• Buro Jansen & Janssen is een onderzoeksburo dat politie, justitie, inlichtingendiensten, de overheid in Nederland en Europa kritisch volgt. Een grond-rechten kollektief dat al 30 jaar publiceert over uitbreiding van repressieve wetgeving, publiek-private samenwerking, bevoegdheden, overheids-optreden en andere staatsaangelegenheden.
    Buro Jansen & Janssen Postbus 10591, 1001EN Amsterdam, 020-6123202, 06-34339533, signal +31684065516, info@burojansen.nl (pgp)
    Steun Buro Jansen & Janssen. Word donateur, NL43 ASNB 0856 9868 52 of NL56 INGB 0000 6039 04 ten name van Stichting Res Publica, Postbus 11556, 1001 GN Amsterdam.

  • Categorieën

  • THE CIA CAMPAIGN TO STEAL APPLE’S SECRETS

    RESEARCHERS WORKING with the Central Intelligence Agency have conducted a multi-year, sustained effort to break the security of Apple’s iPhones and iPads, according to top-secret documents obtained by The Intercept.

    The security researchers presented their latest tactics and achievements at a secret annual gathering, called the “Jamboree,” where attendees discussed strategies for exploiting security flaws in household and commercial electronics. The conferences have spanned nearly a decade, with the first CIA-sponsored meeting taking place a year before the first iPhone was released.

    By targeting essential security keys used to encrypt data stored on Apple’s devices, the researchers have sought to thwart the company’s attempts to provide mobile security to hundreds of millions of Apple customers across the globe. Studying both “physical” and “non-invasive” techniques, U.S. government-sponsored research has been aimed at discovering ways to decrypt and ultimately penetrate Apple’s encrypted firmware. This could enable spies to plant malicious code on Apple devices and seek out potential vulnerabilities in other parts of the iPhone and iPad currently masked by encryption.

    The CIA declined to comment for this story.

    The security researchers also claimed they had created a modified version of Apple’s proprietary software development tool, Xcode, which could sneak surveillance backdoors into any apps or programs created using the tool. Xcode, which is distributed by Apple to hundreds of thousands of developers, is used to create apps that are sold through Apple’s App Store.

    The modified version of Xcode, the researchers claimed, could enable spies to steal passwords and grab messages on infected devices. Researchers also claimed the modified Xcode could “force all iOS applications to send embedded data to a listening post.” It remains unclear how intelligence agencies would get developers to use the poisoned version of Xcode.

    Researchers also claimed they had successfully modified the OS X updater, a program used to deliver updates to laptop and desktop computers, to install a “keylogger.”

    Other presentations at the CIA conference have focused on the products of Apple’s competitors, including Microsoft’s BitLocker encryption system, which is used widely on laptop and desktop computers running premium editions of Windows.

    The revelations that the CIA has waged a secret campaign to defeat the security mechanisms built into Apple’s devices come as Apple and other tech giants are loudly resisting pressure from senior U.S. and U.K. government officials to weaken the security of their products. Law enforcement agencies want the companies to maintain the government’s ability to bypass security tools built into wireless devices. Perhaps more than any other corporate leader, Apple’s CEO, Tim Cook, has taken a stand for privacy as a core value, while sharply criticizing the actions of U.S. law enforcement and intelligence agencies.

    “If U.S. products are OK to target, that’s news to me,” says Matthew Green, a cryptography expert at Johns Hopkins University’s Information Security Institute. “Tearing apart the products of U.S. manufacturers and potentially putting backdoors in software distributed by unknowing developers all seems to be going a bit beyond ‘targeting bad guys.’ It may be a means to an end, but it’s a hell of a means.”

    Apple declined to comment for this story, instead pointing to previous comments Cook and the company have made defending Apple’s privacy record.

    lockheed
    Lockheed Martin Dulles Executive Plaza, Herndon, Virginia.
    SECURITY RESEARCHERS from Sandia National Laboratories presented their Apple-focused research at a secret annual CIA conference called the Trusted Computing Base Jamboree. The Apple research and the existence of the conference are detailed in documents provided to The Intercept by National Security Agency whistleblower Edward Snowden.

    The conference was sponsored by the CIA’s Information Operations Center, which conducts covert cyberattacks. The aim of the gathering, according to a 2012 internal NSA wiki, was to host “presentations that provide important information to developers trying to circumvent or exploit new security capabilities,” as well as to “exploit new avenues of attack.” NSA personnel also participated in the conference through the NSA’s counterpart to the CIA’s Trusted Computing Base, according to the document. The NSA did not provide comment for this story.

    The Jamboree was held at a Lockheed Martin facility inside an executive office park in northern Virginia. Lockheed is one of the largest defense contractors in the world; its tentacles stretch into every aspect of U.S. national security and intelligence. The company is akin to a privatized wing of the U.S. national security state — more than 80 percent of its total revenue comes from the U.S. government. Via a subsidiary, Lockheed also operates Sandia Labs, which is funded by the U.S. government. The lab’s researchers have presented Apple findings at the CIA conference.

    “Lockheed Martin’s role in these activities should not be surprising given its leading role in the national surveillance state,” says William Hartung, director of the Arms and Security Project at the Center for International Policy and author of Prophets of War, a book that chronicles Lockheed’s history. “It is the largest private intelligence contractor in the world, and it has worked on past surveillance programs for the Pentagon, the CIA and the NSA. If you’re looking for a candidate for Big Brother, Lockheed Martin fits the bill.”

    The Apple research is consistent with a much broader secret U.S. government program to analyze “secure communications products, both foreign and domestic” in order to “develop exploitation capabilities against the authentication and encryption schemes,” according to the 2013 Congressional Budget Justification. Known widely as the “Black Budget,” the top-secret CBJ was provided to The Intercept by Snowden and gives a sprawling overview of the U.S. intelligence community’s spending and architecture. The White House did not respond to a request for comment.

    As of 2013, according to the classified budget, U.S. intelligence agencies were creating new capabilities against dozens of commercially produced security products, including those made by American companies, to seek out vulnerabilities.

    Last week, CIA Director John Brennan announced a major reorganization at the agency aimed, in large part, at expanding U.S. cyber-operations. The Information Operations Center, which organized the Jamboree conferences, will be folded into a new Directorate of Digital Innovation. Notwithstanding its innocuous name, a major priority of the directorate will be offensive cyberattacks, sabotage and digital espionage. Brennan said the CIA reorganization will be modeled after the agency’s Counterterrorism Center, which runs the U.S. targeted killing and drone program.

    THE DOCUMENTS do not address how successful the targeting of Apple’s encryption mechanisms have been, nor do they provide any detail about the specific use of such exploits by U.S. intelligence. But they do shed light on an ongoing campaign aimed at defeating the tech giant’s efforts to secure its products, and in turn, its customers’ private data.

    “Spies gonna spy,” says Steven Bellovin, a former chief technologist for the U.S. Federal Trade Commission and current professor at Columbia University. “I’m never surprised by what intelligence agencies do to get information. They’re going to go where the info is, and as it moves, they’ll adjust their tactics. Their attitude is basically amoral: whatever works is OK.”

    Bellovin says he generally supports efforts by U.S. intelligence to “hack” devices — including Apple’s — used by terrorists and criminals, but expressed concern that such capabilities could be abused. “There are bad people out there, and it’s reasonable to seek information on them,” he says, cautioning that “inappropriate use — mass surveillance, targeting Americans without a warrant, probably spying on allies — is another matter entirely.”

    In the top-secret documents, ranging from 2010 through 2012, the researchers appear particularly intent on extracting encryption keys that prevent unauthorized access to data stored — and firmware run — on Apple products.

    “The Intelligence Community (IC) is highly dependent on a very small number of security flaws, many of which are public, which Apple eventually patches,” the researchers noted in an abstract of their 2011 presentation at the Jamboree. But, they promised, their presentation could provide the intelligence community with a “method to noninvasively extract” encryption keys used on Apple devices. Another presentation focused on physically extracting the key from Apple’s hardware.

    A year later, at the 2012 Jamboree, researchers described their attacks on the software used by developers to create applications for Apple’s popular App Store. In a talk called “Strawhorse: Attacking the MacOS and iOS Software Development Kit,” a presenter from Sandia Labs described a successful “whacking” of Apple’s Xcode — the software used to create apps for iPhones, iPads and Mac computers. Developers who create Apple-approved and distributed apps overwhelmingly use Xcode, a free piece of software easily downloaded from the App Store.

    The researchers boasted that they had discovered a way to manipulate Xcode so that it could serve as a conduit for infecting and extracting private data from devices on which users had installed apps that were built with the poisoned Xcode. In other words, by manipulating Xcode, the spies could compromise the devices and private data of anyone with apps made by a poisoned developer — potentially millions of people. “Trying to plant stuff in Xcode has fascinating implications,” says Bellovin.

    The researchers listed a variety of actions their “whacked” Xcode could perform, including:

    — “Entice” all Mac applications to create a “remote backdoor” allowing undetected access to an Apple computer.

    — Secretly embed an app developer’s private key into all iOS applications. (This could potentially allow spies to impersonate the targeted developer.)

    — “Force all iOS applications” to send data from an iPhone or iPad back to a U.S. intelligence “listening post.”

    — Disable core security features on Apple devices.

    THE INTELLIGENCE COMMUNITY IS HIGHLY DEPENDENT ON A VERY SMALL NUMBER OF SECURITY FLAWS, MANY OF WHICH ARE PUBLIC, WHICH APPLE EVENTUALLY PATCHES.
    For years, U.S. and British intelligence agencies have consistently sought to defeat the layers of encryption and other security features used by Apple to protect the iPhone. A joint task force comprised of operatives from the NSA and Britain’s Government Communications Headquarters, formed in 2010, developed surveillance software targeting iPhones, Android devices and Nokia’s Symbian phones. The Mobile Handset Exploitation Team successfully implanted malware on iPhones as part of WARRIOR PRIDE, a GCHQ framework for secretly accessing private communications on mobile devices.

    That program was disclosed in Snowden documents reported on last year by The Guardian. A WARRIOR PRIDE plugin called NOSEY SMURF allowed spies to remotely and secretly activate a phone’s microphone. Another plugin, DREAMY SMURF, allowed intelligence agents to manage the power system on a phone and thus avoid detection. PARANOID SMURF was designed to conceal the malware in other ways. TRACKER SMURF allowed ultra-precise geolocating of an individual phone. “[If] its [sic] on the phone, we can get it,” the spies boasted in a secret GCHQ document describing the targeting of the iPhone.

    All of the SMURF malware — including the plugin that secretly turns on the iPhone’s microphone — would first require that agencies bypass the security controls built into the iOS operating system. Spies would either need to hack the phone in order to plant their malware on it, or sneak a backdoor into an app the user installed voluntarily. That was one of the clear aims of the Apple-focused research presented at the CIA’s conference.

    “The U.S. government is prioritizing its own offensive surveillance needs over the cybersecurity of the millions of Americans who use Apple products,” says Christopher Soghoian, the principal technologist at the American Civil Liberties Union. “If U.S. government-funded researchers can discover these flaws, it is quite likely that Chinese, Russian and Israeli researchers can discover them, too. By quietly exploiting these flaws rather than notifying Apple, the U.S. government leaves Apple’s customers vulnerable to other sophisticated governments.”

    Security experts interviewed by The Intercept point out that the SMURF capabilities were already available to U.S. and British intelligence agencies five years ago. That raises the question of how advanced the current capacity to surveil smartphone users is, especially in light of the extensive resources poured into targeting the products of major tech companies. One GCHQ slide from 2010 stated that the agency’s ultimate goal was to be able to “Exploit any phone, anywhere, any time.”

    jobs_stage
    Steve Jobs unveiling the first iPhone on January 9, 2007.
    THE FIRST JAMBOREE took place in 2006, just as Apple was preparing to unveil its highly-anticipated iPhone. In March 2010, according to a top-secret document, during a talk called “Rocoto: Implanting the iPhone,” a presenter discussed efforts to target the iPhone 3G. In addition to analyzing the device’s software for potential vulnerabilities, the presentation examined “jailbreak methods,” used within the iPhone community to free phones from their built-in constraints, that could be leveraged by intelligence agencies. “We will conclude with a look ahead at future challenges presented by the iPhone 3GS and the upcoming iPad,” the abstract noted. Over the years, as Apple updates its hardware, software and encryption methods, the CIA and its researchers study ways to break and exploit them.

    The attempts to target vulnerabilities in Apple’s products have not occurred in a vacuum. Rather, they are part of a vast multi-agency U.S./U.K. effort to attack commercial encryption and security systems used on billions of devices around the world. U.S. intelligence agencies are not just focusing on individual terrorists or criminals — they are targeting the large corporations, such as Apple, that produce popular mobile devices.

    “Every other manufacturer looks to Apple. If the CIA can undermine Apple’s systems, it’s likely they’ll be able to deploy the same capabilities against everyone else,” says Green, the Johns Hopkins cryptographer. “Apple led the way with secure coprocessors in phones, with fingerprint sensors, with encrypted messages. If you can attack Apple, then you can probably attack anyone.”

    According to the Black Budget, U.S. intelligence agencies have tech companies dead in their sights with the aim of breaking or circumventing any existing or emerging encryption or antiviral products, noting the threat posed by “increasingly strong commercial” encryption and “adversarial cryptography.”

    The Analysis of Target Systems Project produced “prototype capabilities” for the intelligence community, enabled “the defeat of strong commercial data security systems” and developed ways “to exploit emerging information systems and technologies,” according to the classified budget. The project received $35 million in funding in 2012 and had more than 200 personnel assigned to it. By the end of 2013, according to the budget, the project would “develop new capabilities against 50 commercial information security device products to exploit emerging technologies,” as well as new methods that would allow spies to recover user and device passwords on new products.

    Among the project’s missions:

    — Analyze “secure communications products, both foreign and domestic produced” to “develop exploitation capabilities against the authentication and encryption schemes.”

    — “[D]evelop exploitation capabilities against network communications protocols and commercial network security products.”

    — “Anticipate future encryption technologies” and “prepare strategies to exploit those technologies.”

    — “Develop, enhance, and implement software attacks against encrypted signals.”

    — “Develop exploitation capabilities against specific key management and authentication schemes.”

    — “[D]evelop exploitation capabilities against emerging multimedia applications.”

    — Provide tools for “exploiting” devices used to “store, manage, protect, or communicate data.”

    — “Develop methods to discover and exploit communication systems employing public key cryptography” and “communications protected by passwords or pass phrases.”

    — Exploit public key cryptography.

    — Exploit Virtual Private Networks, or VPNs, which allow people to browse the Internet with increased security and anonymity.

    The black budget also noted that the U.S. intelligence community partners with “National Laboratories” to conduct the type of research presented at the CIA’s annual Jamboree conference. It confirms the U.S. government’s aggressive efforts to steal encryption and authentication keys, as occurred in the NSA and GCHQ operations against Gemalto, the world’s largest manufacturer of SIM cards, through the use of Computer Network Exploitation attacks. In that case, spy agencies penetrated Gemalto’s internal networks and cyberstalked its employees to steal mass quantities of keys used to encrypt mobile phone communications.

    The CIA’s Information Operations Center is currently the second largest of the spy agency’s specialized centers. It not only conducts cyber-ops, but has operated covertly in other nations, working to develop assets from targeted countries to assist in its cyber-surveillance programs, according to the Black Budget. At times, its personnel brief the president.

    obama_ipad
    U.S. President Barack Obama holds up an iPad.
    AT THE CIA’s Jamboree in 2011, the computer researchers conducted workshops where they revealed the specifics of their efforts to attack one of the key privacy elements of Apple’s mobile devices. These machines have two separate keys integrated into the silicon of their Apple-designed processors at the point of manufacture. The two, paired together, are used to encrypt data and software stored on iPhones and iPads. One, the User ID, is unique to an individual’s phone, and is not retained by Apple. That key is vital to protecting an individual’s data and — particularly on Apple’s latest devices — difficult to steal. A second key, the Group ID, is known to Apple and is the same across multiple Apple devices that use the same processor. The GID is used to encrypt essential system software that runs on Apple’s mobile devices.

    The focus of the security researchers, as described at the CIA conferences, was to target the GID key, which Apple implants on all devices that use the same processors. For instance, Apple’s A4 processor was used in the iPhone 4, the iPod Touch and the original iPad. All of those devices used the same GID. As Apple designs new processors and faster devices that use those processors, the company creates new GIDs. If someone has the same iPhone as her neighbor, they have the exact same GID key on their devices. So, if intelligence agencies extract the GID key, it means they have information useful to compromising any device containing that key.

    At the 2011 Jamboree conference, there were two separate presentations on hacking the GID key on Apple’s processors. One was focused on non-invasively obtaining it by studying the electromagnetic emissions of — and the amount of power used by — the iPhone’s processor while encryption is being performed. Careful analysis of that information could be used to extract the encryption key. Such a tactic is known as a “side channel” attack. The second focused on a “method to physically extract the GID key.”

    Whatever method the CIA and its partners use, by extracting the GID — which is implanted on the processors of all Apple mobile devices — the CIA and its allies could be able to decrypt the firmware that runs on the iPhone and other mobile devices. This would allow them to seek out other security vulnerabilities to exploit. Taken together, the documents make clear that researching each new Apple processor and mobile device, and studying them for potential security flaws, is a priority for the CIA.

    According to the 2011 document describing the Jamboree presentations on Apple’s processor, the researchers asserted that extracting the GID key could also allow them to look for other potential gateways into Apple devices. “If successful, it would enable decryption and analysis of the boot firmware for vulnerabilities, and development of associated exploits across the entire A4-based product-line, which includes the iPhone 4, the iPod touch and the iPad.”

    At the CIA conference in 2012, Sandia researchers delivered a presentation on Apple’s A5 processor. The A5 is used in the iPhone 4s and iPad 2. But this time, it contained no abstract or other details, instructing those interested to contact a CIA official on his secure phone or email.

    “If I were Tim Cook, I’d be furious,” says the ACLU’s Soghoian. “If Apple is mad at the intelligence community, and they should be, they should put their lawyers to work. Lawsuits speak louder than words.”

    tim_cook
    Apple CEO Tim Cook testifies on Capitol Hill in Washington, May 21, 2013.
    FOR YEARS, Apple has included encryption features in the products it sells to consumers. In 2014, the company dramatically broadened the types of data stored on iPhones that are encrypted, and it incorporated encryption by default into its desktop and laptop operating system. This resulted in criticism from leading law enforcement officials, including the FBI director. The encryption technology that Apple has built into its products — along with many other security features — is a virtual wall that separates cybercriminals and foreign governments from customer data. But now, because Apple claims it can no longer extract customer data stored on iPhones, because it is encrypted with a key the company does not know, the U.S. government can be locked out too — even with a search warrant. The FBI director and other U.S. officials have referred to the advent of the encryption era — where previously accessible data and communications may now be off limits because of the security technology protecting them — as “going dark.”

    In the face of this rising challenge to its surveillance capabilities, U.S. intelligence has spent considerable time and resources trying to find security vulnerabilities in Apple’s encryption technology, and, more broadly, in its products, which can be leveraged to install surveillance software on iPhones and Macbooks. “The exploitation of security flaws is a high-priority area for the U.S. intelligence community, and such methods have only become more important as U.S. technology companies have built strong encryption into their products,” says the ACLU’s Soghoian.

    Microsoft has, for nearly a decade, included BitLocker, an encryption technology that protects data stored on a computer, in its Windows operating system. Unlike Apple, which made encryption available to all customers, Microsoft had included this feature only in its more expensive premium and professional versions of Windows, up until a few years ago. BitLocker is designed to work with a Trusted Platform Module, a special security chip included in some computers, which stores the encryption keys and also protects against unauthorized software modification.

    Also presented at the Jamboree were successes in the targeting of Microsoft’s disk encryption technology, and the TPM chips that are used to store its encryption keys. Researchers at the CIA conference in 2010 boasted about the ability to extract the encryption keys used by BitLocker and thus decrypt private data stored on the computer. Because the TPM chip is used to protect the system from untrusted software, attacking it could allow the covert installation of malware onto the computer, which could be used to access otherwise encrypted communications and files of consumers. Microsoft declined to comment for this story.

    In the wake of the initial Snowden disclosures, Apple CEO Tim Cook has specifically denounced the U.S. government’s efforts to compel companies to provide backdoor access to their users’ data.

    “I want to be absolutely clear that we have never worked with any government agency from any country to create a backdoor in any of our products or services. We have also never allowed access to our servers. And we never will,” Cook said last September in announcing Apple’s new privacy policy. More recently, Cook said, “None of us should accept that the government or a company or anybody should have access to all of our private information. This is a basic human right. We all have a right to privacy. We shouldn’t give it up. We shouldn’t give in to scare-mongering.”

    As corporations increasingly integrate default encryption methods and companies like Apple incorporate their own indigenous encryption technologies into easy-to-use text, voice and video communication platforms, the U.S. and British governments are panicking. “Encryption threatens to lead all of us to a very dark place,” declared FBI Director James Comey in an October 2014 lecture at the Brookings Institution. Citing the recent moves by Apple to strengthen default encryption on its operating systems, and commitments by Google to incorporate such tools, Comey said, “This means the companies themselves won’t be able to unlock phones, laptops, and tablets to reveal photos, documents, e-mail, and recordings stored within.”

    Under current U.S. regulations, law enforcement agencies can get a court order to access communications channeled through major tech companies and wireless providers. But if those communications are encrypted through a process not accessible by any involved company, the data is essentially meaningless, garbled gibberish. “In a world in which data is encrypted, and the providers don’t have the keys, suddenly, there is no one to go to when they have a warrant,” says Soghoian. “That is, even if they get a court order, it doesn’t help them. That is what is freaking them out.”

    Comey alleged that “even a supercomputer would have difficulty with today’s high-level encryption,” meaning a “brute force” attempt to decrypt intercepted communications would be ineffective, and, even if successful, time-consuming.

    “Encryption isn’t just a technical feature; it’s a marketing pitch,” Comey added. “But it will have very serious consequences for law enforcement and national security agencies at all levels. Sophisticated criminals will come to count on these means of evading detection. It’s the equivalent of a closet that can’t be opened. A safe that can’t be cracked.”

    A few months after Comey’s remarks, Robert Litt, the general counsel for the Office of the Director of National Intelligence, also appeared at Brookings. “One of the many ways in which Snowden’s leaks have damaged our national security is by driving a wedge between the government and providers and technology companies, so that some companies that formerly recognized that protecting our nation was a valuable and important public service now feel compelled to stand in opposition,” Litt said. He appealed to corporations to embrace “a solution that does not compromise the integrity of encryption technology but that enables both encryption to protect privacy and decryption under lawful authority to protect national security.”

    Green, the Johns Hopkins professor, argues that U.S. government attacks against the products of American companies will not just threaten privacy, but will ultimately harm the U.S. economy. “U.S. tech companies have already suffered overseas due to foreign concerns about our products’ security,” he says. “The last thing any of us need is for the U.S. government to actively undermine our own technology industry.”

    The U.S. government is certainly not alone in the war against secure communications. British Prime Minister David Cameron has suggested that if he is re-elected, he may seek to ban encrypted chat programs that do not provide backdoor access to law enforcement. “Are we going to allow a means of communications which it simply isn’t possible to read?” Cameron said in a speech in England earlier this year. “My answer to that question is: ‘No, we must not.’”

    When the Chinese government recently tried to force tech companies to install a backdoor in their products for use by Chinese intelligence agencies, the U.S. government denounced China. “This is something that I’ve raised directly with President Xi,” President Obama said in early March. “We have made it very clear to them that this is something they are going to have to change if they are to do business with the United States.” But China was actually following the U.S. government’s lead. The FBI has called for an expansion of U.S. law, which would require Apple and its competitors to design their products so that all communications could be made available to government agencies. NSA officials have expressed similar sentiments.

    “Obama’s comments were dripping with hypocrisy,” says Trevor Timm, executive director of the Freedom of the Press Foundation. “Don’t get me wrong, his actual criticism of China for attempting to force tech companies to install backdoors was spot on — now if only he would apply what he said to his own government. Since he now knows backdooring encryption is a terrible policy that will damage cybersecurity, privacy, and the economy, why won’t he order the FBI and NSA to stop pushing for it as well?”

    ———

    Documents published with this article:

    TCB Jamboree 2012 Invitation
    Strawhorse: Attacking the MacOS and iOS Software Development Kit
    TPM Vulnerabilities to Power Analysis and An Exposed Exploit to Bitlocker
    TCB Jamboree 2012
    Apple A4/A5 Application Processors Analysis
    Differential Power Analysis on the Apple A4 Processor
    Secure Key Extraction by Physical De-Processing of Apple’s A4 Processor
    Rocoto: Implanting the iPhone
    Smurf Capability – iPhone
    Black Budget: Cryptanalysis & Exploitation Services – Analysis of Target Systems
    ———

    Andrew Fishman, Alleen Brown, Andrea Jones, Ryan Gallagher, Morgan Marquis-Boire, and Micah Lee contributed to this story.

    Note: An earlier draft of this story incorrectly suggested that the iOS Group ID is used to sign software. An earlier draft also incorrectly stated that Lockheed Martin owns Sandia National Laboratories. Sandia Corporation, a wholly owned subsidiary of Lockheed Martin, operates Sandia National Laboratories as a contractor for the U.S. Department of Energy’s National Nuclear Security Administration.

    Disclosure: Freedom of the Press Foundation, which Trevor Timm represents, has received grant funding from First Look Media, The Intercept’s parent company. Intercept co-founders Glenn Greenwald and Laura Poitras are on the board of the organization.

    Photo: Google Maps; Simon Dawson/Bloomberg/Getty Images; Tony Avelar/Getty Images; Kevin Lamarque/Reuters/Landov; J. Scott Applewhite/AP

    Email the authors: jeremy.scahill@theintercept.com, josh.begley@theintercept.com

    BY JEREMY SCAHILL AND JOSH BEGLEY @jeremyscahill@joshbegley 10 MAR 2015

    Find this story at 10 March 2015

    Copyright firstlook.org

    The Intercept, Mass Surveillance and the State

    Like a proud father CIA director John Brennan has announced that he’s creating a new directorate to conduct cyberespionage. Never mind all those classified documents published recently by the Intercept which prove that the CIA has been active in the cyber domain for years. While it goes without saying that the CIA’s subversion campaign is unsettling what’s equally thought-provoking is the manner in which the Intercept frames the involvement of the private sector.

    Every year the CIA showcases its latest batch of subversion tools, taking them for a victory lap at a secret conference which internal documents refer to glibly as a “Jamboree.” In 2012 the Jamboree was hosted by Lockheed Martin at a campus in northern Virginia. Journalists at the Intercept describe Lockheed as follows:

    “Lockheed is one of the largest defense contractors in the world; its tentacles stretch into every aspect of U.S. national security and intelligence. The company is akin to a privatized wing of the U.S. national security state — more than 80 percent of its total revenue comes from the U.S. government.”

    Note how this description subtly creates the impression that the ultimate culprit with regard to mass surveillance is the government. Lockheed is merely a “wing” of an overarching “national security state”. All roads lead to U.S. intelligence, it’s all about the state.

    Yet close examination of the history of the CIA yields a different picture. Contractors like Lockheed Martin aren’t a subordinate extension of the national security state. Quite the opposite. It’s probably more accurate to conclude that intelligence agencies, like the NSA, represent a public sector appendage of a much larger corporate power structure whose nexus resides in profound sources of wealth and influence outside of the government. A Deep State, if you will, that’s fundamentally driving what goes on in Washington.

    In the absence of mass public outcry private capital sets the rules. It’s been this way since Ferdinand Lundberg wrote America’s Sixty Families back in 1937. Or perhaps Mr. Scahill hasn’t glimpsed politicians on both sides of the aisle trotting out in front of billionaires to audition for public office?

    Hence there is a recurring theme in L’affaire Snowden that arises from the Intercept’s coverage of mass surveillance. Focus is maintained almost exclusively on the government without acknowledging the central role that corporations play. According to the Intercept’s worldview hi-tech companies are but helpless pawns being coerced and assailed by runaway security services rather than willing symbiotic accomplices that directly benefit from the global panopticon.

    Honestly, doesn’t Ed Snowden have more information on Booz Allen?

    When a doctor is faced with a serious medical condition the diagnosis typically informs the subsequent course of treatment. So it is with mass surveillance. Only in the case of mass surveillance the diagnosis is being shaped by certain actors to fit a preconceived solution. The agenda of the far right is clear. Nothing short of corporate feudalism. Libertarian political operator Grover Norquist boldly spelled it out: “I don’t want to abolish government. I simply want to reduce it to the size where I can drag it into the bathroom and drown it in the bathtub.”

    A messaging scheme which depicts the government as the chief villain is a godsend for people who are itching for reasons to demolish the state. Techno libertarians rejoice and present the public with their version of salvation. “Crypto everywhere” roar CEOs across Silicon Valley. How predictably shallow and self-serving. Their counter-surveillance talking points provide them with something new to sell us. It also absolves them of responsibility while redirecting the public’s attention away from more far-reaching systemic measures.

    In light of this it’s hard not to notice the various twists of fate in L’affaire Snowden. Classified documents gradually trickled into the public record thanks to a whistle-blower who donated money to Ron Paul and exhibited some decidedly right-wing inclinations online. A copy of the classified documents were provided to a journalist who wrote a policy whitepaper for the CATO Institute (formerly known as the Charles Koch Foundation). Then out of the woodwork appears a kindly libertarian billionaire who dazzles the said journalist with fame and fortune, “a dream opportunity that was impossible to decline.”

