us to this dreadful day is relentlessly eating away at the legitimacy of the state’s continued role as legal guardian of the land. The prognosis is dire.

    Only a reawakening of national resolve and a rebirth of ethical politics rooted in national self-respect, moral rectitude and courage of conviction can guarantee the future. No political process devoid of these fundamental values will ever end the agony or the fear for the State of Israel.

    It is clearly time for an historic restoration.

    Jonathan Pollard is completing his 28th year of an unprecedented life sentence in an American prison for his activities on behalf of Israel.

    By JONATHAN POLLARD
    LAST UPDATED: 08/16/2013 08:03

    Find this story at 16 August 2013

    © The Jerusalem Post 1995 – 2012

    Capturing Jonathan Pollard

    De Amerikaanse voormalig spion Jonathan Pollard zit een levenslange gevangenisstraf uit. Als werknemer bij de VS Marine Inlichtingendienst stal hij honderdduizenden geheime documenten en verkocht die aan Israël. De man die hem ontmaskerde, schreef er een boek over.

    Bradley Manning wordt verdacht van het lekken van geheime documenten van de Amerikaanse overheid. Deze documenten werden openbaar gemaakt voor Wikileaks. Nog voordat Manning een eerlijk proces heeft gekregen, zit hij al een ruim een jaar in eenzame opsluiting.

    De omvang en gevoeligheid van de Wikileaks-documenten vallen echter in het niet in vergelijking met het aantal geheime stukken dat Jonathan Pollard begin jaren ’80 aan de Israëliërs heeft overhandigd. Pollard werkte voor de Naval Intelligence Service. Van juni 1984 tot zijn aanhouding in november 1985 wandelde hij bijna dagelijks het gebouw van de Naval Intelligence Command uit met een tas vol top secret documenten.

    De Amerikaanse overheid schat dat hij ruim een miljoen stukken aan de Israëliërs heeft overhandigd. Een van de stukken was het tiendelige boekwerk Radio-Signal Notations (RASIN), een gedetailleerde beschrijving van het netwerk van de wereldwijde elektronische observatie door de Amerikanen.

    Pollard onderzocht

    Capturing Jonathan Pollard werd in 2006 door de Naval Institue Press gepubliceerd. Het boek is van de hand van Ronald Olive, destijds werkzaam voor de Naval Criminal Investigative Service (NCIS). Als medewerker van de NCIS kreeg Olive in 1985 de taak om te onderzoeken of Pollard geheime stukken lekte.

    Het onderzoek volgde op een tip van een medewerker van de Anti-Terrorism Alert Center (ATAC) van de NIS, de afdeling waar Pollard werkte. Deze man zag Pollard het gebouw uitlopen met een stapel papier. De stapel was verpakt in bruin inpakpapier en tape met de code TS/SCI, Top Secret/Sentive Compartmented Information. TS/SCI is een nog zwaardere kwalificatie als top secret.

    Pollard stapte met de stukken bij zijn vrouw Ann in de auto. Nog even dacht zijn collega dat Pollard naar een andere inlichtingendienst, zoals de DIA (Defense Intelligence Service) zou rijden om daar de documenten af te geven. Dit leek onwaarschijnlijk omdat Pollard eerder tegen hem had gezegd dat hij verkeerde documenten had besteld bij het ‘archief’ en dat hij deze nu moest terugbrengen en vernietigen. Pollard en Ann reden echter een geheel andere kant op.

    Olive beschrijft vervolgens de ontmaskering van Jonathan en Ann. In Pollards werkruimte wordt een camera opgehangen die registreert hoe de spion een aktetas vol TS/SCI documenten propt en het gebouw verlaat. Pollard en zijn vrouw ruiken onraad en proberen de sporen van spionage te wissen. Ann moet een koffer vol super geheime documenten, die in hun huis liggen, vernietigen. Zij raakt in paniek en de koffer belandt bij de buren.

    Gevoelige snaar

    Het boek van Ronald Olive is nog even actueel als het eerste boek dat over deze spionagezaak is verschenen in 1989, Territory of Lies: The American Who Spied on His Country for Israel and How He Was Betrayed.

    Begin dit jaar wordt een petitie, ondertekend door meer dan 10.000 Israëliërs, aan de Israëlische president Shimon Peres gezonden. Hierin roepen politici, kunstenaars en andere bekende en onbekende Israëliërs de president op om Pollard vrij te krijgen. Op 1 september 2010 berichtte de LA Times zelfs dat de vrijlating van Pollard de bevriezing van de bouw van Israëlische nederzettingen in de bezette gebieden zou verlengen.

    Pollard raakt kennelijk een gevoelige snaar, zowel in Israël als in de Verenigde Staten. Schrijver Olive op zijn beurt bevindt zich in een gezelschap van allerlei mensen die er voor ijveren om de spion zijn gehele leven achter slot en grendel te houden, hoewel levenslang in de Verenigde Staten niet echt levenslang hoeft te zijn. Bij goed gedrag kunnen gevangenen na dertig jaar vrijkomen.

    In 1987 werd Pollard veroordeeld tot levenslang na een schuldbekentenis en toezegging dat hij de Amerikaanse overheid zou helpen bij het in kaart brengen van de schade die hij door zijn spionage-activiteiten had veroorzaakt. Die schade werd door de toenmalige minister van Defensie Casper Weinberger vastgelegd in een memorandum van 46 pagina’s, welke nog steeds niet openbaar is gemaakt. Pollard’s vrouw kreeg vijf jaar gevangenisstraf voor het in bezit hebben van staatsgeheime documenten.

    Capturing Jonathan Pollard is geen spannend fictie / non-fictie boek met een twist, zoals Spywars van Bagley. Olive beschrijft droog het leven van de spion vanaf het moment dat hij bij de CIA solliciteert, tot aan de dag van zijn veroordeling. Natuurlijk is de schrijver begaan met de geheimhouding van Amerikaanse strategische informatie en verbaast het niet dat hij bij het verschijnen van het boek in 2006 een pleidooi hield om Pollard niet vrij te laten.

    Niet kieskeurig

    Hoewel de volle omvang van het lekken van Pollard niet duidelijk wordt beschreven, blijkt dat Pollard niet bepaald kieskeurig was. De Israëliërs hadden hem lijsten meegegeven van wat zij graag wilden hebben, vooral informatie over het Midden-Oosten, maar ook over de Russen en operaties van de Amerikanen in het Middellandse Zee gebied.

    Zodra Pollard echter stukken langs ziet komen die ook voor andere landen interessant zouden kunnen zijn, probeert hij ook daar te winkelen. Zo poogt hij geheime documenten aan de Chinezen, Australiërs, Pakistani en de Zuid-Afrikanen, maar ook aan buitenlandse correspondenten te slijten.

    Het gegeven dat landen elkaars strategische informatie en geheimen proberen te stelen, is niet nieuw. Het bestaan van contra-spionage afdelingen toont aan dat geheime diensten daar zelf ook rekening mee houden. De Australiërs dachten dan ook dat Pollard onderdeel uitmaakte van een CIA-operatie. Hoewel ze dat eigenlijk niet konden geloven, vermeed hun medewerker Pollard en werd de zaak niet gemeld bij Amerikaanse instanties.

    Als onderdeel van thrillers en spannende lectuur zijn de spionage praktijken van Pollard, zoals Olive die beschrijft, niet bijster interessant, want het leidt af van waar het werkelijk om draait. Daarentegen is het boek van grote waarde waar het gaat om de beschrijving van de persoon Pollard, de wijze waarop hij kon spioneren, zijn werkomgeving, de blunders die worden gemaakt – niet alleen het aannemen en overplaatsen van Pollard, maar ook de wijze waarop geheimen zo eenvoudig kunnen worden gelekt – eigenlijk de totale bureaucratie die de wereld van inlichtingendiensten in zijn greep heeft.

    Hoewel deze persoonlijke en bureaucratische gegevens niet breed worden uitgemeten – Olive is zelf een voormalig inlichtingenman – verschaft het boek een veelheid aan informatie daarover. De schrijver lijkt die persoonlijke details specifiek aan Pollard te koppelen, alsof het niet voor andere medewerkers zou gelden.

    Opschepper

    Dit gaat ook op ook voor de gemaakte fouten van de bureaucratie rond de carrière van de spion. Zo lijkt Pollard van jongs af aan een voorliefde te hebben gehad om spion te worden, of in ieder geval iets geheims te willen doen in zijn leven. Tijdens zijn studie schept hij erover op dat hij voor de Mossad zou werken en had gediend in het Israëlische leger. Zijn vader zou ook voor de CIA werkzaam zijn.

    Aan deze opschepperij verbindt Olive een psychologisch element. Het zou een soort compensatie zijn voor de slechte jeugd van Pollard die vaak zou zijn gepest. Ook zijn vrouw zou niet bij hem passen omdat die te aantrekkelijk is. Pollard moet dat compenseren door stoer te doen. Later, toen hij voor een inlichtingendienst werkte, voelde hij zich opnieuw het buitenbeentje. Zijn carrière verliep alles behalve vlekkeloos, regelmatig werd hij op een zijspoor gezet.

    Olive schetst een beeld van een verwend kind, dat niet op juiste waarde werd ingeschat en stoer wilde doen. Was Pollard echter zoveel anders dan zijn voormalige collega analisten of medewerkers van de inlichtingendienst? Werken voor een inlichtingendienst vereist een zekere mate van voyeurisme, een gespleten persoonlijkheid. Buiten je werk om kun je niet vrijelijk praten over datgene waar je mee bezig bent.

    Dat doet wat met je psyche, maar trekt ook een bepaald soort mensen aan. Het werk betreft namelijk niet het oplossen van misdrijven, maar het kijken in het hoofd van mogelijke verdachten. Het BVD-dossier van oud-provo Roel van Duin laat zien dat een dienst totaal kan ontsporen door zijn eigen manier van denken. Dat komt echter niet voort uit de dienst als abstracte bureaucratie, maar door toedoen van de mensen die er werken.

    Roekeloos

    Pollard gedroeg zich arrogant en opschepperig, misschien wel om zijn eigen onzekerheid te maskeren. Dergelijk gedrag wordt door de schrijver verbonden aan zijn spionage-activiteiten voor de Israëliërs. Pollard was echter niet getraind in het lekken van documenten en ging verre van zorgvuldig te werk. Hij deed het zo openlijk dat het verbazingwekkend is dat het zo lang duurde voordat hij tegen de lamp liep. Hij zei bijvoorbeeld tegen de Israëliërs dat zij alleen de TS/SCI documenten moesten kopiëren en dat ze de rest mochten houden.

    In de loop van de anderhalf jaar dat hij documenten naar buiten smokkelde, werd hij steeds roekelozer. Dat hij gespot werd met een pak papier onder zijn arm terwijl hij bij zijn vrouw in de auto stapte, was eerder toeval dan dat het het resultaat was van grondig speurwerk van de NCIS.

    Eenmaal binnenin het inlichtingenbedrijf zijn de mogelijkheden om te lekken onuitputtelijk. Als Pollard wel getraind was geweest en zorgvuldiger te werk was gegaan, dan had hij zijn praktijk eindeloos kunnen voorzetten. Welke andere ‘agenten’ doen dat wellicht nog steeds? Of welke andere medewerkers waren minder roekeloos en tevreden geweest met het lekken van enkele documenten?

    Die medewerkers vormen gezamenlijk het systeem van de dienst. Pollard schepte graag op, maar de schrijver van Spy Wars, Bagley, klopte zich ook graag op de borst en, hoewel in mindere mate, Ronald Olive ook. Iets dat eigenlijk vreemd is, als het aantal blunders in ogenschouw wordt genomen nadat Pollard ontdekt was. Alleen omdat de Israëliërs Pollard de toegang tot de diplomatieke vestiging ontzegden, zorgde ervoor dat hij alsnog gearresteerd en levenslang kreeg in de VS. Hij was echter bijna ontsnapt.

    Blunders

    Het is daarom niet gek dat inlichtingendiensten een gebrek aan bescheidenheid vertonen. Vele aanslagen zijn voorkomen, wordt vaak beweerd, maar helaas kunnen de diensten geen details geven. Het klinkt als Pollard, op bezoek bij Olive, die breed uitmeet dat hij die en die kent op de Zuid-Afrikaanse ambassade en of hij die moet werven als spion. Olive was werkzaam voor de NCIS. Pollard bezocht hem voordat hij werd ontmaskerd. Zijn eigen gebrek aan actie in relatie tot de twijfels over Pollard toont aan dat geen enkel bureaucratisch systeem perfect is, ook niet dat van inlichtingendiensten.

    Het is niet verbazingwekkend dat de carrière van Pollard bezaaid is met blunders. Hij werd dan wel afgewezen door de CIA, maar waagde vervolgens een gokje bij een andere dienst en had geluk. Hij werd bij de NIS aangenomen en kroop zo langzaamaan in de organisatie. De fouten die bij het aannamebeleid en bij de evaluaties van Pollard zijn gemaakt, worden door Olive gepresenteerd als op zichzelf staand, maar de hoeveelheid blunders en gebrekkige administratie lijken zo talrijk dat het geen toevalstreffers zijn.

    Bij elke promotie of overplaatsing lijkt slechts een deel van zijn persoonsdossier hem te volgen. De NIS wist vanaf het begin niet dat Pollard eerder door de CIA werd afgewezen. Als zijn toegang tot geheime documenten wordt ingetrokken, wacht Pollard net zo lang tot bepaalde medewerkers zijn overgeplaatst of vertrokken. Hij wordt dan wel afgeschilderd als een verwend kind dat met geheimen speelt, regelmatig moet Olive echter toegeven dat Pollard een briljant analist is. Pas in de laatste maanden van zijn spionage-activiteiten, lijdt zijn werk onder de operatie om zoveel mogelijk documenten naar buiten te smokkelen.

    Waarom Pollard de Amerikaanse overheid schade toebracht, wijdt Olive vooral aan zijn joodse afkomst. Niet dat de schrijver alle joodse Amerikanen verdenkt, maar een belangrijke reden voor het fanatiek lekken wordt verklaard aan de hand van Pollard’s wens om naar Israël te emigreren. Olive gaat echter voorbij aan het geld dat de spion aan zijn activiteiten verdiende. Aanvankelijk 1.500 dollar per maand, na een paar maanden 2.500 en twee volledig verzorgde reizen met zijn vrouw naar Europa en Israël en tot slot een Zwitserse bankrekening met jaarlijks een bonus van 30.000 dollar.

    Los van de Zwitserse rekening schat de Amerikaanse overheid dat Pollard rond de 50.000 dollar aan zijn spionagewerk heeft overgehouden. Eigenlijk niet eens veel in vergelijking met de één miljoen documenten die hij leverde. De onderhandelingen over het geld maken echter duidelijk dat Pollard wel degelijk geïnteresseerd was om zoveel mogelijk te verdienen. De prijs werd gedrukt omdat de Israëliërs niet erg toeschietelijk waren en Pollard ze sowieso wilde helpen.

    Afkomst

    Zijn joodse afkomst zat hem in de weg, want waarschijnlijk had hij alleen al voor het tiendelige boekwerk Radio-Signal Notations (RASIN) 50.000 dollar kunnen krijgen. Uiteindelijk blijkt Pollard een gewoon mens die de verlokking van het geld niet kon weerstaan. Andere agenten zijn hem voorgegaan en hebben zijn voorbeeld gevolgd.

    Het nadeel van zijn afkomst blijkt ook uit het feit dat hij zijn Israëlische runner een ‘cadeautje’ gaf. Aviem Sella had mee gevochten in de zesdaagse Yom Kippur oorlog en was een van de piloten die de Iraakse kernreactor in Osirak bombardeerde. Pollard gaf hem destijds satellietbeelden van die aanval. Sella wordt nog steeds gezocht voor Verenigde Staten voor spionage.

    De operatie werd door een andere veteraan, Rafi of Rafael Eitan, geleid. Onder diens leiding spoorde de Mossad Adolf Eichmann op. Eitan en Sella werden rijkelijk beloond voor hun werk met Pollard, maar moesten hun promoties inleveren omdat de Amerikanen eind jaren ’80 furieus reageerden. Na de arrestatie van Pollard beweerden de Israëliërs dat ze helemaal niet zoveel documenten hadden gekregen van de spion en de onderhandelingen over teruggave uiterst stroef waren verlopen.

    Uiteindelijk werd maar een fractie van de documenten teruggegeven aan de Amerikanen. De Israëliërs waren vooral bezig om na zijn veroordeling Pollard vrij te krijgen. Premier Nethanyahu sprak vorig jaar de Knesset toe over het lot van Pollard, terwijl de Israëlische ambassadeur in de VS hem juli 2011 bezocht in de gevangenis.

    Tot nu toe lijken de Amerikanen niet van zins om hem vrij te laten. Na de veroordeling van Pollard kwam de campagne Free Pollard op gang. Zijn vrouw verdween uit beeld. Niet alleen Israëliërs nemen deel aan de campagne, maar ook Alan Dershowitz, professor aan de Harvard Law School en andere academici. In het laatste hoofdstuk More sinned against than sinning beschrijft Olive enkele andere spionnen die documenten verkochten aan buitenlandse mogendheden.

    Capturing Jonathan Pollard was nog niet gepubliceerd toen de stroom Wikileaks-documenten op gang kwam. Die documenten laten echter zien dat een waterdicht systeem niet bestaat en dat mensen voor geld of om andere redenen geheime stukken lekken. De Wikileaks-documenten onderstrepen dat er sinds de jaren ’80 weinig is veranderd. Met als enige verschil de hardvochtige wijze waarop verdachte Manning in deze zaak wordt behandeld en de gebrekkige aandacht die hij krijgt van professoren en andere betrokkenen bij de Wikileaks-documenten.

    Capturing Jonathan Pollard: How One of the Most Notorious Spies in American History Was Brought to Justice. Auteur Ronald J. Olive. Uitgeverij US Naval Institute Press (2006).

    Find this story at 19 June 2012

    CIA NYPD IG

    just some parts

    The CIA inspector general’s report — completed in late 2011, but just declassified in response to a Freedom of Information Act lawsuit by The New York Times — raises concerns about the relationship between the organizations.

    The investigation found “irregular personnel practices” and “inadequate direction and control” by CIA managers “responsible for the relationship.”

    “As a consequence, the risk to the Agency (CIA) is considerable and multifaceted,” said a memo from Inspector General David Buckley to David Petraeus, who was the CIA director at the time.

    “While negative public perception is to be expected from the revelation of the agency’s close and direct collaboration with any local domestic police department, a perception that the agency has exceeded its authorities diminishes the trust place in the organization.”

    The Associated Press reported that the NYPD Intelligence Division dispatched CIA-trained undercover officers into minority neighborhoods to gather intelligence on daily life in mosques, cafes, bars and bookstores.

    It said police have used informers to monitor sermons during religious services and police officials keep tabs on clerics and gather intelligence on taxi cab drivers and food-cart vendors, who are often Muslim, in New York.

    The New York Police Department blasted the report as “fictional.”

    “Even for a piece driven by anonymous NYPD critics, it shows that we’re doing all we reasonably can to stop terrorists from killing more New Yorkers,” said police spokesman Paul Browne.

    The CIA has also previously said that suggestions that it engaged in domestic spying were “simply wrong.”

    Find this document at

    Fresh questions for NYPD as CIA collaboration revealed in new report

    Civil liberties groups express concern over ‘deeply troubling’ report that sets out surveillance of New Yorkers since 9/11

    The NYPD has steadfastly argued that its counter-terrorism operations have stopped 14 terrorist plots since September 11. Photograph: Colleen Long/AP

    Campaigners for greater accountability at New York’s powerful police force have seized on a report that details for the first time the extent of the collaboration between the CIA and the NYPD in the years after 9/11.

    The formerly classified inspector-general’s report also raises new questions over whether the spy agency’s partnership with the nation’s largest police department amounted to unofficial cover for CIA officers to operate in the US in ways that could otherwise be deemed unlawful.

    The 12-page document, first described in a New York Times article published on Wednesday night, contains the December 2011 findings of an investigation into the CIA’s training and support of the NYPD that included embedding four officers in the department in the decade following the September 11 attacks.

    According to the report, one of the individuals engaged in surveillance operations on US soil and believed there were “no limitations” on his activities. The report said another officer was given “unfiltered” access to police reports that had nothing to do with foreign intelligence.

    The partnership led to “irregular personnel practices” devoid of “formal documentation in some important instances”, CIA inspector David Buckley found. While the review found no agency employees in violation of the law and Buckley determined “an insufficient basis to merit a full investigation” into the partnership, the inspector-general said the “risks associated with the agency’s relationship with NYPD were not fully considered and that there was inadequate direction and control by the agency managers responsible for the relationship”.

    The inquiry was prompted by a Pulitzer Prize-winning series of investigative stories by the Associated Press into the NYPD’s intelligence division. David Cohen, a veteran CIA officer with no police experience, was the architect of the NYPD’s spy programme and remains the department’s deputy commissioner for intelligence. The AP found that under Cohen and commissioner Ray Kelly, the intelligence division targeted more than 250 mosques along the east coast, infiltrated student groups and mapped Muslim neighbourhoods for surveillance.

    The NYPD has steadfastly defended its efforts, arguing that its counterterrorism operations have stopped 14 terrorist plots since 2001, although that claim has been contested in the case of almost every alleged plot.

    “We’re proud of our relationship with CIA and its training,” NYPD spokesman Paul Browne told the New York Times. Terrorists “keep coming and we keep pushing back”, he said.