    The product of coincidence? To an extent. But what’s undeniable is that a member of the financial elite, a man who has clocked over a dozen visits to the Obama White House, deliberately leveraged his assets to inject himself into the unfolding course of events. Once more the narrative about mass surveillance that his news organization conveys tends to cast corporations as champions against mass surveillance while omitting to acknowledge how they stand to benefit from the global panopticon. It appears that elements within the ruling class would have us believe that the Deep State will solve the very problem that it intentionally created.

    Bill Blunden is an independent investigator whose current areas of inquiry include information security, anti-forensics, and institutional analysis. He is the author of several books, including The Rootkit Arsenal , and Behold a Pale Farce: Cyberwar, Threat Inflation, and the Malware-Industrial Complex. Bill is the lead investigator at Below Gotham Labs.

    by BILL BLUNDEN
    WEEKEND EDITION MARCH 13-15, 2015

    Find this story at March 2015

    Copyright © CounterPunch

    CIA Aided Program to Spy on U.S. Cellphones

    WASHINGTON—The Central Intelligence Agency played a crucial role in helping the Justice Department develop technology that scans data from thousands of U.S. cellphones at a time, part of a secret high-tech alliance between the spy agency and domestic law enforcement, according to people familiar with the work.

    The CIA and the U.S. Marshals Service, an agency of the Justice Department, developed technology to locate specific cellphones in the U.S. through an airborne device that mimics a cellphone tower, these people said.

    Today, the Justice Department program, whose existence wasreported by The Wall Street Journal last year, is used to hunt criminal suspects. The same technology is used to track terror suspects and intelligence targets overseas, the people said.

    The program operates specially equipped planes that fly from five U.S. cities, with a flying range covering most of the U.S. population. Planes are equipped with devices—some past versions were dubbed “dirtboxes” by law-enforcement officials—that trick cellphones into reporting their unique registration information.
    The surveillance system briefly identifies large numbers of cellphones belonging to citizens unrelated to the search. The practice can also briefly interfere with the ability to make calls, these people said.

    Some law-enforcement officials are concerned the aerial surveillance of cellphone signals inappropriately mixes traditional police work with the tactics and technology of overseas spy work that is constrained by fewer rules. Civil-liberties groups say the technique amounts to a digital dragnet of innocent Americans’ phones.

    ….

    The cooperation between technical experts at the CIA and the Marshals Service, which law-enforcement officials have described as a “marriage,” represents one way criminal investigators are increasingly relying on U.S. intelligence agencies for operational support and technical assistance in the wake of the Sept. 11, 2001, attacks. Many Justice Department officials view the joint effort with the CIA as having made valuable contributions to both domestic and overseas operations.

    A CIA spokesman declined to comment on whether the CIA or any other agency uses the devices. Some technologies developed by the agency “have been lawfully and responsibly shared with other U.S. government agencies,” the spokesman said. “How those agencies use that technology is determined by the legal authorities that govern the operations of those individual organizations—not CIA.” He also said the relationship between the Marshals Service and CIA tech experts couldn’t be characterized as a marriage.

    A Justice Department spokesman said Marshals Service techniques are “carried out consistent with federal law, and are subject to court approval.” The agency doesn’t conduct “domestic surveillance, intelligence gathering, or any type of bulk data collection,” the spokesman said, adding that it doesn’t gather any intelligence on behalf of U.S. spy agencies.

    By DEVLIN BARRETT
    Updated March 10, 2015 7:39 p.m. ET

    Find this story at 10 March 2015
    Copyright wsj.com

    CIA looks to expand its cyber espionage capabilities

    CIA Director John Brennan is planning a major expansion of the agency’s cyber-espionage capabilities as part of a broad restructuring of an intelligence service long defined by its human spy work, current and former U.S. officials said.

    The proposed shift reflects a determination that the CIA’s approach to conventional espionage is increasingly outmoded amid the exploding use of smartphones, social media and other technologies.

    U.S. officials said Brennan’s plans call for increased use of cyber capabilities in almost every category of operations — whether identifying foreign officials to recruit as CIA informants, confirming the identities of targets of drone strikes or penetrating Internet-savvy adversaries such as the Islamic State.

    Several officials said Brennan’s team has even considered creating a new cyber-directorate — a step that would put the agency’s technology experts on equal footing with the operations and analysis branches, which have been pillars of the CIA’s organizational structure for decades.

    U.S. officials emphasized that the plans would not involve new legal authorities and that Brennan may stop short of creating a new directorate. But the suggestion underscores the scope of his ambitions, as well as their potential to raise privacy concerns or lead to turf skirmishes with the National Security Agency, the dominant player in electronic espionage.

    “Brennan is trying to update the agency to make sure it is prepared to tackle the challenges in front of it,” said a U.S. official familiar with the reorganization plan. “I just don’t think you can separate the digital world people operate in from the human intelligence” mission that is the CIA’s traditional domain.

    Like others, the official spoke on the condition of anonymity to discuss internal decision-making.

    The expanded emphasis on cyber is part of a broader restructuring envisioned by Brennan that is expected to break down long-standing boundaries between the CIA’s operations and analysis directorates, creating hybrid “centers” that combine those and other disciplines.

    Brennan is expected to begin implementing aspects of his plan this month, officials said. He recently met with senior members of the House and Senate Intelligence Committees to outline the proposed changes.

    CIA spokesman Dean Boyd declined to comment, saying that “final decisions have not yet been made with respect to agency reorganization efforts.” In a notice to the CIA workforce last year, Brennan said that he had become “increasingly convinced that the time has come to take a fresh look at how we are organized.”

    The changes are designed to replicate the model of the CIA’s Counterterrorism Center, which has surged in size and influence since the Sept. 11, 2001, attacks. The restructuring could lead to new reporting lines for thousands of CIA employees, as long-standing units such the Latin America and Near East divisions give way to new centers that combine analysis, collection and covert operations.

    The National Clandestine Service and the Directorate of Intelligence — the formal names for the operations and analysis branches — would continue to exist, but would focus more on developing talent and resources that could be distributed to the new centers.

    “It would be a huge deal,” said Michael Allen, a former White House and congressional aide who wrote a 2013 book about intelligence reform. Unlike at the FBI and other security agencies, Allen said, “there hasn’t been wholesale structural reform in the CIA post-9/11.”

    Former officials who are familiar with the plan said it has caused generational friction within the CIA’s ranks, with longtime officers resisting changes that younger employees are more eager to embrace.

    The head of the clandestine service recently resigned, in part over objections to the scope of Brennan’s plan, officials said. Brennan quickly replaced him with a longtime officer who had led an internal review panel that broadly endorsed the director’s reform agenda.

    Although limited compared with the larger NSA, the CIA has substantial cyber capabilities. Its Information Operations Center, which handles assignments such as extracting information from stolen laptops and planting surveillance devices, is now second only to the Counterterrorism Center in size, former officials said.

    The CIA also oversees the Open Source Center, an intelligence unit created in 2005 to scour publicly available data, including Twitter feeds, Facebook postings and Web forums where al-Qaeda and other terrorist groups post material.

    Brennan hopes to make the use of such capabilities more pervasive, U.S. officials said, ensuring that expertise and tools that now reside in the Information Operations Center are distributed across the agency.

    The move comes at a time when the CIA has struggled to gain traction against adversaries — including the Islamic State and the Jabhat al-Nusra terrorist group — that recruit and communicate extensively online but operate in combat zones that CIA officers are generally not able to enter.

    But officials said digital changes have transformed even the most conventional cloak-and-dagger scenarios. Secrets that were once obtained by recruiting a source or meeting in a safe house increasingly reside in clouds of digital transmissions that surround espionage targets.

    To recruit a Russian spy, “you may need to manipulate someone’s e-mail, read someone’s e-mail and track the whereabouts of the FSB,” a former official said, referring to the Russian security service. “Cyber is now part of every mission. It’s not a specialized, boutique thing.”

    Beyond elevating the role of the Information Operations Center, U.S. officials said, Brennan is seeking to ensure that the agency is not lagging in other areas, such as counterintelligence work and the CIA’s internal e-mail system.

    Brennan provided only broad outlines of his plan in recent congressional meetings, which excluded all but the four highest-ranking members of the House and Senate intelligence panels. A senior U.S. intelligence official said some senior NSA executives remain in the dark on Brennan’s cyber ambitions.

    In recent years, the CIA has collaborated extensively with the NSA on a range of covert programs, including its drone campaign against al-Qaeda. Documents released by former NSA contractor Edward Snowden showed that e-mails and cellphone signals intercepted by the NSA were used to confirm the identities of targets in strikes.

    But the CIA also has fought budget and bureaucratic battles to maintain its standalone capability, prompting some to view the latest push as an attempt to capi­tal­ize on Washington’s growing alarm over cyberthreats — and the corresponding shifts in federal budgets.

    Former CIA officials said that the agency is mainly concerned about having direct control over the cyber components of its operations and that Brennan’s plans would not encroach on the global surveillance programs run by the NSA. Nor would they interfere with the work of a new agency the Obama administration is creating to fuse intelligence on cyberattacks.

    Brennan’s push to expand the CIA’s cyber capabilities is “entirely appropriate, even overdue,” said Stephen Slick, a former CIA official who directs the Intelligence Studies Project at the University of Texas at Austin. “Advances in digital technology are having a revolutionary impact on the intelligence business, and it’s important for CIA to adapt its collection and covert action missions to account for the new opportunities and dangers.”

    Ellen Nakashima and Julie Tate contributed to this report.

    By Greg Miller February 23

    Find this story at 23 February 2015

    Copyright washingtonpost.com

    Selected extracts of “top” NSA intercepts of French leadership and chief officials, taken from various editions of the National Security Agency’s Top Secret Global SIGINT Highlights executive briefings.

    EU and French diplomats who strongly criticize U.S. trade policies and call TPP treaty a confrontation against China.
    High-ranking French official complaining about President Sarkozy’s inflammatory and inaccurate statements on WTO that no-one in government backs
    French ministerial agenda for planned G7 and G20 meeting intercepted
    French economy in dire straits according to intercepted communications between French Finance Minister and French Senator
    Spying on French Ambassador who contemplated exposing U.S. misuse of UN Oil-for-food program in Iraq
    NSA Eavesdrops as Hollande Tries End Run Around Merkel on Greek Eurozone Exit
    US Intercepts of France Complaining About US Intercepts of France
    US Spying On Chirac Discussing UN Appointments
    US Spying on Sarkozy Talking Tough on Israel-Palestine
    US Eavesdrops as Sarkozy Plots French Leadership on Financial Crisis
    EU and French diplomats who strongly criticize U.S. trade policies and call TPP treaty a confrontation against China.

    Date 2 August 2011
    Classification TOP SECRET//COMINT//ORCON/NOFORN
    WikiLeaks Synopsis
    Intercepted communication between French Minister-Counselor for Economic and Financial Affiars Jean-Francois Boittin and EU Trade Section head Hiddo Houben, reveals Boittin’s discontent with U.S. approach towards a WTO pact. Additionally Houben stated that the TPP (being an American initiative) seems devised as a confrontation with China.
    Download PDF

    EU Officials Perceive Lack of U.S. Leadership on Trade Issues, Skeptical of Pacific Initiative (TS//SI//OC/NF)

    (TS//SI//OC/NF) Washington-based EU trade officials ascertained in late July that the U.S. administration is severely lacking in leadership when it comes to trade matters, as shown by the absence of a clear consensus on the future course of the WTO Doha Development Agenda (DDA). French Minister-Counselor for Economic and Financial Affairs Jean-Francois Boittin expressed astonishment at the level of “narcissism” and wasteful contemplation currently on display in Washington, while describing the idea of scrapping the DDA in favor of another plan–which some U.S. officials are seen to favor–as stupefying. The Frenchman further asserted that once a country makes deep cuts in its trade barriers, as the U.S. has done, it no longer has incentives to offer nor, as a consequence, a strong position from which to negotiate with emerging nations. Boittin’s interlocutor, EU Trade Section head Hiddo Houben, after noting the leadership void in the Office of the U.S. Trade Representative, declared that with regard to the disagreement within his host government on DDA, a political decision must be made about what direction is to be followed. On another subject, Houben insisted that the Trans-Pacific Partnership (TPP), which is a U.S. initiative, appears to be designed to force future negotiations with China. Washington, he pointed out, is negotiating with every nation that borders China, asking for commitments that exceed those countries’ administrative capacities, so as to “confront” Beijing. If, however, the TPP agreement takes 10 years to negotiate, the world–and China–will have changed so much that that country likely will have become disinterested in the process, according to Houben. When that happens, the U.S. will have no alternative but to return to the WTO. Finally, he assessed that this focus on Asia is added proof that Washington has no real negotiating agenda vis-´-vis emerging nations, including China and Brazil, or an actual, proactive WTO plan of action.

    Unconventional

    EU diplomatic

    Z-3/OO/531614-11, 011622Z
    High-ranking French official complaining about President Sarkozy’s inflammatory and inaccurate statements on WTO that no-one in government backs

    Date July 2008
    Classification TOP SECRET//COMINT/NOFORN
    WikiLeaks Synopsis
    Intercepted communication reveals discontent of head of Trade Policy Renaud Lassus regarding some statements from Sarkozy regarding a potential negative impact of a WTO trade negotiation pact on France economy.
    Download PDF

    Sarkozy Remarks on WTO Deemed Injurious to France; Rules Clarity Sought (TS//SI//NF)

    (TS//SI//NF) A high-ranking French treasury official lamented in early July recent inflammatory and inaccurate statements by President Nicolas Sarkozy, statements that the official said were certain to complicate French efforts to balance its national interests with its responsibilities as current EU President. Assuming his duties as head of the Trade Policy and Investment Office in the Treasury and Economic Policy Directorate, Renaud Lassus indicated that Sarkozy’s declaration that there will be no WTO Doha Round accord has effectively set the bar extremely high, while also increasing the chances of a dark scenario in which France finds itself as the lone dissenter on a national level, but responsible as EU President for representing the views of the entire union. The choice for France then becomes one of either capitulating or provoking a crisis within the EU. Paris is totally unprepared to deal with this scenario, Lassus confirmed, as no one wants to try to “spin” the situation in which Sarkozy has placed the country when doing so would be admitting that the President had been wrong in the first place. He further commented that Sarkozy’s assertion that a WTO pact would bring a 20-percent drop in production and the loss of 100,000 French jobs was patently incorrect and believed by no one in the government. As for those who thought that Sarkozy would dampen his rhetoric when France actually assumed the Presidency on 1 July, their hopes were dashed, Lassus insisted, by the President’s most virulent personal attack yet on the EU Trade Commissioner. In other WTO-related commentary, knowledgeable insiders believed that the 21 July WTO ministerial could be disrupted if Rules Committee chairman Guillermo Valles Galmes does not make his intentions clear in advance. If this is not done, it is possible that rules issues will be raised at the ministerial, leading to heated negotiations. In addition, fish subsidies could cause problems. India could threaten to torpedo the ministerial unless it were to get a carve-out on special and differential treatment on fish. This would leave developed countries as the only ones that would have disciplines on fish subsidies and would be unacceptable to Europe and Japan.

    Unconventional

    French, EU, Japanese diplomatic

    Z-3/OO/5427-08, 111833Z; Z-3/OO/5416-08, 111607Z
    French ministerial agenda for planned G7 and G20 meeting intercepted

    Date 2012
    Classification TOP SECRET//COMINT//NOFORN
    WikiLeaks Synopsis
    Intercepted communication reveals French Minister of Economy, Finance, and Industry Francois Baroin’s intentions to emphasize the need for the implementation of the Basel Accords on banking laws in the G7 and G20 meeting in 2012 and his support of the U.S. initiative on oil reserves.
    Download PDF

    G-7/G-20: French Minister to Push U.S. on Banking Reform, Warn Against Stifling Growth (TS//SI//NF)

    (TS//SI//NF) With some messages targeted for the United States, the French Treasury Directorate has drafted talking points for Minister of Economy, Finance, and Industry Francois Baroin to use during meetings of the Group of 7 and Group of 20 on 19 and 20 April, just before the spring meetings of the IMF and World Bank. Baroin will emphasize the need to stay on schedule for implementing the Basel Accords (recommendations on banking laws and regulations), given Washington’s slowness to act. He will also support the U.S. initiative on strategic oil reserves in his remarks on the threat to global growth posed by rising oil prices. While repeatedly reminding his colleagues of the hard choices the EU has made the deal with its financial situation, he will also caution against endangering growth by acting too quickly.

    Unconventional
    French diplomatic

    Z-3/OO/512583-12, 171712Z
    French economy in dire straits according to intercepted communications between French Finance Minister and French Senator

    Date 31 July 2012
    Classification TOP SECRET//COMINT//NOFORN
    WikiLeaks Synopsis
    Intercepted communication reveals that Finance, Economy, and Trade Minister Pierre Moscovici believes the French economic situation was far worse than perceived. Additionally, he remarks about that the situation with the automotive industry was more critical than a pre-retirement unemployment supplement known as AER, which he also thought wouldn’t have had a severe impact on elections (while senator Bourquin thought would have driven voters to right-wing National Front).
    Download PDF

    French Finance Minister Says Economy in Dire Straits, Predicts Two Atrocious Years Ahead (TS//SI//NF)

    (TS//SI//NF) The French economic situation is worse than anyone can imagine and drastic measures will have to be taken in the next 2 years, according to Finance, Economy, and Trade Minister Pierre Moscovici. On 19 July, Moscovici, under pressure to re-establish a pre-retirement unemployment supplement known as the AER, warned that the situation is dire. Upon learning that there are no funds available for the AER, French Senator Martial Bourquin warned Moscovici that without the AER program the ruling Socialist Party will have a rough time in the industrial basin of the country, with voters turning to the right-wing National Front. Moscovici disagreed, asserting that the inability to reinstitute the AER will have no impact in electoral terms, besides, the situation with faltering automaker PSA Peugeot Citroen is more important than the AER. (COMMENT: PSA has announced plans to close assembly plants and lay off some 8,000 workers.) Moscovici warned that the 2013 budget is not going to be a “good news budget,” with the government needing to find at least an additional 33 billion euros ($39.9 billion). Nor will 2014 be a good year. Bourquin persisted, warning that the Socialist Party will find itself in a situation similar to that of Socialist former Spanish President Zapatero, who was widely criticized for his handling of his country’s debt situation. Moscovici countered that it was not Zapatero whose behavior the French government would emulate, but rather Social Democrat former German Chancellor Gerhard Schroeder. (COMMENT: Schroeder, chancellor from 1998 to 2005, was widely credited with helping to restore German competitiveness. He favored shifting from pure austerity measures to measures that encourage economic growth and advocated a common EU financial policy.)

    Unconventional

    French diplomatic

    Z-3/OO/524122-12, 271748Z
    Spying on French Ambassador who contemplated exposing U.S. misuse of UN Oil-for-food program in Iraq

    Date 2004
    Classification TOP SECRET//COMINT
    WikiLeaks Synopsis
    Intercepted communication between French Ambassador in Washington Jean-David Levitte reveals his frustration towards a report he defines “scandalous” regarding a possible misuse of the UN Oil-For-Food (OFF) program by French companies during the regime of Saddam Hussein in Iraq, while he claims some of these French companies where in fact U.S. companies’ subsidiaries and no American company was mentioned in such report. Levitte likely refers to the report filed by the US Senate that accused Russian, British and French politicians of receiving oil allocations from Iraq in exchange for their political alliance. Levitte planned to present a list of such U.S. companies to U.S. Congress and the media.
    Download PDF

    (TS//SI) French Envoy Plans to Release List of U.S. Firms Who Allegedly Profited From OFF

    (TS//SI//REL TO USA, AUS, CAN, GBR and NZL) French Ambassador Jean-David Levitte in Washington plans to respond as early as today to information in the Iraq Survey Group report regarding possible misuse of the UN Oil-for-Food (OFF) program by companies from France and other countries during the former Iraqi regime. The ambassador termed the report scandalous, since it named no U.S. companies and he claimed that many French companies with contracts under the OFF program were actually subsidiaries of U.S. firms that also profited from the business dealings. He therefore planned, with foreign ministry backing, to present a list of these U.S. companies to both the U.S. Congress and the media.

    Unconventional

    French diplomatic

    3/OO/27079-04, 071948Z
    NSA Eavesdrops as Hollande Tries End Run Around Merkel on Greek Eurozone Exit

    Date 22 May 2012
    Classification TOP SECRET//COMINT-GAMMA//ORCON/NOFORN
    WikiLeaks Synopsis
    Intercepted communication reveals that Francois Hollande has approved holding a secret meeting with French officials as well as German opposition (without the knowledge of Merkel) to discuss the euro-zone crisis.
    Download PDF

    French President Approves Secret Eurozone Consultations, Meeting With German Opposition (TS//SI-G//OC/NF)

    (TS//SI-G//OC/NF) French President Francois Hollande has approved holding secret meetings in Paris to discuss the eurozone crisis, particularly the consequences of a Greek exit from the eurozone. On 18 May, Hollande directed Prime Minister (PM) Jean-Marc Ayrault to set up a meeting at the Office of the President (the Elysee) for the following week. Hollande, Ayrault, and “appropriate ministers” would attend, and special emphasis would be given to consequences for the French economy in general and for French banks in particular. Hollande stressed that the meeting would be secret. (COMMENT: The French president seems worried that if word were to get out that Paris is seriously considering the possibility of a Greek exit, it would deepen the crisis.) In addition, secret meetings are to be held in Paris between French officlans and members of the German Social Democratic Party (SPD). Hollande assured the PM that hosting the meeting at the Elysee was “doable,” although Ayrault warned the president to keep the event a secret so as to avoid diplomatic problems. (COMMENT: By “diplomatic problems,” Ayrault is referring to what could happen if German Chancellor Angela Merkel finds out that Hollande is going behind her back to meet with the German opposition.) Earlier reporting reveals that following talks last week in Berlin with Merkel, Hollande complained that nothing of substance was achieved; it was purely for show. Hollande had found the chancellor fixated on the Fiscal Pact and above all on Greece, on which he claimed she had given up and was unwilling to budge. This made Hollande very worried for Greece and the Greek people, who might react by voting for an extremist party. After meeting Merkel, the French president contacted SPD Chairman Sigmair Gabriel and invited him to Paris so that they could talk.

    Foreign Satellite, Unconventional

    French, German governmental

    Z-G/OO/503643-12, 211549Z; Z-G/OO/503541-12, 161711Z
    US Intercepts of France Complaining About US Intercepts of France

    Date 24 March 2010
    Classification TOP-SECRET//COMINT/NOFORN
    WikiLeaks Synopsis
    Intercepted communication between French Ambassador in Washington Pierre Vimont and Sarkozy’s diplomatic advisor Jean-David Levitte, reveals potential topics of discussion for a meeting between Sarkozy and U.S. President, particularly Sarkozy’s frustration regarding Washington step back on a bilateral intelligence cooperation agreement and the U.S. desire to continue spying on France.
    Download PDF

    Sensitive Issues on the Agenda When French, U.S. Presidents Meet Next Week in Washington (TS//SI//NF)

    (TS//SI//NF) French President Sarkozy intends to raise a number of sensitive topics with the U.S. President when the two leaders meet in Washington on 31 March, according to an exchange last week between the French ambassador in Washington Pierre Vimont, and Sarkozy’s diplomatic advisor, Jean-David Levitte. Vimont conveyed that the French President will express his frustration that Washington has backed away from its proposed bilateral intelligence cooperation agreement and Sarkozy intends to continue to push for closure. As Vimont and Levitte understand it, the main sticking point is the U.S. desire to continue spying on France. On the topic of Afghanistan, Levitte noted that Sarkozy is ready to authorize more military trainers but wants clarification on how many are needed, given the conflicting figures from U.S. sources. Another proposed topic was efforts by the European Aeronautic, Defense, and Space Corporation (EADS) to win a tanker aircraft contract with the U.S. military. Vimont revealed cryptically that the deal is moving forward but did not provide any details. Levitte had not expected to put the labeling dispute with Pernod Ricard (the world’s second largest spirits group) on the agenda, but Sarkozy had just spoken to the company’s chairman who had asked the president to intercede on his behalf. (COMMENT: Patrick Ricard, chairman of the Pernod Ricard board of directors, is said to be one of Sarkozy’s wealthy backers.) Vimont characterized the issue as a very political matter in the U.S., and suggested that a direct appeal to the White House might be useful. While Sarkozy intends to broach the issue with the U.S. President, Levitte will talk to the U.S. President’s Economic Adviser and Deputy National Security Adviser. Finally, Levitte expected the two leaders to discuss other pressing subjects including Iran, the Middle East Peace Process, Afghanistan and Pakistan, Yemen, Somalia, the Sahel, Russia, China, Turkey, climate change, and the financial situation of several European countries; however, he provided no details on those topics.

    Unconventional

    French diplomatic

    Z-3/OO/507179-10, 231635Z
    US Spying On Chirac Discussing UN Appointments

    Date 2006
    Classification TOP SECRET//COMINT-GAMMA//ORCON/REL TO USA, AUS, CAN, GBR, NZL
    WikiLeaks Synopsis
    Intercepted communication between French President Jacques Chirac and French Foreign Minister Philippe Douste-Blazy reveals that Chirac gave specific instructions to approach UNSYG Ban Ki-Moon and ask the appointment of Terje Roed-Larsen as Deputy UNSYG or another position of equal responsibility.
    Download PDF

    (TS//SI-G//OC) French President Presses for Selection of Roed-Larsen as Deputy UNSYG

    (TS//SI-G//OC/REL TO USA, AUS, CAN, GBR, NZL) French President Jacques Chirac told Foreign Minister Philippe Douste-Blazy on 23 December to work to ensure that current UN Special Envoy for the Implementation of UNSC Resolution 1559 Terje Roed-Larsen is selected as Deputy UNSYG or at least offered a position of similar responsibility. Chirac spelled out in deliberate fashion exactly how he wanted Douste-Blazy to proceed, instructing him to approach new UNSYG Ban Ki-moon and report back on Ban’s sentiments regarding the deputy post. (COMMENT: Chirac’s detailed orders may be in response to the foreign minister’s propensity, amply demonstrated in the past and the impetus behind a number of presidential reprimands, for making ill-timed or inaccurate remarks.) The President was keen on Roed-Larsen’s selection for several reasons, including his belief that the situation in the Middle East requires a skilled hand with experience in the region and the realization that–for once–France, Russia, and the U.S. all support the same man. Other considerations were that Ban intends to keep Frenchman Jean-Marie Guehenno on as head of the UN Department of Peacekeeping Operations, which is to be divided into two parts, with the newer organization handling logistics. That planned division, however, has drawn fire from Douste-Blazy, who thinks that it would be a catastrophe.

    Unconventional

    French leadership, UN diplomatic

    G/OO/6411-06, 271650Z
    US Spying on Sarkozy Talking Tough on Israel-Palestine

    Date 10 June 2011
    Classification TOP SECRET//COMINT-GAMMA//ORCON/NOFORN
    WikiLeaks Synopsis
    Intercepted communication reveals that Sarkozy was determined to resume peace talks between Israel and Palestine, possibly without the involvement of the U.S.
    Download PDF

    Sarkozy Determined to Proceed With Mideast Initiative, May Pressure U.S. President (TS//SI-G//OC/NF)

    (TS//SI-G//OC/NF) In spite of an apparent lack of interest on the part of some major players, French President Nicolas Sarkozy affirmed on 7 June his determination of go forward with an initiative to restart direct Mideast peace talks between Israel and the Palestinians. It was also disclosed in a conversation between Sarkozy and his foreign minister, Alain Juppe, that consideration was given to including the Quartet in the process; however, they were wary about such an invitation because that group might not bow to Paris’s wishes. Not being a member of the Quartet, they surmised, France would have no control over what transpired in one of its meetings, and if the group elected not to support direct talks, the French initiative would be a non-starter. Another concern centered on the dynamics of the Quartet: the fear in Paris was that in any session involving the EU High Representative for Foreign Affairs and Security Policy, UNSYG Ban Ki-moon, Russian Foreign Minister Sergey Lavrov, and the U.S. Secretary of State, the last two individuals would dominate the proceedings. Finally, the president was giving thought to appealing to Russian President Dmitriy Medvedev for a possible joint initiative without the United States or, as another option, issuing an ultimatum to the U.S. President regarding Palestinian statehood. The ultimatum would demand that Washington back France’s efforts to restart the peace process, failing which Sarkozy would tell the U.S. President that Paris will not side with the U.S. in September (presumably referring to the deliberations in the UN General Assembly on Palestinian statehood).

    Unconventional

    French leadership

    Z-G/OO/513370-11, 091416Z
    US Eavesdrops as Sarkozy Plots French Leadership on Financial Crisis

    Date 2008
    Classification TOP SECRET//COMINT-GAMMA//ORCON/REL TO USA, AUS, CAN, GBR, NZL
    WikiLeaks Synopsis
    Intercepted communication reveals that Sarkozy blamed U.S. Government’s many mistakes for the world economic crisis, and given a lack of engagement by the U.S., France, as EU president at the time, had to take the lead in devising solutions.
    Download PDF

    Sarkozy Sees Himself as Only One Who Can Resolve World Financial Crisis (TS//SI-G//OC)

    (TS//SI-G//OC/REL TO USA, AUS, CAN, GBR, NZL) French President Nicolas Sarkozy considers it his responsibility to Europe and the world to step up to the plate and resolve the world financial crisis. He further declared that he is the only one, given France’s EU Presidency, who can step into the breach at this time. The President blamed many of the current economic problems on mistakes made by the U.S. Government, but believes that Washington is now heeding some of his advice. In his view, this is the first time that the U.S. has not taken the lead in managing a global crisis and France will now take the helm. Sarkozy is determined that the mid-November financial summit, which he proposed, will bring drastic change to the world financial system. Finally, the French President was pleased by some progress made within the EU to ease the crisis and by his excellent working relationship with the British and Spanish prime ministers.