    In an extended interview with the Wall Street Journal in April, Kelly was asked if changes had been made to the NYPD’s surveillance programs in the wake of the AP series. “No,” he said.

    Speaking to the Guardian on Thursday, NYPD critics expressed concern over the details revealed in the IG report.

    “This is deeply troubling because, at the very least, it’s clear that there was insufficient legal guidance and oversight for this relationship,” Hina Shamsi, director of the ACLU’s national security project, said. Shamsi is a lead attorney on a lawsuit filed last week on behalf of several Muslims and Islamic organisations accusing the NYPD of unlawful surveillance.

    “A key question is what information went back and forth between people even if they, at least formally, appear to have severed their relationship with the CIA,” she said. “It is very clear that there was insufficient legal guidance and oversight and that what should be a clear firewall between the CIA and local law enforcement, in terms of law enforcement and intelligence gathering, appears to be porous.”

    Shamsi said “the extent to which these people who were from the CIA had access to CIA databases, operations and information while they were embedded with the NYPD” remained murky. “That’s the thing the report doesn’t address,” she said.

    Faiza Patel, co-director of the Liberty and National Security Program at the Brennan Center for Justice at the New York University School of Law, said in an email to the Guardian that the report confirmed much of what had been reported or suspected in previous years, but expressed fear that the police department had internalised the worldview of an intelligence agency.

    “We already knew that the CIA inspector-general was concerned about irregularities in the assignment of CIA officers to the NYPD. The IG report shows that the concern was more serious than personnel issues, but touched on the agency’s involvement in purely domestic intelligence operations,” she said.

    Patel said that “at least one CIA analyst claimed that he was given unfettered access to NYPD intelligence reports” but said “the bigger issue, in my mind, is the extent to which the CIA’s way of working influenced the NYPD’s intelligence program”.

    “Brooklyn is not Baghdad,” Patel said. “All New Yorkers have a stake in the city’s safety and should be treated as partners in fighting crime and terrorism. The CIA, of course, operates in very different environments. My concern is that a mindset forged in counter-insurgency operations unduly shaped the NYPD’s intelligence operations, especially its Muslim surveillance program.”

    The Freedom of Information Act that eventually resulted in the disclosure of the inspector-general’s report was filed on 28 March 2012 by Ginger McCall, director of the open government project at the Electronic Privacy Information Center in Washington DC.

    The IG report showed the CIA had been dishonest in describing its relationship with the NYPD, McCall told the Guardian.

    “The report indicates that the CIA was not forthright with the American public about its activities,” she said, noting that the review detailed the work of four CIA employees with the department. Previous reporting had indicated there were only two. Some of those individuals, McCall said, “did have the opportunity to participate in domestic surveillance and domestic-focused investigations”.

    Attorney Jethro Eisenstein has been at the head of a four-decade lawsuit accusing the NYPD of violating a set of department rules prohibiting the investigation of political activity in the absence of an indication of illegal activity. Known as Handschu, the rules were developed in response to the department’s past surveillance of radical and activist groups. The rules are now at the heart of the legal debate over the NYPD’s CIA-backed surveillance of Muslim communities.

    Speaking to the Guardian, Eisenstein paraphrased the CIA’s assessment of its work with the NYPD, as described in the IG report as: “‘We were very sloppy in dealing with the NYPD, and maybe we got too deep in bed with them, and maybe we shouldn’t be doing that.'”

    Eisenstein said Cohen’s appointment to the department brought about a dangerous shift. “Once Cohen came aboard, the whole ethos of the place changed,” he said. “They stopped being cops. They started being an intelligence agency. As far as intelligence agencies are concerned, the more information about the more people, the better. And that’s contrary to what the Handschu rules say.”

    “It’s a whole different mindset. Law enforcement is about identifying, stopping illegal activity or apprehending people who have engaged in illegal activity. It’s a totally different model from intelligence gathering,” he said. Eisenstein said the shift represented “a huge danger”.

    A veteran NYPD reporter and author of the book NYPD Confidential, Leonard Levitt, said Michael Bloomberg’s successor as mayor should launch an independent commission to investigate the police department.

    “Somebody needs to look at what’s gone on in these 12 years,” Levitt said.

    Sign up for the Guardian Today

    Our editors’ picks for the day’s top news and commentary delivered to your inbox each morning.
    Sign up for the daily email

    What’s this?
    More from the Guardian
    Giant panda’s second cub stillborn as zoo reports twin is in excellent health
    25 Aug 2013
    Child poverty in Britain is causing ‘social apartheid’
    24 Aug 2013
    Colin Murray on Clare Balding: ‘The second I said it I knew it was too much’
    25 Aug 2013
    Syria debate: parliament did its job when it mattered
    29 Aug 2013

    What’s this?
    More from around the web

    Inside South Africa’s Hunt for Alternative Energy
    (YouTube)
    iPhone 5S ‘dropping September 20th’, iPhone 6 a few weeks later
    (uSwitch)
    E-Cigarettes Want Your Attention Now (Before the FDA Steps In)
    (BusinessWeek)
    The Chicest Dessert for Your Impromptu Dinner Party
    (J.Crew)

    Related information
    World news
    CIA · New York · NYPD · Surveillance · United States ·

    NYPD secretly labels mosques as terror groups and spies on them

    28 Aug 2013

    Confidential police documents uncovered by the AP show at least a dozen terrorism investigations into mosques since 9/11

    22 Aug 2013

    New York city council overrides mayor in vote for greater police oversight

    22 Aug 2013

    New Yorkers on stop-and-frisk: ‘Out here? Nothing’s going to change’

    17 Aug 2013

    Legalise marijuana, tax it – and end NYC’s wrongheaded war on pot

    New York City appeals ruling imposing reform on NYPD stop-and-frisk

    16 Aug 2013

    Head of city’s law department says ’the safety of all New Yorkers’ is at stake in controversy over police tactic

    Ryan Devereaux in New York
    theguardian.com, Thursday 27 June 2013 23.29 BST

    Find this story at 27 June 2013

    © 2013 Guardian News and Media Limited or its affiliated companies. All rights reserved.

    How the CIA Aided the NYPD’s Surveillance Program

    In the years after the attacks on September 11th, 2001, the NYPD had at least four “embedded” CIA officers in their midst. And because at least one of the officers was on unpaid leave at the time, the officer was able to bypass the standing prohibition against domestic spying for the agency and help conduct surveillance for the police force. In his words, he had “no limitations.”

    The news comes from a FOIA request by the New York Times for a 2011 review by the CIA’s inspector general of the embedded analysts. The report, published Wednesday by the paper, criticized the program’s “irregular personnel practice,” “inadequate direction and control,” and risks posed to the agency’s practice and reputation. The existence of the review is public knowledge — it followed the Pulitzer-winning series of reports on NYPD spying on Muslims, which reported on the CIA’s assistance to the NYPD, and vice versa:

    “Though the CIA is prohibited from collecting intelligence domestically, the wall between domestic and foreign operations became more porous. Intelligence gathered by the NYPD, with CIA officer Sanchez overseeing collection, was often passed to the CIA in informal conversations and through unofficial channels, a former official involved in that process said. By design, the NYPD was looking more and more like a domestic CIA.”

    As the Times notes, the public statement on the CIA’s review of the program stated that no laws had been broken. But the actual document shows that the agency had a much more mixed response to the program, and reveals more details on how the program worked:

    “The report shows that the first of the four embedded agency officers began as an adviser in 2002 and went on an unpaid leave from the agency from 2004 to 2009. During that latter period, it said, he participated in — and directed — “N.Y.P.D. investigations, operations, and surveillance activities directed at U.S. persons and non-U.S. persons.”

    C.I.A. lawyers signed off on the arrangement because the officer was on a “leave without pay” status at the agency and was “acting in a personal capacity and not subject to C.I.A. direction.” As a result, the official “did not consider himself an agency officer and believed he had ‘no limitations’ as far as what he could or could not do,” the report said.”

    Earlier this month, the ACLU sued the NYPD over the domestic spying program, which targeted Muslims. Meanwhile, the CIA itself isn’t having the best news day either — but at least the Times story wasn’t the result of a leak.

    Jun 26, 2013

    Find this story at 26 June 2013

    © 2013 by The Atlantic Monthly Group

    US-Geheimdienst: BND übermittelt afghanische Funkzellendaten an NSA

    Die Daten können Experten zufolge Hinweise für gezielte Tötungen liefern: Nach SPIEGEL-Informationen stammt ein beträchtlicher Teil der an die NSA übertragenen Daten aus der Funkzellenauswertung in Afghanistan. Der BND wiegelt ab.

    Hamburg – Der Bundesnachrichtendienst (BND) übermittelt nach SPIEGEL-Informationen afghanische Funkzellendaten an den US-Geheimdienst NSA. Spionageprogramme wie XKeyscore erstellen daraus Bewegungsprofile. Sie zeigen mit nur wenigen Minuten Verzögerung an, wo sich Handy-Nutzer aufhalten – und spielten womöglich eine wichtige Rolle bei der gezielten Tötung von Qaida-Kämpfern durch US-Drohnen.

    Der BND erklärte, Mobilfunkdaten seien für eine zielgenaue Lokalisierung eines Menschen nicht geeignet. Experten gehen aber davon aus, dass Funkzellendaten Hinweise für gezielte Tötungen liefern können. Auch die “Süddeutsche Zeitung” hatte am Samstag einen Experten zitiert, wonach die Daten des BND zur Ortung nützlich seien.

    Der Bürgerrechtler Burkhard Hirsch (FDP) hält den Datentransfer, der offenbar jenseits der parlamentarischen Kontrolle stattfindet, für sehr problematisch. “Wenn der BND in solchem Umfang für einen anderen Geheimdienst tätig wird, dann ist das ein politischer Vorgang, der unter allen Umständen im zuständigen Bundestagsgremium hätte behandelt werden müssen”, sagte Hirsch dem SPIEGEL.

    BND-Präsident Gerhard Schindler sagte der “Bild am Sonntag”, die Kooperation mit der NSA diene “auch dem unmittelbaren Schutz unserer in Afghanistan eingesetzten Soldatinnen und Soldaten”. Die durch die Fernmeldeaufklärung gewonnenen Erkenntnisse trügen dazu bei, Anschlagsplanungen von Terroristen rechtzeitig erkennen zu können. Dies gehöre zu den “prioritären Aufgaben” eines Auslandsnachrichtendiensts.

    Gegenüber dem SPIEGEL erklärte der BND, er habe seit Januar 2011 “maßgebliche Hilfe” bei der Verhinderung von vier Anschlägen auf deutsche Soldaten in Afghanistan geleistet. Bei weiteren 15 verhinderten Anschlägen habe die Datenüberwachung “zu diesen Erfolgen beigetragen”.

    11. August 2013, 14:12 Uhr

    Find this story at 11 August 2013

    © SPIEGEL ONLINE 2013

    Berlin Denies Military Knew About Prism

    A media report on Wednesday alleged that a NATO document proves the German military knew about the NSA’s Prism surveillance program in 2011. But both Berlin and the country’s foreign intelligence agency deny the account, saying there was a NATO program with the same name in Afghanistan.

    The German government has so far claimed that it knew nothing of the United States’ Prism spying program, revealed by whistleblower Edward Snowden last month. But parts of a confidential NATO document published by daily Bild on Wednesday show that the German military, the Bundeswehr, may have already been aware of the National Security Agency’s operations in 2011, the paper alleged.

    The document, reportedly sent on Sept. 1, 2011 to all regional commands by the joint NATO headquarters in Afghanistan, gives specific instructions for working together on a program called Prism, which the paper said was the same as that run by the NSA. According to Bild, the document was also sent to the regional command in northern Afghanistan, for which Germany was responsible at the time under General Major Markus Kneip.

    Should the media report be confirmed, Berlin’s claims of ignorance will prove to have been false. But on Wednesday afternoon, Chancellor Angela Merkel’s spokesman Steffen Seibert denied the Bild story, saying that the document referred to a separate program that had been run by NATO troops, and not the US. The programs were “not identical,” he said.

    The BND, Germany’s foreign intelligence agency, also weighed in with a statement, saying that the program had not been confidential and was also not the same as the NSA’s Prism operation. “The program called Prism by the Bild report today is a NATO/ISAF program that is not identical to the NSA’s program,” it said. “The BND had no knowledge of the name, range or scope of the NSA program.”

    A Separate Prism Program?

    According to the document cited by Bild, as of Sept. 15 that year, regional commands were instructed to apply for monitoring telephone calls and e-mails, according to the document, in which Prism is named at least three times. “Existing COMINT (communications intelligence) nominations submitted outside of PRISM must be resubmitted into PRISM IOT,” it reads.

    It also states that access to the Prism program is regulated by the Joint Worldwide Intelligence Communications System (JWICS), which is used by various US intelligence services to transmit classified information.

    “Coalition RCs (regional commands) will utilize the US military or civilian personnel assigned to their collection management shop ISRLO (Intelligence, Surveillance and Reconnaissance Liaison Officer),” it goes on. In Bild’s assessment, “military or civilian personnel” stands for US intelligence service staff.

    Keeping Track of Terrorists

    The purpose of all this was to “submit the telephone numbers and email addresses of terrorists into the surveillance system,” the paper reports.

    It also claims to have seen documents indicating that the BND, Germany’s foreign intelligence agency, provided such telephone numbers to NATO, where they were ultimately fed into the surveillance system as well.

    The reason for the NATO order was that the NSA’s director had tasked the US military with coordinating surveillance in Afghanistan, Bild reported.

    The German Defense Ministry told the paper that it had “no information and knowledge of such an order,” but would be looking into the matter.

    In response to the report, Green party parliamentarian and defense spokesman Omid Nouripour told SPIEGEL ONLINE that Defense Minister Thomas de Maizière must clarify the situation. “These circumstances destroy the government’s line of defense” on the NSA scandal, he said. Chancellor Angela Merkel’s center-right coalition can “no longer claim it didn’t know anything about Prism.”

    As more details emerge about the scope of the NSA’s worldwide spying program and Germany’s alleged role in the surveillance, the scandal is becoming a central issue in the country’s campaign for the upcoming general election. Germans are particularly sensitive about data protection because of their history of state encroachment on civil liberties, first under the Nazis and then in communist East Germany. And if it turns out that Berlin knowingly tolerated and participated in the NSA activities, many would see it as a betrayal by the government.

    07/17/2013 12:29 PM
    Media Report

    Find this story at 17 July 2013

    © SPIEGEL ONLINE 2013

    Germany backs away from claims NSA program thwarted five attacks

    German Interior Minister Hans-Peter Friedrich is backing off his earlier assertion that the Obama administration’s NSA monitoring of Internet accounts had prevented five terror attacks in Germany, raising questions about other claims concerning the value of the massive monitoring programs revealed by NSA leaker Edward Snowden.

    Friedrich had made the assertion about the number of attacks that the NSA programs – which scoop up records from cellphone and Internet accounts – had helped to avert after a brief visit to the United States last week. But on Tuesday, he told a German parliamentary panel, “It is relatively difficult to count the number of terror attacks that didn’t occur.” And on Wednesday, he was publically referring to just two foiled attacks, at least one and possibly both of which appeared to have little to do with the NSA’s surveillance programs.

    The questions about the programs’ value in thwarting attacks in Germany come as some members of the U.S. Congress have told Obama officials that the programs exceeded what Congress authorized when it passed laws that the administration is arguing allowed the collection of vast amounts of information on cellphone and Internet email accounts.

    In Germany, the concern is that the NSA is capturing and storing as many as 500 million electronic communications each month, but Germans are getting little if anything back for what is seen as an immoral and illegal invasion of privacy.

    Friedrich spent July 11-12 in the United States for meetings with U.S. officials on the NSA programs that German Chancellor Angela Merkel had requested. The point of the meetings was to gather information that would calm a building German angst over the spy scandal.

    Instead of being reassured, however, opposition politicians and commentators now are talking about the arrogance of the U.S. application of “winner’s power” (a reference to the political authority the United States had here during the Cold War, when Germany was divided between east and west, and West Germany leaned heavily on America for support), and how traditionally strong relations between the two countries have been harmed by the scandal.

    “German-American relations are at risk,” said Hans-Christian Stroebele, a Green Party member of the influential German intelligence oversight committee in the country’s legislature, the Bundestag, which is dominated by Merkel’s Christian Democratic Union. “The longer it takes to uncover the facts after this long silence, the more problematic it becomes. No one even bothers to deny what’s been said. It could be that German or (European Union) courts will have to deal with this.”

    Even as emotions build, NSA plans for expanding a listening station in Germany were revealed this week, raising more questions.

    Stroebele spoke Thursday to McClatchy, addressing Friedrich’s official report, delivered behind closed doors to the Bundestag committee. He said Friedrich received little information from the United States in his quick trip to Washington.

    “We’re lucky to have had Snowden,” Stroebele said. “Without him, this surveillance that is not permissible under international law would have continued for a long time. In Germany, there are prison terms for such spying.”

    Perhaps most troubling was how quickly the government backed down on the claims that the surveillance helped foil terror plots. Gisela Piltz, a Liberal Party member of the Bundestag intelligence committee, said she could not give exact details of what took place in the secret hearing but noted: “There was a clear discrepancy between the previously reported number of foiled terror attacks and the number we talked about.”

    And even those cases raised questions. One of them, commonly known as the Sauerland Cell Plot, involved an alleged conspiracy in 2007 to detonate a series of car bombs in crowded places. Piltz was involved in a Bundestag study of what took place. The goal of the would-be bombers was to surpass the death and injured toll from commuter train attacks in Madrid in 2004, which killed 191 and wounded another 1,800.

    The conspirators, who allegedly included two Germans, had gathered nearly a ton of liquid explosives.

    News reports at the time mentioned an unnamed U.S. intelligence official saying that cellphone calls by the two Germans had been intercepted. But those calls were said to have been made when the Germans were leaving a terror camp in Pakistan – an entirely different scenario from the current monitoring program, which captures data from everyday citizens by casting a worldwide net.

    Piltz said even that participation by U.S. intelligence agencies remains unverified.

    The other case, involving four men with al Qaida connections arrested in Dusseldorf while allegedly preparing to make a shrapnel bomb to detonate at an undecided location, also raised questions about NSA involvement. During the trial, prosecutors said they were alerted to the cell by an informant, after which they studied emails from the four. But such targeted surveillance is not the issue in the NSA programs, one of which, PRISM, reportedly taps into the computers of users of nine Internet companies, including Facebook, Google and Yahoo.

    Defending NSA practices, Friedrich noted that security is a “super fundamental right.” As such it outranks fundamental rights such as privacy. German newspapers were scathing in their assessment, calling Friedrich the “idiot in charge.”

    Piltz said that while terrorism is a real threat, the U.S. monitoring programs have done little to prevent it.

    “Germans are not safer because of U.S. espionage,” Piltz said. “It is true Germany has been lucky not to have suffered a terror attack, but there has to be a balance. We cannot sacrifice freedom for security, and when in doubt I would always opt for freedom.”

    McClatchy special correspondent Claudia Himmelreich in Berlin contributed to this report.

    McClatchy Washington Bureau
    Posted on Thu, Jul. 18, 2013
    By Matthew Schofield | McClatchy Foreign Staff

    last updated: July 18, 2013 05:30:07 PM
    BERLIN — ]

    Find this story at 18 July 2013

    © McClatchy Washington Bureau

    Second Prism program emerges as Friedrich faces committee

    As Germany’s interior minister faced a special select committee, another surveillance program – also called Prism – has come to light. Unlike its more famous global namesake, this Prism is said to be used in Afghanistan.

    German mass-circulation daily Bild first found reference to the Afghanistan Prism program in an order sent out to regional command posts from the NATO headquarters in Kabul.

    The communiqué told ISAF staff to use this Prism database for any data gleaned from monitoring telecommunications or emails, starting on September 15, 2011.

    The German government said it knew nothing about the database, run by the US but accessible to ISAF troops across Afghanistan – including those with Germany’s Bundeswehr – until Wednesday’s report.

    “I can only tell you that this was a NATO/ISAF program, one that was not classified as secret – according to the BND,” Chancellor Merkel’s spokesman Steffen Seibert said. Seibert was referring to a press release from Germany’s equivalent to Washington’s National Security Agency (NSA), the Bundesnachrichtendienst (BND). The BND also said this Prism was “not identical” to the now renowned program revealed by NSA contractor turned whistleblower Edward Snowden in May.
    DW.DE
    Itching to ask: What does Merkel know about NSA surveillance?

    A parliamentary oversight committee in Berlin would like to know how much the German government really knows about NSA spying activities in Germany. Their leverage, however, is limited. (17.07.2013)

    Another ministerial spokesman, Stefan Paris with the defense ministry, said it was quite normal for information like this not to filter back to Berlin unless there was a specific need.

    Friedrich faces closed-door grilling

    Elsewhere in Berlin, Interior Minister Hans-Peter Friedrich completed two days in front of the special committee for internal affairs on Wednesday, facing further questions after his impromptu visit to Washington at the weekend.

    Opposition politicians, who see increasing mileage in the alleged NSA espionage activities, said after the session that Friedrich’s appearance shed little light on proceedings.

    “Everywhere people seem to accept the way the US side is acting with a shrug of the shoulders, while there’s no clarity anywhere,” Social Democrat parliamentarian Michael Hartmann said, adding that he felt the chancellor’s office should be answering questions instead of the interior ministry.

    “My personal impression: Before September 22, nothing is meant to be put on the table here,” Green party politician Wolfgang Wieland said, naming the date of federal elections in Germany.