    Unidentified

    French leadership

    G/OO/503290-08, 291640Z

    Find this story at 29 June 2015

    WikiLeaks – Chirac, Sarkozy et Hollande : trois présidents sur écoute

    WIKILEAKS Les documents obtenus par WikiLeaks et que publie «Libération» révèlent que la NSA a, au moins de 2006 à mai 2012, espionné Jacques Chirac, Nicolas Sarkozy et François Hollande.
    Un adage en vogue dans les milieux du renseignement veut qu’en matière d’espionnage, on n’ait pas d’alliés – ou, à tout le moins, qu’ils ne soient pas forcément des amis. «S’espionner entre amis, cela ne se fait pas», s’était d’ailleurs indignée Angela Merkel en apprenant en octobre 2013, par des révélations du Spiegel, que l’Agence nationale de sécurité (NSA) américaine avait ciblé son téléphone portable. Une sélection de documents que publient Libération et Mediapart en collaboration avec WikiLeaks révèle qu’en France, ce sont trois présidents successifs, et certains de leurs collaborateurs, qui ont été espionnés sur une période allant au moins de 2006, lors du second mandat de Jacques Chirac, à mai 2012, juste après l’installation à l’Elysée de François Hollande.

    Ces documents obtenus par WikiLeaks – regroupés sous le titre «Espionnage Elysée» – consistent notamment en cinq rapports d’analyse émanant de la NSA, sous l’intitulé «Global SIGINT Highlights», autrement dit, des «faits marquants» tirés du renseignement d’origine électromagnétique, les interceptions de communications. Tous sont classés «Top Secret», et destinés à des responsables de la NSA et de la communauté américaine du renseignement ; seuls deux d’entre eux, les plus anciens, sont voués à être partagés au sein des «Five Eyes», l’alliance des services de renseignement des Etats-Unis, de l’Australie, du Canada, de la Nouvelle-Zélande et du Royaume-Uni, les autres étant exclusivement à usage américain. Ces comptes rendus émanent, selon des experts interrogés par WikiLeaks, d’un bureau identifié comme étant celui des Summary Services («le service des synthèses»).

    «SÉLECTEURS»
    On peut y lire, notamment, comment Jacques Chirac a, en 2006, poussé son candidat pour le poste de sous-secrétaire général adjoint des Nations unies, mais aussi que, selon la NSA, le ministre des Affaires étrangères de l’époque, Philippe Douste-Blazy, avait une «propension […] à faire des déclarations inexactes ou inopportunes». On peut y lire aussi – ce qui ne surprendra personne – que Nicolas Sarkozy se voyait, en 2008, comme «le seul homme capable de résoudre la crise financière». Ou qu’il se plaignait, en 2010, du «recul de Washington sur sa proposition d’accord de coopération bilatérale sur le renseignement», accord que les deux interlocuteurs mentionnés dans la note, l’ambassadeur de France à Washington, Pierre Vimont, et le conseiller diplomatique, Jean-David Levitte, attribuaient précisément au «souhait des Etats-Unis de continuer à espionner la France»…

    Le mémo le plus récent date du 22 mai 2012 – soit après la mise en place d’un protocole d’échanges d’informations ­entre la Direction générale de la sécurité extérieure (DGSE) et la NSA, qui remonterait, selon le Monde, à la fin 2011 – et fait état de «réunions secrètes» pour discuter d’une possible sortie de la Grèce de la zone euro, mais également des inquiétudes de Jean-Marc Ayrault quant aux réactions d’Angela Merkel si elle venait à avoir vent de la rencontre entre le nouveau président et l’opposition allemande.

    A vrai dire, si le contenu des notes est classé comme hautement confidentiel, il ne révèle pas pour autant de secrets d’Etat. Il témoigne, en tout état de cause, de l’intérêt porté par la NSA à la France. A ce titre, l’autre type de document obtenu par WikiLeaks est au moins aussi frappant. Il s’agit d’un extrait d’une base de données de la NSA mentionnant une série de numéros de téléphone, fixes et mobiles, identifiés comme des «sélecteurs». Autrement dit, sur la base d’une collecte massive d’informations, l’agence identifie des cibles qui motivent par la suite des recherches précises de contenus. Le tout en fonction de «besoins d’information» formalisés à partir de 2002, qui touchent à la politique intérieure ou aux enjeux économiques.

    Extrait d’une base de données de la NSA montrant les personnalités politiques qu’ils ont ciblé.

    «NOUVELLES POSSIBILITÉS DE COLLECTE»
    Dans cette liste, qui date d’après nos recoupements de l’année 2010, Libération a pu identifier les numéros de portable de membres de l’exécutif – le président Nicolas Sarkozy, les secrétaires d’Etat aux Affaires européennes et au Commerce Jean-Pierre Jouyet et Pierre Lellouche –, mais aussi des cibles plus larges : le standard du ministère des Finances, celui de l’Agriculture, ainsi que l’antenne à l’Elysée du Centre de transmissions gouvernemental, qui dépend du Secrétariat général de la défense et de la sécurité nationale (SGDSN). Ce service est précisément responsable de la sécurisation des communications de l’exécutif, ainsi que de la permanence des liaisons gouvernementales, le «téléphone rouge». Rien n’indique pour autant que les liaisons sécurisées aient, elles, été compromises.

    Parmi les autres noms, la liste témoigne d’une identification plutôt précise des interlocuteurs. Les téléphones mobiles de conseillers du Président, comme le secrétaire général de l’Elysée de l’époque, Claude Guéant, ou Jean-David Levitte, sont aussi listés. Contactés par Libération, ni l’un ni l’autre ne se disent surpris. Le premier juge le procédé «inadmissible». Le second, philosophe, indique être «toujours parti du principe [qu’il était] écouté, et pas seulement par nos amis et partenaires américains».

    On trouve aussi des membres du cabinet ou de l’administration du ministère des Affaires étrangères – son porte-parole d’alors, Bernard Valero, ainsi que Laurence Tubiana, fonctionnaire au Quai d’Orsay qui a été chargée en 2009 des négociations pour la conférence sur le climat de Copenhague. A la différence des autres cibles, cette dernière ne relève d’ailleurs pas de la branche chargée d’intercepter les communications européennes, le «S2C32» (déjà identifié dans le scandale Merkel), mais d’un bureau chargé notamment d’«améliorer l’accès à la cible», d’«accroître les efforts de ciblage et d’exploitation» et de «développer de nouvelles possibi­lités de collecte». En clair, de voir dans quelle mesure il serait possible de pirater son téléphone, voire d’installer des logiciels espions dans son ordinateur.

    Cette sélection de documents ne révèle qu’une partie des activités de la NSA en matière d’espionnage des dirigeants français : rien ne permet de connaître la quantité de comptes rendus d’écoutes ayant été communiqués aux dirigeants de la NSA, et les présidents prennent également des précautions pour évoquer les sujets les plus sensibles – rencontres bilatérales ou communications chiffrées. Mais les documents confirment, en tout état de cause, à quel point les Etats-Unis peuvent s’intéresser au détail des communications de dirigeants de pays alliés. En octobre 2013, le ­député ­socialiste Jean-Jacques Urvoas, rapporteur du projet de loi sur le renseignement, se plaignait d’ailleurs dans les colonnes du Monde que «les Etats-Unis n’ont pas d’alliés, ils n’ont que des cibles ou des vassaux».

    «ZONE GRISE»
    Reste désormais à savoir si ces pratiques se sont poursuivies au-delà de la date des derniers documents que nous publions en collaboration avec WikiLeaks. Sollicité par Libération et Mediapart, l’entourage de François Hollande assure qu’au moment de la visite d’Etat du Président à Washington, en février 2014, «l’engagement a été pris [par Barack Obama] de ne plus pratiquer d’écoutes indifférenciées concernant les services de l’Etat des pays alliés». Egalement sollicités, ni la NSA ni la Maison Blanche n’avaient encore réagi, mardi soir à l’heure du bouclage.

    L’espionnage à l’étranger est l’ultime «zone grise» du renseignement – il est d’ailleurs, en France, le véritable point aveugle du projet de loi sur le renseignement, voué à être adopté ce mercredi. En avril, une résolution de l’Assemblée parlementaire du Conseil de l’Europe préconisait la mise en place d’un «code du renseignement multilatéral». On en est évidemment encore très loin.

    AMAELLE GUITON , ALEXANDRE LÉCHENET , JEAN-MARC MANACH ET AVEC JULIAN ASSANGE 23 JUIN 2015 À 21:55 (MIS À JOUR : 23 JUIN 2015 À 22:56)

    Find this story at 23 June 2015

    Copyright liberation.fr

    NSA Economic Spy Order

    Information Need (IN) – France: Economic Developments
    EEI: H – Foreign Contracts/Feasibility Studies/Negotiations
    Information Need (IN) – France: Economic Developments

    Date 2012
    Classification SECRET
    WikiLeaks Synopsis
    This classified US intelligence “Information Need” spying order mandates long term economic espionage against France in order to obtain details about the economic activities of French companies and the economic policies and decisions of the French government. Information Needs (IN) are collection requirements extracted from the National SIGINT Requirements List, and are used to broadly justify the interception of communications in order to satisfy generic intelligence demands from U.S. policy makers and the U.S. Intelligence Community. This IN, identified as 2002-204 (first created in 2002 and updated for more than a decade) and referenced in the list of Top NSA French Targets previously published by WikiLeaks, shows which particular information of interest (“Essential Elements of Information”, EEI) the relevant Signals Intelligence units are instructed to collect and report about. Such requirements include France’s economic relations with the United States, other countries and international institutions, France’s financial and trade policies, and its views on G-8 and G-20 agendas. “Supported Elements” are those parts of the US government which are supported by (i.e receive intelligence reports derived from) the espionage.
    Download PDF

    IN Standard Report: S-C-2002-204

    Title : (S//REL TO USA, AUS, CAN, GBR, NZL) France: Economic Developments

    Originator Classification : SECRET//REL TO USA, AUS, CAN, GBR, NZL

    Table of Contents

    EEI A : (U//FOUO) Economic Relations with the United States
    EEI B : (S//REL TO USA, AUS, CAN, GBR, NZL) French Business Practices
    EEI C : (S//REL TO USA, AUS, CAN, GBR, NZL) French Financial/Macroeconomic Policy Development
    EEI D : (U//FOUO) Views On G-8, G-20 Developments/Issues
    EEI E : (U//FOUO) Budgetary Constraints/Contributions To NATO
    EEI F : (S//REL TO USA, AUS, CAN, GBR, NZL) French Views
    EEI G : (U//FOUO) Relations With Least Developed Countries (LDCs) And Transitional States
    EEI H : (U//FOUO) Foreign Contracts/Feasibility Studies/Negotiations
    EEI I : (U//FOUO) Relations With International Financial Institutions
    EEI J : (S//REL TO USA, AUS, CAN, GBR, NZL) French Trade Policies
    EEI K : (U//FOUO) Questionable Trade Activities

    (U//FOUO) Supported Element(s):

    CIA
    COMMERCE
    DHS
    DIA/DI
    DIA/OSR-2
    DIA/USEUCOM
    FEDERAL RESERVE BOARD
    STATE/INR
    TREASURY
    US TRADE REP
    DOE/IN
    EEI: H – Foreign Contracts/Feasibility Studies/Negotiations

    Date 2012
    Classification SECRET//NOFORN
    WikiLeaks Synopsis
    This US economic espionage order (“Essential Elements of Information) for France instructs US spies to collect information on all French sales and financing of significant projects related to telecommunications, electrical generation, gas, oil, nuclear and renewable energy and environmental and healthcare technologies. Most substantially it also mandates the interception and reportage of all French company negotiations and contracts valued at over $200 million. The results of the spying are to be reported to various US trade, political and intelligence agencies (“Supported Elements”).
    Download PDF

    EEI : H

    EEI Classification : SECRET//NOFORN

    Originator EEI Classification : SECRET//REL TO USA, AUS, CAN, GBR, NZL

    EEI Title : (U//FOUO) Foreign Contracts/Feasibility Studies/Negotiations
    Question(s) :

    1. (S//REL TO USA, AUS, CAN, GBR, NZL) Report impending French contract proposals or feasibility studies and negotiations for international sales or investments in major projects or systems of significant interest to the foreign host country or $200 million or more in sales and/or services, including financing information or projects of high interest including:

    A. Information and telecommunications facilities networks and technology?

    B. Electric power, natural gas, and oil facilities and infrastructure to include nuclear power and renewable energy generation?

    C. Transportation infrastructure and technology to include ports, airports, high-speed rail, and subways?

    D. Environmental technologies used domestically and for export?

    E. Health care infrastructure, services, and technologies, including biotechnology developments?

    Find this story at 29 June 2015

    DOSSIER: LA RÉPUBLIQUE SUR ÉCOUTE ENQUÊTE 2006-2012: Hollande, Sarkozy et Chirac écoutés

    Au-delà des trois chefs d’État français, des ministres, des hauts fonctionnaires, des parlementaires et des diplomates ont été surveillés téléphoniquement pendant près d’une décennie par les services secrets américains, selon des documents obtenus par WikiLeaks.

    Les États-Unis ont placé la République sur écoute. Les présidents François Hollande, Nicolas Sarkozy et Jacques Chirac, ainsi que de nombreux ministres, des hauts fonctionnaires, des parlementaires ou des diplomates, ont été écoutés directement ou par ricochet pendant près d’une décennie par les services secrets américains, selon des documents confidentiels de la National Security Agency (NSA) obtenus par WikiLeaks (lire aussi notre version en anglais de cet article).

    D’après des notes de synthèse de la NSA auxquelles Mediapart et Libération ont eu accès, en collaboration avec WikiLeaks, dans le cadre de l’opération Espionnage Élysée, les interceptions se sont étalées de 2006 à 2012 – mais rien ne dit qu’elles n’ont pas commencé plus tôt et ne se sont pas poursuivies depuis. Toutes classifiées « top secret », ces notes détaillent les dessous d’un espionnage obsessionnel de la France par les États-Unis sur des questions diplomatiques, de politique locale ou économiques de tous ordres.

    Les trois présidents français écoutés par la NSA
    Les trois présidents français écoutés par la NSA © DR
    Que les États-Unis écoutent les principaux dirigeants d’un pays allié comme la France relève pour certains du secret de polichinelle. L’information est désormais prouvée par des documents issus du cœur de l’appareil d’État américain.

    Surtout, les éléments que nous rendons publics à partir d’aujourd’hui (voir ici l’analyse des documents) révèlent l’ampleur jusqu’ici insoupçonnée de l’espionnage états-unien, réalisé en dehors de tout cadre judiciaire et de tout réel contrôle. Car ce ne sont pas seulement les présidents de la République successifs qui ont été écoutés ces dernières années, mais toutes les strates de la puissance publique qui ont été, à un moment ou à un autre, la cible des États-Unis, qu’il s’agisse de directeurs d’administration, de ministres, de conseillers présidentiels et ministériels, de diplomates, de porte-parole. Au sein même de l’Élysée, par exemple, de très nombreuses lignes téléphoniques (fixes ou portables) ont été branchées.

    Déjà passablement écornée par les révélations de l’ancien agent Edward Snowden, l’image de la NSA et, avec elle, des États-Unis ne devrait pas sortir grandie de ces nouvelles révélations, qui jettent une lumière crue sur les pratiques agressives et déloyales de la première puissance mondiale à l’encontre d’un pays normalement considéré comme « ami ». Du moins, en façade.

    Contactée, la NSA n’a pas souhaité faire de commentaire.

    Comme ses deux prédécesseurs de droite, l’actuel président socialiste François Hollande n’a pas échappé à la curiosité des grandes oreilles de Washington. Un rapport du 22 mai 2012 de la NSA fait ainsi explicitement référence à une conversation tenue quatre jours plus tôt entre le président fraîchement élu et son premier ministre de l’époque, Jean-Marc Ayrault. La conversation porte sur la volonté de François Hollande d’organiser des « consultations secrètes » avec l’opposition allemande, concernant l’éventualité d’une sortie de la Grèce de la zone euro – un sujet toujours d’actualité.

    Les analystes de la NSA évoquent dans le même document l’existence de « précédents rapports » concernant des entretiens passés au sujet de la chancelière Angela Merkel. Ce qui laisse donc supposer que les interceptions américaines du président français ont bel et bien été monnaie courante.

    À l’Élysée, on indiquait mardi 23 juin que, sans avoir conservé la trace de cette conversation, celle-ci est « tout à fait crédible ». Mais sur le fond, la présidence de la République n’a souhaité faire aucun commentaire à ce stade. Dans l’entourage du président, on précise toutefois qu’en amont de la rencontre entre François Hollande et Barack Obama, le 11 février 2014 à Washington, puis lors de cette entrevue, « l’engagement a été pris de ne plus pratiquer d’écoutes indifférenciées des services de l’État d’un pays allié ».

    Le directeur général de LR (ex-UMP), Frédéric Péchenard, a communiqué l’information à Nicolas Sarkozy, qui « ne souhaite pas réagir pour l’instant ».

    Comme pour la plupart des documents obtenus par WikiLeaks, le rapport de mai 2012 de la NSA ciblant François Hollande est surmonté de nombreuses initiales qui, une fois décryptées, donnent la mesure du caractère ultrasensible des données désormais publiques. Estampillées « top secret » (TS), ces notes traitent de renseignements obtenus par des interceptions de signaux électroniques (SI pour SIGINT, soit “signal intelligence”) et ne doivent sous aucun prétexte être partagées avec un pays étranger (NF pour NOFORN, soit “no foreigner”).

    La note Hollande est également accompagnée, comme pour de nombreuses autres, de la mention « unconventional », une catégorie particulière dans la nomenclature de la NSA qui correspond aux opérations non conventionnelles.

    LIRE AUSSI
    Revealed: how US tapped phones of three French presidents
    PAR FABRICE ARFI ET JÉRÔME HOURDEAUX ET JULIAN ASSANGE (WIKILEAKS)

    US phone taps on France – why Paris would prefer to keep a low profile
    PAR LÉNAÏG BREDOUX ET MATHIEU MAGNAUDEIX

    WikiLeaks documents on US snooping on France – what the presidents said
    PAR LÉNAÏG BREDOUX ET ELLEN SALVI ET JULIAN ASSANGE (WIKILEAKS)

    France condemns ‘unacceptable’ spying on its presidents
    PAR LÉNAÏG BREDOUX ET MATHIEU MAGNAUDEIX ET ELLEN SALVI

    35 « leaders internationaux » espionnés par la NSA
    PAR LA RÉDACTION DE MEDIAPART

    Espionnage d’intérêts français par le renseignement allemand : la France se tait
    PAR MATHIEU MAGNAUDEIX

    Espionnage : à droite et à gauche, l’allié américain a déçu
    PAR LÉNAÏG BREDOUX ET MATHIEU MAGNAUDEIX ET ELLEN SALVI
    Toujours dans cette même note Hollande figure une petite mention supplémentaire, qui est tout sauf anodine : « Foreign Satellite ». Ce terme, FORNSAT en abrégé, désigne un réseau mondial de stations d’écoutes de la NSA réparties dans les pays alliés. Tous les regards se portent aujourd’hui, sans qu’il soit possible d’en avoir la certitude absolue, vers des antennes satellites allemandes.

    La presse a en effet plusieurs fois fait état ces derniers mois de la sous-traitance par les services secrets allemands (le BND) de l’espionnage américain, ce qui a provoqué une forte indignation en Allemagne et l’ouverture d’une enquête parlementaire qui cherche précisément le type de documents que WikiLeaks a obtenus.

    En dehors de l’actuel chef de l’État français, d’autres hautes personnalités françaises ont été écoutées. D’après les documents en notre possession, sur lesquels nous reviendrons dans les prochains jours, les anciens présidents Nicolas Sarkozy et Jacques Chirac, l’ancien ministre socialiste de l’économie Pierre Moscovici (aujourd’hui commissaire européen) ou l’ex-ambassadeur de France à Washington Pierre Vimont ont ainsi été espionnés.

    Il faut dire que l’appétit de renseignements des États-Unis pour la France relève de la boulimie. Un autre document confidentiel (voir ci-dessous) de la NSA, rédigé sous la présidence Sarkozy (2007-2012), révèle quant à lui la liste des cibles françaises définies par les États-Unis. Sont concernés, pêle-mêle : le portable personnel du président de l’époque, Nicolas Sarkozy, ceux du conseiller diplomatique Jean-David Levitte, du secrétaire général de l’Élysée Claude Guéant, du porte-parole du ministère des affaires étrangères Bernard Valero, de l’ancien ministre Jean-Pierre Jouyet (aujourd’hui secrétaire général de l’Elysée), celui d’un responsable du Quai d’Orsay non identifié, ou du ministre du commerce extérieur Pierre Lellouche.

    La liste des cibles françaises établie par la NSA sous la présidence Sarkozy
    La liste des cibles françaises établie par la NSA sous la présidence Sarkozy
    Pour Claude Guéant, ancien secrétaire général de l’Elysée et ex-ministre de l’intérieur, « cette pratique est scandaleuse ». « Le gouvernement français doit réagir comme il se doit. Au minimum, cela nécessite une explication au plus haut niveau, un engagement absolu à mettre un terme à ces pratiques. Nous nous acheminons vers un monde qui est extrêmement préoccupant, où plus personne n’a plus d’intimité, de confidentialité », se plaint ce proche de Nicolas Sarkozy.

    « Si les Américains ont écouté Merkel, on ne voit pas pourquoi les autres n’auraient pas été écoutés », commente Frédéric Péchenard, ancien patron de la police nationale et actuel directeur général des Républicains. « Mais si l’on veut être capables de se défendre, il faut que nos services soient à la hauteur. Il nous faut des moyens techniques humains et juridiques plus efficaces. Être espionné par ceux qui sont censés être nos amis, ça peut poser un problème d’ordre diplomatique », précise-t-il.

    « Moi qui étais un grand ami de l’Amérique, je le suis de moins en moins », réagit pour sa part le député Pierre Lellouche auprès de Mediapart. « Je ne suis pas surpris. Ça ne m’étonne pas d’avoir été écouté lorsque j’étais au commerce extérieur, ça intéresse beaucoup les Américains, l’espionnage industriel. On a tout le temps ce genre de conversations. C’est d’ailleurs l’argument qu’on nous rétorque en ce moment dans le cadre de la loi sur le renseignement : on est écouté par tout le monde, pourquoi s’empêcher de nous écouter ? On s’écoute de partout. Malheureusement, je le dirai à l’Assemblée nationale, on est dans un imperium global sur le plan économique, où les États-Unis n’hésitent pas à mettre en réseaux la CIA, la NSA, mais aussi la justice américaine, qui ensuite fait des saisines. Je le dénonce sans arrêt », ajoute-t-il.

    D’après les documents de la NSA, les lignes fixes des conseillers africains en poste à l’Élysée et les numéros des… standards des ministères de l’agriculture et des finances sont également visés. On trouve encore dans la liste des cibles l’antenne du Centre de transmission gouvernemental (CTG) situé à l’Élysée. Celui-ci est chargé d’assurer, à l’abri du “secret défense”, la permanence des liaisons gouvernementales et tout particulièrement celles du chef de l’État et du Premier ministre. Un autre numéro, référencé sous l’intitulé « FR VIP AIRCRAFT REL », renvoie après vérification à une ligne de la flotte aérienne du gouvernement, l’Etec, qui dépend de l’armée de l’air.

    Au-delà du scandale que peut susciter aujourd’hui cet espionnage américain, la facilité avec laquelle les États-Unis paraissent pouvoir intercepter la moindre conversation des plus hauts dirigeants français interroge aujourd’hui la faiblesse des capacités de contre-ingérence des services de renseignement français. À ce propos, l’Élysée a coutume de rappeler que sur les questions diplomatiques et militaires, il n’y a jamais eu de fuite quelle qu’elle soit, précisant que s’agissant des sujets les plus sensibles, toutes les précautions sont prises. Jusqu’à preuve du contraire.

    23 JUIN 2015 | PAR FABRICE ARFI ET JÉRÔME HOURDEAUX ET JULIAN ASSANGE (WIKILEAKS)

    Find this story at 23 June 2015

    Copyright mediapart.fr

    Espionnage Élysée (2015)

    Press Release Top French NSA Targets Top French NSA Intercepts Economic Spy Order

    Today, 29 June 2015, WikiLeaks continues “Espionnage Élysée”, our ongoing publication of a collection of TOP SECRET documents from United States surveillance operations against France.

    Today’s publication comprises seven top secret documents detailing how the US has had a decade- long policy of economic espionage against France, including the interception of all French corporate contracts and negotiations valued at more than $200 million. The documents demonstrate that the US National Security Agency, far from being a rogue organisation, is carrying out an economic espionage policy created by the US Director of National Intelligence. The documents detail the intelligence process, from the tasking of the NSA with collection of desired economic information to the production of developed intelligence reports, which are sent to “Supported Elements” of the US government, including the US Department of Commerce, the US Trade Represenative, the US Treasury and the Central Intelligence Agency.

    Central within the cache of documents are two long-term spying orders (“collection requirements”) which define the kinds of intelligence the NSA is tasked with collecting in its surveillance operations against France. The documents make clear that the NSA has been tasked with obtaining intelligence on all aspects of the French economy, from government policy, diplomacy, banking and participation in international bodies to infrastructural development, business practices and trade activities. The documents establish that the US economic intelligence operations against France have run for more than a decade and started as early as 2002. Some of the documents are authorised for sharing with the “Five Eyes” partners – the group of Anglophone countries in close intelligence co-operation with the United States: Canada, New Zealand, Australia and France’s fellow member state of the European Union, the United Kingdom, strongly suggesting that the United Kingdom has also benefited from the United States’ economic espionage activities against France.

    The cache also includes five TOP SECRET intelligence summaries from US spying on the conversations and communications of French officials. The documents show US spying on the French Finance Minister, a French Senator, officials within the Treasury and Economic Policy Directorate, the French ambassador to the United States, and officials with direct responsibility for EU trade policy. The intercepts reveal internal French deliberation and policy on the World Trade Organization, the Trans-Pacific Partnership Agreement, the G7 and the G20, the 2013 French budget, the decline of the automotive industry in France, and the involvement of French companies in the Oil for Food programme in Iraq during the 1990s.

    WikiLeaks founder Julian Assange said: “The United States has been conducting economic espionage against France for more than a decade. Not only has it spied on the French Finance Minister, it has ordered the interception of every French company contract or negotiation valued at more than $200 million. That covers not only all of France’s major companies, from BNP Paribas, AXA and Credit Agricole to Peugeot and Renault, Total and Orange, but it also affects the major French farming associations. $200 million is roughly 3,000 French jobs. Hundreds of such contracts are signed every year. The United States not only uses the results of this spying itself, but swaps these intercepts with the United Kingdom. Do French citizens deserve to know that their country is being taken to the cleaners by the spies of supposedly allied countries? Mais oui!”

    For French-language interviews/comment regarding Espionnage Élysée please contact WikiLeaks’ Paris-based legal advisor, Juan Branco: Tel. +33 671 19 21 47

    Cartoon
    Today, 23 June 2015, WikiLeaks began publishing “Espionnage Élysée”, a collection of TOP SECRET intelligence reports and technical documents from the US National Security Agency (NSA) concerning targeting and signals intelligence intercepts of the communications of high-level officials from successive French governments over the last ten years.

    The top secret documents derive from directly targeted NSA surveillance of the communications of French Presidents Francois Hollande (2012–present), Nicolas Sarkozy (2007–2012), and Jacques Chirac (1995–2007), as well as French cabinet ministers and the French Ambassador to the United States. The documents also contain the “selectors” from the target list, detailing the cell phone numbers of numerous officials in the Elysee up to and including the direct cell phone of the President.

    Prominent within the top secret cache of documents are intelligence summaries of conversations between French government officials concerning some of the most pressing issues facing France and the international community, including the global financial crisis, the Greek debt crisis, the leadership and future of the European Union, the relationship between the Hollande administration and the German government of Angela Merkel, French efforts to determine the make-up of the executive staff of the United Nations, French involvement in the conflict in Palestine and a dispute between the French and US governments over US spying on France.

    A founding member state of the European Union and one of the five permanent members of the UN Security Council, France is formally a close ally of the United States, and plays a key role in a number of US-associated international institutions, including the Group of 7 (G7), the North Atlantic Treaty Organization (NATO) and the World Trade Organization (WTO).

    The revelation of the extent of US spying against French leaders and diplomats echoes a previous disclosure in the German press concerning US spying on the communications of German Chancellor Angela Merkel and other German officials. That disclosure provoked a political scandal in Germany, eventuating in an official inquiry into German intelligence co-operation with the United States, which is still ongoing.

    While the German disclosures focused on the isolated fact that senior officials were targeted by US intelligence, WikiLeaks’ publication today provides much greater insight into US spying on its allies, including the actual content of intelligence products deriving from the intercepts, showing how the US spies on the phone calls of French leaders and ministers for political, economic and diplomatic intelligence.

    WikiLeaks founder Julian Assange said: “The French people have a right to know that their elected government is subject to hostile surveillance from a supposed ally. We are proud of our work with leading French publishers Liberation and Mediapart to bring this story to light. French readers can expect more timely and important revelations in the near future.”

    Find this story at 29 June 2015

    Trade Secrets : Is the U.S.’s most advanced surveillance system feeding economic intelligence to American businesses? (1999)

    No one is surprised that the United States uses sophisticated electronic spying techniques against its enemies. But Europeans are increasingly worried about allegations that the U.S. uses those same techniques to gather economic intelligence about its allies.
    The most extensive claims yet came this spring in a report written for the European Parliament. The report says that the U.S.

    National Security Agency, through an electronic surveillance system called Echelon, routinely tracks telephone, fax, and e-mail transmissions from around the world and passes on useful corporate intelligence to American companies.