    Friedrich has so far stressed the NSA’s supposed contribution to stopping five terror plots in Germany, offering data on two of them to date, when discussing the issue. The minister controversially said on Monday that there was a “super-fundamental right” to protecting public safety that trumped even privacy laws.

    British blow to EU data dreams?

    Free Democrat politician Hartfried Wolff, a member of the Bundestag’s interior committee, said on Wednesday that Friedrich had outlined one blow to Chancellor Angela Merkel’s proposed response.

    Merkel said in a key television interview on Sunday that she would be seeking unified EU rules on data protection to allow the bloc to handle the issue better.

    According to Wolff, Friedrich said that the UK was unlikely to support such a move. Since Snowden went public, a UK espionage program called “Tempora” has also come to light.

    Friedrich is a member of the Bavarian sister party of Merkel’s Christian Democrats, the CSU. Bavaria votes in state elections one week before the German ballot.

    msh/rc (AFP, AP, Reuters)
    Date 17.07.2013

    Find this story at 717 July 2013

    © 2013 Deutsche Welle

    Prism in Afghanistan Conflicting Accounts By German Government

    In Germany, the scandal surrounding NSA spying is getting odder by the day. A new Defense Ministry memo suggests a claim made by a mass-circulation newspaper that Germany’s army knew about Prism in 2011 is, in fact, true.

    The scandal in Germany surrounding spying activities by the United States’ National Security Agency took a surprising twist on Thursday. A report by a German mass-circulation daily that described the use of a program called Prism in NATO-occupied Afghanistan has led to the German Defense Ministry contradicting the foreign intelligence agency BND.

    It started on Wednesday when the broadsheet Bild reported that the American intelligence service NSA had deployed the controversial data-collection tool Prism in Afghanistan and that Germany’s armed forces, the Bundeswehr, knew of the program by the autumn of 2011 at the latest.

    German government spokesman Steffen Seibert, speaking on behalf of the BND, was quick to deny the Bild report. He said on Wednesday that the software which had been used in Afghanistan was part of “a NATO/ISAF program and was not the same as the NSA’s Prism program.” Seibert said the programs were “not identical.” According to Seibert’s account, there are two different Prism programs — the much discussed NSA Prism program, which has been used in recent years to intensively monitor German communications, as well as an ISAF program for Afghanistan.

    But the Defense Ministry is now contradicting that characterization. In a two-page memo obtained by several German media outlets, Rüdiger Wolf, a high-ranking ministry official, states that the Prism program used in Afghanistan is a “computer-aided US planning and information analysis tool” used for the coordination of “American intelligence systems,” that is “operated exclusively by US personnel” and is “used Afghanistan-wide by the US side.”

    Prism Accessible Exclusively to Americans

    Wolf describes in detail how the Bundeswehr and NATO have no access to the US program. He adds that while there may be computer terminals at the German base in Mazar-e-Sharif that are equipped to access the program, they can only be used by Americans.

    If members of the Bundeswehr wanted access to information, they had to send a special form to the IJC command center in Kabul, almost entirely controlled by the US Army — that is, if they wanted US data that went beyond the information possessed by NATO intelligence. When they got the data back, “the origin of the information” was “fundamentally unrecognizable” to the Germans.

    It is precisely such procedures that Bild reported on this week, citing a classified September NATO order. In the paper, NATO members, including the German-led Regional Command North in Afghanistan, are called upon to direct requests for the “Prism” system to American personnel — military or civilian (which in this case is a reference to intelligence workers) because NATO has no access to the system. Given that Bild printed a copy of the order in its newspaper, the BND’s portrayal already seemed odd on Wednesday.

    According to Wolf’s own admissions, the Germans don’t know very much about the Prism program in Afghanistan. It is unclear, for example, how Prism is deployed at the US Army-dominated headquarters in Kabul and the ministry doesn’t know the “extent of use.” However, Wolf once more reiterated that all information obtained from intelligence sources served to protect German soldiers — including “insights provided by the US side that could have come from Prism.”

    A Slap in the Face

    The Defense Ministry is also very cautious compared to the BND when it comes to deferentiating the Prism program in Afghanistan from the Prism spying program that was exposed by former NSA contractor Edward Snowden and involves the systematic monitoring of German communications. The information supplied by the US would have pertained only to the situation in Afghanistan. It was “not a data fishing expedition” on German citizens, according to the memo, and in fact had “no proximity” to the NSA surveillance program in Germany and Europe.

    With his cautious formulation, Wolf deliberately avoids saying whether or not the two programs are identical.

    This representation of the facts, which was already made to some extent on Wednesday by Defense Ministry spokesman Stefan Paris, is like a slap in the face for the BND. Shortly after Seibert appeared at the press conference, insiders wondered why the intelligence agency would so unambiguously commit itself to the position that the Prism program in Afghanistan is part of the composite ISAF system. But the BND didn’t pull back on its position, although Paris clearly said that the Prism program in Afghanistan is operated exclusively by Americans.

    Members of the opposition were quick to attack the BND for its assertions. “The Chancellery, acting on behalf of the BND, deliberately lied to the public on Wednesday,” Green Party defense expert Omid Nouripour told SPIEGEL ONLINE. According to Nouripour, Wolf’s description makes it clear that there is no NATO Prism program. The German government, he says, should stop making excuses and finally begin to seriously investigate the spying scandal.

    07/18/2013 09:26 PM

    By Matthias Gebauer

    Find this story at 18 July 2013

    © SPIEGEL ONLINE 2013

    Other Agencies Clamor for Data N.S.A. Compiles

    WASHINGTON — The National Security Agency’s dominant role as the nation’s spy warehouse has spurred frequent tensions and turf fights with other federal intelligence agencies that want to use its surveillance tools for their own investigations, officials say.

    Agencies working to curb drug trafficking, cyberattacks, money laundering, counterfeiting and even copyright infringement complain that their attempts to exploit the security agency’s vast resources have often been turned down because their own investigations are not considered a high enough priority, current and former government officials say.

    Intelligence officials say they have been careful to limit the use of the security agency’s troves of data and eavesdropping spyware for fear they could be misused in ways that violate Americans’ privacy rights.

    The recent disclosures of agency activities by its former contractor Edward J. Snowden have led to widespread criticism that its surveillance operations go too far and have prompted lawmakers in Washington to talk of reining them in. But out of public view, the intelligence community has been agitated in recent years for the opposite reason: frustrated officials outside the security agency say the spy tools are not used widely enough.

    “It’s a very common complaint about N.S.A.,” said Timothy H. Edgar, a former senior intelligence official at the White House and at the office of the director of national intelligence. “They collect all this information, but it’s difficult for the other agencies to get access to what they want.”

    “The other agencies feel they should be bigger players,” said Mr. Edgar, who heard many of the disputes before leaving government this year to become a visiting fellow at Brown University. “They view the N.S.A. — incorrectly, I think — as this big pot of data that they could go get if they were just able to pry it out of them.”

    Smaller intelligence units within the Drug Enforcement Administration, the Secret Service, the Pentagon and the Department of Homeland Security have sometimes been given access to the security agency’s surveillance tools for particular cases, intelligence officials say.

    But more often, their requests have been rejected because the links to terrorism or foreign intelligence, usually required by law or policy, are considered tenuous. Officials at some agencies see another motive — protecting the security agency’s turf — and have grown resentful over what they see as a second-tier status that has undermined their own investigations into security matters.

    At the drug agency, for example, officials complained that they were blocked from using the security agency’s surveillance tools for several drug-trafficking cases in Latin America, which they said might be connected to financing terrorist groups in the Middle East and elsewhere.

    At the Homeland Security Department, officials have repeatedly sought to use the security agency’s Internet and telephone databases and other resources to trace cyberattacks on American targets that are believed to have stemmed from China, Russia and Eastern Europe, according to officials. They have often been rebuffed.

    Officials at the other agencies, speaking only on the condition of anonymity because they were not authorized to discuss the tensions, say the National Security Agency’s reluctance to allow access to data has been particularly frustrating because of post-Sept. 11 measures that were intended to encourage information-sharing among federal agencies.

    In fact, a change made in 2008 in the executive order governing intelligence was intended to make it easier for the security agency to share surveillance information with other agencies if it was considered “relevant” to their own investigations. It has often been left to the national intelligence director’s office to referee the frequent disputes over how and when the security agency’s spy tools can be used. The director’s office declined to comment for this article.

    Typically, the agencies request that the N.S.A. target individuals or groups for surveillance, search its databases for information about them, or share raw intelligence, rather than edited summaries, with them. If those under scrutiny are Americans, approval from the secret Foreign Intelligence Surveillance Court is required.

    The security agency, whose mission is to spy overseas, and the F.B.I., its main partner in surveillance operations, dominate the process as the Justice Department’s main “customers” in seeking warrants from the intelligence court, with nearly 1,800 approved by the court last year.

    In a statement, the security agency said that it “works closely with all intelligence community partners, and embeds liaison officers and other personnel at those agencies for the express purpose of ensuring N.S.A. is meeting their requirements and providing support to their missions.”

    The security agency’s spy tools are attractive to other agencies for many reasons. Unlike traditional, narrowly tailored search warrants, those granted by the intelligence court often allow searches through records and data that are vast in scope. The standard of evidence needed to acquire them may be lower than in other courts, and the government may not be required to disclose for years, if ever, that someone was the focus of secret surveillance operations.

    Decisions on using the security agency’s powers rest on many complicated variables, including a link to terrorism or “foreign intelligence,” the type of surveillance or data collection that is being conducted, the involvement of American targets, and the priority of the issue.

    “Every agency wants to think that their mission has to be the highest priority,” said a former senior White House intelligence official involved in recent turf issues.

    Other intelligence shops usually have quick access to N.S.A. tools and data on pressing matters of national security, like investigating a terrorism threat, planning battlefield operations or providing security for a presidential trip, officials say. But the conflicts arise during longer-term investigations with unclear foreign connections.

    In pressing for greater access, a number of smaller agencies maintain that their cases involve legitimate national security threats and could be helped significantly by the N.S.A.’s ability to trace e-mails and Internet activity or other tools.

    Drug agency officials, for instance, have sought a higher place for global drug trafficking on the intelligence community’s classified list of surveillance priorities, according to two officials.

    Dawn Dearden, a drug agency spokeswoman, said it was comfortable allowing the N.S.A. and the F.B.I. to take the lead in seeking surveillance warrants. “We don’t have the authority, and we don’t want it, and that comes from the top down,” she said.

    But privately, intelligence officials at the drug agency and elsewhere have complained that they feel shut out of the process by the N.S.A. and the F.B.I. from start to finish, with little input on what groups are targeted with surveillance and only sporadic access to the classified material that is ultimately collected.

    Sometimes, security agency and bureau officials accuse the smaller agencies of exaggerating links to national security threats in their own cases when pushing for access to the security agency’s surveillance capabilities. Officials from the other agencies say that if a link to national security is considered legitimate, the F.B.I. will at times simply take over the case itself and work it with the N.S.A.

    In one such case, the bureau took control of a Secret Service investigation after a hacker was linked to a foreign government, one law enforcement official said. Similarly, the bureau became more interested in investigating smuggled cigarettes as a means of financing terrorist groups after the case was developed by the Bureau of Alcohol, Tobacco, Firearms and Explosives.

    Mr. Edgar said officials in the national intelligence director’s office occasionally allow other agencies a role in identifying surveillance targets and seeing the results when it is relevant to their own inquiries. But more often, he acknowledged, the office has come down on the side of keeping the process held to an “exclusive club” at the N.S.A., the F.B.I. and the Justice Department, with help from the Central Intelligence Agency on foreign issues.

    Officials in the national intelligence director’s office worry about opening the surveillance too widely beyond the security agency and the F.B.I. for fear of abuse, Mr. Edgar said. The two intelligence giants have been “burned” by past wiretapping controversies and know the political consequences if they venture too far afield, he added.

    “I would have been very uncomfortable if we had let these other agencies get access to the raw N.S.A. data,” he said.

    As furious as the public criticism of the security agency’s programs has been in the two months since Mr. Snowden’s disclosures, “it could have been much, much worse, if we had let these other agencies loose and we had real abuses,” Mr. Edgar said. “That was the nightmare scenario we were worried about, and that hasn’t happened.”

    Eric Schmitt contributed reporting.

    August 3, 2013
    By ERIC LICHTBLAU and MICHAEL S. SCHMIDT

    Find this story at 3 August 2013

    © 2013 The New York Times Company

    For Western Allies, a Long History of Swapping Intelligence

    BERLIN — When Edward J. Snowden disclosed the extent of the United States data mining operations in Germany, monitoring as many as 60 million of the country’s telephone and Internet connections in one day and bugging its embassy, politicians here, like others in Europe, were by turns appalled and indignant. But like the French before them, this week they found themselves backpedaling.

    In an interview released this week Mr. Snowden said that Germany’s intelligence services are “in bed” with the National Security Agency, “the same as with most other Western countries.” The assertion has added to fresh scrutiny in the European news media of Berlin and other European governments that may have benefited from the enormous American snooping program known as Prism, or conducted wide-ranging surveillance operations of their own.

    The outrage of European leaders notwithstanding, intelligence experts and historians say the most recent disclosures reflect the complicated nature of the relationship between the intelligence services of the United States and its allies, which have long quietly swapped information on each others’ citizens.

    “The other services don’t ask us where our information is from and we don’t ask them,” Mr. Snowden said in the interview, conducted by the documentary filmmaker Laura Poitras and Jacob Appelbaum, a computer security researcher, and published this week in the German magazine Der Spiegel. “This way they can protect their political leaders from backlash, if it should become public how massively the private spheres of people around the globe are being violated.”

    Britain, which has the closest intelligence relationship with the United States of any European country, has been implicated in several of the data operations described by Mr. Snowden, including claims that Britain’s agencies had access to the Prism computer network, which monitors data from a range of American Internet companies. Such sharing would have allowed British intelligence agencies to sidestep British legal restrictions on electronic snooping. Prime Minister David Cameron has insisted that its intelligence services operate within the law.

    Another allegation, reported by The Guardian newspaper, is that the Government Communications Headquarters, the British surveillance center, tapped fiber-optic cables carrying international telephone and Internet traffic, then shared the information with the N.S.A. This program, known as Tempora, involved attaching intercept probes to trans-Atlantic cables when they land on British shores from North America, the report said.

    President François Hollande of France was among the first European leaders to express outrage at the revelations of American spying, and especially at accusations that the Americans had spied on French diplomatic posts in Washington and New York.

    There is no evidence to date that French intelligence services were granted access to information from the N.S.A., Le Monde reported last week, however, that France’s external intelligence agency maintains a broad telecommunications data collection system of its own, amassing metadata on most, if not all, telephone calls, e-mails and Internet activity coming in and out of France.

    Mr. Hollande and other officials have been notably less vocal regarding the claims advanced by Le Monde, which authorities in France have neither confirmed nor denied.

    Given their bad experiences with domestic spying, first under the Nazis and then the former the East German secret police, Germans are touchy when it comes to issues of personal privacy and protection of their personal data. Guarantees ensuring the privacy of mail and all forms of long-distance communications are enshrined in Article 10 of their Constitution.

    When the extent of the American spying in Germany came to light the chancellor’s spokesman, Steffen Seibert, decried such behavior as “unacceptable,” insisting that, “We are no longer in the cold war.”

    But experts say ties between the intelligence services remain rooted in agreements stemming from that era, when West Germany depended on the United States to protect it from the former Soviet Union and its allies in the East.

    “Of course the German government is very deeply entwined with the American intelligence services,” said Josef Foschepoth, a German historian from Freiburg University. Mr. Foschepoth spent several years combing through Germany’s federal archives, including formerly classified documents from the 1950s and 1960s, in an effort to uncover the roots of the trans-Atlantic cooperation.

    In 1965, Germany’s foreign intelligence service, known by the initials BND, was created. Three years later, the West Germans signed a cooperation agreement effectively binding the Germans to an intensive exchange of information that continues up to the present day, despite changes to the agreements.

    The attacks on Sept. 11, 2001, in the United States saw a fresh commitment by the Germans to cooperate with the Americans in the global war against terror. Using technology developed by the Americans and used by the N.S.A., the BND monitors networks from the Middle East, filtering the information before sending it to Washington, said Erich Schmidt-Eenboom, an expert on secret services who runs the Research Institute for Peace Politics in Bavaria.

    In exchange, Washington shares intelligence with Germany that authorities here say has been essential to preventing terror attacks similar to those in Madrid or London. It is a matter of pride among German authorities that they have been able to swoop in and detain suspects, preventing several plots from being carried out.

    By focusing the current public debate in Germany on the issue of personal data, experts say Chancellor Angela Merkel is able to steer clear of the stickier questions about Germany’s own surveillance programs and a long history of intelligence sharing with the United States, which still makes many Germans deeply uncomfortable, more than two decades after the end of the cold war.

    “Every postwar German government, at some point, has been confronted with this problem,” Mr. Foschepoth said of the surveillance scandal. “The way that the chancellor is handling it shows that she knows very well, she is very well informed and she wants the issue to fade away.”

    Reporting contributed by Stephen Castle from London, Scott Sayare from Paris and Eric Schmitt from Washington.

    July 9, 2013
    By MELISSA EDDY

    Find this story at 9 July 2013

    © 2013 The New York Times Company

    Spy access to NZ used as bargaining tool

    The Southern Cross Cable Network links Australia, New Zealand and the United States.

    The ability for US intelligence agencies to access internet data was used as a bargaining tool by a Telecom-owned company trying to keep down the cost of the undersea cable from New Zealand.

    Lawyers acting for Southern Cross Cable quoted a former CIA and NSA director who urged the Senate to “exploit” access to data for an intelligence edge.

    The value of intercepted communications to the US was raised during negotiations last year which could increase internet costs 15 per cent.

    Documents on the Federal Communications Commission website show the issue was raised by lawyers acting for “undersea cable operators”, including Southern Cross Cables, half-owned by Telecom and owner of the 28,900km cable which links New Zealand to the internet.

    Lawyers acting for the cable operators told the FCC there were benefits to their clients not having to pay for their cables to land on US soil.

    The FCC was told the number of internet connections passing through the US was dropping.

    “There has long been speculation that US surveillance following implementation of the Patriot Act could push internet content and information storage outside the United States-to the detriment of the United States.”

    The legal team footnoted the statement with a 2006 quote from former CIA director and National Security Agency director General Michael Hayden, who set up domestic wiretapping and widespread internet snooping during his terms as an intelligence chief.

    He was quoted as saying: “Because of the nature of global telecommunications, we are playing with a tremendous home-field advantage, and we need to exploit that edge.

    “We also need to protect that edge, and we need to protect those who provide it to us.”

    In other documents, Southern Cross Cables raised the possibility of submarine cables coming to land in Canada or Mexico.

    Southern Cross Cables lawyer Nikki Shone said the company was legally obliged to co-operate with US laws and it was in relation to those obligations that “it noted that the FCC’s proposed universal services charges could harm US security interests by encouraging infrastructure to bypass the United States”.

    She said Southern Cross Cable was “wholly unaware of recently disclosed US surveillance programmes”.

    A Telecom spokesman cited the company’s contract with residential customers, which tells them it will pass on their information without permission if it believes it is legally required to do so or if it is necessary “to help maintain the law”.

    Telecom Users Association chief executive Paul Brislen said revelations about US interception of internet traffic meant “we have to assume that all our communications are intercepted”.

    He said internet and telecoms companies had to comply with US rules or be shut out of lucrative contracts.

    Mr Brislen believed the cable from Auckland to Los Angeles was secure but said intelligence agencies would access information beyond the landing stations.

    Tech Liberty director Thomas Beagle said any use of American services and networks exposed data to being captured by the US.

    But shifting to other countries “will just expose you to surveillance from their national governments”.

    “It seems that we now have the choice between taking the time to understand and implement secure encryption or choosing services based on which governments we don’t mind spying on us.”

    By David Fisher @DFisherJourno
    5:30 AM Saturday Aug 10, 2013

    Find this story at 10 August 2013

    © Copyright 2013, APN Holdings NZ Limited

    US spy agencies eavesdrop on Kiwi

    The New Zealand military received help from US spy agencies to monitor the phone calls of Kiwi journalist Jon Stephenson and his associates while he was in Afghanistan reporting on the war.

    Stephenson has described the revelation as a serious violation of his privacy, and the intrusion into New Zealand media freedom has been slammed as an abuse of human rights.

    The spying came at a time when the New Zealand Defence Force was unhappy at Stephenson’s reporting of its handling of Afghan prisoners and was trying to find out who was giving him confidential information.

    The monitoring occurred in the second half of last year when Stephenson was working as Kabul correspondent for the US McClatchy news service and for various New Zealand news organisations.

    The Sunday Star-Times has learned that New Zealand Defence Force personnel had copies of intercepted phone “metadata” for Stephenson, the type of intelligence publicised by US intelligence whistleblower Edward Snowden. The intelligence reports showed who Stephenson had phoned and then who those people had phoned, creating what the sources called a “tree” of the journalist’s associates.

    Advertisement

    New Zealand SAS troops in Kabul had access to the reports and were using them in active investigations into Stephenson.

    The sources believed the phone monitoring was being done to try to identify Stephenson’s journalistic contacts and sources. They drew a picture of a metadata tree the Defence Force had obtained, which included Stephenson and named contacts in the Afghan government and military.

    The sources who described the monitoring of Stephenson’s phone calls in Afghanistan said that the NZSIS has an officer based in Kabul who was known to be involved in the Stephenson investigations.

    And since early in the Afghanistan war, the GCSB has secretly posted staff to the main US intelligence centre at Bagram, north of Kabul. They work in a special “signals intelligence” unit that co-ordinates electronic surveillance to assist military targeting. It is likely to be this organisation that monitored Stephenson.

    Stephenson and the Defence Force clashed in the Wellington High Court two weeks ago after it claimed Stephonson had invented a story about visiting an Afghan base.

    The Human Rights Foundation says Defence Force involvement in monitoring a journalist is an abuse of fundamental human rights.

    “Don’t they understand the vital importance of freedom of the press?” spokesman Tim McBride said. “Independent journalism is especially important in a controversial war zone where the public has a right to know what really happens and not just get military public relations,” he said.

    The news has emerged as the Government prepares to pass legislation which will allow the Defence Force to use the GCSB to spy on New Zealanders.

    The Stephenson surveillance suggests the Defence Force may be seeking the GCSB assistance, in part, for investigating leaks and whistleblowers.

    Stephenson said monitoring a journalist’s communications could also threaten the safety of their sources “by enabling security authorities to track down and intimidate people disclosing information to that journalist”.

    He said there was “a world of difference between investigating a genuine security threat and monitoring a journalist because his reporting is inconvenient or embarrassing to politicians and defence officials”.

    The Star-Times asked Chief of Defence Force Rhys Jones and Defence Minister Jonathan Coleman if they were aware of the surveillance of Stephenson, if they approved of it and whether they authorised the investigation of Stephenson (including the phone monitoring).

    They were also asked if they thought journalists should be classified as threats. Neither answered the questions.

    Defence Force spokesman Geoff Davies said: “As your request relates to a legal matter involving Jon Stephenson which is still before the court, it would not be appropriate for the Chief of Defence Force to comment.”

    In fact, none of the issues before that court relate to the surveillance or security manual.

    Coleman’s press secretary said the minister was not available for comment and to try again next week.

    Green Party co-leader Russel Norman said the monitoring of Stephenson demonstrates that the security services see the media and journalists as a legitimate target.

    “Democracy totally relies on a free and independent press,” he said. “Current attempts to strengthen the security apparatus for monitoring New Zealanders is deeply disturbing and menacing for democracy.”

    An internal Defence document leaked to the Star-Times reveals that defence security staff viewed investigative journalists as “hostile” threats requiring “counteraction”. The classified security manual lists security threats, including “certain investigative journalists” who may attempt to obtain “politically sensitive information”.

    The manual says Chief of Defence Force approval is required before any NZDF participation in “counter intelligence activity” is undertaken. (See separate story)

    Stephenson took defamation action against the Defence Force after Jones claimed that Stephenson had invented a story about visiting an Afghan base as part of an article about mishandling of prisoners.

    Although the case ended with a hung jury two weeks ago, Jones conceded during the hearing that he now accepted Stephenson had visited the base and interviewed its Afghan commander.

    Victoria University lecturer in media studies Peter Thompson said the Afghanistan monitoring and the security manual’s view of investigative journalists confirmed the concerns raised in the High Court case.

    There was “a concerted and deliberate effort to denigrate that journalist’s reputation for political ends”.

    There is currently controversy in the United States over government monitoring of journalists. In May the Associated Press reported that the Justice Department had secretly obtained two months’ worth of phone records of its reporters and editors.

    The media organisation said it was a “massive and unprecedented intrusion” into its news gathering process.

    PROBING JOURNALISTS DEEMED THREAT

    A leaked New Zealand Defence Force security manual reveals it sees three main “subversion” threats it needs to protect itself against: foreign intelligence services, organisations with extreme ideologies and “certain investigative journalists”.

    In the minds of the defence chiefs, probing journalists apparently belong on the same list as the KGB and al Qaeda.

    The manual’s first chapter is called “Basic Principles of Defence Security”. It says a key part of protecting classified information is investigating the “capabilities and intentions of hostile organisations and individuals” and taking counteraction against them.

    The manual, which was issued as an order by the Chief of Defence Force, places journalists among the hostile individuals. It defines “The Threat” as espionage, sabotage, subversion and terrorism, and includes investigative journalists under the heading “subversion”.

    Subversion, it says, is action designed to “weaken the military, economic or political strength of a nation by undermining the morale, loyalty or reliability of its citizens.”

    It highlights people acquiring classified information to “bring the Government into disrepute”.

    This threat came from hostile intelligence services and extreme organisations, and “there is also a threat from certain investigative journalists who may seek to acquire and exploit official information for similar reasons”, it says.

    Viewing journalism as a security threat has serious implications. The manual states that “plans to counter the activities of hostile intelligence services and subversive organisations and individuals must be based on accurate and timely intelligence concerning the identity, capabilities and intentions of the hostile elements”.

    It says “one means of obtaining security intelligence is the investigation of breaches of security”.

    This is where the security manual may be relevant to the monitoring of Jon Stephenson’s phone calls. The Defence Force was unhappy at Stephenson’s access to confidential information about prisoner handling in Afghanistan and began investigating to discover his sources.

    The manual continues that “counter intelligence” means “activities which are concerned with identifying and counteracting the threat to security”, including by individuals engaged in “subversion”.

    It notes: “The New Zealand Security Intelligence Service is the only organisation sanctioned to conduct Counter Intelligence activities in New Zealand. [Chief of Defence Force] approval is required before any NZDF participation in any CI activity is undertaken.”

    Under the NZSIS Act, subversion is a legal justification for surveillance of an individual.

    The sources who described the monitoring of Stephenson’s phone calls in Afghanistan said the NZSIS has an officer based in Kabul who was known to be involved in the Stephenson investigations.

    To reinforce its concern, the defence security manual raises investigative journalists a second time under a category called “non-traditional threats”. The threat of investigative journalists, it says, is that they may attempt to obtain “politically sensitive information”.

    Politically sensitive information, such as the kind of stories that Stephenson was writing, is however about politics and political accountability, not security. Metro magazine editor Simon Wilson, who has published a number of Jon Stephenson’s prisoner stories, said the Defence Force seemed to see Stephenson as the “enemy”, as a threat to the Defence Force.

    “But that’s not how Jon works and how journalism works,” he said. “Jon is just going about his business as a journalist.”

    The New Zealand Defence Force “seems to be confusing national security with its own desire not to be embarrassed by disclosures that reveal it has broken the rules”, he said.

    Last updated 05:00 28/07/2013
    NICKY HAGER

    Find this story at 28 july 2013

    © 2011 Fairfax New Zealand Limited

    Bundesheer-Lauschstation als Teil einer US-Peilkette

    Die Amerikaner finanzierten den Horchposten Königswarte bei Hainburg und banden ihn in ein ganzes Netz ein, das sich von Norwegen über Deutschland bis Italien zog.

    Das österreichische Heeresnachrichtenamt (HNA) und der US-Militärgeheimdienst (NSA) tauschen seit mehr als 50 Jahren Informationen aus. Einer der Angelpunkte der Kooperation ist der Horchposten auf der Königswarte bei Hainburg an der Grenze zur Slowakei. Finanziert haben die Station die Amerikaner. Das bestätigte ein Sprecher des Verteidigungsministeriums bereits in der Samstagsausgabe der „Presse“. Das Nachrichtenmagazin „Profil“ förderte nun weitere Details zutage.
    Redaktionspraktikum 2013

    „Die Presse“ fördert mit Sommerpraktika Nachwuchsjournalisten mit Migrationshintergrund. Jetzt Praktikanten kennenlernen und Wissenswertes erfahren. Weitere Informationen »

    Demnach waren die 1958 errichtete Königswarte und kleinere Stationen in Neulengbach, Großharras, Gols, Pirka bei Graz und Stockham bei Wels Teil einer amerikanischen Peilkette, die sich von Norwegen über Deutschland bis nach Italien zog. Österreich war der einzige neutrale Staat in diesem Nato-Lauschverbund. Die USA haben die immer noch aktive Anlage auf der Königswarte ständig erneuert. Von dort aus konnten vor 1989 Gespräche weit hinter dem Eisernen Vorhang belauscht werden. Jetzt stellt sich die Frage, ob immer noch in dieselbe Richtung gehorcht wird. Wie „Die Presse“ erfuhr, verhalfen die Österreicher der NSA zu Informationen, die 2007 zur Ergreifung einer deutschen Terrorzelle, der Sauerland-Gruppe, geführt haben.

    Mit den abgefangenen Daten hat das Bundesheer laut „Profil“ immer schon wenig anfangen können. Die Bänder seien stets zu einer US-Station nahe Frankfurt geflogen worden. Wie „Die Presse“ berichtete, hat die NSA im Kalten Krieg einen Vertrag mit dem HNA abgeschlossen. In den Nullerjahren, nach den Terroranschlägen vom 11. September 2001, soll das Dokument erneuert und ergänzt worden sein. Das bestätigten mehrere Quellen, sowohl Politiker als auch hochrangige Beamte aus dem Sicherheitsbereich. Das Verteidigungsministerium wollte sich nichtdazu äußern, die US-Botschaft in Wien ebenso wenig, sie betonte jedoch die „sehr gute Kooperation mit dem österreichischen Militär und den österreichischen Nachrichtendiensten“.

    FPÖ-Chef Heinz-Christian Strache forderte Bundeskanzler Faymann und Verteidigungsminister Klug auf, unverzüglich Stellung zum Geheimvertrag mit der NSA zu nehmen. Es müsse überprüft werden, inwieweit die Neutralität verletzt worden sei.

    13.07.2013 | 17:57 | von CHRISTIAN ULTSCH (Die Presse)

    Find this story at 13 July 2013

    © 2013 DiePresse.com

    NSA hat Vertrag mit Österreich abgeschlossen

    Die National Security Agency schloss im Kalten Krieg eine Vereinbarung mit dem Heeresnachrichtenamt und finanzierte dessen Horchposten bei Hainburg. Im Krieg gegen den Terror haben Österreich und die USA das Abkommen erneuert.

    Es ist eines der großen Geheimnisse der Republik, aber wirklich gut gehütet ist es nicht: Das neutrale Österreich hat mit dem US-Nachrichtendienst NSA (National Security Agency) einen Vertrag abgeschlossen. Darin sind die Rahmenbedingungen für die Zusammenarbeit und den Informationsaustausch zwischen der US-Überwachungsbehörde und dem Heeresnachrichtenamt HNaA, dem Auslandsnachrichtendienst des österreichischen Bundesheeres, festgelegt. Seine Wurzeln hat das Dokument im Kalten Krieg, doch nach den Terroranschlägen vom 11. September 2001 hat es der damalige NSA-Direktor, Michael Hayden, erneuern lassen. Das erfuhr „Die Presse“ aus mehreren Quellen: von österreichischen Politikern und hochrangigen Beamten im Sicherheitsbereich.
    Die erste Wahl bei politischer Berichterstattung!

    Für alle, die im Superwahljahr 2013 objektiv und bestens informiert sein wollen, gibt´s jetzt die “Presse” und die “Presse am Sonntag” 8 Wochen um 8 Euro. Weitere Informationen »

    Michael Bauer, der Sprecher des Verteidigungsministeriums, will die Existenz des NSA-Vertrags mit Österreich weder bestätigen noch dementieren: „Ich kann dazu nichts sagen.“ Auch die US-Botschaft in Wien äußert sich nicht zu der Vereinbarung. Sie weist jedoch ausdrücklich auf die „sehr gute Kooperation mit dem österreichischen Militär und den österreichischen Nachrichtendiensten“ hin.
    Minister Klug schweigt

    Die NSA war zuletzt auch Thema im parlamentarischen Unterausschuss für Landesverteidigung. Doch Verteidigungsminister Gerald Klug zog es vor, über den Vertrag zu schweigen. Dass das Heeresnachrichtenamt als Kontaktstelle für die NSA fungiert, ist bekannt. Das Verteidigungsressort hat diesen Umstand nach einem Bericht der „Presse“ vom 13. Juni nicht abgestritten. Damals wie heute betont das Ministerium jedoch, dass das HNaA keinen Massenaustausch von Daten mit anderen Nachrichtendiensten betreibe.

    Wie breit der Fluss österreichischer Daten in die USA ist, darüber gehen die Einschätzungen auseinander. Ein Geheimdienst-Insider gab sich gegenüber der „Presse“ überzeugt, dass die Amerikaner in der Lage sind, jegliche elektronische Kommunikation abzufangen. Allein mithilfe ihres Überwachungsprogramms Prism kann die NSA die Verbindungsdaten jeglichen Internetverkehrs aufzeichnen, der über US-Server läuft. Das gestand der US-Botschafter in Wien bei einem Treffen mit Innenministerin Johanna Mikl-Leitner ein. Nachzuvollziehen ist ihre Empörung nicht ganz. Denn ihr Verfassungsschutz ist im Bild über die Aktivitäten der NSA in Österreich.

    Die Amerikaner sind unglücklich über den Verlauf der Diskussion seit den Enthüllungen des Ex-NSA-Mitarbeiters Snowden. Denn ihre Dienste nehmen nicht nur, sie geben auch. So halfen sie jüngst bei der Befreiung der österreichischen Geisel im Jemen. Umgekehrt lieferte Österreich angeblich Informationen an die NSA, die 2007 zur Ergreifung der Sauerland-Gruppe, einer deutschen Terrorzelle, führten.

    Die Partnerschaft zwischen österreichischen und US-Geheimdiensten reicht lang zurück, in die Zeit, als Europa noch geteilt war. Einer ihrer Brennpunkte war immer die Königswarte, ein Horchposten des Heeresnachrichtenamts bei Hainburg an der Grenze zur Slowakei, dort, wo früher der Eiserne Vorhang verlief. Die Österreicher waren in der Lage, von den niederen Karpaten aus tief in das sowjetische Imperium hineinzuhören. Ihre Informationen teilten sie zuweilen mit den Amerikanern.
    Unterschrieb Platter das Papier?

    Auch 24 Jahre nach Ende des Kalten Kriegs ist die Lauschstation des HNaA noch in Betrieb. Vor einiger Zeit wurde sie erneuert. In Militärkreisen kursieren Gerüchte, dass die teure Ausrüstung auf der Königswarte aus den USA stamme. Unter anderem das sei in einem Appendix zum NSA-Vertrag mit Hayden in den Nullerjahren vereinbart worden. Das Papier soll die Unterschrift von Günther Platter tragen, der 2003 bis 2007 Verteidigungsminister war. Im Büro des heutigen Tiroler Landeshauptmannes will man davon nichts wissen.

    Michael Bauer, der Sprecher des Verteidigungsministeriums, bestreitet, dass die Amerikaner die Renovierung der Königswarte finanziert hätten. Ob sie freilich Equipment zur Verfügung stellten, kann der Oberst nicht sagen. Was er jedoch bestätigen kann, ist für das historische Selbstverständnis Österreichs brisant: „Die Königswarte war zur Zeit des Kalten Krieges ein Vorposten der Amerikaner. Sie haben die Anlage finanziell unterstützt.“ Wirklich neutral agierte Österreich schon damals nicht.

    (“Die Presse” Printausgabe vom 13.07.2013)

    12.07.2013 | 17:08 | VON RAINER NOWAK UND CHRISTIAN ULTSCH (Die Presse)

    Find this story at 12 July 2013

    © 2013 DiePresse.com

    The NSA’s mass and indiscriminate spying on Brazilians

    As it does in many non-adversarial countries, the surveillance agency is bulk collecting the communications of millions of citizens of Brazil
    Follow Glenn Greenwald on security and liberty by emailBeta

    The National Security Administration headquarters in Fort Meade, Maryland. Whistleblower Edward Snowden worked as a data miner for the NSA in Hawaii. Photograph: Jim Lo Scalzo/EPA

    I’ve written an article on NSA surveillance for the front page of the Sunday edition of O Globo, the large Brazilian newspaper based in Rio de Janeiro. The article is headlined (translated) “US spied on millions of emails and calls of Brazilians”, and I co-wrote it with Globo reporters Roberto Kaz and Jose Casado. The rough translation of the article into English is here. The main page of Globo’s website lists related NSA stories: here.

    As the headline suggests, the crux of the main article details how the NSA has, for years, systematically tapped into the Brazilian telecommunication network and indiscriminately intercepted, collected and stored the email and telephone records of millions of Brazilians. The story follows an article in Der Spiegel last week, written by Laura Poitras and reporters from that paper, detailing the NSA’s mass and indiscriminate collection of the electronic communications of millions of Germans. There are many more populations of non-adversarial countries which have been subjected to the same type of mass surveillance net by the NSA: indeed, the list of those which haven’t been are shorter than those which have. The claim that any other nation is engaging in anything remotely approaching indiscriminate worldwide surveillance of this sort is baseless.

    As those two articles detail, all of this bulk, indiscriminate surveillance aimed at populations of friendly foreign nations is part of the NSA’s “FAIRVIEW” program. Under that program, the NSA partners with a large US telecommunications company, the identity of which is currently unknown, and that US company then partners with telecoms in the foreign countries. Those partnerships allow the US company access to those countries’ telecommunications systems, and that access is then exploited to direct traffic to the NSA’s repositories. Both articles are based on top secret documents provided by Edward Snowden; O Globo published several of them.

    The vast majority of the GuardianUS’s revelations thus far have concerned NSA domestic spying: the bulk collection of telephone records, the PRISM program, Obama’s presidential directive that authorizes domestic use of cyber-operations, the Boundless Informant data detailing billions of records collected from US systems, the serial falsehoods publicly voiced by top Obama officials about the NSA’s surveillance schemes, and most recently, the bulk collection of email and internet metadata records for Americans. Future stories in the GuardianUS will largely continue to focus on the NSA’s domestic spying.

    But contrary to what some want to suggest, the privacy rights of Americans aren’t the only ones that matter. That the US government – in complete secrecy – is constructing a ubiquitous spying apparatus aimed not only at its own citizens, but all of the world’s citizens, has profound consequences. It erodes, if not eliminates, the ability to use the internet with any remnant of privacy or personal security. It vests the US government with boundless power over those to whom it has no accountability. It permits allies of the US – including aggressively oppressive ones – to benefit from indiscriminate spying on their citizens’ communications. It radically alters the balance of power between the US and ordinary citizens of the world. And it sends an unmistakable signal to the world that while the US very minimally values the privacy rights of Americans, it assigns zero value to the privacy of everyone else on the planet.

    This development – the construction of a worldwide, ubiquitous electronic surveillance apparatus – is self-evidently newsworthy, extreme, and dangerous. It deserves transparency. People around the world have no idea that all of their telephonic and internet communications are being collected, stored and analyzed by a distant government. But that’s exactly what is happening, in secrecy and with virtually no accountability. And it is inexorably growing, all in the dark. At the very least, it merits public understanding and debate. That is now possible thanks solely to these disclosures.
    The Guardian’s reporting

    One brief note on the Guardian is merited here: I’ve been continuously amazed by how intrepid, fearless and committed the Guardian’s editors have been in reporting these NSA stories as effectively and aggressively as possible. They have never flinched in reporting these stories, have spared no expense in pursuing them, have refused to allow vague and baseless government assertions to suppress any of the newsworthy revelations, have devoted extraordinary resources to ensure accuracy and potency, and have generally been animated by exactly the kind of adversarial journalistic ethos that has been all too lacking over the last decade or so (see this Atlantic article from yesterday highlighting the role played by the Guardian US’s editor-in-chief, Janine Gibson).

    I don’t need to say any of this, but do so only because it’s so true and impressive: they deserve a lot of credit for the impact these stories have had. To underscore that: because we’re currently working on so many articles involving NSA domestic spying, it would have been weeks, at least, before we would have been able to publish this story about indiscriminate NSA surveillance of Brazilians. Rather than sit on such a newsworthy story – especially at a time when Latin America, for several reasons, is so focused on these revelations – they were enthused about my partnering with O Globo, where it could produce the most impact. In other words, they sacrificed short-term competitive advantage for the sake of the story by encouraging me to write this story with O Globo. I don’t think many media outlets would have made that choice, but that’s the kind of journalistic virtue that has driven the paper’s editors from the start of this story.

    This has been a Guardian story from the start and will continue to be. Snowden came to us before coming to any other media outlet, and I’ll continue to write virtually all NSA stories right in this very space. But the O Globo story will resonate greatly in Brazil and more broadly in Latin America, where most people had no idea that their electronic communications were being collected in bulk by this highly secretive US agency. For more on how the Guardian’s editors have overseen the reporting of the NSA stories, see this informative interview on the Charlie Rose Show from last week with Gibson and Guardian editor-in-chief Alan Rusbridger:

    Glenn Greenwald
    theguardian.com, Sunday 7 July 2013 00.32 BST

    Find this story at 7 July 2013

    © 2013 Guardian News and Media Limited or its affiliated companies. All rights reserved.

    Brazil wants answers on US surveillance

    Foreign Minister Antonio Patriota is deeply concerned about the scope of a US monitoring programme targeting Brazilians.

    Whistleblower Edward Snowden revealed top secret US surveillance programmes to alert the public [Reuters]

    Brazil’s foreign minister has said his government is worried by a report that the United States has collected data on millions of telephone and email conversations in his country and promised to push for international protection of internet privacy.

    Foreign Minister Antonio Patriota on Sunday expressed “deep concern at the report that electronic and telephone communications of Brazilian citizens are being the object of espionage by organs of American intelligence.

    “The Brazilian government has asked for clarifications” through the US Embassy in Brazil and Brazil’s embassy in Washington, he said.

    Patriota also said Brazil will ask the UN for measures “to impede abuses and protect the privacy” of internet users, laying down rules for governments.

    The O Globo newspaper reported over the weekend that information released by NSA leaker Edward Snowden shows that the number of telephone and email messages logged by the US National Security Agency in January alone was not
    far behind the 2.3 million reportedly collected in the United States.