    Among the allegations: that the NSA fed information to Boeing and McDonnell Douglas enabling the companies to beat out European Airbus Industrie for a $ 6 billion contract; and that Raytheon received information that helped it win a $ 1.3 billion contract to provide radar to Brazil, edging out the French company Thomson-CSF. These claims follow previous allegations that the NSA supplied U.S. automakers with information that helped improve their competitiveness with the Japanese (see “Company Spies,” May/June 1994).

    Is there truth to these allegations? The NSA is among the most secretive of U.S. intelligence agencies and won’t say much beyond the fact that its mission is “foreign signals intelligence.” The companies involved all refused to comment.

    “Since the NSA’s collection capabilities are so grotesquely powerful, it’s difficult to know what’s going on over there,” says John Pike, an analyst at the watchdog group Federation of American Scientists, who has tracked the NSA for years.

    This much is known: The NSA owns one of the largest collections of supercomputers in the world, and it’s an open secret–as documented in the European Parliament report–that Echelon vacuums up massive amounts of data from communications satellites and the Internet and then uses its computers to winnow it down. The system scans communications for keywords–“bomb,” for instance–that might tip off analysts to an interesting topic.

    Fueling allegations of corporate espionage is the fact that defense contractors and U.S. intelligence agencies are linked extensively through business relationships. Raytheon, for instance, has large contracts to service NSA equipment, according to the European report.

    Englishman Glyn Ford, the European Parliament member who initiated the study, wants the NSA to come clean about its activities in Europe. And the Europeans have some leverage on this issue, if they decide to use it. In a drive to improve surveillance, the United States is pressuring European governments to make telephone companies build eavesdropping capabilities into their new systems. But if that’s what the U.S. wants, says Ford, it’s going to have to be open about what information it’s collecting: “If we are going to leave the keys under the doormat for the United States, we want a guarantee that they’re not going to steal the family silver,” he says.

    In the meantime, congressional critics have started to wonder if all that high-powered eavesdropping is limited to overseas snooping. In April, Bob Barr (R-Ga.), a member of the House Government Reform Committee, said he was worried by reports that the NSA was engaged in illicit domestic spying.

    “We don’t have any direct evidence from the NSA, since they’ve refused to provide any reports, even when asked by the House Intelligence Committee,” Barr says. “But if in fact the NSA is pulling two million transmissions an hour off of these satellites, I don’t think there’s any way they have of limiting them to non-U.S. citizens.”

    Last May, after the NSA stonewalled requests to discuss the issue, Congress amended the intelligence appropriations bill to require the agency to submit a report to Congress. (The bill is still in a conference committee.) And the NSA will face more questions when the Government Reform Committee holds hearings on Echelon and other surveillance programs.

    “We ought to prevent any agency from the dragnet approach–where they throw out a net and drag anything in,” Barr says.

    Kurt Kleiner
    Mother Jones November 1, 1999

    Find this story at 1 November 1999

    Copyright Mother Jones

    KGB spy shares details of his escape to Britain in 1985

    Oleg GordievskyA Soviet double spy, who secretly defected to Britain 30 years ago this month, has revealed for the first time the details of his exfiltration by British intelligence in 1985. Oleg Gordievsky was one of the highest Soviet intelligence defectors to the West in the closing stages of the Cold War. He joined the Soviet KGB in 1963, eventually reaching the rank of colonel. But in the 1960s, while serving in the Soviet embassy in Copenhagen, Denmark, Gordievsky began feeling disillusioned about the Soviet system. His doubts were reinforced by the Soviet invasion of Czechoslovakia in 1968. It was soon afterwards that he made the decision to contact British intelligence.
    Cautiously, Britain’s Secret Intelligence Service (known as MI6) communicated with Gordievsky, and in 1974 he secretly became an agent-in-place for the United Kingdom. Eight years later, in 1982, Gordievsky was promoted to KGB rezident (chief of station) in London. While there, he frequently made contact with his MI6 handlers, giving them highly coveted information on Soviet nuclear strategy, among other things. He is credited with informing London of Mikhail Gorbachev’s imminent ascendency to the premiership of the Soviet Union, long before he was seen by Western intelligence as a viable candidate to lead the country.
    But in May of 1985, Gordievsky was suddenly recalled to Moscow, where he was detained by the KGB. He was promptly taken to a KGB safe house in the outskirts of Moscow and interrogated for five hours, before being temporarily released pending further questioning. Remarkably, however, Gordievsky managed to escape his KGB surveillance and reappear in Britain less than a week later. How did this happen? On Sunday, the former double spy gave a rare rare interview to The Times, in which he revealed for the first time the details of his escape to London. He told The Times’ Ben Macintyre that he was smuggled out of the USSR by MI6 as part of Operation PIMLICO. PIMLICO was an emergency exfiltration operation that had been put in place by MI6 long before Gordievsky requested its activation in May of 1985.
    Every Tuesday, shortly after 7:00, a British MI6 officer would take a morning stroll at the Kutuzovsky Prospekt in Moscow. He would pass outside a designated bakery at exactly 7:24 a.m. local time. If he saw Gordievsky standing outside the bakery holding a grocery bag, it meant that the double agent was requesting to be exfiltrated as a matter of urgency. Gordievsky would then have to wait outside the bakery until a second MI6 officer appeared, carrying a bag from the Harrods luxury department store in London. The man would also be carrying a Mars bar (a popular British candy bar) and would bite into it while passing right in front of Gordievsky. That would be a message to him that his request to be exfiltrated had been received.
    Four days later, Gordievsky used his skills in evading surveillance and shook off (or dry-cleaned, in espionage tradecraft lingo) the KGB officers trailing him. He was then picked up by MI6 officers and smuggled out of the country in the trunk of a British diplomatic car that drove to the Finnish border. Gordievsky told The Times that Soviet customs officers stopped the car at the Finnish border and surrounded it with sniffer dogs. At that moment, a British diplomat’s wife, who was aware that Gordievsky was hiding in the car, came out of the vehicle and proceeded to change her baby’s diaper on the trunk, thus safeguarding Gordievsky’s hiding place and masking his scent with her baby’s used diaper. If it hadn’t been for the diplomat’s wife, Gordievsky told The Times that he might have been caught.
    After crossing the Soviet-Finnish border, Gordievsky traveled to Norway and from there he boarded a plane for England. Soviet authorities promptly sentenced him to death, but allowed his wife and children to join him in Britain six years later, after British Prime Minister Margaret Thatcher personally lobbied the Soviet government. Gordievsky’s death penalty still stands in Russia. In 2007, the Queen made Gordievsky a Companion of the Most Distinguished Order of St. Michael and St. George for services rendered to the security of the British state.

    JULY 6, 2015 BY JOSEPH FITSANAKIS LEAVE A COMMENT

    Find this story at 6 July 2015

    Copyright intelnews.org

    Top KGB defector begged Margaret Thatcher to secure release of his family

    Oleg Gordievsky told the prime minister that without his wife and young daughters his “life has no meaning”, papers released by the National Archives show

    Oleg Gordievsky, the most prominent Soviet agent to defect to Britain during the Cold War, personally pleaded with Margaret Thatcher to help secure the release of his family from Moscow.
    The KGB colonel told the prime minister that without his wife and young daughters, who were prevented from following him to London, his “life has no meaning”.
    Files released by the National Archives reveal that MI6 secretly sought to broker a deal with the Russians to secure the safe passage of his family. When the offer was rejected, Mrs Thatcher insisted on expelling every KGB agent in Britain.
    Mr Gordievsky, who was one of the most important spies during the Cold War, provided Britain with reports on Soviet operations for more than a decade.
    When he issued his appeal to Mrs Thatcher in 1985, she responded personally in an emotive note on Sept 7 1985 urging him to have hope.
    Related Articles
    Tony Benn, the veteran Labour politician, has died at the age of 88. The former cabinet minister, who served as an MP for more than 50 years, died at his home in west London surrounded by family members.
    Tony Benn, a KGB spy? No, he was far too dangerous for us 26 Dec 2014
    Former KGB colonel says he paid late union leader Jack Jones £200 for information 22 Apr 2009
    Sir Christopher Curwen 23 Dec 2013
    They can’t take their eyes off us 07 Dec 2010
    “Our anxiety for your family remains and we shall not forget them,” she said. “Having children of my own, I know the kind of thoughts and feelings which are going through your mind each and every day. But just as your concern is about them, so their concern will be for your safety and well-being.
    “Please do not say that life has no meaning. There is always hope. And we shall do all to help you through these difficult days.”
    Mrs Thatcher went on to suggest that the pair should meet when the “immediate situation” – the public announcement of Mr Gordievsky’s defection to Britain – had passed.
    Her personal involvement was greeted with extreme gratitude by Christopher Curwen, the MI6 chief who had arranged Mr Gordievsky’s extraction from Moscow.
    Curwen said: “The reassurance that his family would not be forgotten provided the help and support which he most needs at this difficult time.”
    Her comments “greatly assisted” MI6’s dealings with Mr Gordievsky at a “very dificult time,” he added.
    Mr Gordievsky arrived in London as a result of an emergency extraction sanctioned by Mrs Thatcher in the summer of 1985. Originally recruited in 1974, Mr Gordievsky became Britain’s star source inside the KGB after being posted to the Soviet secret service’s London bureau.
    However, on May 17 1985, having just been promised the job of head of station in London, he was suddenly summoned back to Moscow and subsequently accused of being a spy. He eventually escaped to London with the help of MI6, who smuggled him across the border into Finland, after giving his KBG minders the slip.
    When she formally announced Mr Gordievsky’s defection Mrs Thatcher said she hoped that “on humanitarian grounds” the Soviet authorities would agree to his request for his family to join him in London.
    However it was another six years before he was reunited with his wife Leila and children. His elder daughter Mariya was 11 on her arrival in London in 1991, and his second child Anna was 10.
    The National Archives files show that the prime minister took a close interest in Mr Gordievsky’s well-being, asking his handlers “whether he has some sort of companion to talk to and confide in at what is obviously a very difficult time for him.”

    By Edward Malnick7:00AM GMT 30 Dec 2014

    Find this story at 30 December 2014

    © Copyright of Telegraph Media Group Limited 2015

    The Spy Among Us

    Jack Barsky held a job at some of the top corporations in the U.S. and lived a seemingly normal life — all while spying for the Soviet Union

    The following is a script from “The Spy Among Us” which aired on May 10, 2015. Steve Kroft is the correspondent. Draggan Mihailovich, producer.

    Tonight, we’re going to tell you a story you’ve probably never heard before because only a few people outside the FBI know anything about it. It’s a spy story unlike any other and if you think your life is complicated, wait till you hear about Jack Barsky’s, who led three of them simultaneously. One as a husband and father, two as a computer programmer and administrator at some top American corporations and three as a KGB agent spying on America during the last decade of the Cold War.

    The FBI did finally apprehend him in Pennsylvania but it was long after the Soviet Union had crumbled. What makes Jack Barsky’s story even more remarkable is he’s never spent a night in jail, the Russians declared him dead a long time ago, he’s living a quiet life in upstate New York and has worked in important and sensitive jobs. He’s now free to tell his story…as honestly as a former spy ever can.

    Jack Barsky CBS NEWS
    Steve Kroft: So who are you?
    Jack Barsky: Who am I? That depends when the question is asked. Right now, I’m Jack Barsky. I work in the United States. I’m a U.S. citizen. But it wasn’t always the case.

    Steve Kroft: How many different identities do you have?

    Jack Barsky: I have two main identities. A German one, and an American one.

    “Who am I? That depends when the question is asked. Right now, I’m Jack Barsky. I work in the United States. I’m a U.S. citizen. But it wasn’t always the case.”
    Steve Kroft: What’s your real name?

    Jack Barsky: My real name is Jack Barsky.

    Steve Kroft: And what name were you born with?

    Jack Barsky: Albrecht Dittrich. Say that three times real fast.

    Steve Kroft: Just say it once slowly…(laughs)

    Jack Barsky: Albrecht Dittrich.

    How Albrecht Dittrich became Jack Barsky is one of the untold stories of the Cold War, an era when the real battles were often fought between the CIA and the KGB. Barsky was a rarity, a Soviet spy who posed as an American and became enmeshed in American society. For the 10 years he was operational for the KGB, no one in this country knew his real story, not even his family.

    Steve Kroft: Did you think you were going to get away with this?

    Jack Barsky: Yeah, otherwise I wouldn’t have done it (laughs).

    youngbarsky.jpg
    Young Jack Barsky
    What Barsky did can be traced back to East Germany, back to the days when he was Albrecht Dittrich. A national scholar at a renowned university in Jena, Dittrich was on the fast track to becoming a chemistry professor, his dream job.
    Jack Barsky: Didn’t work out that way, because I was recruited by the KGB to do something a little more adventurous.

    Steve Kroft: Spy?

    Jack Barsky: We called it something different. We used a euphemism. I was going to be a “scout for peace.”

    Steve Kroft: A KGB “scout for peace”?

    Jack Barsky: That is correct. The communist spies were the good guys. And the capitalist spies were the evil ones. So we didn’t use the word spy.

    He says his spying career began with a knock on his dorm room door one Saturday afternoon in 1970. A man introduced himself, claiming to be from a prominent optics company.

    Jack Barsky: He wanted to talk with me about my career, which was highly unusual. I immediately, there was a flash in my head that said, “That’s Stasi.”

    Steve Kroft: East German secret police?

    Jack Barsky: East German secret police, yeah.

    60 MINUTES: SEGMENT EXTRAS
    HOW DOES A COVERT SPY GET AROUND?
    It was a Stasi agent. He invited Dittrich to this restaurant in Jena where a Russian KGB agent showed up and took over the conversation. The KGB liked Dittrich’s potential because he was smart, his father was a member of the Communist party and he didn’t have any relatives in the West. Dittrich liked the attention and the notion he might get to help the Soviets.

    Steve Kroft: And what did you think of America?

    Jack Barsky: It was the enemy. And, the reason that the Americans did so well was because they exploited all the third-world countries. That’s what we were taught, and that’s what we believed. We didn’t know any better. I grew up in an area where you could not receive West German television. It was called the “Valley of the Clueless.”

    For the next couple of years, the KGB put Dittrich through elaborate tests and then in 1973 he was summoned to East Berlin, to this former Soviet military compound. The KGB, he says, wanted him to go undercover.

    Jack Barsky: At that point, I had passed all the tests, so they wanted, they made me an offer.

    Steve Kroft: But you had been thinking about it all along, hadn’t you?

    Jack Barsky: That’s true. With one counterweight in that you didn’t really know what was going to come. Is– how do you test drive becoming another person?

    It was a difficult decision, but he agreed to join the KGB and eventually found himself in Moscow, undergoing intensive training.

    Jack Barsky: A very large part of the training was operational work. Determination as to whether you’re being under surveillance. Morse code, short wave radio reception. I also learned how to do microdots. A microdot is, you know, you take a picture and make it so small with the use of microscope that you can put it under a postage stamp.

    60 MINUTES: SEGMENT EXTRAS
    JACK BARSKY SHARES SOME HOW-TOS OF SPYING
    The Soviets were looking to send someone to the U.S. who could pose as an American. Dittrich showed a command of English and no trace of an East German accent that might give him away. He learned a hundred new English words every day.

    Jack Barsky: It took me forever. I did probably a full year of phonetics training. The difference between “hot” and “hut.” Right? That, that’s very difficult and, and most Germans don’t get that one.

    Steve Kroft: Did you want to go to the United States?

    Jack Barsky: Oh yeah. Sure. There was New York, there was San Francisco, you know, we heard about these places.

    Steve Kroft: Your horizons were expanding…

    Jack Barsky: Oh, absolutely. Now I’m really in the big league, right?

    Dittrich needed an American identity. And one day a diplomat out of the Soviet embassy in Washington came across this tombstone just outside of D.C. with the name of a 10-year-old boy who had died in 1955. The name was Jack Philip Barsky.

    60 MINUTES: SEGMENT EXTRAS
    THE ORIGINAL JACK PHILIP BARSKY
    Jack Barsky: And they said, “Guess what? We have a birth certificate. We’re going to the U.S.”

    Steve Kroft: And that was the Jack Barsky birth certificate.

    Jack Barsky: The Jack Barsky birth certificate that somebody had obtained and I was given. I didn’t have to get this myself.

    Steve Kroft: Did you feel strange walking around with this identity of a child?

    Jack Barsky: No. No. When you do this kind of work, some things you don’t think about. Because if you explore, you may find something you don’t like.

    The newly minted Jack Barsky landed in New York City in the fall of 1978, with a phony back story called a legend and a fake Canadian passport that he quickly discarded. The KGB’s plan for him was fairly straightforward. They wanted the 29-year-old East German to get a real U.S. passport with his new name, then become a businessman, then insert himself into the upper echelons of American society and then to get close to National Security Adviser Zbigniew Brzezinski so that he could spy on him.

    Jack Barsky: That was the plan. It failed.

    Steve Kroft: Why?

    Jack Barsky: Because I was not given very good instructions with regard to how to apply for a passport.

    When he went to apply for a passport at Rockefeller Center, Barsky was thrown off by the list of questions.

    Jack Barsky: Specific details about my past, for which I had no proof. So I walked out of it.

    Steve Kroft: Did the KGB have a pretty good grasp on the United States and how things worked there?

    Jack Barsky: No.

    Steve Kroft: No?

    Jack Barsky: Absolutely not. They made a number of mistakes in terms of giving me advice, what to do, what not to do. They just didn’t know.

    Left to fend for himself in a country the KGB didn’t understand, he got himself a cheap apartment and tried to make do with a birth certificate and $6,000 dollars in cash the Soviets had given him. His spying career at that point more resembled the bumbling Boris Badenov than James Bond…

    Steve Kroft: So you were working as a bike messenger?

    Jack Barsky: Right.

    Steve Kroft: That doesn’t sound like a promising position for a spy.

    Jack Barsky: No. But there were a lot of things that I didn’t know…

    Steve Kroft: So how close did you ever get to Brzezinski?

    Jack Barsky: Not very.

    To get a Social Security card, which he would need if he wanted a real job, Barsky knew he would have to do some acting.

    Jack Barsky: It was unusual for a 30-plus-year-old person to, to say, “You know, I don’t have a Social Security card. Give me one.” So in order to make my story stick I made my face dirty. So I looked like somebody who just came off a farm. It worked! The lady asked me, she said, “So how come you don’t, you don’t have a card?” And when the answer was, “I didn’t need one.” “Why?” “Well, I worked on a farm.” And that was the end of the interview.

    The Social Security card enabled him to enroll at Baruch College in Manhattan, where he majored in computer systems. He was class valedictorian but you won’t find a picture of him in the school yearbook. In 1984, he was hired as a programmer by Metropolitan Life Insurance where he had access to the personal information of millions of Americans.

    Steve Kroft: You were writing computer code?

    Jack Barsky: Right. Yes. Lots of it. And I was really good at it.

    What he didn’t write, he stole, on behalf of the KGB.

    Steve Kroft: What was the most valuable piece of information you gave them?

    Jack Barsky: I would say that was the computer code because it was a very prominent piece of industrial software still in use today.

    Steve Kroft: This was IBM code?

    Jack Barsky: No comment.

    Steve Kroft: You don’t want to say?

    Jack Barsky: No. It was good stuff. Let’s put it this way, yeah.

    Steve Kroft: It was helpful to the Soviet Union…

    Jack Barsky: It would’ve been helpful to the Soviet Union and their running organizations and, and factories and so forth.

    Steve Kroft: How often did you communicate with the Russians?

    Jack Barsky: I would get a radiogram once a week.

    Steve Kroft: A radiogram, meaning?

    Jack Barsky: A radiogram means a transmission that was on a certain frequency at a certain time.

    Every Thursday night at 9:15 Barsky would tune into his shortwave radio at his apartment in Queens and listen for a transmission he believed came from Cuba.

    Jack Barsky: All the messages were encrypted that they became digits. And the digits would be sent over as, in groups of five. And sometimes that took a good hour to just write it all down, and then another three hours to decipher.

    During the 10 years he worked for the KGB, Barsky had a ready-made cover story.

    Steve Kroft: When somebody’d ask you, you know, “Where you from Jack?,” what’d you say?

    Jack Barsky: I’m originally from New Jersey. I was born in Orange. That’s it. American. Nobody ever questioned that. People would question my, “You have an accent.” But my comeback was, “Yeah, my mother was German and we spoke a lot of German at home.”

    Steve Kroft: You had to tell a lot of lies.

    Jack Barsky: Absolutely. I was living a lie.

    Steve Kroft: Were you a good liar?

    Jack Barsky: The best.

    You had to be a good liar to juggle the multiple lives he was leading. Every two years while he was undercover for the KGB, Barsky would return to East Germany and Moscow for debriefings. During one of his visits to East Berlin he married his old girlfriend Gerlinde and they had a son.

    Steve Kroft: Did that complicate matters?

    Jack Barsky: Initially it wasn’t complicated at all, it got complicated later.

    Steve Kroft: Because?

    Jack Barsky: Because I got married in the United States to somebody else.

    Steve Kroft: Did she know about your other wife in Germany?

    Jack Barsky: No.

    Steve Kroft: Did your wife in Germany know about the…

    Jack Barsky: Not at all.

    Steve Kroft: So you had two wives?

    Jack Barsky: I did. I’m, I was officially a bigamist. That’s, that’s the one thing I am so totally not proud of.

    Steve Kroft: Being a spy was all right. Being a bigamist…

    Jack Barsky: In hindsight, you know, I was a spy for the wrong people. But I, this one hurt because I had promised my German wife, that you know, we would be together forever. And I broke that promise. And the one way I can explain it to myself is I had separated the German, the Dittrich from the Barsky to the point where the two just didn’t know about each other.

    Not only did he have two different identities, and two wives, he had a son named Matthias in Germany and a daughter named Chelsea in America. And by November 1988, a radiogram from the KGB would force him to make an excruciating choice.

    Jack Barsky: I received a radiogram that essentially said, “You need to come home. Your cover may soon be broken and you’re in danger of being arrested by the American authorities.”

    Barsky was given urgent instructions from the KGB to locate an oil can that had been dropped next to a fallen tree just off this path on New York’s Staten Island. A fake passport and cash that he needed to escape the United States and return to East Germany would be concealed inside the can.

    Jack Barsky: I was supposed to pick up the container and go on, leave. Not even go back home to the apartment, just disappear. The container wasn’t there. I don’t know what I would have done if I had found it, but I know what I did when I didn’t find it. I did not tell them, “repeat the operation.” I made the decision to stay.

    Steve Kroft: Why?

    Jack Barsky: Because of Chelsea.

    Steve Kroft: Your daughter.

    Jack Barsky: Yes. If Chelsea’s not in the mix, that’s a no brainer, I’m outta here.

    Barsky had chosen Chelsea over Matthias.

    Jack Barsky: I had bonded with her. It was a tough one because on the one hand I had a wife and child in Germany but if I don’t take care of Chelsea, she grows up in poverty.

    Steve Kroft: This may be a little harsh but it sounds like the first time in your life that you thought about somebody besides yourself.

    Jack Barsky: You’re absolutely right. I was quite an egomaniac. I was.

    Jack Barsky was still left with the not insignificant matter of telling the KGB that he was staying in America. In a moment, we’ll tell you how he duped the KGB and how the FBI changed his life.

    PART TWO
    At the end of 1988, Jack Barsky’s 10-year run as a clandestine KGB agent in the United States was about to come to an end. He had ignored Soviet warnings that his cover had been blown and decided to remain in America and not return to his native East Germany. He was taking a chance that no one in America would ever find out who he really was. And he was taking a bigger chance that the KGB wouldn’t retaliate for disobeying an order. The urgency with which the Soviets seemed to view the situation became clear one morning in Queens.

    Jack Barsky says he was on his way to work in December 1988, standing and waiting for an “A” train on this subway platform when a stranger paid him a visit.

    Jack Barsky: There’s this character in, in a black coat and he sidles up to me and he whispers in my ear, he says, “You gotta come home or else you’re dead.” And then he walked out.

    Steve Kroft: Russian accent?

    Jack Barsky: Yes.

    Steve Kroft: That’s an incentive.

    Jack Barsky: It’s an incentive to go.

    Steve Kroft: I mean spies get killed all the time.

    Jack Barsky: They do. But not me. The entire time I always had this childlike belief that everything would be all right.

    “There’s this character in, in a black coat and he sidles up to me and he whispers in my ear, he says, ‘You gotta come home or else you’re dead.’ And then he walked out.”
    Steve Kroft: So what are you going to tell the Russians?

    Jack Barsky: Well, I (sighs) I sent them, this “Dear John” letter, the goodbye letter in which I stated that I had contracted AIDS and that the only way for me to get a treatment would be in the United States.

    Steve Kroft: You just wrote them a letter and said, ‘I can’t come back. I’ve got AIDS”?

    Jack Barsky: There’s three things I tell people that the Russians were afraid of. AIDS, Jewish people and Ronald Reagan. And they were deathly…

    Steve Kroft: In that order?

    Jack Barsky: I think Ronald Reagan took the top spot. They thought he would push the button.

    The AIDS letter apparently worked because in East Berlin the Soviets told his German wife Gerlinde he wasn’t coming back.

    Jack Barsky: They went to Gerlinde and told her that I had died of AIDS. So I think they just wrote me off completely.

    Steve Kroft: You were officially dead in East Germany?

    Jack Barsky: Right. After five years she was able to declare me dead.

    Once the Berlin Wall fell and the Soviet Union fell apart, Barsky was a man without a country. No one would want him back. He felt his secret was safe in America. He became a family guy, with a wife, two kids, Chelsea and Jessie, and a job. He burrowed himself into suburbia, keeping a low profile.

    Jack Barsky: I was settling down, I was living in the, in rural Pennsylvania at the time, in a nice house, with two children. I was, like, typical middle class existence.

    And his life would have stayed quiet if a KGB archivist named Vasili Mitrokhin hadn’t defected to the West in 1992 with a trove of notes on the Soviets’ spying operations around the world. Buried deep in his papers was the last name of a secret agent the KGB had deployed somewhere in America: Barsky.

    Joe Reilly: We were concerned that he might be running an agent operating in the federal government somewhere. Who knows? In the FBI, the CIA, the State Department. We had no idea.

    Joe Reilly was an FBI agent when the bureau got the Mitrokhin tip, and the Barsky case quickly became serious enough that FBI director Louis Freeh got personally involved. The FBI didn’t know who or where he was, but the best lead seemed to be a Jack Barsky who was working as an I.T. specialist in New Jersey, with a suburban home across the border in Mount Bethel, Pennsylvania.

    Steve Kroft: Aside from his name was there anything else that made you suspicious and make you think that this was the guy you were looking for?

    Joe Reilly: Yes. One thing was the fact that he had applied for a Social Security number late in life. Especially someone like him who was educated and intelligent.

    The FBI began following Barsky, and when this surveillance photo caught him talking to a native of Cuba, the bureau grew increasingly concerned.

    Joe Barsky: There were some indications that I could possibly be the head of a international spy ring, because I had a friend who was originally from Cuba. And it so happened that this friend owned an apartment that was rented to a Soviet diplomat. So that one and raised all kinds of flags and they investigated me very, very, very carefully.

    FBI agent Joe Reilly went so far as to set up an observation post on a hillside behind Barsky’s house. This is a picture he took of his view.

    Joe Reilly: I got a telescope and binoculars, as if I was a birdwatcher. But I was looking at his backyard and at him. Over time, I learned a great deal about him.

    Steve Kroft: Like what?

    Joe Reilly: …just watching him. Well, I became convinced that he loved his children. And that was important because I wanted to know if he would flee. There was less chance of that if, if he was devoted to his children. And he was.

    But that wasn’t enough for the FBI. The bureau bought the house next door to get a closer look at the Barskys.

    Steve Kroft: Did you get a good deal?

    Joe Reilly: I think we paid what he was asking. And we had agents living there so that we could be sure who was coming and going from his house without being too obvious in our surveillance.

    Steve Kroft: You had no idea the FBI was living next door to you?

    Jack Barsky: No.

    Steve Kroft: Never saw…

    Jack Barsky: No.

    Steve Kroft: …Joe Reilly up on the hill with the binoculars?

    Jack Barsky: Absolutely not.

    When the FBI finally got authorization from the Justice Department to bug Barsky’s home, the case broke wide open.

    Joe Reilly: Within, I’d say, the first two weeks that we had microphones in his house, he had an argument with his wife in the kitchen. And during the course of that dispute, he readily admitted that he was an agent, operating from the Soviet Union.

    It was all the FBI needed to move in on Barsky. They set a trap for him at a toll bridge across the Delaware River as he drove home from work late one Friday afternoon in May of 1997.

    Jack Barsky: I’m being waved to the side by a state trooper. And he said, “We’re doing a routine traffic check. Would you please get out of the car?” I get out of the car and somebody steps up from, from behind and shows me a badge. And he said, “FBI. We would like to talk to you.”

    Joe Reilly: His face just dropped. And we told him that he had to go with us.

    Jack Barsky: The first words out of my mouth were, “Am I under arrest?” And the answer was, “No.” Now that took a big weight off of me, so I figured there was a chance to get out of this in one piece. And the next question I asked, “So what took you so long?”

    The FBI had rented an entire wing of a motel off Interstate 80 in Pennsylvania for Barsky’s interrogation.

    Joe Reilly: But on the way to the motel, I remember turning to him. And I, I told him that this didn’t have to be the worst day of his life. And he immediately realized that he had an out.

    Jack Barsky: I said to them, “Listen, I know I have only one shot out of this and that means I need to come clean and be 100 percent honest and tell you everything I know.”

    The FBI questioned Barsky throughout the weekend and gave him a polygraph test that he passed. Convinced that his spying days were over, and that his friendship with the Cuban was just that, the FBI decided to keep the whole thing quiet and allowed Barsky to go back to work on Monday morning.

    Steve Kroft: Was he charged with something?

    Joe Reilly: No.

    Steve Kroft: Even though he confessed to being a Soviet spy?

    Joe Reilly: Yes.

    Steve Kroft: That seems odd.

    Joe Reilly: Well, we wanted him to cooperate with us. We didn’t want to put him in jail. He was no use to us there.

    Barsky continued to meet not only with the FBI but with the National Security Agency to offer his first-hand insights into the KGB and the Russians.

    Jack Barsky: I was able to provide them with a lot of valuable information how the KGB operated.

    The only people who were aware of his secret were the FBI and Penelope, his wife in America, who subsequently filed for divorce. His daughter Chelsea, then a teenager, knew only that he wanted to tell her something when she turned 18. That day finally arrived on a four-hour drive to St. Francis University.

    Chelsea: He started chuckling to himself and he said, “Well, I’m a, I was a spy. I was a KGB spy.” I was like “What? Really?”

    Jack also revealed to Chelsea why he had decided to stay in America.

    Chelsea: He said that, you know, he fell in love with me and my, my curls when I was a little baby. And then I cried.

    Steve Kroft: Did he tell you everything?

    Chelsea: No, he didn’t. He didn’t tell me 100 percent the whole truth. He left some things out at that point.

    Jack Barsky: I told her everything that you can tell in four hours that is age appropriate. She was still a teenager. I may not have told her that I was married in Germany.

    He waited another two years before he matter-of-factly dropped another bombshell about his past.

    Chelsea: He just looked straight ahead at the TV. And he said, “Did I tell you you have a brother?” And I turned my head. I’m like, “What? Are you serious?”

    The half brother was Matthias, the boy Jack had left behind in Germany. Chelsea was determined to find him. Jack didn’t like the idea.

    Jack Barsky: I did not feel comfortable getting in touch with him. I did not feel comfortable with my acknowledging my German past.

    After a year of trying to track him down online, Chelsea finally got a reply from Matthias…

    Chelsea: The subject line said, “Dear little sister.” And when I saw, “Dear little sister,” I just started weeping, because that meant everything to me. That meant that he accepted me.

    Matthias: And this is me…

    A month later, Matthias was in Pennsylvania visiting Chelsea and her brother Jessie. They hit it off. Matthias wasn’t interested in seeing his father, then changed his mind.

    barksys-american-kids-with-his-german-son.jpg
    Barsky’s children, from left: Jessie, Matthias and Chelsea
    Steve Kroft: Was it awkward?
    Jack Barsky: I just remember he stared at me for a couple of minutes. He just stared at me.

    Steve Kroft: I mean he had reason to be angry with you.

    Jack Barsky: When I told him the dilemma that I was faced with, he actually said, “I understand.”

    Steve Kroft: And what’s your relationship like with Matthias now?

    Jack Barsky: He feels like he’s my son.

    Gerlinde, the wife in Germany who thought he was dead, wants nothing to do with Jack today – or with 60 Minutes.

    He has remarried and has a four-year-old daughter. They live in upstate New York where Jack has worked as director of software development for a company that manages New York’s high voltage power grid, a critical piece of U.S. infrastructure. When he told his employer recently that he had once been a KGB spy, he was placed on a paid leave of absence. Before becoming an American citizen last year, he had been given a clean bill of health by the FBI and U.S. intelligence agencies. But in the world of espionage it’s often difficult to tell what’s true and what’s legend.

    Steve Kroft: Are you telling the truth right now?

    Jack Barsky: I am, absolutely. The truth as far as I know it. Yes.

    Steve Kroft: As far as you know it?

    Jack Barsky: Well, you know, sometimes memory fails you. But I am, I am absolutely not holding back anything.

    Steve Kroft: Why tell the story now?

    Jack Barsky: I want to meet my maker clean. I need to get clean with the past. I need to digest this fully.

    The FBI agent who apprehended him, Joe Reilly, still believes in Barsky. And in yet another twist to this story, the two are good friends and golfing buddies.

    Joe Reilly: He’s a very honest person. And if you want to find out how honest someone is, play golf with them.

    Steve Kroft: But you’re a former FBI guy and he’s a former spy. What’s the bond?

    Joe Reilly: It’s personal. He credits me for keeping him out of prison.

    After nearly 30 years, Jack Barsky went back to visit a unified Germany, first in October, then again last month.

    [Jack Barsky: So that was essentially the very beginning of my career…]

    He showed his kids where this improbable tale began and some other key settings in his odyssey. And he caught up with old classmates who knew him as Albrecht Dittrich.

    barsky-in-germany-with-his-american-kids.jpg
    Barsky in Germany with his American children CBS NEWS
    Steve Kroft: When you’re here in Germany…
    Jack Barsky: Yeah…

    Steve Kroft: …are you Albrecht or are you Jack?

    Jack Barsky: No, I’m Jack. I am 100 percent Jack. You know, the, I let the Albrecht out and sometimes he interferes, but they, they get along very well now (laughs)…

    The Berlin wall, which once divided east and west, is now gone except for a section that has been turned into an art display. Checkpoint Charlie, once the epicenter of the Cold War, is now a tourist attraction, full of kitsch. Statues of Karl Marx and Friedrich Engels still stand in the eastern part of Berlin, relics of another era as is the man who straddled two worlds and got away with it.

    2015 May 10 CORRESPONDENT Steve Kroft

    Find this story at 10 May 2015

    © 2015 CBS Interactive Inc. All Rights Reserved.

    Evidence of police complicity in blacklisting of trade unionists stretches back decades

    Police are alleged to have been covertly helping companies to blacklist trade unionists since before the Second World War

    The blacklisting of trade unionists by major firms over the years has been an inherently secretive practice. Even more secretive, it seems, has been the state’s covert collusion in such a practice.

    From time to time, the public get glimpses that reveal how the state has facilitated the blacklisting. These snapshots suggest that there has been regular collusion for many decades.

    The police and blacklisters have not welcomed public scrutiny of their relationship. However the trade unionists who were blacklisted are now pressing for the upcoming public inquiry into the failures of undercover policing – to be headed by Lord Justice Pitchford – to scrutinise the allegations (see here for more details).

    In all these years, there has never been an in-depth, independent, and public examination of these persistent allegations.

    Some of the evidence of this collusion is detailed below – the most recent dates from 2008. According to a leaked document, a secretive police unit that was involved in monitoring political activists met a blacklisting agency that was funded by large companies.

    The agency, operating under the bland name of the Consulting Association, unlawfully compiled confidential dossiers on thousands of workers who were considered by company directors to be politically active or potential trouble-makers. Many workers were denied employment for long periods.

    A note of the meeting at an Oxfordshire hotel on November 6 2008 records that the purpose of the police unit, which was then expanding, was “to liaise with industry”.

    Police ‘spied on activists for blacklisting agency’
    Read more
    More evidence dates from the 1990s. Peter Francis, a former undercover police officer who has now become a whistleblower, has disclosed that he believes that he personally collected some of the information that later appeared in the files of the Consulting Association. Francis infiltrated anti-racist groups between 1993 and 1997 as a member of the Metropolitan Police’s undercover unit, the Special Demonstration Squad.

    The blacklisting files recorded one bricklayer as being “under constant watch (officially) and seen as politically dangerous”.

    An official watchdog, the information commissioner, shut down the Consulting Association, after seizing many of its files in a raid. Dave Clancy, a former police officer who worked as an investigator for the watchdog, has testified that “there is information on the Consulting Association files that I believe could only be supplied by the police or the security services”. These details, he added, were specific and came from police records.

    An earlier incarnation of the blacklist was run by another clandestine agency, called the Economic League. This organisation had been set up shortly after the First World War, at a time of widespread industrial unrest, and, again, was financed by large corporations.

    The Economic League had began to compile secret dossiers on workers around the country.

    It seems that from early on, the Economic League received help from the police. Documents chronicle how Economic League officials worked closely with police in Lancashire in the 1930s.

    In 1937, they met detectives who were monitoring political “subversives”. The league’s Manchester organiser reported to his superiors that he had “Manchester police in here yesterday and found them extremely helpful and have now arranged to work in the closest co-operation with them. Among other things, they promised to give me as long as I like looking over their Communist industrial file in their office.”

    Blacklisted workers seek to prise open secrets of covert police surveillance
    Read more
    Days later, the league’s Manchester organiser wrote to the chief constable of the local force and thanked him for his help. At one point, the league asked police to carry out surveillance on a meeting of trade unionists as the blacklisters considered it “of considerable importance”.

    At another point, the league’s Manchester organiser told his boss that he was due to get a report of a Communist Party meeting from the police without having to send “one of our own men”.

    In that same year, Special Branch passed onto the Economic League a confidential list of Manchester communists.

    Fifty years on, and collaboration still seemed to exist. In the 1980s, an undercover television sting caught the candid thoughts of an Economic League official who said :”We give all our information to the police. In return, they’re not exactly unfriendly back.”

    Michael Noar, then the Economic League’s director-general, said in 1987 said that “of course, the police and Special Branch are interested in some of the things we are interested in. They follow the activities of these groups in much the same way as we do and therefore they do get in touch with us from time to time and talk to us and say ‘were you at this demonstration or that’.” He added that “in the course of discussions, there is an exchange of information just in the ordinary course of talking.”

    Phil Chamberlain, co-author of a book on blacklisting, being interviewed
    Police and Economic League officials have acknowledged they had meetings together, but say information about individuals was not passed to the league.

    One unnamed Special Branch officer recently told an internal police investigation into the undercover infiltration of political groups that the “flow of information was purely one way”. The Economic League was treated solely as a source of information, according to the officer, and it was Special Branch policy not to share any information with the league.

    Jack Winder, who worked for the Economic League from 1963 until its closure in the early 1990s, told a parliamentary inquiry two years ago that he had meetings with the Metropolitan Police’s Special Branch over a long time for what he called “general chit-chat”. He told MPs that the “exchange of detailed information” about individuals was “absolutely forbidden”.

    Sources : Dave Smith and Phil Chamberlain, Blacklisted :the secret war between big business and union activists (New Internationalist, 2015); Mark Hollingsworth and Richard Norton-Taylor, Blacklist – the inside story of political vetting (Hogarth Press, 1988). For a detailed and documented history of the Economic League, see the work of researcher Mike Hughes here.

    Rob Evans
    @robevansgdn
    Tuesday 16 June 2015 11.03 BST Last modified on Tuesday 16 June 2015 11.06 BST

    Find this story at 16 June 2015

    © 2015 Guardian News and Media Limited

    Blacklisted workers seek to prise open secrets of covert police surveillance

    Trade unionists blacklisted by major firms are pushing for the public inquiry into undercover policing to examine alleged collusion between covert police officers and company directors

    Blacklisted workers have intensified their campaign to uncover the extent of secret police surveillance operations against them.

    Covert police officers are alleged to have passed information they gathered on the trade unionists to multi-national firms who maintained a secret and unlawful blacklist.

    The blacklisted workers want the allegations examined by the public inquiry that has been established into the police’s use of undercover officers to infiltrate hundreds of political groups.

    That inquiry – to be headed by Lord Justice Pitchford – is drawing up its remit which is due to be announced by the end of July. This here and here gives some background on the inquiry that was set up by home secretary Theresa May.

    This week, the blacklisted workers said they have applied to be given a central role in the inquiry. In legal terms, they are seeking to be made a “core participant” in the inquiry.

    It is not yet known who will be the “core participants” in the Pitchford inquiry. The status is given to those who, for example, have a direct and significant interest in the issues that will be examined.

    On the blacklist: how did the UK’s top building firms get secret information on their workers?
    Read more
    It allows them to see evidence in advance of it being aired at the inquiry and to seek to cross-examine witnesses.

    The application by the Blacklist Support Group (BSG) has been made by Imran Khan, the lawyer who also represents Doreen Lawrence, the mother of murdered teenager Stephen. (For more details, see this).

    Dave Smith, the group’s spokesman, said: “Hopefully by the BSG applying for core participant status, we will be able to guarantee that spying on trade unions and passing over information to private companies becomes a theme within the Pitchford inquiry.”

    “Police and security services spying on trade unions is not a one-off aberration, it is standard operating procedure by the state.”

    An official watchdog closed down the blacklist in 2009 after discovering that major firms kept confidential files on workers deemed to be “trouble-makers”. Checks were run on trade unionists to deny them work if their names were on the list.

    The police’s role in giving information to the blacklist has yet to be fully brought into the public domain.

    Imran Khan, the lawyer working for the blacklisted workers. Facebook Twitter Pinterest
    Imran Khan, the lawyer working for the blacklisted workers. Photograph: Richard Saker/Richard Saker
    Read this, this, and this for accounts of how the police are alleged to have colluded with the blacklisters by gathering and sharing information on trade unionists.

    More than 580 blacklisted workers have launched legal action against 40 large construction firms in a case that is due to be heard in the High Court next year. They say the blacklisting files date from at least 1969.

    At a preliminary hearing this month, lawyers for the blacklisted workers told a court that the blacklisters had deliberately destroyed documents after they had been raided by the official watchdog, the information commissioner. (Read this for more details).

    Meanwhile, Smith, the co-author of a new book, Blacklisted : the Secret War between Big Business and Union Activists, is due to give a talk on the controversy on Tuesday June 2. This here gives details of the talk in London that is being organised by the Haldane Society of Socialist Lawyers and the Institute of Employment Rights.

    Rob Evans
    @robevansgdn
    Thursday 28 May 2015 11.51 BST Last modified on Thursday 28 May 2015 12.00 BST

    Find this story at 28 May 2015

    © 2015 Guardian News and Media Limited

    New information on undercover policing networks obtained by German parliamentary deputies

    New information on the 2014 activities of European police cooperation groups and networks has been published by the German government (pdf), in response to questions from Die Linke parliamentary deputies. The answers include information on the work of Europe’s secretive undercover policing coordination networks. However, the government claims – as it has done in the past – that many of the questions cannot be answered publicly, due to the need for confidentiality.
    The questions concern a number of groups and networks, including:

    The European Cooperation Group on Undercover Activities (ECG);
    The International Working Group on Police Undercover Activities (IWG);
    The Cross-Border Surveillance Working Group (CSW);
    The International Specialist Law Enforcement (ISLE) project;
    Europol’s ‘Focal Point Dolphin’.
    European Cooperation Group on Undercover Activities (ECG)

    The ECG was established in 2001 and deals with: “The promotion of international cooperation by law enforcement agencies at the European level with respect to the deployment of undercover investigators to combat organised crime.” [1]

    However, the German government has previously referred to “politically motivated” crime as one of the “main issues” looked at by the group, [2] and has admitted that the work of the exposed police spy Mark Kennedy has been discussed at its meetings.

    The extent to which the ECG is involved in coordinating or directing police infilitration of protest movements across Europe is unknown, although a number of the British undercover police exposed in recent years are known to have travelled abroad frequently. German officers have also been sent abroad on a number of occasions. [3] Attempts by a number of women to obtain justice after being deceived into spending years in relationships with undercover police officers are ongoing. [4]

    According to the German government, the ECG met in Bucharest from 20 to 23 May, and the group’s third workshop on “Undercover on the Internet” was held in Marburg from 6 to 9 October.

    The list of attendees is lengthy. At the main ECG meeting, there were representatives present from 22 EU Member States:

    Austria (Federal Criminal Police Office, Vienna)
    Belgium (Federal Police)
    Bulgaria (Government Agency for National Security)
    Croatia (Criminal Police Directorate)
    Czech Republic (Czech National Police)
    Denmark (Danish National Police)
    Estonia (Central Criminal Police)
    Finland (National Bureau of Investigation)
    France (Central Directorate of Criminal Investigation Department)
    Germany (Federal Criminal Police Office, Central Office of the German Customs Investigation Service)
    Hungary (Hungarian National Police and Hungarian Customs)
    Italy (Carabinieri)
    Latvia (Criminal Police Department)
    Lithuania (Criminal Police Bureau)
    Netherlands (National Police Agency)
    Poland (Polish National Police)
    Portugal (Policia Judiciária)
    Romania (Romanian National Police)
    Slovakia (Slovakian National Police)
    Slovenia (General Police Directorate)
    Spain (Spanish National Police)
    United Kingdom (National Crime Agency and Metropolitan Police)
    And six non-EU states:

    Albania (Central Criminal Police)
    Macedonia (Office of Public Security)
    Norway (Oslo Police Department)
    Russia (Federal Drugs Control Service)
    Switzerland (Federal Criminal Police)
    Turkey (National Police)
    At the October workshop the same organisations were present from Austria, Belgium, Finland, Germany, Hungary, Italy, Latvia, Lithuania, Netherlands, Norway, Poland, Switzerland, Slovenia and the UK. Also present were representatives of the Royal Canadian Mounted Police.

    The content of the agendas has not been published by the German government. Its justification for the secrecy was lengthy:

    “The meetings dealt inter alia with tactical and operational measures in the context of undercover police investigations, for instance on the Internet. In addition to this, joint training measures in a particular area were discussed…

    “The said undercover measures are only used in areas of criminal activity in which a particularly high level of conspiracy, danger to the public and willingness to employ violence must be assumed.

    “…making public specific contents of discussions of certain operational resources conducted with foreign police authorities, as discussed in the meeting in question, would gravely undermine the trust and confidence of the international cooperation partners in the integrity of German police work and render significantly more difficult continued cooperation in the area of undercover policing.”

    The same justification was referred to in response to a wide number of other questions put forward by Hunko and his colleagues, and similar statements have been previously been put forward by the government in response to parliamentary questions on policing issues.

    International Working Group on Police Undercover Activities (IWG)

    The IWG was established in 1989 and its purpose has previously been described as “international exchange of experience on all matters related to the covert deployment of police officers.” 2014 saw the 45th meeting of the group, which took place from 21 to 24 October in Warsaw. Poland organised the meeting itself, but Germany’s Federal Criminal Police Office prepared the invitations and agenda “in close consultation with the Member States.”

    The same organisations from the list above were present to represent Austria, Belgium, the Czech Republic, Denmark, Finland, France, Germany, Hungary, Italy, Lithuania, the Netherlands, Norway, Poland, Spain, Switzerland, Slovenia, and the UK. Also present were representatives from the Australian Federal Police, the Royal Canadian Mounted Police, the Swedish National Bureau of Investigation, and the United States’ Federal Bureau of Investigation.

    The IWG also has an International Business Secretariat (IBS), which has been the subject of previous parliamentary questions from Hunko and his colleagues.

    In 2014, the IBS held a meeting from 10 to 13 June in Oslo, with Norway organising the meeting and the UK preparing the invitations and agenda.

    Germany’s Federal Criminal Police Office presented an agenda item on “biometrics” to the other delegations, who came from Belgium, Canada, Denmark, France, the Netherlands, Norway, Poland, Spain, Sweden, Switzerland and the UK.

    Cross-Border Surveillance Working Group (CSW)

    The CSW was first convened in 2005. It appears to have been busier during 2014 than some of the other networks asked about by Die Linke deputies – a meeting of the CSW itself was held in Rome from 7 to 9 May, the steering group met on the 16 and 17 October in The Hague, and The Hague also played host to the ‘Assembly of Regional Groups on Surveillance’ (ARGOS), which was attended by CSW representatives. Italy organised the meeting in Rome, while the ARGOS conference was organised by Europol.

    The purpose of the meetings was “to enable the various mobile special mission units to exchange experiences and, building on this, the optimisation of cooperation during cross-border surveillance operations.”

    In response to questions about the CSW, the German made statements on the content of the agendas. The May meeting saw discussions on:

    The organisation of Italy’s R.O.S. Carabinieri force “and a case study of an abduction case”
    “Current status and outlook for the European Tracking System (ETS) and European Law”
    The European Network of Law Enforcement Technology Services (ENLETS)
    “Presentation of the legal situation in Belgium and other Member States”
    “Use of different licence plates in the respective Member States”
    “Presentation of criminal activities and means of detection”
    “Police measures”
    “Air-based surveillance in the United Kingdom”
    “Challenges and opportunities arising from the use of technology in the fight against crime”
    “Legislative amendments and presentation of the organisation and deployment possibilities of the French police force”
    “Presentation of the different legal foundation and use of resources for the interception of private conversations in the participating countries”
    “Overview and presentation of an EU Framework Programme”
    The agenda for the ARGOS conference in November included:

    A presentation on the CSW
    “Presentation of a case study on cooperation in the field of surveillance (SENSEE)”
    The European Tracking System and European Law
    ENLETS
    “Presentation of the Europol Liaison Officers ‘Working Group on Controlled Delivery'”
    “Presentation of the possible impacts of the European Investigation Order on cross-border surveillance” (the European Investigation Order was adopted in March 2014 and includes rules on cross-border covert investigations. [5])
    “Advantages of cross-departmental surveillance and administration”
    However, less detail was provided about the attendees, with the German government’s response stating:

    “The CSW meeting was attended by representatives of the mobile special mission units or comparable units from Belgium, Netherlands, the United Kingdom, France, Spain, Denmark, Austria, Italy, Finland, Ireland, Luxembourg, Sweden, Norway and Germany (Federal Criminal Police Office). A representative of Europol also attended. The steering group meeting was attended by representatives from Germany (Federal Criminal Police Office), the United Kingdom, France, the Netherlands and Europol. Representatives of 37 states attended the ARGOS conference.”

    International Specialist Law Enforcement

    As the IWG was meeting in Warsaw, organisations involved in the International Specialist Law Enforcement (ISLE) project were meeting in Rome, from 20 to 22 October. International Specialist Law Enforcement began life as an EU-funded project run by Belgium, Germany and the UK that sought to build “a network of [EU] Member State organisations that may develop coordination, cooperation and mutual understanding amongst law enforcement agencies using ‘specialist techniques’.” [6]

    Although it appeared in mid-2013 that the project might have been discontinued, [7] the German government’s answers show otherwise.

    The meeting was prepared, and the agenda drafted, by the German Federal Criminal Police Office and Europol. Including Germany, “members of mobile special mission units from 16 other EU Member States attended the ISLE meeting”.

    According to the German government, “the agenda included the following points”:

    “Future development of international cooperation in ISLE”
    “Discussion on the possibilities provided by the Europol Platform for Experts (EPE)”
    Workshops on using the EPE
    Expert Meeting Against Right Wing Extremism (EMRE)

    A meeting of the EU-funded EMRE project was held in Bonn, Germany, from 19 to 22 May, and was prepared by Germany’s BKA in cooperation with the Czech Republic and Hungary. Representatives from 25 EU Member States and Switzerland attended the event, which “centred around exchanging information on right-wing extremist and right-wing terrorist structures, right-wing events and Internet activities and their impact on the security situation in all European countries.”

    On the agenda was:

    “[A] lead-in presentation and presentations on the ‘Counter Terrorism Centre’ service unit in Hungary, a set of investigation files by the Czech Republic, the Joint Centre for Countering Right-Wing Extremism (Gemeinsames Abwehrzentrum Rechtsextremismus, GAR) by the Federal Criminal Police Office and the government exit programme for people seeking to leave the right-wing extremist scene in North Rhine-Westphalia.”

    The interest of the German authorities in addressing right-wing extremism is notable, given the well-documented failure to deal with a series of racist murders carried out by the neo-Nazi National Socialist Underground between 2000 and 2007. [8]

    Focal Point Dolphin and Europol’s data systems

    Europol’s Focal Point Dolphin is part of the agency’s ‘Analysis Work File’ on counter-terrorism, although it also contains information on political activism. [9]

    Two meetings were held during 2014 in relation to Dolphin, both at Europol’s headquarters in The Hague: one of the “target group BAZAAR” on 15 April, dealing with the financing of the PKK (Kurdistan Workers’ Party); and one from 12 to 14 November at a “Counter Terrorism Event”.

    The April meeting focused on “coordination and comparison of the information available in Europe on the financing of the PKK.” The agenda items for FP Dolphin at the Counter Terrorism Event were: “Overview, EIS [Europol Information System] in CT [counter-terrorism] work, ERWED/RWE Ukraine [RWE presumably stands for right-wing extremism], TG BAZAAR status and Ops MED status.”

    No German authorities attended the Counter Terrorism Event, but the Federal Criminal Police Office was present at the April meeting alongside representatives from Austria, Belgium, Denmark, the Netherlands, Spain, Switzerland, the United Kingdom and Europol.

    During 2014, the German government “made 24 data deliveries” to FP Dolphin, a minute amount compared to the overall number of German entries into the Europol Information System. As of 4 October 2012, Germany was responsible for 24,199 items in the EIS; on 18 October 2013, 36,047 items; and 30 September 2014, 49,449 items.

    According to the government’s response, “Germany is the second most frequent user of EIS,” and “conducted a total of 20,331 searches in the EIS in Q4 [fourth quarter] 2014.”

    The EIS contained entries on a total of 259,359 objects and people, although it is not clear what point in time this number relates to. The data in the system “is used mainly in the following areas of Europol’s mandate: drugs trafficking (28%), theft (19%), illegal immigration (11%), counterfeiting (8%) and fraud (6%).”

    The full response from the German government also contains responses to questions on the 2014 activities of:

    the ‘TC LI Group’ of the European Telecommunications Standards Institute;
    the Southeast European Law Enforcement Centre (SELEC);
    “the platform for police from South East Europe ‘Police Equal Performance’ (PEP)”;
    “twinning projects” between German authorities and other states;
    the Baltic Sea Region Border Control Cooperation (BSRBCC);
    agreements and cooperation between Europol and non-EU states and organisations;
    agreements and cooperation between Frontex and non-EU states and organisations;
    the EU Intelligence Analysis Centre (INTCEN);
    EU training for police due to serve abroad in “crisis management” missions;
    meetings of the United Nations Office on Drugs and Crime (UNODC);
    the Police Working Group on Terrorism (PWGT);
    the Global Counterterrorism Forum (GCTF); and
    the European Expert Network on Terrorism Issues (EENeT).
    Some significant information has come to light in recent years on undercover policing and the infilitration of protest movements. However, much remains unknown. The release of new information such as that obtained through the German Bundestag makes it possible to put together a picture of cross-border networks and their activities, but understanding in more detail their work – and holding state authorities to account for their actions – is far more difficult.

    In the UK, the police appear to have tried to ‘move on’ from the scandal by renaming and re-organising undercover policing units, most recently establishing the National Domestic Extremism and Disorder Intelligence Unit. [10] Keeping track of the organisations, individuals and institutions involved – and what is known of their activities – can help to make clear the wider picture and what can be done about it.

    Sources

    Statewatch tracks developments in undercover policing; numerous articles can be found in our database
    The Undercover Research Group recently published webpages containing further information on numerous aspects of the police infilitration of political movements in Europe, and will at some point launch a Wikipedia-style website on the issue
    The Guardian’s Undercover blog has regular updates on developments, mainly focusing on the UK
    The Bristling Badger blog frequently contains forensic examinations of issues related to the undercover policing scandal
    Document

    Minor Interpellation submitted by Member of the Bundestag Andrej Hunko and others and the Left Party parliamentary group, ‘Cooperation and projects by European police forces in 2014’, January 2015

    Footnotes
    [1] ‘Another secretive European police working group revealed as governments remain tight-lipped on other police networks and the activities of Mark Kennedy’, Statewatch News Online, August 2012
    [2] ‘State guidelines for the exchange of undercover police officers revealed’, Statewatch News Online, May 2013
    [3] Matthias Monroy, ‘Using false documents against “Euro-anarchists”: the exchange of Anglo-German undercover police highlights controversial police operations’, Statewatch Journal, vol 21 no 2, April-June 2011
    [4] Campaign Opposing Police Surveillance; Police Spies Out of Lives
    [5] Council of the European Union, ‘Council adopts the “European Investigation Order” directive’, press release, 14 March 2014 (pdf); European Investigation Order (pdf)
    [6] ‘Another secretive European police working group revealed as governments remain tight-lipped on other police networks and the activities of Mark Kennedy’, Statewatch News Online, August 2012
    [7] ‘Uncertain future for EU-funded police project aimed at enhancing covert surveillance techniques’, Statewatch News Online, July 2013
    [8] ‘NSU Crime Spree Report Finds ‘Devastating’ Errors’, Spiegel Online, 23 August 2013
    [9] Andrej Hunko, ‘Abolish international databases on anarchy!’, press release, 5 June 2012
    [10] ‘Political Secret Police Units’, Bristling Badger, 5 February 2014

    20.02.2015

    Find this story at 20 February 2015

    © Statewatch

    Blacklisting: The Secret War Big Business Wages on Workers

    You’d hope that construction work would be one area of life where tabloid stories about “health ‘n’ safety going mad” were actually true, in order to stop people getting in the way of machines designed to smash concrete, or falling off some 20th floor scaffolding. In fact, for years, the opposite has been the case, as people raising health and safety concerns have been systematically nixed from getting a job in construction.

    From at least the 1980s, construction companies kept a secret “blacklist” of some 3,200 workers that they wanted to ensure never found work. These included various types of people who somehow got in the way of the companies making a fat profit—workers who complained about dangerous practices on sites, trade union organizers who tried to get a better wage, and even environmental protesters who weren’t employed in the industry but got in the way of construction. Lives were ruined as tradespeople found that they were mysteriously denied work all the time, despite being qualified. Some people were even pushed to suicide as they couldn’t provide for their families.

    In 2009, an article written by journalist Phil Chamberlain in the Guardian ended up being put on the desk of an investigator at the Information Commissioner Office. That kick started a chain of events which exposed the truth of blacklisting that many had already suspected for years. Following a raid on the organization set up by the companies to manage the secret blacklist—the Consulting Association—the Blacklist Support Group was formed to represent blacklisted workers. The secretary of the group Dave Smith, a trade unionist who was blacklisted himself, has teamed up with Phil Chamberlain to write a book exposing the practice. Blacklisted: The Secret War Between Big Business and Union Activists tells the story of multinationals and the state colluding to undermine trade unionism and thousands of workers fighting for their dignity—a fight which continues to this day. I caught up with the pair at the book’s launch last week.