    The spokesman for the US embassy in Brazil’s capital, Dean Chaves, said earlier that any response to the O Globo report would be issued in Washington.

    There was no immediate response from the office of the US national intelligence director’s office on Sunday, but in response to earlier reports of covert monitoring in Europe, the office said it would respond to concerns of specific nations through diplomatic channels.

    However, “as a matter of policy, we have made clear that the United States gathers foreign intelligence of the type gathered by all nations,” last month’s statement said, without providing further details.

    The chairman of the US Joint Chiefs of Staff warned Sunday that Snowden’s overall disclosures have undermined US relationships with other countries and affected what he calls “the importance of trust”.

    O Globo’s article said that “Brazil, with extensive digitalised public and private networks operated by large telecommunications and internet companies, appears to stand out on maps of the US agency as a priority target for telephony and data traffic, alongside nations such as China, Russia and Pakistan.”

    The report did not describe the sort of data collected, but the US programs appear to gather what is called metadata: Logs of message times, addresses and other information rather than the content of the messages.

    The report was co-authored by US journalist Glenn Greenwald, who has been key in earlier reports on Snowden’s revelations.

    In a column Sunday for the British-based newspaper The Guardian, Greenwald said that “the NSA has, for years, systematically tapped into the Brazilian telecommunication network and indiscriminately intercepted, collected and stored the email and telephone records of millions of Brazilians.”

    He said Brazil was merely an example of a global practice.

    Last Modified: 07 Jul 2013 20:49

    Find this story at 7 July 2013

    © www.aljazeera.com

    XKeyscore: NSA tool collects ‘nearly everything a user does on the internet’

    • XKeyscore gives ‘widest-reaching’ collection of online data
    • NSA analysts require no prior authorization for searches
    • Sweeps up emails, social media activity and browsing history
    • NSA’s XKeyscore program – read one of the presentations

    One presentation claims the XKeyscore program covers ‘nearly everything a typical user does on the internet’

    A top secret National Security Agency program allows analysts to search with no prior authorization through vast databases containing emails, online chats and the browsing histories of millions of individuals, according to documents provided by whistleblower Edward Snowden.

    The NSA boasts in training materials that the program, called XKeyscore, is its “widest-reaching” system for developing intelligence from the internet.

    The latest revelations will add to the intense public and congressional debate around the extent of NSA surveillance programs. They come as senior intelligence officials testify to the Senate judiciary committee on Wednesday, releasing classified documents in response to the Guardian’s earlier stories on bulk collection of phone records and Fisa surveillance court oversight.

    The files shed light on one of Snowden’s most controversial statements, made in his first video interview published by the Guardian on June 10.

    “I, sitting at my desk,” said Snowden, could “wiretap anyone, from you or your accountant, to a federal judge or even the president, if I had a personal email”.

    US officials vehemently denied this specific claim. Mike Rogers, the Republican chairman of the House intelligence committee, said of Snowden’s assertion: “He’s lying. It’s impossible for him to do what he was saying he could do.”

    But training materials for XKeyscore detail how analysts can use it and other systems to mine enormous agency databases by filling in a simple on-screen form giving only a broad justification for the search. The request is not reviewed by a court or any NSA personnel before it is processed.

    XKeyscore, the documents boast, is the NSA’s “widest reaching” system developing intelligence from computer networks – what the agency calls Digital Network Intelligence (DNI). One presentation claims the program covers “nearly everything a typical user does on the internet”, including the content of emails, websites visited and searches, as well as their metadata.

    Analysts can also use XKeyscore and other NSA systems to obtain ongoing “real-time” interception of an individual’s internet activity.

    Under US law, the NSA is required to obtain an individualized Fisa warrant only if the target of their surveillance is a ‘US person’, though no such warrant is required for intercepting the communications of Americans with foreign targets. But XKeyscore provides the technological capability, if not the legal authority, to target even US persons for extensive electronic surveillance without a warrant provided that some identifying information, such as their email or IP address, is known to the analyst.

    One training slide illustrates the digital activity constantly being collected by XKeyscore and the analyst’s ability to query the databases at any time.

    The purpose of XKeyscore is to allow analysts to search the metadata as well as the content of emails and other internet activity, such as browser history, even when there is no known email account (a “selector” in NSA parlance) associated with the individual being targeted.

    Analysts can also search by name, telephone number, IP address, keywords, the language in which the internet activity was conducted or the type of browser used.

    One document notes that this is because “strong selection [search by email address] itself gives us only a very limited capability” because “a large amount of time spent on the web is performing actions that are anonymous.”

    The NSA documents assert that by 2008, 300 terrorists had been captured using intelligence from XKeyscore.

    Analysts are warned that searching the full database for content will yield too many results to sift through. Instead they are advised to use the metadata also stored in the databases to narrow down what to review.

    A slide entitled “plug-ins” in a December 2012 document describes the various fields of information that can be searched. It includes “every email address seen in a session by both username and domain”, “every phone number seen in a session (eg address book entries or signature block)” and user activity – “the webmail and chat activity to include username, buddylist, machine specific cookies etc”.
    Email monitoring

    In a second Guardian interview in June, Snowden elaborated on his statement about being able to read any individual’s email if he had their email address. He said the claim was based in part on the email search capabilities of XKeyscore, which Snowden says he was authorized to use while working as a Booz Allen contractor for the NSA.

    One top-secret document describes how the program “searches within bodies of emails, webpages and documents”, including the “To, From, CC, BCC lines” and the ‘Contact Us’ pages on websites”.

    To search for emails, an analyst using XKS enters the individual’s email address into a simple online search form, along with the “justification” for the search and the time period for which the emails are sought.

    The analyst then selects which of those returned emails they want to read by opening them in NSA reading software.

    The system is similar to the way in which NSA analysts generally can intercept the communications of anyone they select, including, as one NSA document put it, “communications that transit the United States and communications that terminate in the United States”.

    One document, a top secret 2010 guide describing the training received by NSA analysts for general surveillance under the Fisa Amendments Act of 2008, explains that analysts can begin surveillance on anyone by clicking a few simple pull-down menus designed to provide both legal and targeting justifications. Once options on the pull-down menus are selected, their target is marked for electronic surveillance and the analyst is able to review the content of their communications:

    Chats, browsing history and other internet activity

    Beyond emails, the XKeyscore system allows analysts to monitor a virtually unlimited array of other internet activities, including those within social media.

    An NSA tool called DNI Presenter, used to read the content of stored emails, also enables an analyst using XKeyscore to read the content of Facebook chats or private messages.

    An analyst can monitor such Facebook chats by entering the Facebook user name and a date range into a simple search screen.

    Analysts can search for internet browsing activities using a wide range of information, including search terms entered by the user or the websites viewed.

    As one slide indicates, the ability to search HTTP activity by keyword permits the analyst access to what the NSA calls “nearly everything a typical user does on the internet”.

    The XKeyscore program also allows an analyst to learn the IP addresses of every person who visits any website the analyst specifies.

    The quantity of communications accessible through programs such as XKeyscore is staggeringly large. One NSA report from 2007 estimated that there were 850bn “call events” collected and stored in the NSA databases, and close to 150bn internet records. Each day, the document says, 1-2bn records were added.

    William Binney, a former NSA mathematician, said last year that the agency had “assembled on the order of 20tn transactions about US citizens with other US citizens”, an estimate, he said, that “only was involving phone calls and emails”. A 2010 Washington Post article reported that “every day, collection systems at the [NSA] intercept and store 1.7bn emails, phone calls and other type of communications.”

    The XKeyscore system is continuously collecting so much internet data that it can be stored only for short periods of time. Content remains on the system for only three to five days, while metadata is stored for 30 days. One document explains: “At some sites, the amount of data we receive per day (20+ terabytes) can only be stored for as little as 24 hours.”

    To solve this problem, the NSA has created a multi-tiered system that allows analysts to store “interesting” content in other databases, such as one named Pinwale which can store material for up to five years.

    It is the databases of XKeyscore, one document shows, that now contain the greatest amount of communications data collected by the NSA.

    In 2012, there were at least 41 billion total records collected and stored in XKeyscore for a single 30-day period.

    Legal v technical restrictions

    While the Fisa Amendments Act of 2008 requires an individualized warrant for the targeting of US persons, NSA analysts are permitted to intercept the communications of such individuals without a warrant if they are in contact with one of the NSA’s foreign targets.

    The ACLU’s deputy legal director, Jameel Jaffer, told the Guardian last month that national security officials expressly said that a primary purpose of the new law was to enable them to collect large amounts of Americans’ communications without individualized warrants.

    “The government doesn’t need to ’target’ Americans in order to collect huge volumes of their communications,” said Jaffer. “The government inevitably sweeps up the communications of many Americans” when targeting foreign nationals for surveillance.

    An example is provided by one XKeyscore document showing an NSA target in Tehran communicating with people in Frankfurt, Amsterdam and New York.

    In recent years, the NSA has attempted to segregate exclusively domestic US communications in separate databases. But even NSA documents acknowledge that such efforts are imperfect, as even purely domestic communications can travel on foreign systems, and NSA tools are sometimes unable to identify the national origins of communications.

    Moreover, all communications between Americans and someone on foreign soil are included in the same databases as foreign-to-foreign communications, making them readily searchable without warrants.

    Some searches conducted by NSA analysts are periodically reviewed by their supervisors within the NSA. “It’s very rare to be questioned on our searches,” Snowden told the Guardian in June, “and even when we are, it’s usually along the lines of: ‘let’s bulk up the justification’.”

    In a letter this week to senator Ron Wyden, director of national intelligence James Clapper acknowledged that NSA analysts have exceeded even legal limits as interpreted by the NSA in domestic surveillance.

    Acknowledging what he called “a number of compliance problems”, Clapper attributed them to “human error” or “highly sophisticated technology issues” rather than “bad faith”.

    However, Wyden said on the Senate floor on Tuesday: “These violations are more serious than those stated by the intelligence community, and are troubling.”

    In a statement to the Guardian, the NSA said: “NSA’s activities are focused and specifically deployed against – and only against – legitimate foreign intelligence targets in response to requirements that our leaders need for information necessary to protect our nation and its interests.

    “XKeyscore is used as a part of NSA’s lawful foreign signals intelligence collection system.

    “Allegations of widespread, unchecked analyst access to NSA collection data are simply not true. Access to XKeyscore, as well as all of NSA’s analytic tools, is limited to only those personnel who require access for their assigned tasks … In addition, there are multiple technical, manual and supervisory checks and balances within the system to prevent deliberate misuse from occurring.”

    “Every search by an NSA analyst is fully auditable, to ensure that they are proper and within the law.

    “These types of programs allow us to collect the information that enables us to perform our missions successfully – to defend the nation and to protect US and allied troops abroad.”

    Glenn Greenwald
    theguardian.com, Wednesday 31 July 2013 13.56 BST

    Find this story at 31 July 2013

    © 2013 Guardian News and Media Limited or its affiliated companies

    Snooping Fears; German Firms Race to Shield Secrets

    Edward Snowden’s revelations about data surveillance have left German firms feeling acutely vulnerable to industrial espionage. In the medium-sized business sector, which contains a host of world leaders in high-tech fields, the race is on to shield vital know-how.

    Markus Stäudinger is a cautious person — especially when he’s sitting in front of his computer. He’s an IT security expert at Gustav Eirich, a southern German engineering company that makes industrial mixing equipment, and he has been encrypting his emails for years. “While I was typing I always had in the back of my mind that it could still be deciphered,” says Stäudinger, 48. He has tried to entrench that mindset in his company.

    Stäudinger has spent years trying to enhance the security of Eirich’s data and communications. He kept telling colleagues to be careful when dealing with sensitive information. He installed extra security features on notebooks and smartphones before they were taken off company premises. Some of the firm’s 750 employees probably shook their heads at all this paranoia. But now, after the NSA revelations of whistleblower Edward Snowden, they all know that Stäudinger was right. “We were always aware that the intelligence services and business work closely together in the US,” said the IT expert. “When we heard about what’s been going on, it didn’t hit us completely out of the blue.”

    Other companies were taken by surprise, though. Be it Prism, Tempora or XKeyscore, reports about mass electronic surveillance and tapped Internet hubs and trans-Atlantic data lines have alarmed German companies. Many firms are now worried that the intelligence services aren’t just trying to pinpoint terrorists but to get at German industrial secrets as well. They fear that their lead over US, British and French competitors could be at risk. And they’ve suddenly realized that they’ve got to do something to protect themselves against the organized theft of data.

    “The reports of the activities of intelligence services are a wake-up call for many companies. It sent alarm bells ringing,” said Rainer Glatz, director of product and know-how protection at the VDMA German engineering association. In the past, warnings of hacker attacks and IT espionage often fell on deaf ears. But now Germany’s small and medium-sized business sector, or Mittelstand, often described as the backbone of the German economy, has woken up to the risk. “There is growing sensitivity,” said Glatz. “In many firms, the management boards are now thinking about how they can shield themselves better.”

    Spying Causes Billions of Euros in Damage

    Action is urgently needed. At most, only one in four Mittelstand firms has an IT security strategy, said Christian Schaaf, founder of the Munich-based consultancy Corporate Trust. Many have limited themselves to a simple firewall and a few anti-virus programs. But that’s not enough to keep out professional hackers, let alone the likes of the NSA. “Many companies are starting to realize that they have to cast a safety net over their data,” said Schaaf.

    There’s plenty to spy on in the Mittelstand, with its thousands of high-tech businesses, ranging from newly developed products to production processes and process control systems, as well as customer lists and price offers in contract tenders. Germany’s domestic intelligence agency, the Office for the Protection of the Constitution, estimates that industrial espionage causes damage totalling between €30 billion and €60 billion ($40 billion to $80 billion) per year. No one knows the exact figure because companies in Germany and across Europe tend to keep quiet when they find out they have been spied on. There are a number of reasons for this: They’re afraid of copycat espionage, they don’t want to reveal to potential new attackers where their weak points are and what they’re doing to protect themselves. And they’re afraid that they may lose customers if their data leaks become public.

    Engineering company Gustav Eirich would be worth spying on. The 150-year-old, family-owned business from Hardheim in the Odenwald region of southern Germany is among the world leaders in its field. Eirich’s machines can mix chemicals and all sorts of materials faster, more thoroughly and more efficiently than those of its international competitors. This is thanks to a host of inventions and innovations that the company has had patented. “Our know-how is our big competitive advantage,” said security chief Stäudinger. And Eirich is doing all it possibly can to protect that lead.

    Possible Boost For German Data Security Firms

    The company refrains from storing information in foreign data processing centers. Video conferences, data transmission and emails — Eirich handles all that via its own cloud server. Skype is forbidden, and the use of Facebook is discouraged. All staff members are given clear instructions to avoid any unintentional releases of sensitive data. As a rule, the company encrypts all emails it sends outside the firm, if the clients go along with that, and they use German software to do the encrypting. “With US programs the intelligence agency will definitely have the general key,” said Stäudinger. “That’s why we try to use domestic products whenever we can.” In Germany, security authorities usually don’t get access to the algorhythms of firms that offer encryption.

    Germany’s comparatively strict rules on data privacy protection represent a possible competitive advantage for German suppliers of IT security. Data processing centers based in Germany have been enjoying a strong increase in demand of late, said Gatz, VDMA’s IT security expert. Providers of private clouds such as Demando, a subsdiary of the Kaiserslautern municipal utility company, offer their customers their own server cabinets and can even make exclusive glass fiber lines available to them so that they don’t have to send sensitive data through the Internet.

    However, even such lines can be tapped into, and almost every encryption code can be cracked. “You can never guarantee 100 percent security,” said Stäudinger. “We know there’s a residual risk. But we set the hurdles as high as possible.” Maybe that will make potential attackers seek easier targets: among companies with less distrustful security chiefs.

    07/23/2013 06:04 PM
    By Claus Hecking

    Find this story at 23 July 2013

    © SPIEGEL ONLINE 2013

    Ghosts of the NSA Relics of Cold War Spying Dot Germany

    The National Security Agency has long been active in Germany, though much of its spying was conducted against the Eastern Bloc during the Cold War. Today, former listening stations and other facilities dot the German landscape.

    Tracking down traces of the National Security Agency in Germany isn’t particularly difficult. One merely has to head to Berlin and look for the city’s highest point. It can be found in the southwest corner of the city — Teufeslberg, or “Devil’s Mountain.” Made of piled up rubble gathered from Berlin following World War II, the “mountain” rises 115 meters (377 feet) above the nearby waterway known as the Havel.

    In the winter, it is the place where Berliners meet to sled; in the summer it is a haven for mountain bikers and daytrippers. And hobby historians: At the very top of the hill stands the most famous NSA relict in Germany — five gigantic white radar balls. The listening station was used until the end of the Cold War, primarily to spy on the east.

    Teufelsberg used to be part of the NSA’s global espionage network called Echelon, which the US intelligence service used to keep an eye on Moscow. From 1957 to 1991, the NSA maintained a presence on Teufelsberg and eavesdropped on satellite-based telephone conversations, filtered fax reports and analyzed Internet datasets. The NSA was still doing all that in 2013, as SPIEGEL recently reported, but it no longer requires the massive radar towers.

    Desolate and in Disrepair

    Today, the artificial hill looks desolate. When the Americans withdrew, the listening station began to fall into disrepair. The covering on the radomes is torn in many places, and inside the facility weeds are growing out of the debris.

    But it’s not just weather and age that have led the buildings to deteriorate. Shortly after the turn of the century, the government of the city-state of Berlin decided that guarding the empty facility had become too expensive. It then became the target of regular break-ins and vandalism. Rotraud von der Heide, an artist and the curator of the Initiative Teufelsberg, a group seeking to preserve the facility, says, “the facility is totally destroyed because private owners weren’t able to carry out their construction plans, and now the building permits have expired. For the past year-and-a-half, two young people have been leasing it.” Originally, a conference hotel had been envisioned for the site, but those plans ultimately failed.

    Those leasing the site are now responsible for security at the facility. Using revenues generated through frequent tours, they are financing the constant repairs required for the fence surrounding property. “New holes are cut in the fence every night, and we turn trespassers over to the police,” said von der Heide. “Earlier, people had parties in the facility. There were also copper thieves who ripped wires out of the walls. That’s no longer possible now.”

    Big Plans

    The initiative has big plans for the hill. During Germany’s “Day of Open Monuments,” in September, they plan to open the former listening station to the public for three days.

    By then, von der Heide plans to completely transform the area into one giant artwork. “The hill is becoming more and more fantastic. It’s a magical art space that is constantly changing,” the artist says. That’s also a product of anonymous graffiti artists whose paintings cover the massive walls and the insides of the radomes, she says.

    A second NSA listening station in Germany, located some 200 kilometers to the west — represents the opposite extreme. Whereas the Teufelsberg radomes were difficult to ignore, the facility in Schöningen, near Braunschweig, was more hidden. Mayor Henry Bäsecke says that there was an American facility in the nearby forest consisting of “containers and large antennas. But the facility has since been torn down. “There’s nothing left here, and nature is slowly reconquering the property,” Bäsecke says.

    At Least 17 Surveillance Hubs at Cold War Peak

    Some 50 kilometers south of Munich is yet another listening post of note. Bad Aibling the southernmost facility in a chain of such espionage centers operated in Germany by US intelligence agencies. In 1989, shortly before the end of the Cold War, SPIEGEL counted 17 such surveillance hubs. But it’s a figure that may have been even higher. The network extended from the town of Schleswig near the Danish border right down to the edge of the Alps. Most of the facilities were located close to the former border between West and East Germany, as close as possible to the enemy.

    In Bad Aibling, the outsized radomes of the disused listening station also dominate the landscape. In 2004, the Americans left, but Germany’s foreign intelligence agency, the BND, continues to operate nearby. The 17,000 resident city is hard at work transforming the 134 hectare (331 acre) property for civilian use. The community has already turned a small part of the property into sporting facilities, Peter Schmid of the city administration says. Here, local teams play football in the shadows of the radomes. The rest is to be built up by a property developer, with plans for a zero-energy settlement to be constructed.

    Still, the area’s eventful history hasn’t been forgotten. Since 2009, it has hosted an annual electro- and house-music festival that attracted 17,000 fans last year to revel between the radar towers and a former aircraft hangar. The name of the two-day festival recalls the American spy network: The Echelon festival.

    07/05/2013 03:24 PM
    By Johannes Korge

    Find this story at 5 July 2013

    © SPIEGEL ONLINE 2013

    „Prism ist nur die Spitze des Eisbergs“ NSA-Mitarbeiter: BND nutzt seit den 90ern Spähsoftware

    Eine Kuppel der ehemaligen Abhörstation der NSA auf dem Teufelsberg in Berlin
    Der BND und der US-Geheimdienst NSA arbeiten offenbar bereits 20 Jahre bei der Datenspionage zusammen. Einem Medienbericht zufolge wurden entsprechende Spähprogramme schon früher geteilt. Auch Kanzlerin Merkel könnte ausspioniert worden sein.
    Die Zusammenarbeit des Bundesnachrichtendienstes BND und der amerikanischen National Security Agency (NSA) bei der Nutzung von Spähsoftware war offenbar schon in den 1990er-Jahren intensiver als bislang bekannt. In einem Gespräch mit dem Magazin „Stern“ sagte der langjährige NSA-Mitarbeiter William Binney, der BND habe neben „Xkeyscore“ noch ein weiteres NSA-Ausspähprogramm genutzt. Der Entschlüsselungsspezialist arbeitete mehr als 30 Jahre in leitender Funktion bei der NSA und war viele Jahre auch für die technische Zusammenarbeit mit dem BND zuständig.