    Continued below.

    RECOMMENDED
    Man Decapitated in France and Islamist Banner Found on Site
    Man Decapitated in France and Islamist Banner Found on Site

    Australian Government Contractors Will Now Go to Jail for Reporting Detention Centre Child Abuse
    Australian Government Contractors Will Now Go to Jail for Reporting Detention Centre Child Abuse

    A Year After His Kidnapping, a British Man Is Still On Death Row in Ethiopia
    A Year After His Kidnapping, a British Man Is Still On Death Row in Ethiopia

    A Bachelor Party Prank Went Very, Very Wrong When the Cops Responded to the Groom’s ‘Kidnapping’
    A Bachelor Party Prank Went Very, Very Wrong When the Cops Responded to the Groom’s ‘Kidnapping’
    VICE: Dave, you’ve written this book as somebody who has been a victim of blacklisting. Tell me about your experience.
    Dave Smith: My blacklist file is 36 pages long and runs from 1992 until 2006. The first entry records a protest about several week’s unpaid wages on a Balfour Beatty site. The rest of my file is about safety concerns I have raised including asbestos and overflowing toilets. I could never get a job for any of the large companies but managed to find work with small subcontractors or via employment agencies for a while. But it reached a point where even the agencies wouldn’t offer me a job. This is recorded in my blacklist file. I went from driving a large four by four to a £300 [$445] fiesta van and during the height of the building boom I was virtually unemployable. I had to leave the industry to pay the mortgage.

    “Blacklisting people who complain about safety causes deaths on building sites. It’s as simple as that.”

    How big was the human cost throughout the industry?
    Some people we interviewed for the book have been out of work for 20 years. When you first tell someone that, they go “out of work for 20 years? Building work? That can’t be right,” but then when you actually see their file, they’re out of work and as soon as they get a job, the company find out, and they’re sacked. They get another job as soon as they’re fired and they’re sacked again. We’ve been talking not just to the workers but their wives and their partners. Kids aren’t getting new trainers, kids aren’t going on school trips. People have lost their houses over this. Quite a few people, their relationships have broken up. This isn’t just about numbers, it’s about the fact they’ve taken food off our tables and that’s why we’ve taken it so personally.

    One of the main reasons workers were added to the blacklist was for raising health and safety concerns. What kind of impact does this have on building sites?
    Well everybody knew there was a blacklist. It wasn’t a secret, although the employers always denied it whenever the politicians asked them. Management used to say, “If you carry on like that we’ll make sure you never work again in the building industry” and it wasn’t an idle threat—it was true. The impact on health and safety is, if somebody moans about a bit of scaffolding or the toilets overflowing and gets sacked for it, then next time when the toilets are overflowing or there’s asbestos, people just keep their head down and don’t say anything, which is one of the reasons why constructions got such a terrible health and safety record. Blacklisting people who complain about safety causes deaths on building sites. It’s as simple as that.

    The promotional video for ‘Blacklisted.’

    The blacklist was mainly a list of construction workers, but not entirely. What other kind of people were on the list, and why?
    Phil Chamberlain: It started off as a construction blacklist and—I think it’s the nature of the surveillance—once you start compiling it takes in more and more people. People who the companies are concerned about suddenly get drawn in. If we look at the road protests [anti-road building activism] that grew up around the 1990s, they affected construction companies. The environmental protesters who took part in roads protests aren’t union members but they’re people the companies want to keep tabs on. That coincides with the kind of people which the state are interested in keeping tabs on as well. That’s when you start to see that kind of cross over. We’ve got academics and journalists on the list as well. People who start to cause worry to the companies started to be added in.

    So you’re talking about a cross over between the construction companies and the state. Was the list compiled with the active collusion of the police?
    It appears there were links between construction companies and the police. The question is about how systematized that contact was. In some cases it would have been personal contacts developed up over a number of years or inherited. We’ve spoken to industrial relations officers from the companies who have freely acknowledged meeting Special Branch people and we know the industrial desk at Special Branch was tasked with looking at trade unions and maintaining contact with corporations. We know those links existed and have done for a number of years. In some cases it would have been done on a fairly informal basis and in other cases perhaps more systemically done.

    The files are quite clear in that some of the files contain information that could only have come from the police. That not just us saying that, the Information Commissioner’s Office looked at the files and came to the same conclusion independently to ourselves.

    It’s quite clear this is much wider than construction and much wider than the UK but that’s because it’s the nature of the economic system which can’t deal with that kind of dissent, which is ultimately about preserving some profit margin at the expense of democratic, legitimate forms of protest.

    In the book you draw a lot of parallels between the blacklisting scandal and the the phone hacking scandal. Why is that?
    I think it’s fascinating in the sense that when Rob Evans and I wrote the article for the Guardian in March 2009 and in the summer Nick Davies writes that superb piece showing the breadth of phone hacking. The numbers are relatively similar.

    But phone hacking victims are getting some sense of justice, whereas blacklisting victims are having to fight to be listened to.
    The differences is who they are. The celebrities have got a lot more access to mechanisms to make their voice heard. They can employ better lawyers, they can apply pressure in a number of different ways.

    The willingness to address the issue of phone hacking is in stark contrast and I think it’s because they’ve treated it as a corruption issue, but with blacklisting this was the normal mode of operation. That says something fundamental about the way we handle industrial relations in this country, the way we handle dissent in this country, which is far more frightening and needs to be resisted.

    The book ends by putting blacklisting in its global and historical context. How widespread is the practice, and similar tactics?
    One of the guys who ran the Economic League [predecessor in many ways to The Consulting Association] said to Parliament: “it’s gone on since the pyramids,” as if it’s part of your hazard of working. I think there’s a danger of accepting it because then we don’t get to challenge it and say that fundamentally this is wrong.

    It’s quite clear in this country it’s operating in the NHS. There was a story published two weeks ago about keeping files on people involved in airline disputes with British Airways. We’ve looked at cases that have taken place in Canada where migrant workers from Mexico have been monitored and refused visas to go and work in Canada. There was a case in France in 2013 where Ikea used access to police files to monitor people in their stores. We’ve got evidence of a company based in Ireland which recruits migrant workers keeping files on workers in Europe who might be causing problems.

    It’s quite clear this is much wider than construction and much wider than the UK but that’s because it’s the nature of the economic system which can’t deal with that kind of dissent, which is ultimately about preserving some profit margin at the expense of democratic, legitimate forms of protest. Most of these people are simply just raising health and safety issues. There was a case in Indonesia where people were upset about conditions at an Adidas company and they reached for the blacklist. It’s a tool for managing, but it doesn’t mean it’s right.

    Blacklisted: The Secret War Between Big Business and Union Activists is available from New Internationalist Books

    March 16, 2015
    by James Poulter

    Find this story at 16 March 2015

    Copyright Vice.com

    Home Office to blacklist extremists to protect public sector

    Theresa May says new extremism analysis unit is compiling list of legal but unacceptable individuals and groups to prevent another Trojan horse scandal

    The Home Office is drawing up a blacklist of extremist individuals and organisations with whom the government and public sector should not engage, Theresa May has revealed.

    The list of legal but unacceptable organisations is being compiled by a new Home Office “extremism analysis unit”, which is also to develop a counter-entryism strategy to tackle Islamist radicalisation and ensure there is no repeat of the Trojan horse affair in Birmingham schools across the public sector.

    In a speech outlining a wishlist of measures and powers to tackle extremism in Britain, the home secretary acknowledged that the work of the new unit had received only cabinet approval so far.

    May was put in charge of developing a cross-government extremism strategy last October, but she has so far failed to resolve outstanding problems raised by at least four Conservative cabinet colleagues.

    “Chris Grayling wants more clarity on its impact on prisons. Theresa Villiers wants more consultation with Northern Ireland, where extremism is obviously historically a big issue. Eric Pickles wants work to be done on the impact on communities and faiths and Nicky Morgan wants more work done on the role of Ofsted,” said a Westminster source.

    Instead, the home secretary outlined a list of measures a majority Conservative government would introduce, including closure orders for premises being used by extremists, banning orders, and a review of the impact of sharia law in Britain. The package would include a positive campaign to promote British values.

    May said the new extremism analysis unit “will help us to develop a new engagement policy – which will set out clearly for the first time with which individuals and organisations the government and public sector should engage and should not engage”.

    She added: “This will make sure nobody unwittingly lends legitimacy or credibility to extremists or extremist organisations, and will make it very clear that government should engage with people directly and through their elected representatives – not just through often self-appointed and unrepresentative community leaders.”

    She said it was known from the Trojan horse affair in Birmingham schools that extremists use entryist tactics to infiltrate legitimate organisations to promote their own agendas.

    “The counter-entryism strategy will ensure that government, the public sector and civil society as a whole will be more resilient against this danger,” the home secretary said in a speech in Westminster.

    The move goes far beyond current powers to ban violent extremist and terrorist organisations and paves the way for a range of non-violent legal organisations to be put on a blacklist and boycotted by the government.

    David Cameron, for example, has promised for the last five years to ban the non-violent radical Islamist organisation Hizb ut-Tahrir but it has failed to meet the legal criteria to be banned.

    The Home Office defines extremism as “vocal or active opposition to fundamental British values including democracy, the rule of law, individual liberty and mutual respect and tolerance of different faiths and beliefs. We also include in our definition of extremism calls for the death of members of armed forces whether in this country or overseas”.

    A recent Home Office consultation produced many comments that a much tighter definition was needed and such vague terms could catch a wide range of organisations. Those blacklisted would be likely to mount legal challenges to the decision.

    In outlining her list of possible new measures that a majority Conservative government would introduce, May revived the idea of closing down “extremist” mosques, new “extremism officers” in prisons, a review of how Sharia courts impact in England and Wales, a review of citizenship laws to ensure respect for British values, and a review of unregulated “supplementary” schools.

    The home secretary called for a new partnership to defeat the extremists. “To those who do not want to join this new partnership, to those who choose consciously to reject our values and the basic principles of our society, the message is equally clear: the game is up. We will no longer tolerate your behaviour.”

    Yvette Cooper, the shadow home secretary, said: “Everyone other than the extremists agree that we should robustly defend and actively promote the pluralistic values our society rightly holds in esteem.

    “But it isn’t enough for the home secretary to say it, she needs to act.

    “We need to work in as many communities as possible, throughout the UK, to support civil society and defeat extremism.

    “And we should never tie the hands of our agencies and the police in confronting dangerous, violent extremists. The government’s record is one of making that harder, not easier.”

    Alan Travis Home affairs editor
    Monday 23 March 2015 15.28 GMT Last modified on Tuesday 24 March 2015 08.21 GMT

    Find this story at 23 March 2015

    © 2015 Guardian News and Media Limited

    Blacklisted: The secret war between big business and union activists

    Demo outside parliament, TUC Day of Action on Blacklisting in 2012
    Demo outside parliament, TUC Day of Action on Blacklisting in 2012
    REVIEW: The communications revolution of the past 40 years has transformed our capacity to hold and use information about large numbers of people. As databases grow from hundreds to thousands and then tens of thousands of people, our fear grows that much of this information may have been gathered wrongly: that the information itself is incorrect, or that it has been gathered without our consent or knowledge.

    We all suspect that our personal data is being shared behind our backs, whether by utilities companies eager to trade on vulnerable pensioners, or by parts of the secret state who are monitoring emails on an industrial scale in the hope of catching extremists. Very rarely do we find out for definite who has been harmed or how.

    In the conventional press story that usually follows, attention is paid to the whistleblowers, self-sacrificing individuals such as Edward Snowden or Bradley Manning who once played a part in a system of malicious data collection but threw their position away in order to expose the corrupt practises of giant organisations.

    Blacklisted: The Secret War between Big Business and Union Activists by Dave Smith and Phil Chamberlain is published by New Internationalist on 22 March
    You can read Dave Smith on www.thejusticegap.com (Six years and still waiting: the legal implications of blacklisting)
    The story of the construction industry blacklist, brought to light in this extraordinary book, corresponds in many ways but not in others to our conventional fears about the manipulation of data. One difference from the usual story is that Dave Smith, the secretary of the Blacklist Support Group, and Phil Chamberlain, the freelancer who originally broke the story of the blacklist in the Guardian, are able to show in much more graphic detail than is usual just how much harm was caused to the victims.

    They have interviewed several hundred building workers and their family members, union officials, construction managers, former policemen, environmental activists, blacklisted academics or journalists, and blacklisters.

    From the accounts of the first group, they are able to describe what it is like to be a skilled worker, and to find yourself suddenly unemployable, like Frank Morris who describes going home to empty cupboards during the recent Olympic building boom because he had supported a dismissed colleague and been placed on the blacklist, or Dave Ayre who said: ‘I’d been sacked so many times at Christmas that my kids that my kids thought it was part of the Father Christmas story.’

    A second difference is that the champions of the story are the building workers who have been fighting for decades to secure trade union and healthy safety rights in their workplaces, rather than the whistleblowers.

    There were indeed managers within the blacklisting process who became disenchanted with their employers and belatedly blew the whistle on this practice – such as Alan Wainwright, whose evidence at an early Tribunal hearing led to Chamberlain’s report and the subsequent raid by the Information Commissioner’s Office of the blacklisting company, the Consulting Association.

    But Wainwright is an equivocal figure in the story, seemingly trusted neither by the employers nor the construction workers. And much the same can be said of Ian Kerr, the man who kept the blacklist going, very profitably, for decades. Kerr’s widow Mary spoke to the authors and described how he died of a heart attack shortly after giving evidence to a Parliamentary Select Committee. Only two of Kerr’s colleagues within the TCA, staffed as it was by the personnel directors of all the main construction companies, even sent her their condolences. Not one attended his funeral.

    If there are heroes to Smith and Chamberlain’s story it is rather individuals such as Mick Dooley and Chris Clark, founders of the Join Sites Committee, a rank-and-file union group of the early 1990s.

    One of Dooley’s best-known actions was a strike at Vascroft in 1992, when he occupied a tower crane for 10 days in protest at the dismissal of union stewards, effectively preventing an entire site from working.

    That tactics of this militancy were required is evident from the other passages of the book which describe the worsening conditions on sites over the last twenty years as union organisation has decayed. One of their sources Robert Smith describes working on the huge and vastly profitable Channel Tunnel extension to St Pancras, among rats, without toilets or other basic safety requirements.

    While there was much that the employers might truthfully have told each other about the tactics of certain individuals, blacklisting went far beyond the sort of open, honest record of occasional unofficial militancy that might be justifiable. It extended to the private lives of those who were being spied on, their relationships, the employment of their relatives, the private opinions of their partners.

    The names on the blacklist which cause the greatest distress are those who were rumoured to have worked at a site where the union had called a strike or who were said once to have purchased a copy of a left-wing newspaper, and found themselves subject to a simple data-trawl, often years and sometimes decades later. And where their name was on the blacklist, for any reason, they simply were not employed.
    A large portion of the narrative is given over to the accounts of the legal battles which have led to the discovery of the blacklist and to the partial attempts to obtain redress for its victims. I have acted as a barrister for two of the litigants, and it would not be appropriate for me to comment on these parts of the narrative. In any event, a previous article by Dave Smith for this website explains that part of the story.

    Was blacklisting specific to construction, or has it become part of the ordinary way in which industrial relations are conducted in this country? I have sat in court and listened to employers in radically different industries from construction admit to all sorts of practices which differ only in scale from the picture in this book.

    Has blacklisting ended? The authors term it ‘a global phenomenon which has been going on for centuries’. Kerr’s files were constructed out of the technology of a previous industrial era. His data was held on paper cards in drawers. New technology makes it easier to spy on large numbers of workers and to hide the fruits of this industrial espionage, but no less destructive in terms of their consequences for those about whom false data is being held.

    The authors, and the whole campaign whose voices they have recorded, deserve our thanks for bringing this secret conspiracy into public focus.

    Posted by David Renton on March 12, 2015.

    Find this story at 12 March 2015

    © 2015, ↑ The Justice Gap

    Police continued spying on Labour activists after their election as MPs

    Ex-minister Peter Hain says whistleblower’s disclosure of spying operations during 1990s raises questions about parliamentary sovereignty

    Police conducted spying operations on a string of Labour politicians during the 1990s, covertly monitoring them even after they had been elected to the House of Commons, a whistleblower has revealed.

    Peter Francis, a former undercover police officer, said he read secret files on 10 MPs during his 11 years working for the Metropolitan police’s special branch. They include Labour’s current deputy leader, Harriet Harman, the former cabinet minister Peter Hain and the former home secretary Jack Straw.

    Francis said he personally collected information on three MPs – Diane Abbott, Jeremy Corbyn and the late Bernie Grant – while he was deployed undercover infiltrating anti-racist groups. He also named Ken Livingstone, the late Tony Benn, Joan Ruddock and Dennis Skinner as having been subjected to special branch intelligence-gathering. The files on all 10 were held by Scotland Yard.

    The whistleblower said special branch files were often “very extensive” and typically described the subject’s political beliefs, personal background such as parents, school and finances, and demonstrations they attended. Some contained “some personal and private matters”, Francis added.

    Hain called for the home secretary, Theresa May, to ensure that an existing judge-led public inquiry into undercover policing examines the extent of the surveillance of members of parliament.

    Why were special branch watching me even when I was an MP?
    Peter Hain
    Read more
    In an article for the Guardian, he wrote: “That the special branch had a file on me dating back 40 years ago to anti-apartheid and anti-Nazi League activist days is hardly revelatory. That these files were still active for at least 10 years while I was an MP certainly is and raises fundamental questions about parliamentary sovereignty.”

    The Met’s special branch has been responsible for monitoring political groups considered to pose a threat to public order. Francis worked for special branch between 1990 and 2001. For four of those years he went undercover to spy on anti-racist groups as part of a covert unit, the Special Demonstration Squad (SDS), which was controlled by special branch.

    In recent years Francis has publicly detailed many aspects of this covert work, disclosing, for instance, that the SDS collected information on the relatives of murdered teenager Stephen Lawrence and other families seeking justice over alleged police misconduct.

    Francis approached Hain and described how he had read the pink special branch files – known as personal registry files – on the MPs while he was working for the police. He said some of the information in the files dated from the subjects’ days as political campaigners before they entered parliament, but special branch continued to store details of their political activities after they were elected to the Commons. “When you become an MP, the files don’t stop,” he said.

    He said that while he was undercover pretending to be an anti-racist campaigner in north-east London, Abbott, the MP for Hackney North and Stoke Newington, often talked at meetings and demonstrations he attended. He reported back details of her activities to his special branch superiors.

    To a lesser extent he collected information about Corbyn, the Islington North MP, and Grant, who represented Tottenham from 1987 until his death in 2000. “They were in meetings and I was there and they were talking about things and that is what I reported on,” he said. His superiors were “certainly very grateful” if he passed on information involving MPs, he added.

    Last year the Metropolitan police said it did not know how many elected politicians it was currently monitoring, after it was revealed that it had logged the political activities of Jenny Jones, the Green party’s sole peer, and a Green party councillor in Kent on a secretive database.

    May ordered the public inquiry after a string of revelations about the conduct of undercover officers who infiltrated political groups for more than 40 years. The officers routinely formed sexual relationships with women they had been sent to spy on. The remit of the inquiry, which is to be led by Lord Justice Pitchford, has yet to be defined.

    Livingstone, former MP for Brent East and former mayor of London, said he backed the idea of an inquiry covering surveillance of MPs but said this would probably only be serious under an Ed Miliband government.

    He said: “I wish I could have been a threat when I was an MP but I was completely powerless. My phone was being bugged in the 80s when I was on the Greater London Council. MI5 always denied it was them. So this was done by special branch?

    “Did they think we were a threat to the western system? If only this were true. What a load of crap. What’s so ridiculous is that we were being subjected to IRA bombings right the way through that period and they were wasting officers spying on me and Tony Benn. It’s a complete waste of police resources. People like me and Tony Benn were sadly never a threat to capitalism because we never had the powers. I’d love to see the files. My kids would love to see the files. They’re most likely full of rubbish.”

    Hain said the public should know whether covert surveillance hindered the MPs’ ability to represent their constituents and speak confidentially with them.

    He said that when he was Northern Ireland secretary between 2005 and 2007, undercover operations to defeat terrorism and serious crime were vital. “But conflating serious crime with political dissent unpopular with the state at the time means travelling down a road that endangers the liberty of us all.”

    Ruddock, the MP for Lewisham Deptford, described the news as “utterly appalling” and and “affront to parliament”.

    She said: “It is a surprise and I think it is absolutely outrageous. The MI5 surveillance of me in the 80s had no justification whatsoever, was found to be illegal. The idea that it could carry on without even the pretext that I was involved in CND when I was a member of parliament is completely and utterly outrageous.”

    Ruddock said she has written to May today demanding answers and would write again to whoever was the new home secretary after the election. She has also submitted a request to the police to see the file held on her and wants to know whether the Conservative political leadership of the day authorised the operation.

    May has promised that the remit of the public inquiry will be drawn up in consultation with people who were spied upon.

    Francis said: “My question is: how can people help formulate this public inquiry if they didn’t actually know they were spied upon? By me revealing that these MPs were also spied upon the same as many trade union members, countless law-abiding political activists and demonstrators also were, they can all demand to be included in the inquiry.”

    A Met police spokesman said an internal police inquiry, Operation Herne, was unable to fully investigate claims by Francis as he has been unwilling to speak to the inquiry.

    The spokesman said the Met had not shied away from issues raised by Operation Herne and another inquiry. “Whilst talking openly about undercover policing is challenging because of its very nature, the upcoming inquiry represents a real opportunity to provide the public with as complete a picture as possible of what has taken place,” he added.

    Two SDS undercover officers previously spied on Hain in the 1960s and 1970s when he campaigned against apartheid and racism before becoming the MP for Neath in 1991.

    Rob Evans and Rowena Mason
    Wednesday 25 March 2015 18.13 GMT Last modified on Thursday 26 March 2015 00.40 GMT

    Find this story at 25 March 2015

    © 2015 Guardian News and Media Limited

    FBI Spied ‘Beyond Its Authority’ on Keystone XL Opponents

    New investigation reveals agency’s actions amounted to ‘substantial non-compliance’ with its own rules

    The FBI violated its internal rules while spying on Tar Sands Blockade activists in Texas protesting the Keystone XL pipeline, a new report shows. (Photo: Tar Sands Blockade/flickr/cc)
    The Federal Bureau of Investigation (FBI) broke its own internal rules when it spied on Keystone XL opponents in Texas, violating guidelines designed to prevent the agency from becoming overly involved in complex political issues, a new report by the Guardian and Earth Island Journal published Tuesday has revealed.

    Internal documents acquired by the outlets through a Freedom of Information Act (FOIA) request show how the FBI failed to get approval for launching investigations into Houston-based protesters, whom the agency labeled “environmental extremists,” and held a bias in favor of the controversial tar sands pipeline—currently awaiting federal approval—extolling its supposed economic benefits in one document which outlined reasons for spying on its opponents.

    “Many of these extremists believe the debates over pollution, protection of wildlife, safety, and property rights have been overshadowed by the promise of jobs and cheaper oil prices,” the file states. “The Keystone pipeline, as part of the oil and natural gas industry, is vital to the security and economy of the United States.”

    The Guardian reports:

    Between November 2012 and June 2014, the documents show, the FBI collated inside knowledge about forthcoming protests, documented the identities of individuals photographing oil-related infrastructure, scrutinised police intelligence and cultivated at least one informant.

    ….However, the partially redacted documents reveal the investigation into anti-Keystone activists occurred without prior approval of the top lawyer and senior agent in the Houston field office, a stipulation laid down in rules provided by the attorney general.

    Additionally, the FBI appeared to have opened its file on the Keystone XL opponents in 2013 following a meeting between officials from the agency and TransCanada, the company building the pipeline.

    “For a period of time—possibly as long as eight months—agents acting beyond their authority were monitoring activists aligned with [direct action climate group] Tar Sands Blockade,” the Guardian writes.

    Dozens of activists were arrested in Texas in late 2012, although none were accused of violent crime or property damage, according to key Tar Sands Blockade organizer, Ron Seifert.

    “Less than a month after TransCanada showed the FBI a PowerPoint claiming that people opposed to [Keystone XL] need to be watched, Houston’s FBI office cuts corners to start an investigation; it’s not surprising but it is revealing of who they really work for,” Seifert told Common Dreams on Monday. “The FBI has been harassing and actively repressing communities of organizers for decades.”

    Yet more records show that the FBI associated the Tar Sands Blockade, which organizes peaceful protests, with other “domestic terrorism issues.”

    Other documents suggest that the Houston-based investigation was only one of a larger probe, possibly monitoring other anti-Keystone XL activists around the country.

    “We’re not surprised,” Seifert continued. “We’re also not deterred. Movements for climate and environmental justice are activating people from diverse political backgrounds to take direct action to defend themselves from threats like [Keystone XL]. People are stepping out of the blind alleys of electoral politics and building grassroots power, and that’s scary for people who want a monopoly on power.”

    Tuesday, May 12, 2015
    byCommon Dreams
    byNadia Prupis, staff writer

    Find this story at 12 May 2015

    This work is licensed under a Creative Commons Attribution-Share Alike 3.0 License

    As Internal Docs Show Major Overreach, Why Is FBI Spying on Opponents of Keystone XL Pipeline?

    A new report confirms for the first time that the FBI spied on activists in Texas who tried to stop the construction of the Keystone XL pipeline. Documents from the FBI reveal it failed to get approval before it cultivated informants and opened its investigation, which was run from its Houston field office. The files document “substantial non-compliance” with Department of Justice rules. The Tar Sands Blockade mentioned in that report was one of the main groups targeted by the FBI. Agents in Houston office also told TransCanada they would share “pertinent intelligence regarding any threats” to the company in advance of protests. We are joined by Adam Federman, contributing editor to Earth Island Journal and co-author of the new investigation published by The Guardian, “Revealed: FBI violated its own rules while spying on Keystone XL opponents.” In February, he also revealed how the FBI has recently pursued environmental activists in Texas, Pennsylvania, Oregon, Washington and Idaho for “little more than taking photographs of oil and gas industry installations.”

    TRANSCRIPT
    This is a rush transcript. Copy may not be in its final form.

    JUAN GONZÁLEZ: A new report confirms for the first time that the FBI spied on activists in Texas who tried to stop the construction of the Keystone XL pipeline. The report is based on FBI documents obtained by The Guardian and the Earth Island Journal. The documents also reveal that the FBI failed to get approval before it cultivated informants and opened its investigation, which was run from its Houston field office. The files document, quote, “substantial non-compliance” with Department of Justice rules. Much of the FBI’s surveillance took place between November of 2012 and June 2014.

    AMY GOODMAN: The Tar Sands Blockade mentioned in the report was one of the main groups targeted by the FBI. Agents in Houston also told TransCanada they would share, quote, “pertinent intelligence regarding any threats” to the company in advance of protests.

    For more, we are joined by Adam Federman, contributing editor to Earth Island Journal, co-author of this new investigation that was published by The Guardian. It’s headlined “Revealed: FBI Violated Its Own Rules While Spying on Keystone XL Opponents.” In February, he also revealed how the FBI has recently pursued environmental activists in Texas, Pennsylvania, Oregon, Washington and Idaho for, quote, “little more than taking photographs of oil and gas industry installations.”

    Adam Federman, thank you so much for joining us from Burlington, Vermont. Talk about this most recent exposé. How do you know the FBI was spying on those who are opposed to the Keystone XL?

    ADAM FEDERMAN: Yeah, the recent investigation is based on more than 80 pages of documents that we obtained through a Freedom of Information Act request. And the most striking thing about them is that they demonstrated for the first time that the FBI opened an investigation into anti-Keystone pipeline campaigners in Texas in 2012, late 2012, and that investigation continued through 2013, despite the fact that it was opened without proper approval from within the FBI. And what’s interesting about them is that they show extensive interest in Tar Sands Blockade and activists organizing in Houston, particularly in, yeah, neighborhoods in East Houston, where tar sands oil would eventually end up at the refineries that are based there.

    JUAN GONZÁLEZ: And in terms of the most surprising revelations that you found in these documents, could you talk about that?

    ADAM FEDERMAN: Yeah, there are several. I mean, the fact that the investigation was opened without proper approval is probably most noteworthy. The FBI requires approval from legal counsel and a senior agent for investigations that are described as sensitive, and those include investigations into political or religious organizations, media institutions, academic institutions, and basically they set a higher threshold for opening an investigation. So, the fact that the Houston domain failed to do that obviously violates agency protocol.

    But I think, more broadly, the documents also sort of illuminate the FBI’s characterization of environmental organizations and activism in the country. You know, the sort of opening salvo in the investigation is a synopsis of what they call environmental extremism, and that sort of undergirds the entire investigation and has also—you know, we’ve seen the same sort of language used in other contexts, not just surrounding Keystone pipeline.

    AMY GOODMAN: Adam, many of the—looking at the quotes in the FBI documents, they talk about, as you said, the environmental extremists and say, quote, “Many of these extremists believe the debates over pollution, protection of wildlife, safety, and property rights have been overshadowed by the promise of jobs and cheaper oil prices. The Keystone pipeline, as part of the oil and natural gas industry, is vital to the security and economy of the United States.” Can you explain these documents?

    ADAM FEDERMAN: Yeah, I mean, that quote is really quite amazing for a number of reasons. Mike German, a former FBI agent who’s now at the Brennan Center and who we worked with on this story, you know, said that that characterization would include just about anyone who watches the evening news. I mean, it’s such a broad brush to tar—to describe environmental activists as extremists simply for being concerned about things like pollution, wildlife and property rights.

    And then the FBI also goes on to claim that the Keystone pipeline is vital to the national security and economy of the United States, which of course is highly controversial and contested. And as I’m sure your viewers know, the State Department is still deliberating over whether to approve the northern leg of the pipeline itself. So that question remains open; however, it seems that the FBI has taken it upon its own to suggest that the pipeline is crucial to U.S. national security and financial security.

    JUAN GONZÁLEZ: I wanted to ask you about the 2010 intelligence bulletin from the FBI Domestic Terrorism Analysis Unit that you obtained. It warned that, even though the industry had encountered only low-level vandalism and trespassing, recent “criminal incidents” suggested environmental extremism was on the rise. The FBI concluded, quote, “Environmental extremism will become a greater threat to the energy industry owing to our historical understanding that some environmental extremists have progressed from committing low-level crimes against targets to more significant crimes over time in an effort to further the environmental extremism cause.”

    ADAM FEDERMAN: Yeah, it’s a fascinating document. And the story behind how I obtained it is because of the fact that that very document was used by the Pennsylvania Department of Homeland Security to justify surveillance of anti-fracking groups in the state. And it essentially captures the FBI’s thinking on, you know, the threat of environmental extremism to—specifically to the energy industry. And this is laid out, as you say, in 2010, so I think that this is sort of the foundation for the FBI’s approach to the environmental movement more broadly. And I think, with these more recent documents, we’re seeing that sort of carried out in real time. And we also know that the FBI has had high-level meetings with TransCanada and that local and state law enforcement along the pipeline route and in Pennsylvania and elsewhere has actively investigated and spied on environmental activists of, you know, all stripes. And it’s quite systematic, and I do think that the FBI is in many ways leading the charge.

    AMY GOODMAN: You report the FBI’s monitoring of Tar Sands Blockade activists failed to follow proper protocols for more than eight months. I want to read the FBI’s response: quote, “While the FBI approval levels required by internal policy were not initially obtained, once discovered, corrective action was taken, non-compliance was remedied, and the oversight was properly reported through the FBI’s internal oversight mechanism.” That’s what the FBI said, acknowledging they didn’t initially get approval. Adam, as we wrap up right now, if you can talk about what—the legality of what the FBI did, in what you released today in the Earth Island Journal and The Guardian, and also in your past reporting on FBI spying on activists?

    ADAM FEDERMAN: Well, I think, unfortunately, it’s perhaps not the exception that the FBI has opened an investigation without proper approval. In 2011, the inspector general issued a report showing widespread cheating on a test that was designed to prevent this very kind of thing from happening. So it essentially demonstrates a lack of internal control. But more broadly speaking, the question that I think we need to be asking is whether the investigation, opened properly or not, should have been conducted to begin with. I mean, Tar Sands Blockade is committed to nonviolent civil disobedience. They’ve been very open and transparent about their activism and work. And I think the question is whether this investigation should have been opened to begin with, and, quite frankly, if the FBI is actively investigating other anti-Keystone pipeline activists or anti-fracking activists in other states.

    AMY GOODMAN: Adam Federman, we want to thank you for being with us, contributing editor to Earth Island Journal, where he covers the intersection between law enforcement and the environment. He co-authored the new investigation published by The Guardian, “Revealed: FBI Violated Its Own Rules While Spying on Keystone XL Opponents.” We’ll link to that story at democracynow.org. When we come back, it’s the 30th anniversary of the MOVE bombing, when the Philadelphia police bombed a neighborhood. Stay with us.

    WEDNESDAY, MAY 13, 2015

    Find this story at 13 May 2015

    Creative Commons License The original content of this program is licensed under a Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 United States License. Please attribute legal copies of this work to democracynow.org. Some of the work(s) that this program incorporates, however, may be separately licensed. For further information or additional permissions, contact us.

    Keystone protesters tracked at border after FBI spied on ‘extremists’

    More than 18 months after federal investigation violated internal rules, activists say they were still watchlisted at the airport, visited at home by a terrorism task force and detained for hours because they ‘seemed like protesters’

    An activist was placed on a US government watchlist for domestic flights after being swept up in an FBI investigation into protests of the Keystone XL pipeline, linking a breach of intelligence protocol with accounts of continued tracking that environmentalists fear could follow them for life.

    Revealed: FBI violated its own rules while spying on Keystone XL opponents
    Read more
    Twenty-five-year-old Bradley Stroot is one of several campaigners to go public, after the Guardian revealed an FBI investigation that labeled them “environmental extremists”, with new allegations of a continued crackdown. From an hours-long detention at the US border to a home visit by a terrorism task force and an encounter with police searching for bombs, the activists say law enforcement has tracked them from a peaceful Texas protest of the highly contentious oil project in 2012 and 2013 to the tony suburbs of Indianapolis as recently as the end of last year.

    Stroot told the Guardian that when he flew back to Texas to visit a friend last December, he learned that he was on a watchlist – known as a “Secondary Security Screening Selection” – and was subjected to more invasive airport security measures.

    The FBI’s investigation into anti-Keystone activists was closed in June 2014 due to a lack of credible intelligence regarding threats to the pipeline and extremist activity.

    According to internal agency documents obtained by the Guardian and Earth Island Journal, it was discovered in August 2013 that the FBI’s investigation had been opened without proper approval from the chief legal counsel of the agency’s Houston division and a senior agent, resulting in a report of “substantial non-compliance” with rules set out by the US Justice Department.

    But before the internal violations were discovered, information on Stroot and several other activists was included in FBI files. Now, interviews with Stroot, who was held up at Chicago’s O’Hare airport six months after the investigation was closed, and other protesters indicate that they are still being monitored by law enforcement.

    Stroot and two other people involved in the protests were described in the files as having separate, larger “Subject” files in the FBI’s Guardian Threat Tracking System, a repository for suspicious activity reports and counterterrorism threat assessments that can be searched by all FBI employees.

    How the US’s terrorism watchlists work – and how you could end up on one
    Read more
    Hugh Handeyside, an attorney with the ACLU in New York, said the government’s suspicious activity reporting program is often tied to placement on a watchlist.

    “Both label people as suspicious according to low standards that inevitably include innocent conduct,” he said. “And this case shows that the two may be linked.”

    According to a long-withheld US watchlist guidance document published last year by the Intercept, people who do not meet the criteria for inclusion on the no-fly list but who are associated with “terrorist activity” may be placed on a selectee list like the one Bradley Stroot found himself on. Some 16,000 people – 1,200 of them US citizens – have been identified as so called “selectees” who must undergo heightened screenings at border crossings or airports.

    From photos at the pipeline to a pat-down at the airport
    fbi stroot
    Bradley Stroot was one of three people detained by Houston police for taking photographs of an endpoint for the proposed Keystone XL pipeline. Four days later, a terrorism unit of the FBI reviewed the incident. Information on Stroot and other ‘suspicious individuals’ was kept in the agency’s ‘Guardian’ repository for tracking suspicious activity and terrorism-involved activities.
    On 13 December 2014, Stroot said, he prepared to board a flight from Chicago to Dallas to see an old friend – his first air travel since his 10-month involvement in a campaign in the Houston area against the proposed Keystone project.

    While in Texas the first time, he had been arrested once for trespassing after taking part in a widely publicized occupation of part of the pipeline route that included a “tree village”.

    And on 15 November 2012, Stroot and two other activists were stopped by the Houston police department while taking photos of the Valero refinery, one of the endpoints for tar sands oil. Although they were not charged with any crime, details of the incident ended up in an FBI file – part of more than 80 pages of internal FBI documents obtained through a Freedom of Information Act request – that described the activists as “suspicious individuals”. Four days later, the police officers met with members of the FBI’s Joint Terrorism Task Force to discuss the incident.

    The encounter with the Houston police left Stroot somewhat shaken but determined to continue protesting. He says he had flown once to Europe – before the Keystone campaign began in Texas in 2012 – and had no issues.

    But when he printed his American Airlines plane ticket in December, he noticed four S’s in large black letters in the top left corner. So-called “Secondary Security Screening Selection” helps Transportation Security Administration and Department of Homeland Security officers single out travelers, with no explanation, for heightened screening at airports.

    bradley stroot pass
    Secondary Security Screening Selection (SSSS) led Bradley Stroot to a more invasive pat-down on both legs of his return trip to Texas. Photograph: Courtesy of Bradley Stroot
    When Stroot arrived at Chicago O’Hare, he said, he was subjected to heightened security screening – removed from the main passenger line and taken to a separate holding area where another airline security official was waiting. His bags, Stroot alleged, were carefully searched and he was subjected to a more invasive pat-down. He said the same thing happened on his return flight to Chicago.

    “They pull you out of line, swab down all of your shit with tongue depressor-like things, and check for bomb-making materials,” Stroot said.

    TSA’s failures start long before screeners fail to detect bombs in security tests
    Jason Edward Harrington
    Read more
    But there were signs that Stroot had become a subject of interest to law enforcement even before he learned he was on a watchlist.

    One night in spring 2013, just a few months after he had returned home to Indiana from Texas, Stroot said he was helping out at a makeshift homeless shelter in Bloomington, sleeping in a friend’s truck, when a police officer knocked on the window and asked for identification.

    When the officer returned from running his ID, Stroot claims that he was aggressively questioned and that the officer asked if he could look in the truck, which had an open cab. “You could see there was nothing in it,” Stroot said.

    After what he recalls as minutes more of questioning, Stroot said the officer finally asked if he had “any bomb-making materials”.

    From video in the trees to detention at the border – and at home
    Tar Sands Blockade occupy the corporate offices of TransCanada on 7 January 2013 Facebook Twitter Pinterest
    Andrew Neef took part in a January 2013 protest at the Houston offices of TransCanada, the Canadian oil giant that would oversee the Keystone XL pipeline. Internal FBI documents show the agency willing to share ‘any pertinent intelligence regarding any threats’ with the company; the documents also show Neef included in files describing ‘Threats to Keystone XL Pipeline Projects’. Photograph: Tar Sands Blockade
    Stroot is not the only anti-Keystone XL activist who has been targeted since the Texas protest campaign and parallel FBI investigation.

    Elizabeth Arce, a 27-year-old independent journalist, traveled to Texas with a friend in October 2012 to help document the tree sit-in that ended in Stroot’s arrest. After spending a week in the trees live-streaming video of the protest, she said, they ran out of batteries and descended, hoping that as journalists they might avoid arrest from the police waiting underfoot.

    I think the storyline of TransCanada and authorities communicating further than we think is plausible
    Elizabeth Arce
    Arce and her friend, Lorenzo Serna, were arrested for trespassing but all the charges were dropped.

    In April 2013, Arce was on her way to Canada for an Earth Day event hosted by an indigenous group in Ontario. At the border crossing in Minnesota, Arce said, Canadian border agents asked her about the arrest in Texas, searched her car and eventually let her pass.

    But this past August, Arce said she, Serna and another friend were driving to Canada to document the aftermath of the Mount Polley mine disaster in British Columbia and were denied entry.

    At the crossing in Sweetgrass, Montana, Arce said agents at the border asked her detailed questions about her arrest in Texas. They searched the car for “hours”, she said, going through every piece of luggage and scrap of paper, even referring to her trombone as a “noisemaker”. After being detained for five hours, she said she and her friends were told that they could not cross into Canada because, she remembered an agent telling her, they “seemed like protesters”.

    In the FBI files, the agency’s Houston office said it would share “any pertinent intelligence regarding any threats” with TransCanada, the Canadian oil giant that has been lobbying for years to oversee the transport of tar sands oil from Canada to the Texas Gulf coast. The project is still awaiting approval from the Obama administration.

    “I think the storyline of TransCanada and authorities communicating further than we think is plausible,” Arce said.

    (In a statement, TransCanada said the company does not “direct law enforcement” but that “law enforcement officials have asked us on a number of occasions about our experience along the Gulf Coast Pipeline so they can determine what they may expect when Keystone XL construction begins”.)

    Andrew Neef, a 31-year-old data archivist from Minnesota, also spent time in Texas in 2012 and 2013. He was part of a mass action on 7 January 2013, at the Houston offices of TransCanada, and was arrested for trespassing along with another activist, Alec Johnson. Because he did not have a permanent address at the time and was not living in Texas, Neef entered his parents’ address on the police report. Neef and Johnson are both referred to in the FBI files obtained by the Guardian, which detail that the FBI had advance knowledge of the TransCanada sit-in and debriefed an informant on the event after it happened.

    stroot fbi
    An internal FBI document detailing the January 2013 arrest of Andrew Neef and Alec Johnson labeled them as ‘Threats to Keystone XL Pipeline Projects’. Neef said the peaceful protest haunted him, with authorities later showing up at his parents’ front door.
    About a month after the Houston arrest, Neef said his parents were visited by members of the Indiana division of the FBI’s joint terrorism task force at their home in Carmel, an upscale Indianapolis suburb.

    According to Neef, who also works as an independent-media journalist, the agents asked his parents several questions about the people he knew, whom he was working with, and where his funding came from. They also wanted to know, Neef said, if he was involved in anti-fracking campaigns.

    “They wanted me to contact them,” Neef said, “and probably become some kind of snitch.”

    (The FBI’s Houston field office did not respond to a detailed list of questions for this article.)

    More than a year later, the FBI investigation into anti-Keystone pipeline campaigners in Texas was formally closed due to a “lack of reporting and/or extremist activity”. But the FBI retains data on individuals even if the purported threat turns out to be non-existent.

    For young activists like Bradley Stroot, the stigma of being on a government watchlist can last for years. Stroot said he was resigned to the “new reality” that he may be on the list for “the rest of my life or a very long period”.

    Once an individual has been placed on the selective screening watchlist, there is very little he or she can do to get removed from it, said Handeyside of the ACLU, or even find out why he or she was put on it in the first place.

    “There’s no due process for these people,” he said.

    Adam Federman is a contributing editor of Earth Island Journal.
    Monday 8 June 2015 13.30 BST Last modified on Wednesday 17 June 2015 21.30 BST

    Find this story at 8 June 2015

    © 2015 Guardian News and Media Limited

    Revealed: FBI violated its own rules while spying on Keystone XL opponents

    Houston investigation amounted to ‘substantial non-compliance’ of rules
    Internal memo labels pipeline opponents as ‘environmental extremists’
    FBI failed to get approval before it opened files on protesters in Texas

    The FBI breached its own internal rules when it spied on campaigners against the Keystone XL pipeline, failing to get approval before it cultivated informants and opened files on individuals protesting against the construction of the pipeline in Texas, documents reveal.

    Internal agency documents show for the first time how FBI agents have been closely monitoring anti-Keystone activists, in violation of guidelines designed to prevent the agency from becoming unduly involved in sensitive political issues.

    The hugely contentious Keystone XL pipeline, which is awaiting approval from the Obama administration, would transport tar sands oil from Canada to the Texas Gulf coast.

    It has been strongly opposed for years by a coalition of environmental groups, including some involved in nonviolent civil disobedience who have been monitored by federal law enforcement agencies.

    The documents reveal that one FBI investigation, run from its Houston field office, amounted to “substantial non-compliance” of Department of Justice rules that govern how the agency should handle sensitive matters.

    One FBI memo, which set out the rationale for investigating campaigners in the Houston area, touted the economic advantages of the pipeline while labelling its opponents “environmental extremists”.

    FBI Keystone memo Facebook Twitter Pinterest
    An FBI memo labels opponents of the controversial pipeline as ‘environmental extremists’. Photograph: Guardian
    FBI Keystone memo Facebook Twitter Pinterest
    An FBI memo detailing ‘non-compliance’ by the Houston field office. Photograph: Guardian
    “Many of these extremists believe the debates over pollution, protection of wildlife, safety, and property rights have been overshadowed by the promise of jobs and cheaper oil prices,” the FBI document states. “The Keystone pipeline, as part of the oil and natural gas industry, is vital to the security and economy of the United States.”

    The documents are among more than 80 pages of previously confidential FBI files obtained by the Guardian and Earth Island Journal after a request under the Freedom of Information Act.

    Between November 2012 and June 2014, the documents show, the FBI collated inside knowledge about forthcoming protests, documented the identities of individuals photographing oil-related infrastructure, scrutinised police intelligence and cultivated at least one informant.

    It is unclear whether the source or sources were protesters-turned-informants, private investigators or hackers. One source is referred to in the documents as having had “good access and a history of reliable reporting”.

    The FBI investigation targeted Tar Sands Blockade, a direct action group that was at the time campaigning in southern Texas.

    However, the partially redacted documents reveal the investigation into anti-Keystone activists occurred without prior approval of the top lawyer and senior agent in the Houston field office, a stipulation laid down in rules provided by the attorney general.

    Confronted by evidence contained in the cache of documents, the agency admitted that “FBI approval levels required by internal policy were not initially obtained” for the investigation, but said the failure was remedied and later reported internally.

    The FBI files appear to suggest the Houston branch of the investigation was opened in early 2013, several months after a high-level strategy meeting between the agency and TransCanada, the company building the pipeline.

    For a period of time – possibly as long as eight months – agents acting beyond their authority were monitoring activists aligned with Tar Sands Blockade.

    Tar Sands Blockade appeared on the FBI’s radar in late 2012, not long after the group began organising in east Houston, the end destination for Keystone’s 1,660-mile pipeline.

    Environmental activists affiliated with the group were committed to peaceful civil disobedience that can involve minor infractions of law, such as trespass. But they had no history of violent or serious crime.

    Ron Seifert, a key organiser at Tar Sands Blockade, said dozens of campaigners were arrested in Texas for protest-related activity around that time, but not one of them was accused of violent crime or property destruction.

    The group focused on Houston’s heavily industrialised neighbourhood of Manchester, where the Valero Energy Corporation has a massive refinery capable of processing heavy crude oil.

    Between early November 2012 and June 2014, the documents show, the FBI collated inside-knowledge about forthcoming protests, documented the identities of individuals photographing oil-related infrastructure, scrutinised police intelligence and cultivated at least one informant.

    FBI memo Facebook Twitter Pinterest
    ‘The Houston Division had identified an emerging threat from environmental extremists targeting construction projects of the TransCanada Keystone XL Pipeline within the Houston Domain.’ Photograph: Guardian
    It is unclear whether the source or sources were protesters-turned-informants, private investigators or hackers. One source is referred to in the documents as having had “good access, and a history of reliable reporting”.

    At one point, the FBI’s Houston office said it would share with TransCanada “any pertinent intelligence regarding any threats” to the company in advance of a forthcoming protest.

    One of the files refers to Houston police officers who stopped two men and a woman taking photographs near the city’s industrial port, noting they were using a “large and sophisticated looking” camera.

    Two of the individuals were described as having larger subject files in the FBI’s Guardian Threat Tracking System.

    In another incident, the license plate belonging to a Silver Dodge was dutifully entered into the FBI’s database, after a “source” spotted the driver and another man photographing a building associated with TransCanada.

    Sensitive matters
    The FBI rules, laid out in the FBI’s Domestic Investigations and Operations Guide, dictate that special care should be taken over sensitive investigations such as those targeting elected officials, journalists and political organisations.

    FBI work on “sensitive investigative matters” requires prior approval of both the chief division counsel (CDC), the top lawyer in the field office, and the special agent in charge (SAC).

    Both are supposed to consider the severity of the threat and the consequences of “adverse impact on civil liberties and public confidence” should the investigation be made public.

    Keystone protest Facebook Twitter Pinterest
    Tar Sands Blockade occupy the corporate offices of TransCanada in January 2013. Photograph: Laura Borealis/Tar Sands Blockade
    However, neither Houston’s CDC or SAC were consulted in relation to the FBI’s monitoring of Tar Sands Blockade activists, the documents show.

    Explaining the breach of protocols, the FBI said in a statement that it was committed to “act properly under the law”.

    “While the FBI approval levels required by internal policy were not initially obtained, once discovered, corrective action was taken, non-compliance was remedied, and the oversight was properly reported through the FBI’s internal oversight mechanism,” it said.

    The FBI did not deny opening an investigation into anti-Keystone campaigners, and said it was compelled to “take the initiative to secure and protect activities and entities which may be targeted for terrorism or espionage”.

    But the precise nature of the FBI’s investigation, which continued for almost a year after the Houston Division acknowledged it had violated protocol, remains unclear.

    The documents appear to suggest the investigation was one branch of a wider set of investigations, possibly including anti-Keystone activists elsewhere in the country.

    The documents connect the investigation into anti-Keystone activists to other “domestic terrorism issues” in the agency and show there was some liaison with the local FBI “assistant weapons of mass destruction coordinator”.

    Mike German, a former FBI agent, who assisted the Guardian in deciphering the bureau’s documentation, said they indicated the agency had opened a category of investigation that is known in agency parlance as an “assessment”.

    Introduced as part of an expansion of FBI powers after 9/11, assessments allow agents to open intrusive investigations into individuals or groups, even if they have no reason to believe they are breaking the law.

    German, now a fellow at the Brennan Center for Justice in New York, said the documents also raised questions over collusion between law enforcement and TransCanada.

    “It is clearly troubling that these documents suggest the FBI interprets its national security mandate as protecting private industry from political criticism,” he said.

    According to the FBI documents, the FBI concluded there were “no adverse consequences” emanating from its failure to seek approval for the sensitive investigation, noting the mistake was later “remedied”.

    The investigation continued for 11 months after the mistake was spotted. It was closed after the FBI’s Houston division acknowledged its failure to find sufficient evidence of “extremist activity”.

    Before closing the case, however, agents noted the existence of a file that was to be used as a repository for future intelligence “regarding the Keystone XL pipeline”.

    Since then, at least a dozen anti-tar sands campaigners in Oregon, Washington, and Idaho have been contacted by the FBI. The agency has said they are not under investigation.

    Adam Federman is a contributing editor of Earth Island Journal
    Paul Lewis in Washington and Adam Federman
    Tuesday 12 May 2015 11.59 BST Last modified on Tuesday 12 May 2015 23.11 BST

    Find this story at 12 May 2015

    © 2015 Guardian News and Media Limited

    F.B.I. Says It Broke Its Rules in Inquiry of Keystone Pipeline Opponents

    WASHINGTON — The Federal Bureau of Investigation violated its own guidelines in 2013 when it investigated environmental advocates who opposed the Keystone XL pipeline, the F.B.I. acknowledged on Tuesday.

    The bureau had received information about plots to damage part of the existing Keystone pipeline, which moves oil from Canada to the Gulf of Mexico, according to federal law enforcement officials. The proposed Keystone XL pipeline would create a shortcut for a significant section of the system.

    As part of the investigation, agents at the F.B.I.’s field office in Houston communicated with sources, who gathered information from environmental advocates. The agents also conducted database searches on the advocates and reviewed local law enforcement reports about them. But the agents had not received approval from the head of their office and from its chief lawyer.

    Continue reading the main story
    RELATED COVERAGE

    Paula Antoine at a “spirit camp” set up by the Rosebud Sioux tribe near the planned route of Keystone XL in South Dakota.Grass-Roots Push in the Plains to Block the Keystone Pipeline’s PathMAY 5, 2015
    That authorization was required under F.B.I. investigative guidelines intended to prevent agents from abusing powers that are most often used in national security and criminal investigations.

    After an audit led by the bureau’s headquarters in Washington revealed that the agents had not received authorization, the agents asked for permission and got it. The investigation ultimately found no evidence that the protesters were plotting to damage the pipeline, and it was closed.

    The Guardian first reported the investigation on Tuesday.

    As the F.B.I. changed its focus to national security after the Sept. 11, 2001, attacks, it began building closer relationships with the nation’s largest companies as it worked to protect the country’s critical infrastructure. Many of those companies — like TransCanada, which owns the pipeline — are frequently targets of environmental protests, and issues of free speech and national security can become intertwined.

    The F.B.I. said on Tuesday that it had not conducted a full investigation into the protesters — only an assessment, its least invasive inquiry. The bureau said it had looked into the accusations because the threats were against “the oil and gas industry, and the energy sector is considered a part of the critical infrastructure of the United States.”

    It characterized the mistake by the agents as an “administrative error” that “was discovered by the F.B.I.’s internal oversight mechanisms.”

    “While the F.B.I. approval levels required by internal policy were not initially obtained, once discovered, corrective action was taken, noncompliance was remedied, and the oversight was properly reported through the F.B.I.’s internal oversight mechanism,” the bureau said. “At no time did the review find that the initial justification for the assessment was improper.”

    By MICHAEL S. SCHMIDTMAY 12, 2015

    Find this story at 12 May 2015

    © 2015 The New York Times Company

    FBI’s Plan to Expand Hacking Power Advances Despite Privacy Fears

    Google had warned that the rule change represents a “monumental” constitutional concern.

    March 16, 2015 A judicial advisory panel Monday quietly approved a rule change that will broaden the FBI’s hacking authority despite fears raised by Google that the amended language represents a “monumental” constitutional concern.

    The Judicial Conference Advisory Committee on Criminal Rules voted 11-1 to modify an arcane federal rule to allow judges more flexibility in how they approve search warrants for electronic data, according to a Justice Department spokesman.

    (RELATED: Republicans Have Less Faith in the NSA than Democrats)

    Known as Rule 41, the existing provision generally allows judges to approve search warrants only for material within the geographic bounds of their judicial district.

    But the rule change, as requested by the department, would allow judges to grant warrants for remote searches of computers located outside their district or when the location is unknown.

    The government has defended the maneuver as a necessary update of protocol intended to modernize criminal procedure to address the increasingly complex digital realities of the 21st century. The FBI wants the expanded authority, which would allow it to more easily infiltrate computer networks to install malicious tracking software. This way, investigators can better monitor suspected criminals who use technology to conceal their identity.

    But the plan has been widely opposed by privacy advocates, such as the American Civil Liberties Union, as well as some technologists, who say it amounts to a substantial rewriting of the rule and not just a procedural tweak. Such a change could threaten the Fourth Amendment’s protections against unreasonable search and seizures, they warn, and possibly allow the FBI to violate the sovereignty of foreign nations. The rule change also could let the agency simultaneously target millions of computers at once, even potentially those belonging to users who aren’t suspected of any wrongdoing.

    (RELATED: The CIA Is Trying to Hack Your iPhone)

    Google weighed in last month with public comments that warned that the tweak “raises a number of monumental and highly complex constitutional, legal and geopolitical concerns that should be left to Congress to decide.”

    In an unusual move, Justice Department lawyers rebutted Google’s concerns, saying the search giant was misreading the proposal and that it would not result in any search or seizures not “already permitted under current law.”

    The judicial advisory committee’s vote is only the first of several stamps of approval required within the federal judicial branch before the the rule change can formally take place—a process that will likely take over a year. The proposal is now subject to review by the Standing Committee on Rules of Practice and Procedure, which normally can approve amendments at its June meeting. The Judicial Conference is next in line to approve the rule, a move that would likely occur in September.

    The Supreme Court would have until May 1, 2016 to review and accept the amendment, which Congress would then have seven months to reject, modify or defer. Absent any congressional action, the rule would take place on Dec. 1, 2016.

    DON’T MISS TODAY’S TOP STORIES
    “I read the Tech Edge every morning.”Ashley, Senior Media AssociateSign up form for the newsletter

    Privacy groups vowed to continue fighting the rule change as it winds its way through the additional layers of review.

    “Although presented as a minor procedural update, the proposal threatens to expand the government’s ability to use malware and so-called ‘zero-day exploits’ without imposing necessary protections,” said ACLU attorney Nathan Freed Wessler in a statement. “The current proposal fails to strike the right balance between safeguarding privacy and Internet security and allowing the government to investigate crimes.”

    Drew Mitnick, policy counsel with digital rights group Access, said the policy “should only be considered through an open and accountable legislative process.”

    Google did not immediately respond to a request for comment.

    BY DUSTIN VOLZ

    Find this story at 16 March 2015

    Copyright © 2015 by National Journal Group Inc.

    New report claims al-Qaeda-Benghazi link known day after attack

    One day after the deadly Sept. 11, 2012, attack on the U.S. compound in Benghazi, Libya, the Defense Intelligence Agency concluded the assault had been planned 10 days earlier by an al-Qaeda affiliate, according to documents released Monday by conservative watchdog group Judicial Watch.

    “The attack on the American consulate in Benghazi was planned and executed by The Brigades of the Captive Omar Abdul Rahman,” said a preliminary intelligence report by the Defense Intelligence Agency, obtained through a lawsuit following a Freedom of Information Act request.

    The group, which also conducted attacks against the Red Cross in Benghazi, was established by Abdul Baset Azuz, a “violent radical” sent by al-Qaeda to set up bases in Libya, the defense agency report said.

    The attack was planned on Sept. 1, 2012, with the intent “to kill as many Americans as possible to seek revenge” for the killing of a militant in Pakistan and to memorialize the terrorist attacks of Sept. 11, 2001, the report said.

    Four Americans were killed in the Benghazi attack, including U.S. Ambassador Chris Stevens.

    The incident became politically controversial because the White House initially described the attack as the result of a spontaneous protest. Republican critics said the White House intentionally played down that it was a terrorist attack, because it occurred so close to President Obama’s re-election.

    Then-Secretary of State Hillary Clinton, who’s now seeking the Democratic presidential nomination, was to appear this week before the House Select Committee on Benghazi, but the hearing was canceled after Clinton and the committee chairman, Rep. Trey Gowdy, R-S.C., failed to agree on whether all the documents Gowdy requested had been given to the panel.

    USA TODAY
    Benghazi panel won’t call Clinton to testify next week

    USA TODAY
    Benghazi probe dogs Clinton presidential bid

    Other documents released by Judicial Watch show that U.S. personnel in Libya had been monitoring weapons transfers from Benghazi to opposition forces in Syria, where al-Qaeda and the Muslim Brotherhood had taken the lead against Syrian President Bashar Assad in that country’s civil war. In late August 2012, the weapons included 500 sniper rifles, 300 rocket-propelled grenades and 400 howitzer missiles sent to small Syrian ports that handle little cargo, according to one of the reports.