    Laut Binney soll die Zusammenarbeit im Bereich der Spähsoftware bereits Anfang der 1990er-Jahre begonnen haben. 1999 habe der BND von der NSA den Quellcode zum damals entwickelten Spähprogramm „Thin Thread“ erhalten. „Thin Thread“ sollte die Erfassung und Analyse von Verbindungsdaten wie Telefondaten, E-Mails oder Kreditkartenrechnungen weltweit ermöglichen. „Mein Ziel war es, den Datenverkehr der ganzen Welt zu erfassen“, sagte Binney dem „Stern“. Der BND sei „bis heute einer unserer wichtigsten Partner“.

    Mindestens 50 Spähprogramm lieferten Daten
    Auf der Basis von „Thin Thread“ sei eine Vielzahl von Abhör- und Spähprogrammen entwickelt worden. Eines der wichtigsten davon soll das Dachprogramm „Stellar Wind“ sein, dem nach Angaben von Binney mindestens 50 Spähprogramme Daten zugeliefert haben – auch die durch Edward Snowden bekannt gewordene Software „Prism“ zur direkten Erfassung von Telefon- und Internetdaten bei Telekommunikationsunternehmen.

    „Stellar Wind“ sei mindestens bis 2009, möglicherweise auch bis 2011 im Einsatz gewesen. Es werde heute wahrscheinlich unter anderem Namen fortgeführt, so Binney gegenüber dem Magazin.

    Nach Schätzungen von Binney speichert die NSA mittlerweile zwischen 40 und 50 Billionen Telefonate und E-Mails aus der ganzen Welt, vor allem Verbindungsdaten, aber auch Inhalte. Das von der NSA zurzeit gebaute Datenzentrum in Bluffdale im US-Bundesstaat Utah könne aufgrund seiner Kapazitäten „mindestens 100 Jahre der globalen Kommunikation speichern“, sagte Binney dem „Stern“. „Dieser Ort sollte uns endgültig in Angst und Schrecken versetzen. Die NSA will alles. Jederzeit.“ Er fügte hinzu: „Diese Macht gefährdet unsere Demokratie.“

    Regierungskommunikation im Visier der NSA
    Neben William Binney äußerten sich im „Stern“ zwei weitere ehemalige ranghohe NSA-Mitarbeiter, die zu Whistleblowern wurden: J. Kirk Wiebe, der für die Datenanalyse zuständig war, und Thomas Drake, der zur Führungsebene des Geheimdienstes gehörte. Binney trat im Oktober 2001 aus Protest gegen die NSA-Spähprogramme unter der Regierung von George W. Bush von seinem Posten zurück.
    Die Ex-Geheimdienstler halten es für möglich, dass selbst Daten von Kanzlerin Angela Merkels Handy auf den Servern der NSA landen. „Prism ist nur die Spitze des Eisbergs“, so Drake gegenüber dem „Stern“. „Ihre Kanzlerin könnte sich einmal für das Programm „Ragtime“ interessieren. Es dient unter anderem der Abschöpfung von Regierungskommunikation durch die NSA“. Auch Binney hält das Ausspionieren von Merkels Verbindungsdaten für nicht ausgeschlossen. „Ich würde sogar sagen, dass es durchaus möglich ist“, sagte er dem Magazin.

    Mittwoch, 24.07.2013, 16:59

    Find this story at 24 July 2013

    © FOCUS Online 1996-2013

    BND nutzte bislang unbekanntes NSA-Spähprogramm

    Im stern packen drei Ex-NSA-Mitarbeiter aus: Der BND nutzte seit Anfang der 90er Jahre ein bislang unbekanntes Spähprogramm. Für die Kanzlerin könnte der Begriff “Ragtime” wichtig werden. Von Katja Gloger

    “Hallo, Merkel am Apparat.”: Womöglich landen auf den Servern der NSA auch Handydaten der Kanzlerin. Mit dem Programm “Ragtime” spioniert die NSA Kommunikation von Regierungen aus.
    © Rainer Jensen/DPA/LBN

    Die Zusammenarbeit des Bundesnachrichtendienstes BND und der amerikanischen National Security Agency (NSA) bei der Nutzung von Spähsoftware war offenbar schon in den 90er Jahren intensiver als bislang bekannt. In einem Gespräch mit dem stern sagte der langjährige NSA-Mitarbeiter William Binney, der BND habe neben “Xkeyscore” noch ein weiteres NSA-Ausspähprogramm genutzt. Der Entschlüsselungsspezialist arbeitete mehr als 30 Jahre in leitender Funktion bei der NSA und war viele Jahre auch für die technische Zusammenarbeit mit dem BND zuständig.

    BND hatte den Quellcode

    Laut Binney soll die Zusammenarbeit im Bereich der Spähsoftware bereits Anfang der 90er Jahre begonnen haben. 1999 habe der BND von der NSA den Quellcode zum damals entwickelten Spähprogramm “Thin Thread” erhalten, zu Deutsch “dünner Faden”.

    “Thin Thread” sollte die Erfassung und Analyse von Verbindungsdaten wie Telefondaten, E-Mails oder Kreditkartenrechnungen weltweit ermöglichen. “Mein Ziel war es, den Datenverkehr der ganzen Welt zu erfassen”, so Binney zum stern. Der BND sei “bis heute einer unserer wichtigsten Partner”.

    Auf der Basis von “Thin Thread” wurde eine Vielzahl von Abhör- und Spähprogrammen entwickelt. Eines der wichtigsten davon soll das Dachprogramm “Stellar Wind” (“Sternwind”) sein, dem nach Angaben von Binney mindestens 50 Spähprogramme Daten zugeliefert haben – auch die durch Edward Snowden bekannt gewordene Software “Prism” zur direkten Erfassung von Telefon- und Internetdaten bei Telekommunikationsunternehmen. “Stellar Wind” war mindestens bis 2009, möglicherweise auch bis 2011 im Einsatz. Es werde, so Binney, heute wahrscheinlich unter anderem Namen fortgeführt.
    Neues Datenzentrum kann 100 Jahre der globalen Kommunikation speichern

    Nach Schätzung von Binney speichert die NSA mittlerweile zwischen 40 und 50 Billionen Telefonate und E-Mails aus der ganzen Welt, vor allem Verbindungsdaten, aber auch Inhalte. Das von der NSA zur Zeit gebaute Datenzentrum in Bluffdale im US-Bundesstaat Utah könne aufgrund seiner Kapazitäten “mindestens 100 Jahre der globalen Kommunikation speichern”, sagte Binney dem stern. “Dieser Ort sollte uns endgültig in Angst und Schrecken versetzen. Die NSA will alles. Jederzeit.” Und fügte hinzu: “Diese Macht gefährdet unsere Demokratie.”

    Neben William Binney äußern sich im stern zwei weitere ehemalige ranghohe NSA-Mitarbeiter, die zu Whistleblowern (“Enthüllern”) wurden: J. Kirk Wiebe, der für die Datenanalyse zuständig war, und Thomas Drake, der zur Führungsebene des Geheimdienstes gehörte. Binney trat im Oktober 2001 aus Protest gegen die NSA-Spähprogramme unter der Regierung von George W. Bush von seinem Posten zurück.
    Auch Merkels Handydaten womöglich auf NSA-Servern

    Die Ex-Geheimdienstler halten es für möglich, dass selbst Daten von Kanzlerin Angela Merkels Handy auf den Servern der NSA landen. “Prism ist nur die Spitze des Eisbergs”, so Drake zum stern. “Ihre Kanzlerin könnte sich einmal für das Programm “Ragtime” interessieren. Es dient unter anderem der Abschöpfung von Regierungskommunikation durch die NSA”. Auch Binney hält das Ausspionieren von Merkels Verbindungsdaten für nicht ausgeschlossen: “Ich würde sogar sagen, dass es durchaus möglich ist.”

    24. Juli 2013, 16:51 Uhr

    Find this story at 24 July 2013

    © stern.de

    Skandale, Organisation, Geschichte NSA, Mossad und die verräterische Nackttänzerin – so spionieren die Geheimdienste

    Eine Chronik der Geheimdienstarbeit: Von Meisterspionin Mata Hari bis zur Cyber-Spionage der NSA
    Geheimdienste wie NSA, Mossad oder BND scheinen tun zu können, was sie wollen: Überwachen, ausspionieren, töten – ihre Methoden sind dabei nicht immer legal. FOCUS Online zeigt die interessantesten Geheimdienste der Welt, ihre Organisation, ihre Geschichte, ihre Skandale.
    Die Enthüllungen des ehemaligen Geheimdienstlers Edward Snowden zeigen, wie zügellos und weit verbreitet heute abgehört wird. Dabei richtet sich die Arbeit der Geheimdienste nicht nur gegen Offizielle und Politiker. Auch ganz normale Bürger werden überwacht. Die Öffentlichkeit ist besorgt, Fragen nach der Kontrolle der Behörden drängen sich auf, die Menschen fordern Konsequenzen.

    Dabei galten Geheimdienste schon immer als mysteriös und spannend. Doch die Realität ihrer Arbeit hat oft wenig mit den Meisterspionen a la James Bond oder „Mission Impossible“-Held Ethan Hunt zu tun. Die Behörden sammeln Daten, werten sie aus, informieren, desinformieren, verhandeln und tauschen. Ihr Netz haben sie über die ganze Welt ausgeworfen. Das zeigen nicht erst die Enthüllungen von Prism und Edward Snowden.

    Eines der ältesten Gewerbe der Welt
    „Spionage ist eines der ältesten Gewerbe der Welt“, erklärt der Historiker und Geheimdienstexperte Siegfried Beer im Gespräch mit FOCUS Online. Beer leitet das österreichische Center für „Intelligence, Propaganda & Security Studies“, kurz ACIPSS, in Graz. Das Wissen um den Feind sei für jeden Staat von entscheidender Bedeutung. Schon Alexander der Große, der makedonische Heeresführer, dessen Reich ungeheure Ausmaße annahm, verließ sich auf Spionage.

    Das wurde ihm beinahe zum Verhängnis, wie Wolfgang Krieger in seiner „Geschichte der Geheimdienste“ zeigt: 333 v. Christus, bei Issus „berühmter Keilerei“, wurde Alexander falsch informiert. Seine Agenten sagten ihm, der Perserkönig und sein Heer seien noch weit entfernt – Tatsache war, dass sie aneinander vorbeimarschiert waren. Und Alexander so in umgekehrter Schlachtformation kämpfen musste – doch er siegte.

    Eine Folge der Industrialisierung
    „Organisierte, moderne Spionage gibt es aber erst seit etwa 130 Jahren“, erklärt der Geheimdienst-Experte Beer vom ACIPSS. „Großbritannien nahm eine Vorreiterrolle ein.“ Die Briten begannen in den 1870er-Jahren mit dem Aufbau eines Nachrichtendienstes: aus Angst vor den unterdrückten und rebellischen Iren. Das brachte die anderen Länder unter Zugzwang: Alle europäischen Großmächte des 19. Jahrhunderts gründeten ihrerseits nach und nach Geheimdienste.

    „Die moderne Spionage ist eine Folge der Industrialisierung“, sagt Beer. Wegen der verbesserten Kommunikation, den schnellen Transportwegen und der beginnenden Globalisierung mussten die Regierungen umdenken. In den Weltkriegen und dem Kalten Krieg entwickelten sie neue Methoden, um ihre Feinde besser zu überwachen und sich entscheidende Vorteile zu sichern. Heute hat jedes Land eigene Geheimdienste. Nicht nur zur Spionage und Gegenspionage, sondern auch zur Sicherung eigener Daten. Und, vor allem nach 9/11, zur Terrorismusbekämpfung.
    Geschichten aus Hunderten Jahren Spionage
    Doch die Prism-Enthüllung ist nur eine in einer langen Reihe vergleichbarer Skandale. Seien es Spione, die überliefen, die gefährlichen Methoden des Mossad oder die Meisterspione des KGB. Seitdem es organisierte Spionage gibt, werden die verborgenen Tätigkeiten in regelmäßigen Abständen enthüllt. Und immer bieten sie genug Stoff für spektakuläre Geschichten. FOCUS Online stellt eine Auswahl der aktivsten und gefährlichsten Geheimdienste der Welt und ihre Methoden vor – und zeigt ihre brisantesten Skandale und berühmtesten Spione.
    Deutschland – BND, BfV, MAD
    Montage/Panther
    In Deutschland sammelt unter anderem der Bundesnachrichtendienst Informationen
    Organisation der deutschen Nachrichtendienste

    Drei Nachrichtendienste teilen sich in Deutschland den Schutz der Bürger: Das Bundesamt für Verfassungsschutz (BfV) beobachtet das Inland, der Bundesnachrichtendienst das Ausland (BND), der militärische Abschirmdienst (MAD) kümmert sich um den Schutz der Armee. Die drei Behörden arbeiten großteils getrennt.

    Geschichte des BND

    Die Alliierten gaben 1949 die Struktur des Geheimdienstes in der Bundesrepublik vor. Dabei zogen sie vor allem die Lehren aus dem System des NS-Regiems: Die Geheime Staatspolizei, kurz Gestapo, hatte dort die Möglichkeit, eigenmächtig Verhaftungen durchzuführen. Das darf der Verfassungsschutz in Deutschland nicht. Die Nachrichtendienste haben generell keine polizeilichen Befugnisse.

    Der BND ist als deutscher Auslandsgeheimdienst dem Kanzleramt unterstellt und wurde 1956 gegründet. Zu den Aufgabenbereichen gehört die Beobachtung mutmaßlicher Terroristen, der organisierten Kriminalität, illegaler Finanzströme, des Rauschgifthandels, der Weitergabe von ABC-Waffen und Rüstungsgütern sowie von Krisenregionen wie Afghanistan oder Pakistan. Dazu wertet der BND Informationen von menschlichen Quellen, elektronische Kommunikation sowie Satelliten- und Luftbilder aus. Er zählt etwa 6000 Mitarbeiter – vom Fahrer bis zum Nuklearphysiker. Wie viel Geld der BND für Spionage ausgeben darf, hält die Behörde streng geheim.

    1950 wurde in der Deutschen Demokratischen Republik wohl einer der bekanntesten Geheimdienste der Welt gegründet: Das Ministerium für Staatssicherheit, kurz Stasi. Angegliedert an die Stasi war der Auslandsgeheimdienst Hauptverwaltung Aufklärung, die sich vor allem mit dem westlichen Bruder beschäftigte. Die Stasi mauserte sich zu einem entscheidenden Machtinstrument der sozialistischen Regierung. Sie unterdrückte Andersdenkende, warb sogenannte Spitzel an, inhaftierte Dissidenten – die Bevölkerung hatte Angst vor der Behörde. Das lag daran, dass die Behörde polizeiliche Befugnisse hatte. Bis heute läuft die Aufarbeitung über das Ausmaß der Stasi-Überwachung.

    Spektakuläres über den BND

    Deutsche Spione à la James Bond? Falsch. Beim BND sind Fremdsprachenexperten, Informatiker, Juristen, Biologen, Ingenieure und Islamwissenschaftler gefragt, keine Superagenten. Sie werden innerhalb von zwei bis drei Jahren zum Agenten ausgebildet – und dann als Tarifbeschäftigte, Soldaten und Beamten angestellt.

    2006 erschütterte ein Bericht über die Arbeit des BND die Bundesrepublik: Im großen Stil hörte der Dienst Journalisten ab. Gerade in den Achtzigern war der Bedarf an Informationen besonders hoch, namhafte Autoren bei Zeitungen wie Stern, Spiegel oder FOCUS standen unter Beobachtung.
    Welche Rolle spielte der BND im Irak-Krieg 2003? Hartnäckig halten sich Gerüchte, dass der Dienst einen Informanten hatte, der behauptete, dass der Irak Massenvernichtungswaffen und Biolabore besessen haben soll. Weiterhin haben Agenten des BND, so zeigt Alexandra Sgro in ihrem Buch „Geheimdienste der Welt“, angeblich strategische Informationen über irakische Verteidigungsstellungen und Truppenbewegungen an die USA weitergegeben. Die Bundesregierung hatte offiziell verlauten lassen, dass sich Deutschland aus dem Irak-Krieg heraushält – lässt sich dieser Status nach den Enthüllungen noch halten?
    Türkei – MIT
    Colourbox/Montage
    Die Türkei hat nur einen Nachrichtendienst: den „Millî Istihbarat Teşkilâti“
    Organisation türkischen Geheimdienstes

    Der Millî Istihbarat Teşkilâti (MIT) ist der einzige Nachrichtendienst der Türkei. Er ist für innere Sicherheit und Spionageabwehr zuständig. Außerdem hat er die Pflicht, für den Schutz der Landesgrenzen zu sorgen. Der Geheimdienst untersteht direkt dem Premierminister und ist dafür verantwortlich, bedrohliche Gruppierungen im In- und Ausland zu beobachten. Dabei gibt es häufig gewaltsame Konflikte mit Anhängern der verbotenen Arbeiterpartei Kurdistans PKK. Denn diese kämpfen für die Autonomie der kurdischen Gebiete der Türkei.

    Geschichte des MIT

    Schon vor der Gründung der Türkei gab es Geheimdienste. 1913 wurde Teşkilât-I Mahsusa als erster zentralisierter und organisierter türkischer Nachrichtendienst gegründet. Er sollte die Aktivitäten von Separatisten eindämmen. Während des Ersten Weltkrieges erlebte die Behörde ihre Blütezeit und war militärisch und paramilitärisch aktiv. Das Ende des Krieges bedeutete auch das Ende des Geheimdienstes.

    Sein Nachfolger war Karakol Cemiyeti, der Zivilpersonen und kleine Gruppierungen ab 1919 im türkischen Unabhängigkeitskrieg mit Waffen ausstattete. So gelang es, die Besatzungsmächte zu besiegen. Als die Briten im Jahr 1920 Istanbul besetzten, lösten sie auch den Nachrichtendienst auf. Danach gab es viele verschiedene Geheimdienste, die nie lange Bestand hatten. Bis 1965 der Millî Istihbarat Teşkilâti gegründet wurde.

    Spektakuläres über den MIT

    Wie Sgro in ihrem Buch „Geheimdienste der Welt“ schreibt, werden beim türkischen Geheimdienst nur schriftliche Bewerbungen angenommen, die per Post eingesendet werden – eine Vorbereitung auf die Spionagetätigkeit? Die frisch gebackenen Agenten bekommen ihren Arbeitsort dann per Losverfahren zugeteilt.

    In den Neunzigern machten Berichte die Runde, der türkische Geheimdienst würde militante Separatisten bekämpfen. Allerdings nicht nur im eigenen Land, sondern auch in Deutschland. Dabei schüchterten die Agenten angeblich Oppositionelle ein, bedrohten Asylbewerber und kündigten Repressalien gegen die in der Türkei lebenden Verwandten an.
    Ein anderes Ziel hatte laut Spekulationen sogenannter Experten der türkische Geheimdienst Mitte der 2000er-Jahre: Zu diesem Zeitpunkt war gerade die sogenannte Sauerland-Gruppe verhaftet worden. Sie plante offenbar einen Bombenanschlag in Deutschland, unterstützt von dem Türken Mevlüt K. – laut Medienberichten ein Informant des türkischen Geheimdienstes. Fakt ist: Er ist untergetaucht und wird per internationalem Haftbefehl gesucht.
    Frankreich – DGSE
    Motage/Panther
    Frankreichs Geheimdienst DGSE
    Organisation des französischen Geheimdienstes

    Der französische Geheimdienst nennt sich „Direction Générale de la Sécurité Extérieure“, kurz DGSE. Spezialoperationen des DGSE müssen von oberster Stelle genehmigt werden: Seit 2009 darf sie nur der französische Präsident bewilligen. Wer eingestellt wird, entscheidet das Verteidigungsministerium. Schwerpunkt des Geheimdienstes mit Sitz in Paris: Terrorismusbekämpfung. Außerdem haben die Geheimdienstler ein Auge auf Länder, in denen Massenvernichtungswaffen hergestellt und vertrieben werden.

    Geschichte des DGSE

    Die Geschichte des DGSE beginnt mit Charles de Gaulle. Der spätere Ministerpräsident Frankreichs ließ 1940 aus dem Exil einen Geheimdienst zusammenstellen. Er sollte für die Widerstandsbewegung „France Libre“ gegen das NS-Regime spionieren. Nach dem Krieg wurde ein neuer Geheimdienst gegründet, der Service de Documentation Extérieure et de Contre-Espionnage (SDECE). Seine Aufgaben: ausländische Berichterstattung und Gegenspionage. 1982 löste ihn der DGSE ab.

    Die Schwerpunkte des DGSE sind stark von Frankreichs Geschichte als Kolonialmacht geprägt. Denn zu seinen ehemaligen Kolonien pflegt Frankreich auch heute noch wirtschaftliche Beziehungen. Die Regierungen sollten also stabil bleiben. Wo Frankreich Fundamentalismus fürchtete, griff der Geheimdienst ein. So wie Ende der 1980er-Jahre in Algerien. Angeblich ermordete der DGSE 1992 den algerischen Präsidenten Muhammad Boudiaf. Und auch in Syrien könnte sich die Behörde 2012 eingemischt haben, Sgro. Agenten sollen dem syrischen General Manaf Tlass bei der Flucht geholfen haben. Der stand einst Machthaber Assad nahe.

    Spektakuläres über den DGSE

    Die wohl legendärste Doppelspionin überhaupt war für die Franzosen im Einsatz: Mata Hari. Die Nackttänzerin ließ sich zur Zeit des Ersten Weltkriegs von den Deutschen dafür bezahlen, französischen Militärs Geheimnisse zu entlocken. Gleichzeitig spionierte sie für die Franzosen in den von den Deutschen besetzten Gebieten. Die schöne Niederländerin wurde schließlich von den Franzosen zum Tode verurteilt, weil sie auch an Deutschland Geheimnisse verraten haben soll. Was genau sie wem erzählt hat, ist bis heute nicht bekannt. Erst 2017 wird der französische Staat die Akten freigegeben.

    In den 1980er-Jahren kämpfte der französische Geheimdienst gegen Greenpeace. Die französische Regierung testete zu dieser Zeit im Mururoa-Atoll im Pazifik Atomwaffen. Greenpeace-Aktivisten wollten dagegen protestieren. Agenten des DGSE gelang es, auf dem Greenpeace-Schiff Sprengsätze anzubringen. Bei der Explosion starb ein Mensch. Bewilligt wurde die Aktion angeblich vom damaligen Präsidenten François Mitterand. Der Verteidigungsminister rechtfertigte das Vorgehen: Anders hätte man den Protest nicht verhindern können.
    Großes Aufsehen erregte auch der Vorgänger des DGSE, der SDECE: 1965 verschwand Ben Barka, ein Marokkaner im französischen Exil – bis heute ist nicht geklärt, wer ihn entführt hat. Im Verdacht stehen französische Agenten. Sie hätten damit dem marokkanischen König geholfen und zugleich den Einfluss Frankreichs auf Marokko gesichtert. Bakra war in Marokko wegen Hochverrats verurteilt worden, weil er den König scharf kritisiert hatte. Er soll vom marokkanischen Innenminister getötet worden sein.
    Brasilien – Abin
    dpa/Montage
    Brasiliens Nachrichtendienst heißt „Agência Brasiliera de Inteligência“
    Organisation des brasilianischen Geheimdienstes

    Der brasilianische Geheimdienst heißt Agência Brasileira de Inteligência (Abin) und ist dem Präsidenten unterstellt. Die Aufgaben umfassen Spionage- und Terror-Abwehr, Informationsbeschaffung und Schutz der Bürger.

    Geschichte der Albin

    Schon 1927 wurde die militärische Behörde Conselho de Defesa Nacional gegründet, die sich zunächst mit geheimdienstlichen Aufgaben beschäftigte. Nachdem die Folgeorganisation die Arbeit in den Wirren des Militärputsches von 1964 schon wieder einstellte und durch einen regimehörigen Dienst ersetzt wurde, bestand die Behörde bis 1990. Die Abin wurde 1999 gegründet und übernimmt seitdem die Aufgabe des In- und Auslands-Geheimdienstes – im Gegensatz zu seinem Vorgänger als zivile Behörde.

    Spektakuläres über die Albin

    Nachwuchsarbeit bei Zehn bis 15-Jährigen? Warum nicht, muss sich die Abin gedacht haben. 2005, so beschreibt es Sgro in ihrem Buch, habe eine Informationsveranstaltung stattgefunden, bei der Jugendlichen die Arbeit von Agenten nahegebracht wurde. Dieses Programm soll weitergeführt werden und sich in Zukunft verstärkt an Schüler und Studenten richten.

    Es muss eine skurrile Situation gewesen sein: 1983 entdeckte ein Maler im Büro des damaligen Präsidenten eine Wanze mit aktivem Sender. Brasilianische Zeitungen machten schnell den Schuldigen aus: den Geheimdienst. Der habe sich derartige Abhör-Vergehen schon öfters zuschulden kommen lassen, so die Argumentation. Die wahren Hintergründe bleiben unbekannt.
    Im Juli diesen Jahres kam im Zuge des weltweiten Abhörskandals heraus, dass auch Brasilien im Fadenkreuz der NSA stand: Millionen Emails und Telefonate seien abgehört worden. Nach Informationen der Zeitung „O Blobo“ ist Brasilien das am meiste ausgespähte Land Lateinamerikas.
    Syrien – Abteilung für militärische Aufklärung
    AFP
    Syriens Geheimdienst ist in der Hand des Machthabers Baschar al-Assad
    Organisation des syrischen Geheimdienstes

    Etwas unübersichtlich stellt sich die Situation in Syrien dar: Fünf Behörden teilen die Geheimdienst-Aufgaben unter sich auf. Es gibt einen allgemeinen zivilen Nachrichtendienst, einen Nachrichtendienst der Luftwaffe, das Direktorat für Staatssicherheit sowie das Direktorat für politische Sicherheit im Innenministerium – in den Zeiten des Umbruchs ist aber vor allem eine Behörde wichtig: die Abteilung für Aufklärung. Sie unterstützt die militärischen Truppen und soll Dissidentengruppen zerschlagen – und soll dabei an illegalen Aktionen beteiligt gewesen sein.

    Geschichte der Abteilung für Militärische Aufklärung

    Die Gründung der Abteilung für Militärische Aufklärung datiert auf das Jahr 1969. In der westlichen Welt wurde der Geheimdienst allerdings erst in den 2000er-Jahren bekannt. Im Kampf gegen die Auswirkungen des arabischen Frühlings in Syrien koordinierte die Abteilung ab 2010 die Niederschlagung von Demonstrationen und die Diskreditierung der Rebellen.

    Doch auch in westliche Staaten entsendete der Geheimdienst seine Agenten: So soll ein Deutsch-Libanese über mehrere Jahre hinweg Informationen über syrische Oppositionelle in der Bundesrepublik gesammelt und an den syrischen Geheimdienst weitergegeben haben. Und auch der BND hat offenbar gute Kontakte nach Syrien: Die Tagesschau berichtete im Mai, dass der BND-Präsident an einem Treffen mit syrischen Geheimdienstlern teilgenommen haben soll.

    Spektakuläres über die Abteilung für Militärische Aufklärung

    Wenig ist über die Arbeit des syrischen Geheimdienstes bekannt. Doch ein Name steht wohl in direktem Zusammenhang mit einer Aktion syrischer Agenten im Jahr 2011: Oberstleutnant Hussein Harmusch. Er rief in einem Internetvideo dazu auf, sich gegen die syrische Regierung zu stellen und setzte sich in die Türkei ab. Kurze Zeit später verschwand er spurlos. Was war passiert? Sgro schildert die Geschichte folgendermaßen: Am Tag seines Verschwindens traf sich Harmusch mit einem türkischen Agenten, der ihn mit dem Auto abholte, aber nach Eigenaussage wenige Minuten später wieder absetzte.

    Mehr als zwei Wochen nach dieser Episode strahlte das syrische Staatsfernsehen ein Video aus, in dem Harmusch seinen Aufruf zum Widerstand widerrief. Experten erkennen einen tiefverängstigten Mann, sie gehen davon aus, dass er gezwungen wurde. Harmusch verschwindet daraufhin von der Bildfläche, bis heute weiß niemand, wo er ist. Nur die türkische Regierung äußerte sich noch einmal zu dem Fall: Sie ließ verlauten, dass der angebliche türkische Agent tatsächlich aus Syrien stammte.

    Mit welcher Grausamkeit der syrische Geheimdienst beispielsweise gegen Dissidenten vorgeht, zeigen Berichte aus dem Jahr 2012: Menschenrechtsorganisationen sprechen bei den Geheimdienstzentren in Damaskus von der „Hölle auf Erden“. „Human Rights Watch“ erfasste zahlreiche Fälle, in denen Familien ihre vermissten Angehörigen nur noch tot finden konnten: Mit Brandflecken und Blutergüssen übersät. Überlebende berichten von Methoden, die man aus dem europäischen Mittelalter kennt: Sie wurden an den Händen aufgehangen, dann wurden sie geschlagen und geschnitten. Oder sie wurden auf Kreuz-ähnliche Holzbretter geschnallt und von Häschern auf die Fußsohlen geschlagen. Andere berichten von Stromschocks im Genitalbereich und weiteren Foltermethoden.
    Die Beobachtergruppe „Violations Documentation Center“ spricht von über 25 000 Syrern, die seit 2011 verhaftet worden sind. Weniger als ein Fünftel sei bislang freigelassen worden. Experten gehen allerdings von weiter höheren Zahlen aus: Sie sprechen von Hunderttausenden Inhaftierten.
    Russland – KGB, FSB, SWR, GRU
    Colourbox/Montage
    Der FSB ist nur einer von Russlands Geheimdiensten
    Organisation des russischen Geheimdienstes

    Russland verlässt sich seit dem Zerfall der Sowjetunion auf diese Geheimdienst-Behörden: Den Inlandsgeheimdienst FSB, den Auslandsnachrichtendienst SWR, den Schutzdienst FSO und den Militärnachrichtendienst GRU. Die Aufgaben des SWR umfassen dabei Gegenspionage und Fernaufklärung, der Dienst umfasst rund 13 000 Mitarbeiter. Spannend ist aber vor allem der Inlandsgeheimdienst FSB, da er als Nachfolger des berüchtigten KGB gilt.

    Geschichte des russischen Geheimdienstes

    Die Wirren um die Abdankung des Zaren Nikolaus II. in der Februarrevolution 1917 forderten ein ganzes Land heraus: Eine provisorische Regierung wurde gebildet, die Oktoberrevolution brach aus, schon bald übernahmen kommunistische Bolschewiken die Macht. Der starke Mann Lenin regte die Gründung eines neuen Geheimdienstes an, um die Konterrevolution und Klassenfeinde zu bekämpfen.

    Nach einigen Umstrukturierungen und dem Zweiten Weltkrieg entstand 1954 der KGB als eigenständiges Ministerium. Erst 1991, mit dem Ende der Sowjetunion, hörte er auf zu existieren – wobei der Geheimdienst in Weißrussland noch immer KGB heißt. Der sowjetische KGB arbeitete dabei sowohl nach innen als auch nach außen, dazu gehörten Gegenspionage, Auslandsspionage, Bekämpfung von Regimegegnern, Sicherung der Parteimitglieder. SWR und FSB wurden in den 1990-Jahren gegründet und teilen sich wiederum in eigene Büros und Organe auf.

    Spektakuläres über den russischen Geheimdienst

    Normalerweise sind es Geschichtsbegeisterte, die Geheimdiensten Verschwörungstheorien andichten. In den 80er-Jahren, so schreibt Sgro in ihrem Buch, war es allerdings der KGB selbst, der für Furore sorgte: Tüchtige Sowjet-Agenten setzten das Gerücht in Umlauf, dass die US-Amerikaner den HI-Virus hergestellt und aus Versehen freigesetzt hätten. Der Plan: die USA damit zu diskreditieren. Selbst die deutsche Zeitung „taz“ griff die These auf. 1987 entschuldigte sich der Staatschef Gorbatschow bei US-Diplomaten, die Zeitung brauchte 20 Jahre länger und entschuldigte sich 2010.

    Unabhängig davon unterstanden dem KGB einige der berühmtesten Spione des 20. Jahrhunderts: Beispielsweise sorgte der Journalist Richard Sorge dafür, dass sich die Sowjets auf die deutschen und japanischen Angriffspläne einstellen konnten – weil der überzeugte Kommunist Dokumente weitergab. Aldrich Ames dagegen arbeitete eigentlich beim CIA, dort leitete der die Abteilung „Gegenspionage UDSSR“. Was niemand wusste: Ames spionierte für Russland. Er bekam Geld, die Sowjets die Namen von US-Spitzeln. Und dann wären da noch das Spionage-Ehepaar Rosenberg, der Doppel-Agent Heinz Felfe, der Atomwaffen-Physiker Klaus Fuchs und und und.

    Wie im Kalten Krieg: Erst im Juli stand ein russisches Agenten-Ehepaar vor dem Gericht in Stuttgart. Das Ehepaar firmierte unter den Decknamen Andreas und Heidrun Anschlag. Auch wenn die beiden nicht als klassische Spione gearbeitet haben sollen, hatten sie wohl als eine Art Briefkasten gedient. Das Paar wurde 2011 von Beamten des BKA und der GSG9 aufgespürt und festgenommen, nachdem sie 20 Jahre lang unentdeckt geblieben waren. Derzeit verhandeln russische und deutsche Behörden über einen Austausch der beiden Russen gegen einen deutschen Agenten.
    Dass auch der moderne russische Geheimdienst an traditionellen Methoden festhält, zeigt eine Meldung der russischen Zeitung „Iswestija“. Zum Schutz streng geheimer Informationen schreiben russische Geheimdienste auf Schreibmaschinen, nicht digital, auch handschriftliche Aufzeichnungen seien üblich. Besonders beliebt: das deutsche Modell Triumph-Adler Twen 180. Dabei hat jede Schreibmaschine eine eigene Signatur, so dass jedes Dokument der Maschine zugeordnet werden kann, auf der es geschrieben wurde.
    Neuseeland – GCSB
    Colourbox/Montage
    „Government Communications Security Bureau“ heißt der Geheimdienst Neuseelands
    Organisation des neuseeländischen Geheimdienstes

    Neuseeland hat zwei Geheimdienstbehörden: Den Security Intelligence Service und das nachgeordnete Government Communications Security Bureau (GCSB). Das GCSB kümmert sich um die nationale Sicherheit, überwacht ausländische Datenströme, stellt Sicherheitssysteme für die Regierung zusammen – Einheimische und Zugezogene mit ständigem Wohnsitz dürfen dabei nicht überwacht werden. Die Behörde ist dem Premierminister unterstellt.

    Geschichte des GCSB

    Im Jahr 1977 wünschte sich der neuseeländische Premierminister einen Geheimdienst – vergleichsweise spät im Vergleich zu anderen Staaten. Schnell wurden Anlagen für die Überwachung in Waihopai und in Tangimoana gebaut. Bis dahin arbeiteten Angestellte des Auslands- und Verteidigungsministeriums an der Nachrichtenbeschaffung. Um besser reagieren zu können, baute die Regierung das GCSB auf.

    Vor den Augen der Öffentlichkeit im Verteidigungsministerium versteckt, wurde die Behörde in den Anfang der 80er-Jahren zunächst nur der Politik vorgestellt. 1984 erfuhr die neuseeländische Öffentlichkeit von der Existenz des Geheimdienstes.Bis das GCSB aber eine eigene Behörde wurde, sollten noch mehrere Jahrzehnte vergehen: 2003, durch einen Erlass, wurde das GCSB als öffentliche Dienstleistungsabteilung eingerichtet.

    Spektakuläres über das GCSB

    Ausgerechnet ein Deutscher mit doppelter Staatsbürgerschaft – er hat auch einen finnischen Pass – wurde zum Politikum in Neuseeland: Kim Schmitz, auch bekannt als Kim Dotcom, geriet aufgrund zwielichtiger Online-Geschäfte in das Fadenkreuz des GCSB. Schmitz wurde im Januar 2012 aufgrund des Verdachts auf Urheberrechtsverletzungen sowie Geldwäsche verhaftet, doch bereits zuvor hörten neuseeländische Agenten Mr Dotcom ab – ohne Einverständnis der Regierung, allerdings im Auftrag der Polizei.
    Die Auswertung von Emails und Telefonaten, so zeichnet Sgro in ihrem Buch „Geheimdienste der Welt“ nach, brachte die Behörde auf die Spur der meisten Mitangeklagten. Das Problem: langjährige Bewohner Neuseelands dürfen nicht bespitzelt werden. Das Ergebnis: Die gesammelten Daten waren illegal erworben, der Premierminister entschuldigte sich bei Schmitz und dem neuseeländischen Volk.
    Österreich – HNA, HAA, BVT
    Motage/Panther
    Einer der österreichischen Geheimdienste, das Abwehramt
    Organisation des österreichischen Geheimdienstes

    In Österreich gibt es drei Geheimdienste: Der Auslandsnachrichtendienst ist das Heeresnachrichtenamt (HNaA oder HNA). Sein Gegenstück ist das Heeres-Abwehramt (HAA oder HabwA) als militärischer Inlandsnachrichtendienst. Beide unterstehen dem Bundesministerium für Landesverteidigung und Sport. Das Bundesamt für Verfassungsschutz und Terrorismusbekämpfung (BVT) ist die dritte Behörde.

    Geschichte der österreichischen Geheimdienste

    Militärische Nachrichtendienste gibt es in Österreich seit den Napoleonischen Kriegen. Napoleon veränderte damals mit seiner „Grande Armée“ die Kriegsführung, die Truppen waren beweglicher und agierten schneller. Die österreichische Monarchie musste darauf reagieren und begann, ein strukturiertes „militärisches Nachrichtenwesen“ aufzubauen. 1850 wurde der erste offizielle Nachrichtendienst in der österreichischen Monarchie eingerichtet: das Evidenzbüro. Ende des 19. Jahrhunderts überwachten dann die ersten „Geheimen Polizeiagenten“ hauptsächlich die öffentliche Sittlichkeit.

    Diese Struktur änderte sich bis zum Anschluss Österreichs an das Deutsche Reich im Jahr 1938 kaum. Danach spionierte die Gestapo im Inland, der Sicherheitsdienst war für das Ausland zuständig und die Abwehr für militärische Spionage. Sie galten auch in Österreich als mächtiges Instrument der Nationalsozialisten. Eine der ersten Amtshandlungen nach dem Zweiten Weltkrieg war die Gründung einer österreichischen Staatspolizei. Erst 1955 gründete das Bundesheer einen militärischen Geheimdienst.

    1972 wurde dieser in das heutige Heeres-Nachrichtenamt (HNaA) umgebaut. Zunächst beschäftigte sich dieses sowohl mit Auslandsaufklärung als auch mit Abwehr. 1985 wurde vom HNaA das Abwehramt abgespalten, weil das Heeresnachrichtenamt zu mächtig geworden war. Heute ist das Heeresnachrichtenamt vor allem im Einsatz gegen Terrorismus, Organisierte Kriminalität und irreguläre Migration.

    Spektakuläres über die österreichischen Geheimdienste

    Im Parlament ist ein ständiger Unterausschuss des Landesverteidigungsausschuss für die Kontrolle des Heeresnachrichtenamtes zuständig, die Parlamentarier sind aber auf strenge Verschwiegenheit vereidigt. Das HNaA soll eng mit US-amerikanischen Geheimdiensten zusammenarbeiten und vor allem in der Zeit des Kalten Krieges wichtige Informationen über Vorgänge in den Balkanstaaten an die USA weitergegeben haben. 1968 waren es österreichische Agenten des Heeresnachrichtenamtes, die als erste über den Einmarsch der Truppen des Warschauer Pakts in die Tschechoslowakei Bescheid wussten.
    Das Stillschweigen rund um die Arbeit des Heeresnachrichtenamtes verlieh dem Nachrichtendienst zwischenzeitlich große Macht. Das ging so weit, dass sogar Verteidigungsminister ausspioniert worden sein sollen. Als Verteidigungsminister Friedhelm Frischenschlager das zufällig erfuhr, soll er so erbost gewesen sein, dass er im Jahr 1985 das Heeresnachrichtenamt reformieren und das Heeres-Abwehramt davon abspalten ließ. Die beiden Nachrichtendienste sind bis heute politisch verfeindet: Das HNaA wird der Österreichischen Volkspartei zugeordnet, das HAA den österreichischen Sozialdemokraten. Diese sollen sich seit ihrem Bestehen immer wieder gegenseitig ausspionieren.
    USA – CIA, FBI, NSA, DEA
    Montage/Colourbox
    Zwei der US-Geheimdienste: FBI und CIA
    Organisation des US-amerikanischen Geheimdienstes

    Über keinen Geheimdienst gibt es derart viele Informationen wie über den US-amerikanischen. Der Auslandsgeheimdienst CIA, die inländische Spionageabwehr FBI, die weltweit operierende NSA, die amerikanische Bundespolizei, die Drogenbehörde DEA und elf weitere Dienste bilden die sogenannte United States Intelligence Community (IC). Insgesamt sollen dort etwa 200 000 Menschen arbeiten mit einem Gesamtbudget von 30 Milliarden Euro.

    Geschichte des CIA und der NSA

    Mit Gründung des Amts der Marineaufklärung begann 1882 die offizielle geheimdienstliche Aufklärung der USA. Doch schon unter George Washington hatten Agenten in geheimen Operationen, Aufklärung und Spionage gearbeitet. Die bekannteste Einrichtung, die Central Intelligence Agency, wurde 1947 ins Leben gerufen. Sie ist die Folgeorganisation des Office of Strategic Services, das im Laufe des Zweiten Weltkriegs aufgebaut wurde. Das Ziel: Die Sammlung strategisch wertvoller Informationen, aber auch Sabotage und Spionageabwehr. Mit dem National Security Act übernahm die Behörde Aufgaben, die FBI-Chef J. Edgar Hoover zunächst für seine Agenten vorgesehen hatte. ACIPSS-Experte Siegfried Beer erklärt, dass die USA zwar sehr spät mit der Errichtung eines Auslandsgeheimdienstes begonnen haben, dieser heute aber zu den effizientesten weltweit gehört.

    Doch eine andere Behörde macht derzeit Schlagzeilen: Die National Security Agency (NSA). Ihr Aufgabengebiet ist die weltweite, nachrichtliche Aufklärung. Die Wurzeln der Behörde reichen bis in die 40er-Jahre zurück, die offizielle Gründung datiert auf das Jahr 1952. Seitdem hält die NSA mit den technologischen Entwicklungen von Satellit bis Internet Schritt. In den Mittelpunkt einer weltweiten Diskussion über Datenschutz rückte die NSA, weil der Geheimdienstler Edward Snowden brisante Informationen über die weltweite Überwachung und die Kenntnisnahme europäischer Politiker von den Abhör-Programmen der Behörde veröffentlichte.

    Spektakuläres über die CIA

    „Bis in die frühen Siebziger hinein hatte die CIA weitgehend freie Hand“, sagt Beer. Und das nutzte die Agency voll aus: Waren CIA-Agenten am Attentat an John F. Kennedy beteiligt? Welche Rolle spielte die CIA bei den Anschlägen von 2001? Verdient die Behörde an weltweiten Drogen- und Geldwäschegeschäften? Für Verschwörungstheoretiker ist der US-Geheimdienst eine wahre Pandora-Kiste hanebüchener Geschichten. Dabei gibt es zahlreiche verbriefte Operationen: 1961 war die CIA beispielsweise an der Invasion in der Schweinebucht beteiligt, bei der Exilkubaner auf Kuba landen und die Regierung Castros stürzen wollten – und scheiterte spektakulär.
    Viele weitere Operationen mit dem Ziel, Machthaber zu stürzen, wurden von der CIA angeleiert. In Afghanistan warben CIA-Agenten ab 1979 bis zu 100 000 Einheimische an, trainierten sie, unterstützten sie mit Waffen und Geld und schickten sie in den Kampf gegen sowjetische Truppen. Wohl einer der Hauptgründe für die gegenwärtige Stärke der Taliban in dem befreiten Land. Nicht immer nutzt die Agency bei ihren Operationen legale Mittel, Menschenrechtsorganisationen werfen der Behörde Verletzung internationalen Rechts und Folter vor.
    Großbritannien – MI5, MI6
    Motage/Panther
    Großbritanniens MI5 und MI6
    Organisation des englischen Geheimdienstes

    Neun Behörden kümmern sich in Großbritannien um die Geheimdienstarbeit, organisiert im Secret Service Bureau. Am bekanntesten sind sicherlich der Security Service und der Secret Intelligence Service, kurz: MI5 und SIS oder MI6. Während sich der Blick des MI5 in das eigene Land richtet, kümmert sich der MI6 um das Ausland. Hinlänglich bekannt wurde der MI6 durch die Arbeit des wohl berühmtesten Spions James Bond, auch wenn dieser natürlich nur ein Roman- und Filmheld und kein echter Agent ist.

    Geschichte des MI6

    Ursprünglich war der MI6 für die Marine zuständig, als er 1909 gegründet wurde. Zunehmend spezialisierte sich der Dienst aber auf das Ausland, im Ersten Weltkrieg sammelten Agenten Informationen über das Deutsche Reich und kämpften gegen den Kommunismus in Russland. Nach der Machtübernahme durch die Nationalsozialisten arbeitete der SIS unter anderem an der Entschlüsselung der Geheim-Codes der Nazis.

    Im Kalten Krieg versuchte sich die Behörde in der Anwerbung sowjetischer Offizieller oder an Staatsstreichen, über die Erfolgsrate schweigt sie sich bis heute aus. Seit 1994 sind die Zuständigkeiten im Intelligence Services Act geregelt. Auch die Überwachung von Telefonaten und Internetaktivitäten Verdächtiger gehört zur Aufgabe der Behörde. Könnten Sie ein MI6-Agent sein?

    Spektakuläres über den MI6

    Eine der bekanntesten und schillerndsten Personen in der Geschichte der Geheimdienste ist Thomas Edward Lawrence, auch bekannt als Lawrence von Arabien. Der studierte Archäologe begab sich 1914 offiziell zur Kartographierung in den Nahen Osten, unter der Hand ging es um militärisches Auskundschaften. Aufgrund seiner Erfolge und Fähigkeiten wurde er schnell vom britischen Geheimdienst angeworben – und integrierte sich derart gut in die einheimischen Beduinenvölker, dass er sie zum Aufstand gegen die Fremdherrschaft durch die Türken führte. Ganz im Sinne seines Heimatlandes. Noch zu Lebzeiten wurde Lawrence zum Mythos – und zu einem beliebten Gesprächsgegenstand der englischen Aristokratie.
    Eine spektakuläre Mordtheorie geistert seit dem 3. August 1997 durch Großbritannien: Wurde Prinzessin Diana, die Ex-Frau des britischen Thronfolgers Prinz Charles, vom MI6 beseitigt? Sgro schreibt dazu, dass das britische Königshaus Angst vor einem muslimischen Schwiegervater des zukünftigen Königs gehabt hatte und Lady Di zu allem Überfluss auch noch schwanger gewesen sein soll. Diana war seit kurzem mit Dodi Al-Fayed zusammen, dem Sohn des Harrod-Geschäftsführers Mohamed Al-Fayed. Bis heute ist der Fall nicht aufgeklärt, Gerüchte über vertauschte Blutproben, eine überschnelle Einbalsamierung zur Vertuschung der Schwangerschaft und den Einsatz einer Stroboskop-Lichtkanone zur Blendung des Limousinen-Fahrers machen noch immer die Runde.
    Spanien – CNI
    panther/Montage
    CNI, das Kürzel des spanischen Geheimdienstes, steht für „Centro Nacional de Inteligencia“
    Organisation des spanischen Geheimdienstes

    In Spanien kümmert sich der Centro Nacional de Inteligencia (CNI) um Spionage-Dinge. Der Geheimdienst ist Teil des spanischen Verteidigungsministeriums. Seine Aufgaben umfassen die Informationsbeschaffung und Abwehr, aber auch wirtschaftliche Analysen und politische Risikobewertungen. Der spanische Ministerrat fungiert einerseits als Kontrollorgan, andererseits bestimmt er jährlich die Ziele der Behörde neu. Der CNI umfasst etwa 600 Mitarbeiter.

    Geschichte des CNI

    Die Wurzeln der Behörde liegen in der Zeit des spanischen Bürgerkriegs: 1935 gründete die Zweite Republik einen Geheimdienst, der – überrascht vom Beginn des Krieges – allerdings nie seine Arbeit aufnahm. Bis zu acht verschiedene Dienste arbeiteten bis in die 70er-Jahre gleichzeitig, zum Teil beschafften sie sogar dieselben Informationen.

    Erst 1972 gründete sich der erste offizielle Geheimdienst in Spanien, der sogenannte Zentrale Dokumentationsdienst – noch unter der Diktatur des Generals Francisco Franco. Hauptzweck war der Schutz der Diktatur und die Aufdeckung von Umsturzplänen. 1977, zwei Jahre nach dem Tod des Diktators, wurde der Geheimdienst reformiert und dem Verteidigungsministerium angegliedert.

    Spektakuläres über das CNI

    „Sieben spanische Agenten im Irak getötet“ – diese Nachricht ging 2003 um die Welt. Mit einem Schlag verlor der spanische Geheimdienst praktisch alle Experten in dem Land. Und alles nur, weil die Agenten offenbar einem irakischen Doppelagenten zum Opfer fielen. An einem Samstag im November trafen sich vier dort stationierte CNI-Agenten mit ihren Kollegen, die sie ablösen sollten. Mit dabei: ihre Kontaktperson und Informanten – und ein Maulwurf, der die Spanier an Saddams Truppen verriet. Ein tödlich verwundeter Agent rief offenbar noch während des Hinterhalts bei der CNI-Zentrale an und flehte mit letzter Kraft: „Sie bringen uns um. Schickt Hubschrauber herbei!“.
    Ein schwieriges Verhältnis hat der CNI zum spanischen Königshaus: Als sich König Juan Carlos in den 2000ern eine Geliebte leistete, musste Spaniens Geheimdienstchef vor dem Parlament antanzen und Auskunft geben – offiziell zum Schutz der Monarchie und des Wohl des Königs. Doch eigentlich ging es um die Frage, ob die „enge Freundin“ des Königs auf Staatskosten ausgehalten wurde. Die Befragung verlief allerdings hinter verschlossenen Türen und ergab nichts Erhellendes. Erst ein Mitarbeiter der Polizeigewerkschaft erhärtete die Gerüchte und so wurde das Verhältnis zum Politikum – ohne Beteiligung des CNI.
    Israel – Mossad
    AFP/Montage
    Israels berüchtigter Geheimdienst Mossad
    Organisation des israelischen Geheimdienstes

    In Israel gibt es vier Behörden, die sich um nachrichtendienstliche Belange kümmern: Den militärischen Geheimdienst Aman, den wissenschaftlichen Nachrichtendienst Lakam, den Inlandsgeheimdienst Schin Bet und den – sicherlich am bekanntesten – Auslandsgeheimdienst Mossad. Das Hauptquartier des Mossad befindet sich in Tel Aviv, laut Schätzungen arbeiten in der Behörde etwa 1200 Geheimdienstler. Darunter aktive Agenten, die sogenannten Katsas, und freiwillige Helfer, die sogenannten Sjanim – organisiert in einem weltweiten Netz israelischer Spione. Der Mossad kümmert sich um die Sicherheit des Landes und des Militärs, gilt aber auch als operativer Arm der Regierung – Geschichten über Liquidierungen und Entführungen durch Mossad-Agenten gibt es seit jeher.

    Geschichte des Mossad

    Israel ist ein vergleichsweise junger Staat: 1947 teilte die UN Palästina in einen jüdischen und einen arabischen Staat – um einen Lebensraum für die Überlebenden des Holocausts zu schaffen. Für die arabische Bevölkerung stellten die Pläne jedoch eine Provokation dar: Einer der zentralen Konflikte des 20. Jahrhunderts war geschaffen. Kriegerische Auseinandersetzungen folgten, gleichzeitig arbeiteten inoffizielle Organisationen daran, arabische Aufstände zu vermeiden. 1949 gründete der damalige Premierminister David Ben-Gurion dann den ersten offiziellen Geheimdienst, zunächst dem Außenministerium zugeordnet, später Teil des Büros des Premierministers.

    Spektakuläres über den Mossad

    Wie Alexandra Sgro in ihrem Buch „Geheimdienste der Welt“ beschreibt, wählte der Mossad seine Bewerber besonders streng aus: Angehende Agenten mussten ihre Geschicklichkeit unter Beweis stellen, indem sie an gut einsehbaren Stellen Bomben platzieren sollten – ohne, dass sie dabei gesehen werden. Wer geschickt genug war, wurde Agent. Heute steht am Beginn lediglich ein medizinischer und psychologischer Check, die Ausbildung dauert drei Jahre – mit einem Stundenplan aus Ausfragen, Leeren toter Briefkästen, Durchführung von Anschlägen und die spezielle israelische Kampfkunst Krav Maga.

    Doch das sollte nicht darüber hinwegtäuschen, dass der Mossad einer der effizientesten Geheimdienste weltweit ist, erklärt der Experte Beer. Eine der spektakulärsten – und ersten großen – Operationen des Mossads war die Gefangennahme des nach Argentinien geflohenen Nazis Adolf Eichmann. Er war als Mitglied des Reichsicherheitshauptamtes maßgeblich an der Deportation und Ermordung der Juden im „Dritten Reich“ beteiligt. Er tauchte in Südamerika unter, wurde allerdings vom Mossad aufgespürt und 1960 verhaftet. Nach einem neunmonatigen Prozess wurde er zum Tode verurteilt und 1962 hingerichtet.

    Zehn Jahre später kam es bei den Olympischen Spiele in München zur Katastrophe: Eine palästinensische Terror-Gruppe ermordete elf israelische Sportler – die israelische Führung schwor Rache. Die Sonderheinheit „Caesarea“ jagte die acht Mörder über den gesamten Globus und vollendete die Hatz mit dem Mord an dem letzten Attentäter im Jahr 1979. Die Operation „Zorn Gottes“ ging in die Geschichte ein – wohl auch deshalb, weil ein Unschuldiger sterben musste. Mossad-Agenten töteten den Marokkaner Ahmed Bouchiki. Sie verwechselten ihn mit einem der palästinensischen Attentäter.
    Und auch heute noch scheint der Mossad sehr aktiv zu sein. 2012 machte ein Medienbericht die Runde, wonach sich israelische Agenten Mitte der 2000er als CIA-Spione ausgegeben haben sollen, um eine Rebellen-Organisation zu Anschlägen im Iran anzustiften. Es war eine der „besonderen“ Methoden im geheimen Atomkrieg. Von 2010 bis 2012 wurden vier iranische Atom-Wissenschaftler ermordet – von Israel, so Beobachter.
    China – Ministerium für Staatssicherheit
    Colourbox
    In China ist das Ministerium für Staatssicherheit als Geheimpolizei tätig
    Organisation des chinesischen Geheimdienstes

    Der Geheimdienst in der Volksrepublik China teilt sich in das Ministerium für Staatssicherheit und den Militärnachrichtendienst auf. Das Ministerium kümmert sich dabei um in- wie ausländische Belange und gilt als einer der größten Geheimdienste weltweit. Die Methoden wie Netzzensur, Verletzung von Menschenrechten und zum Teil gewalttätige Überwachung von Dissidenten zeigt, dass das Ministerium ein Dienst mit polizeilichen Befugnissen zu sein scheint.

    Geschichte des Ministeriums für Staatssicherheit

    Dass Geheimdienste nicht erst ein Phänomen der Moderne sind, zeigt das riesige Netzwerk von Geheimdiensten in der Ming-Dynastie. Die Agenten wurden von Eunuchen angeführt, zumeist einfache Männer aus dem Volk. Die Ming-Herrscher sahen sich im 16. Jahrhundert zunehmend bedroht durch die Macht der Geheimtruppen und ihren Führern. Alle Maßnahmen kamen schließlich zu spät, die große Ming-Dynastie zerbrach. Unter anderem wegen des Konflikts zwischen hohen Beamten und den aus niedriger Herkunft stammenden Eunuchen.

    Im Jahr 1949 gründete die Kommunistische Partei den Vorläufer des Sicherheitsministeriums. Die Behörde sollte die Granden der Partei über weltweite Vorkommnisse unterrichten, basierend auf Nachrichten der Presseagenturen und einer limitierten Zahl Zeitungen und Bücher. Mit der Konsolidierung der Macht der Kommunistischen Partei wuchs auch die Aufgabe des Geheimdienstes, die jäh durch die Kulturrevolution unterbrochen wurde. In den Siebziger Jahren wurde die Arbeit wieder aufgenommen und die Behörde in kurzer Zeit massiv erweitert, bis sie 1983 in das Ministerium für Staatssicherheit überformt wurde – um alles abzuwehren, was dem sozialistischen System Chinas gefährlich werden könnte.

    Spektakuläres über das Ministerium für Staatssicherheit

    Die größte Bedrohung geht von Chinas Cyberspionage aus: Erst im Mai hatte eine US-Expertenkommission eine Liste von militärischen Projekten veröffentlicht, die vom chinesischen Geheimdienst über das Internet ausspioniert wurde. Darunter derart wichtige strategische Objekte wie das Patriot-Raketenabwehrsystem, Flugzeuge und Kriegsschiffe. Aber auch das Videosystem für Drohnen, Nanotechnologie, Nachrichtenverbindungen – der Schaden sei kaum absehbar, so die Kommission. Der Hintergrund sind offenbar die Modernisierungsbemühungen der chinesischen Armee.
    Doch auch vor Ort scheinen chinesische Spione ihrer subversiven Tätigkeit nachzugehen: Etwa 120 Agenten arbeiten in den USA, Kanada, Japan, West-, Ost- und Nord-Europa als Geschäftsleute, Industrie-Arbeiter, Banker, Wissenschaftler, Journalisten.
    Finnland – Supo
    Motage/Panther
    Der „Supo“, der zivile Nachrichtendienst, ist nur einer von Finnlands Geheimdiensten
    Organisation des finnischen Geheimdienstes

    In Finnland gibt es zwei offizielle Nachrichtendienste: Zum einen die „Suojelupoliisi“ (Supo), den zivilen Nachrichtendienst, und das „Pääesikunnan tiedusteluosasto“, den militärischen Nachrichtendienst. Die Supo ist ein Teil der finnischen Polizei und untersteht dem Innenminister, ihr Hauptquartier steht in Helsinki. Etwa 220 Geheimdienstler arbeiten dort an Terrorismus-Bekämpfung, Gegenspionage und allgemein der Bekämpfung von Verbrechen, die sich gegen die Regierung und die Politik richten.

    Das „Pääesikunnan tiedusteluosasto“ dagegen untersteht dem finnischen Verteidigungsminister. Die Behörde ist mit dem Schutz des finnischen Hoheitsgebiets beauftragt. Ein zentrales Mittel für die Überwachung ist die Funkaufklärung: Sie sitzt in der zentralfinnischen Kleinstadt Tikkakoski.

    Geschichte der Supo

    Finnland litt schon immer unter seiner exponierten Lage: Über Jahrhunderte hinweg führten Schweden und Russland ihre kriegerischen Konflikte auf dem finnischen Festland aus, erst im 19. Jahrhundert konnten die Finnen die Fremdherrschaft abschütteln und zu einem eigenständigen Staat werden, obgleich eine starke Abhängigkeit zu Russland auch weiterhin bestand. 1917 rief Finnland seine Unabhängigkeit aus, eine tiefe Kluft zwischen rechten und linken politischen Kräften durchzog jedoch das Land.

    Darin fußt die Geschichte der Geheimdienste: Rechte Kräfte gründeten eine Vorläufer-Organisation der Supo, um die „Roten“ zu überwachen. Nach dem Ende der Konflikte 1919 wurde die Geheimdienstarbeit dem Innenministerium unterstellt. Ab da lässt sich eine durchgehende Spionage-Tätigkeit bis in die Gegenwart verfolgen. Doch die politische Entzweiung brodelte weiter: 1949 wurde die Supo gegründet, um die mit Kommunisten besetzte Staatspolizei abzulösen. Die Organisation hat kein eigenes Einsatzkommando. Sie kann allerdings auf das „Karhu“-Team zurückgreifen, ähnlich dem amerikanischen Swat-Team.

    Spektakuläres über die Supo

    Eine der spektakulärsten Einsätze ist sicherlich Operation Stella Polaris: Im Zweiten Weltkrieg wurde Finnland erneut Dreh- und Angelpunkt östlicher und westlicher Machtinteressen. Einerseits verbündete sich Finnland zwar mit Nazi-Deutschland, andererseits fürchtete die Führung sowohl eine Invasion der Wehrmacht als auch der sowjetischen Truppen. Die Lösung war eine geheime Operation mit den Vereinigten Staaten: Mehrere finnische Spione setzten sich in das benachbarte Schweden ab und verkauften Informationen über das „Dritte Reich“ und die Sowjetunion an die USA.
    1942, bei einem Besuch Heinrich Himmlers, spionierte der finnische Geheimdienst den damaligen Reichsführer SS aus – und rettete so wohl 2000 Juden das Leben, wie die Historikerin Janne Könönen 2002 herausfand. Die heimlich abfotografierte Liste mit den Namen einheimischer Juden wurde dem damaligen Staatspräsidenten ausgehändigt – dieser sprach sich vehement gegen eine Auslieferung der Juden aus und bewahrte sie so vor der sicheren Deputation in deutsche Lager.
    Die schwierige Quellenlage
    Das Internet ist voll brisanter Informationen über die Geheimdienste der Welt. Teilweise ist die Quellenlage mysteriös – und oft falsch. Behörden, die im Geheimen agieren, haben es natürlich an sich, zu den wildesten Verschwörungstheorien einzuladen, die Grenzen zwischen Wahrheit und Fiktion verwischen gerne. Doch es gibt auch seriöse und wissenschaftliche Ansätze – eine Übersicht:

    Einen pragmatischen und sehr überblicksreichen Ansatz bietet das Buch „Geheimdienste der Welt“ von Alexandra Sgro, 2013 erschienen im Compact Verlag. Sgro fasst die wichtigsten Informationen zu bekannten Geheimdiensten wie MI6, BND, CIA aber auch unbekannteren Behörden wie Schwedens Säkerhetspolisen oder Griechenlands Ethniki Ypiresia Pliroforion zusammen und reichert die Berichte mit Geschichten zu den größten Skandalen und bekanntesten Spionen an.

    Auf der wissenschaftlichen Seite schreibt der emeritierte Professor Dr. Wolfgang Krieger in seiner Monographie „Geschichte der Geheimdienste. Von den Pharaonen bis zur CIA“, 2010 in der zweiten Auflage bei C.H. Beck erschienen. Wie der Titel vermuten lässt, beginnt Krieger seine historische Suche nach den Wurzeln der Spionage in der Antike und verfolgt sie bis in die Gegenwart. Die aktuellsten Entwicklungen zu Snowden und der NSA fanden dabei aufgrund des Veröffentlichungszeitpunktes nicht in das Buch. Spannend: Trotz allem schreibt Krieger über Bürgerrechtsverletzungen, versteckte Kooperationen der internationalen Geheimdienste und „Whistleblower“.

    Das „Austrian Center for Intelligence, Propaganda & Security Studies“ (ACIPSS) ist eine wissenschaftliche Plattform unter der Ägide von Professor Dr. Siegfried Beer. Das ACIPSS bietet Tagungsberichte, wissenschaftliche Studien und Interviews zu aktuellen Phänomenen – wie beispielsweise zum Abhör-Skandal. Außerdem beschäftigt sich das Center mit der Geschichte der Geheimdienste im europäischen Westen sowie den USA.

    Von FOCUS-Online-Redakteur Julian Rohrer , FOCUS-Online-Autor Johannes Ruprecht und FOCUS-Online-Autorin Lisa Kohn

    Find this story at Augustus 2013

    © FOCUS Online 1996-2013

    << oudere artikelen  nieuwere artikelen >>