    The documents also predicted “dire consequences” of the Syrian civil war: that al-Qaeda’s well-established network in Syria, together with the ongoing conflict there and the influx of weapons and fighters, would lead to a resurgence for al-Qaeda in Iraq. That group, which had been defeated in Iraq by U.S. forces allied with Sunni tribes, did make a resurgence last year, when it broke with al-Qaeda, changed its name to the Islamic State and conquered huge swaths of Iraq and Syria.

    “These documents are jaw-dropping,” said Judicial Watch president Tom Fitton. “If the American people had known the truth – that Barack Obama, Hillary Clinton and other top administration officials knew that the Benghazi attack was an al-Qaeda terrorist attack from the get-go – and yet lied and covered this fact up – Mitt Romney might very well be president.”

    Messages to the White House, the State Department and Clinton’s campaign spokesman were not immediately answered.

    Salwa Bugaighis carries a wreath with a photo of U.S. Ambassador Chris Stevens as she and others pay their respects to the victims of an attack on the U.S. consulate, on Sept. 17, 2012, in Benghazi, Libya. Stevens and three other Americans were killed on Sept. 11 during the attack.Salwa Bugaighis carries a wreath with a photo of U.S. Ambassador Chris Stevens as she and others pay their respects to the victims of an attack on the U.S. consulate, on Sept. 17, 2012, in Benghazi, Libya. Stevens and three other Americans were killed on Sept. 11 during the attack. (Photo: Mohammad Hannon, AP)
    Fullscreen
    Salwa Bugaighis carries a wreath with a photo of U.S. Ambassador Chris Stevens as she and others pay their respects to the victims of an attack on the U.S. consulate, on Sept. 17, 2012, in Benghazi, Libya. Stevens and three other Americans were killed on Sept. 11 during the attack. Libyan military guards check a burned-out building at the U.S. consulate in Benghazi on Sept. 14, 2012. Glass, debris and overturned furniture are strewn inside a room at the U.S. Consulate in Benghazi, Libya, on Sept. 12, 2012, a day after the attack. A man walks through a damaged room. A man investigates the inside of the U.S. consulate. A person looks at a destroyed vehicle at the entrance of the American consulate building. An empty bullet casing lies on the ground near a destroyed vehicle. A man looks at documents at the U.S. consulate. People inspect the destroyed consulate. A man walks past the U.S. consulate. A building was burned during the attack. A destroyed car rests outside a burned building at the U.S. consulate. Vehicles belonging to Libyan investigators’ cars are parked in front of the U.S. consulate on Sept. 15, 2012.
    Next Slide
    The Benghazi attack occurred less than two months before Obama’s bid for reelection in a tight race against Romney. The White House and State Department at first blamed the attack on protests to an anti-Islam film that sparked protests across the Muslim world, but later admitted there was no protest in Benghazi before the attack.

    Administration officials later said conflicting information, including false media accounts, caused a delay of more than a week to identify the attack as pre-planned act of terrorism. Conservative critics have charged that information was withheld to preserve Obama’s claims at campaign events that al-Qaeda was “on the run.”

    “These documents show that the Benghazi cover-up has continued for years and is only unraveling through our independent lawsuits,” Fitton said. “The Benghazi scandal just got a whole lot worse for Barack Obama and Hillary Clinton.”

    A bipartisan Senate Intelligence Committee said in January 2014 that talking points used by then-U.S. Ambassador to the United Nations Susan Rice in Sunday talk shows after the attack contained erroneous information, although they reflected what the intelligence community believed at the time.

    Oren Dorell, USA TODAY 8:26 a.m. EDT May 19, 2015

    Find this story at 19 May 2015

    Copyright usatoday.com

    Military intel predicted rise of ISIS in 2012, detailed arms shipments from Benghazi to Syria

    Seventeen months before President Obama dismissed the Islamic State as a “JV team,” a Defense Intelligence Agency report predicted the rise of the terror group and likely establishment of a caliphate if its momentum was not reversed.

    While the report was circulated to the CIA, State Department and senior military leaders, among others, it’s not known whether Obama was ever briefed on the document.

    The DIA report, which was reviewed by Fox News, was obtained through a federal lawsuit by conservative watchdog Judicial Watch. Documents from the lawsuit also reveal a host of new details about events leading up to the 2012 Benghazi terror attack — and how the movement of weapons from Libya to Syria fueled the violence there.

    The report on the growing threat posed by what is now known as the Islamic State was sent on Aug. 5, 2012.

    The report warned the continued deterioration of security conditions would have “dire consequences on the Iraqi situation,” and huge benefits for ISIS — which grew out of Al Qaeda in Iraq.

    “This creates the ideal atmosphere for AQI (Al Qaeda in Iraq) to return to its old pockets in Mosul and Ramadi,” the document states, adding “ISI (Islamic State of Iraq) could also declare an Islamic state through its union with other terrorist organizations in Iraq and Syria, which will create grave danger in regards to unifying Iraq and the protection of its territory.”

    ISIS would, in June 2014, go on to declare a caliphate in territory spanning Iraq and Syria, in turn drawing more foreign fighters to their cause from around the world.

    CLICK TO READ THE DOCUMENTS GIVEN TO JUDICIAL WATCH FROM THE DEFENSE DEPARTMENT AND STATE DEPARTMENT.

    Also among the documents is a heavily redacted DIA report that details weapons operations inside Libya before the 2012 terror attack in Benghazi. The Oct. 5, 2012 report leaves no doubt that U.S. intelligence agencies were fully aware that lethal weapons were being shipped from Benghazi to Syrian ports.

    The report said: “Weapons from the former Libya military stockpiles were shipped from the Port of Benghazi, Libya to the Port of Banias and the Port of Borj Islam, Syria. The weapons shipped during late-August 2012 were Sniper rifles, RPG’s, and 125 mm and 155 mm howitzers missiles.”

    Current and former intelligence and administration officials have consistently skirted questions about weapons shipments, and what role the movement played in arming extremist groups the U.S. government is now trying to defeat in Syria and Iraq.

    In an interview with Fox News’ Bret Baier broadcast May 11, former Acting CIA Director Michael Morell, deflected questions:

    Baier: Were CIA officers tracking the movement of weapons from Libya to Syria?

    Morell: I can’t talk about that.

    Baier: You can’t talk about it?

    Morell: I can’t talk about it.

    Baier: Even if they weren’t moving the weapons themselves, are you saying categorically that the U.S. government and the CIA played no role whatsoever in the movement of weapons from Libya …

    Morell: Yes.

    Baier: — to Syria?

    Morell: We played no role. Now whether we were watching other people do it, I can’t talk about it.

    While the DIA report was not a finished intelligence assessment, such Intelligence Information Reports (IIRs) are vetted before distribution, a former Pentagon official said.

    The October 2012 report may also be problematic for Hillary Clinton, who likewise skirted the weapons issue during her only congressional testimony on Benghazi in January 2013. In an exchange with Sen. Rand Paul, R-Ky., who is now a Republican candidate for president, the former secretary of state said, “I will have to take that question for the record. Nobody’s ever raised that with me.”

    Referring to Fox News’ ongoing reporting that a weapons ship, Al Entisar, had moved weapons from Libya to Turkey with a final destination of Syria in September 2012, Paul responded, “It’s been in news reports that ships have been leaving from Libya and that they may have weapons.” He asked whether the CIA annex which came under attack on Sept. 11, 2012 was involved in those shipments.

    Clinton answered: “Well, senator, you’ll have to direct that question to the agency that ran the annex. I will see what information is available.”

    In a follow-up letter, the State Department Office of Legislative Affairs provided a narrow response to the senator’s question, and did not speak to the larger issue of weapons moving from Libya to Syria.

    “The United States is not involved in any transfer of weapons to Turkey,” the February 2013 letter from Thomas B. Gibbons, acting assistant secretary of state for legislative affairs, said.

    Heavily redacted congressional testimony, declassified after the House intelligence committee Benghazi investigation concluded, shows conflicting accounts were apparently given to lawmakers.

    On Nov. 15 2012, Morell and Director of National Intelligence James Clapper testified “Yes” on whether the U.S. intelligence community was aware arms were moving from Libya to Syria. This line of questioning by Republican Rep. Devin Nunes, who is now the intelligence committee chairman, was shut down by his predecessor Mike Rogers, R-Mich., who said not everyone in the classified hearing was “cleared” to hear the testimony, which means they did not have a high enough security clearance.

    An outside analyst told Fox News that Rogers’ comments suggest intelligence related to the movement of weapons was a “read on,” and limited to a very small number of recipients.

    Six months later, on May 22, 2013, Rep. Mac Thornberry, R-Texas, now chairman of the House Armed Services Committee, asked if the CIA was “monitoring arms that others were sending into Syria.” Morell said, “No, sir.”

    The Judicial Watch documents also contain a DIA report from Sept. 12, 2012. It indicates that within 24 hours of the attack that killed Ambassador Chris Stevens, Foreign Service Officer Sean Smith, and former Navy SEALs Tyrone Woods and Glen Doherty at the CIA annex, there were strong indicators that the attack was planned at least a week in advance, and was retaliation for a June 2012 drone strike that killed an Al Qaeda strategist — there is no discussion of a demonstration or an anti-Islam video, which were initially cited by the Obama administration as contributing factors.

    “The attack was planned ten or more days prior to approximately 01 September 2012. The intention was to attack the consulate and to kill as many Americans as possible to seek revenge for the US killing of Aboyahiye (Alaliby) in Pakistan and in memorial of the 11 September 2001 attacks on the World Trade Center buildings.”

    The DIA report also states a little-known group, “Brigades of the Captive Omar Abdul Rahman,” claimed responsibility, though the group has not figured prominently in previous congressional investigations. The document goes on to say the group’s leader is Abdul Baset, known by the name Azuz, “sent by (Al Qaeda leader Ayman al-Zawahiri) to set up Al Qaeda bases in Libya.”

    “The Obama administration says it was a coincidence that it occurred on 9/11. In fact, their intelligence said it wasn’t a coincidence and in fact specifically the attack occurred because it was 9/11,” Judicial Watch President Tom Fitton told Fox News.

    Catherine Herridge is an award-winning Chief Intelligence correspondent for FOX News Channel (FNC) based in Washington, D.C. She covers intelligence, the Justice Department and the Department of Homeland Security. Herridge joined FNC in 1996 as a London-based correspondent.

    By Catherine HerridgePublished May 18, 2015FoxNews.com

    Find this story at 18 May 2015

    ©2015 FOX News Network, LLC.

    “I couldn’t help but be surprised”: These Vietnam-era dirty tricks will shock you

    The true story of how CIA infiltrated the National Student Association is even worse than we thought. Here’s why

    At this point in our history, most Americans are quite familiar with the Central Intelligence Agency’s habit of being creative with (or, depending on your ideological leanings, outright contemptuous of) the rule of law. But although it was certainly the case by the late 1960s that Americans were beginning to look askance on their government like never before, a bombshell report from Ramparts Magazine in 1967, which found that the CIA had infiltrated and co-opted the National Student Association (NSA), still came to many as a shock. In a post-”enhanced interrogation” world, that might seem a little quaint; but a better angle might be to see it as a warning, unheeded, of worse things to come.

    The CIA’s relationship with the NSA has not been as widely remembered as other government scandals of the era, but in her new book “Patriotic Betrayal: The Inside Story of the CIA’s Secret Campaign to Enroll American Students in the Crusade Against Communism,” political scientist and the American Prospect contributing editor Karen Paget shows that there’s much about the CIA’s meddling with the NSA that we still don’t fully grasp. Moreover, what Paget found after years of meticulous research is that much of what we’ve been told about the controversy in the decades since has been incomplete — or outright untrue.

    Recently, Salon spoke over the phone with Paget to discuss the NSA, the CIA’s involvement, and how the relationship between the two organizations evolved with and reflected the changing currents of the Cold War. Our conversation is below and has been edited for clarity and length.

    Can you tell me a little bit about what the USNSA was and what kind of work they did? What kind of person was drawn to that organization?

    It was founded in 1947 and it was structured so that student governments belonged to the National Student Association, not individual students on campus. That was very deliberate in its founding because anti-Communist attitudes were very crucial in the formation of the NSA. It claimed, however, to speak for all American students. Probably between 400 and 1,000 of any given year attended huge NSA congresses which mimicked political party conventions and where both domestic and international issues were debated, where the officers were elected.

    NSA presented itself as kind of an exemplar of student self-government, which was sort of new after the war. There were many colleges and universities that didn’t have a student government, including Yale, as a matter of fact. I think from ’47 to ’67, one thing that was true for just about all generations is how exciting it was to meet people from other parts of the country. Remember, no social media, no cell phones; most people didn’t read the New York Times; you didn’t really have access to other American students and very few people had access to foreign students. You find people talking about how exciting it was.

    This was also a period of time in which very smart people were attracted to student government. Many of the people that I listened to in the mid-60s were unbelievable orators; if you made a list of the people that came out of NSA, many of them would be familiar to younger generations even today — Barney Frank, or the journalist Jeff Greenfield — so these annual gatherings were a real induction into political debate on the issues of one’s time. The composition of the delegations changed over time. One fact very salient to the unfolding of this story is that just after World War 2, 50 percent of all students on campus were returned veterans, so that made it a very unique student population.

    What was it about this organization that also drew the CIA’s attention?

    The very simple answer is that the Soviets were interested in students. In fact, the National Student Association was really created in response to an international event, which was the 1946 founding of the International Union of Students based in Prague. At that point, IUS represented about 70 countries and it was very broadly based. Most European unions joined and there was a big debate over whether it was Communist-dominated because of the location— although Czechoslovakia was not then a Communist country.

    There was an American delegation that attended in 1946 but it was ad-hoc, drawn from both campuses and other student and youth groups. They were very diverse, politically, from the left to the center to even some of the conservative Catholics, but the one thing that they could agree on was that if American students were to have any influence in this organization they had to found a national student organization of their own.

    So the story really starts well before the actual founding of the USNSA?

    I tried for almost five years to start the story in 1947 — I thought it was logical because that’s when the Constitutional Convention was held and that’s when the CIA was founded— but I kept seeing all these hidden hands. At that point, I knew I had to knit everything backwards, which I did do. To foreshadow a much more complicated story, I think the sheer number of agencies and organizations behind the scenes prior to the formation of the NSA is stunning: it ranges from the American Catholic Bishops to the Vatican to the State Department to multiple intelligence agencies.

    I would also distinguish this early period from the covert operation that was run through and with NSA. Initially, the CIA had determined that covert actions were outside the charter that Congress had granted them. The first covert office was not really up and running until 1948, and then over the next few years the relationship with NSA became more and more clandestine; more and more secret; more and more formal, and then it grows and morphs into many different operations.

    How much did the student members of the NSA know that they were working with the CIA?

    There were absolutely two distinct groups of NSA students. The people who worked consciously, knowingly, with the CIA were made witting. Students who were going to fill the roles that the CIA wanted filled within the NSA were recruited through different means and each person underwent this ritual where any person who had passed the security background examination was either taken out to some posh place, usually with a former NSA person who had gone inside the agency to be a career staff, often helping to oversee the relationship.

    Let’s just say they were an elected officer; they were told that there were aspects of their new position that were important to the United States government and the older NSA person would say, I’d like to tell you about those aspects. Neither I nor most of the students who entered this way knew why the US government was interested, didn’t know what they were going to learn, but after they signed, they learned that the CIA funded and ran the international program of the United States National Student Association. Anyone who crossed that boundary not only knew but reported to a CIA case officer, had code names, reporting requirements, and ops meetings.

    Could you be a higher-up in the NSA and not be brought into the fold?

    There were such people; I can’t say for sure but it looks like most of the people had something in their background that made the agency balk at making them witting. The president was always made witting and the international affairs vice-president was always made witting. In 1967, as part of the constructed cover-up, the agency tried to say they only made two officials witting but that is misleading. The word “officials” means elected officials, because by then there was a large international staff and there were overseas NSA representatives.

    You were made witting if you were those elected positions but you could be recruited by several other mechanisms. One was in 1953, a six-week seminar called the International Student Relations Seminar. People were very carefully selected for that seminar and while they were learning about international student politics in eye-glazing detail they were undergoing background security investigations.

    At the end of the summer, a number of the students would be offered jobs on the international side of NSA, which is what happened with my husband; he did not know anything about the CIA or the U.S. government when he took the job. To my surprise, there were also career agents— particularly in the 60s— that came out of Langley headquarters and became NSA overseas representatives. Part of the explanation for that is that NSA was operating on so many continents and so many countries in the 60s, and it was such a time of seething anti-colonial sentiment that they were just desperate for students who could operate.

    Some of the officers were only involved for the one year that they were elected officials of the NSA. Others spent five years with the agency because if you did that, apart from basic training, you got an exemption from the draft. That had great meaning during the Korean War, as several former participants explained to me. They said, look, it kept me out of Korea! Others still stayed far longer and became career officers.

    Is there any truth to the various explanations given by the government of the CIA’s operations within the NSA?

    The cover story that was constructed in 1967, which has four crucial elements. One of them is essentially a denial that these were operations. The claim people still try to stick to is that the CIA just gave NSA “a few travel grants” but I don’t think you can read this book and conclude that that was the case. A lot of the agents argued that they never exercised any control over the students, but that’s a complicated question. Most participants were hardened Cold Warriors who, once they learned of it, were true believers in the anti-Communist cause.

    In terms of the construction of a cover-up in ’67, the third was that they never compromised the independence of NSA; again, I don’t think you can read this book and come to that conclusion. They always claimed that there was Presidential approval of these operations but the evidence is mixed and I now have declassified documents that show how the State Department, the CIA, and the White House all scrambled to find that Presidential authority in 1967 — and they could not find specific authority in any of their files. The then-Senator from New York, Robert F. Kennedy, saved them by coming out and saying that all the past presidents had approved, but he had no way of knowing that, really. He himself was an advocate of these kinds of operations so he did have first-hand information about NSA and had met, in fact, with some of their officers during that time.

    What I’m trying to say is that the critical elements of the cover story are absolutely refuted by this book.

    Why has it been so difficult for you to find information from this time period? Why is there still a desire to sweep this under the rug?

    There are two different answers. One is this claim that the documents would reveal sources and methods, which is a generic national security claim. I found three 1948 reports that had been reclassified in 2001 and it took nine years to get two of the three declassified. There was just nothing in them… The two that got declassified were about what the “bad boys” were doing to us and the one that didn’t get declassified a second time I think was about what we were doing to the bad guys. In that broad-brush national security claim, there is a lot of instinct to protect people or to not be embarrassed.

    There is also a grey area, as one of the career people said to me; it’s not clear these were legal operations. His first reaction was, how can they possible be legal? since the agency was forbidden to operate domestically. He found people inside the agency defensive about the question and finally concluded that it was definitely a grey area.

    What criticism did you hear about the CIA’s operations from NSA members?

    The early Cold Warriors, up to the mid- to late 50′s are pretty unambiguous about still supporting what they did, but they don’t particularly look at the strategies. When you get into the time between ’58 and ’67, these are the participants who offer a much more nuanced and often devastatingly critical analysis of the strategies they used, even if they might defend their attempt. It’s a distinction between motivation and consequences.

    For example, one of the people who surprised me the most was one of the two people that was involved in making me witting: Robert Kiley. However much he might have believed in the Algerian revolutionaries’ right to self-determination, he said specifically that none of those people amounted to a hill of beans. He also criticized the policy of not having any contact with the Communist international organization; he actually said that he felt it was a truly paranoid view within the agency.

    There was a massive amount of intelligence reporting that came into the agency from specific countries or the International Student Conference, but who else in the agency besides the Covert Action Unit got to see all this reporting? Where did those reports go? That really bothers a lot of participants because nobody knows. It deeply troubles them.

    Did you have assumptions about the program that became complicated by your research?

    I didn’t really have too many assumptions because my knowledge was very rough-hewn. I knew it wasn’t what people said in 1967 who were defending the agency; I knew there was more to it, but I didn’t know what the more to it meant. Absolutely critical to my process is this ginormous collection of international NSA papers at the Hoover Institute at Stanford University…

    I couldn’t help but be surprised at the high-level attention the CIA gave; there is a declassified memo that detailed the conservative influence in the National Student Association in the early 60s when the Young Americans for Freedom was formed. First they tried to take over NSA and then they tried to destroy it by having campus-by-campus disaffiliation votes. This was the highest levels of the CIA worrying about the conservatives, and the reason they were so concerned is that it was crucial for international credibility that NSA always be able to speak int he name of American students.

    FRIDAY, APR 3, 2015 02:00 PM +0200
    ELIAS ISQUITH Follow

    Find this story at 3 April 2015

    Copyright © 2015 Salon Media Group, Inc.

    When the Student Movement Was a CIA Front

    The CIA’s manipulation of the National Student Association foreshadowed other forms of Cold War blowback that compromised democracy at home.

    This book review appears in the Winter 2015 issue of The American Prospect magazine. Subscribe here.
    Patriotic Betrayal: The Inside Story of the CIA’s Secret Campaign to Enroll American Students in the Crusade Against Communism
    By Karen M. Paget
    552 pp. Yale University Press $35

    In its March 1967 issue, Ramparts, a glossy West Coast muckraking periodical that expired in 1975, and that strongly opposed American involvement in the war in Vietnam, published an exposé of the close relationship between the Central Intelligence Agency and the National Student Association. This other NSA—not to be confused with the National Security Agency—was then the leading American organization representing college students, with branches on about 400 campuses. Its ties with the CIA were formed in the early years of both institutions following World War II, as the Cold War was getting under way.
    According to Ramparts, the CIA had been providing much of the funding for the NSA through various “conduits.” NSA officers, many of them wittingly, had served the interests of the CIA by participating actively in international youth and student movements. The NSA’s activities were financed by the Agency both to counter communist influence and also to provide information on people from other countries with whom they came in contact. The disclosures about the CIA’s ties to the NSA were the most sensational of a number of revelations in that era that exposed the Agency’s involvement in such institutions as the Congress for Cultural Freedom; the International Commission of Jurists; the AFL-CIO; Radio Free Europe; and various leading philanthropic foundations. Karen Paget’s new book, Patriotic Betrayal, is the most detailed account yet of the CIA’s use of the National Student Association as a vehicle for intelligence gathering and covert action. (See author’s endnote.)

    With the passage of half a century, it may be difficult to understand why so many political and cultural organizations, led by individuals with a generally liberal or leftist outlook, covertly collaborated with the CIA in the 1950s and first half of the 1960s, before exposés in Ramparts and other publications put an end to most such arrangements. After all, many of the activities of the Agency in that era are among those that we now regard as particularly discreditable. These include the CIA’s cooperation with the British intelligence services in overthrowing the democratically elected government of Iranian Prime Minister Mohammed Mossadegh in 1953; its cooperation with the United Fruit Company in overthrowing the democratically elected government of Guatemalan President Jacobo Arbenz in 1954; and its cooperation with the Republic of the Congo’s former colonial rulers, the Belgians, in overthrowing the country’s newly elected prime minister, Patrice Lumumba, in 1960.

    Several factors seem to me to have played a part. Press reporting on these events in that era tended not to focus on the role of the CIA. It was only years later, after the Senate’s 1975-1976 Church Committee investigations, after long-after-the-fact investigations by journalists and scholars, and after the mid-1980s development of the National Security Archive and its extensive and effective use of the Freedom of Information Act, that many otherwise well-informed Americans grasped the role of the CIA in these events.

    It was a struggle that had to be won, not only on the military battlefield, but also in intellectual and ideological combat with the communists.
    Also during the 1950s and the 1960s, the CIA, paradoxically, was the federal agency that seemed most ready to enlist liberals and leftists in its activities. In contrast, the State Department, which had been the main target of Senator Joseph McCarthy’s attacks on those he accused of being communist sympathizers, probably would not have risked involvement with many of the young people who collaborated with the CIA. Above all, there was the atmosphere created by the Cold War. It was a struggle that had to be won, not only on the military battlefield, but also in intellectual and ideological combat with the communists.

    Finally, it may be that covert activities had their own appeal. Those who were in on the secret were an elite, deriving satisfaction comparable to that provided by membership in an exclusive club.

    This was also a period in which many other Americans with similar views collaborated with the Federal Bureau of Investigation, the CIA’s counterpart in the domestic intelligence field. In this era, the Bureau relied extensively on informers to accumulate its vast dossiers on the political associations and personal lives of millions of Americans. When I was executive director of the American Civil Liberties Union in the 1970s, we discovered through documents we obtained under the Freedom of Information Act that three officials of the ACLU in the 1950s had given the FBI information on others within the ACLU they suspected of being communists. They seem to have rationalized their conduct, at least in part, on the basis that cooperation with the FBI would help protect the ACLU against irresponsible congressional investigative bodies such as the House Un-American Activities Committee. The FBI’s COINTELPRO, a program the Bureau established secretly in 1956 to foster jealousies and feuds in organizations whose activities the Bureau wished to disrupt, depended in part on its ability to collect personal data from informers within those organizations. The atmosphere created by the Cold War, in which the FBI and its allies in Congress and the media portrayed domestic subversives allied with foreign enemies as being the greatest threat to the United States, probably played a large part in persuading so many Americans to act as informers.

    A number of young CIA collaborators who figure in Paget’s story later achieved prominence. One of the book’s virtues is that we get a clear picture of how well-educated and successful young Americans got involved in clandestine activities, and how they conducted themselves. But a frustrating aspect of the book is that, in most cases, Paget does not mention their subsequent careers. At least one leading academic figure’s undisclosed youthful relationship with the CIA could be considered relevant to his later published work.

    One of those collaborators Paget discusses is Allard Lowenstein, president of the NSA from 1950 to 1951, who became a leading civil rights and anti-war activist, a one-term member of Congress, and the organizer of the “Dump Johnson” movement that helped deter President Lyndon Johnson from running for re-election in 1968. A charismatic figure, he inspired many others to become activists in the causes that mattered to him. In 1980, Lowenstein was assassinated in his office by a deranged gunman who had become obsessed with him. Though some have previously speculated that Lowenstein initiated the NSA relationship with the CIA, Paget’s research does not support this view. She finds that he may have obstructed such a relationship, and, if it took place when he was a leader of the NSA, he was probably not aware. Following the Ramparts disclosures, when 12 former presidents of the NSA issued a press release defending the covert relationship with the Agency, Lowenstein did not sign. Among those rumored or confirmed to have covertly collaborated with the CIA, Lowenstein stands out in Paget’s book as the principal figure whom she clears of suspicion.

    In discussing Robert Kiley, who was vice president of the NSA from 1957 to 1958, Paget never mentions that he eventually became a leading figure in urban transit, heading New York City’s Metropolitan Transportation Authority and then, on the other side of the Atlantic, heading London Regional Transport. Paget discusses only how Kiley as a student leader cooperated closely with the CIA and subsequently went to work directly for the Agency, playing a leading role in identifying Africans who might collaborate with it. During his tenure on the CIA staff, in which he rose to become an aide to Director Richard Helms, Kiley helped manage the relationship with the student organization of which he had previously been an officer, sometimes in what seems a heavy-handed way.

    Of those mentioned by Paget as knowing participants in the relationship between the NSA and the CIA, the most lustrous name is that of Gloria Steinem. Her connection has long been known. She acknowledged it following the disclosures by Ramparts. Steinem then told Newsweek: “In the CIA, I finally found a group of people who understood how important it was to represent the diversity of our government’s ideas at Communist festivals. If I had the choice, I would do it again.” Operating through a CIA front organization, established in cooperation with former NSA officers, Steinem recruited young Americans to participate in the 1959 communist-organized World Youth Festival in Vienna, and did the same a couple of years later when another such festival was held in Helsinki. Apparently, she did her job well, choosing American participants who were very effective in countering the communists. To her credit, Steinem, unlike several others, was candid; and this history hardly implicates the CIA in the rise of feminism.

    Paul Sigmund, a longtime professor of politics at Princeton, died last April at the age of 85. He was particularly known for his many books and articles on Latin America, especially Chile. Sigmund wrote extensively about the overthrow of the Salvador Allende regime in Chile, which brought General Augusto Pinochet to power. In a lengthy article in the January 1974 Foreign Affairs, he attributed the September 1973 coup to Allende’s misdeeds. He argued: “What [the Allende government] cannot do is blame all its problems on foreign imperialists and their domestic allies, and ignore elementary principles of economic rationality and effective political legitimacy in its internal policies. No amount of foreign assistance can be a substitute for these, and no amount of foreign subversion or economic pressure can destroy them if they exist.”

    According to Paget, Sigmund collaborated with the CIA over a period of several years. His role included drafting a plan for a six-week summer seminar conducted by a front group through which the Agency could screen other students who might be enlisted in its activities. (Sigmund’s relationship to the CIA had come to light in the wake of the Ramparts exposé, but he did not cite it years later when he wrote about these events in which the CIA played a leading role.) Paget, though, does not mention Sigmund’s subsequent career. She interviewed him and says, “He explained his willingness to cooperate with the CIA in pragmatic terms: ‘It kept me out of Korea.’” Whatever his motivations, the question arises whether Sigmund’s relationship to the Agency in the 1950s affected his subsequent scholarly work. We learned a long time ago that the Nixon administration primarily relied on the CIA to promote the overthrow of Allende. Should the professor of politics at Princeton have acknowledged his own past relationship with the CIA in an essay rebutting allegations of a central U.S. role in what happened in Chile? How would such a disclosure have affected reader assessment of his Foreign Affairs essay and his other writing on the subject?

    Among the other NSA leaders named by Paget who subsequently became prominent are James P. Grant, the longtime and widely admired executive director of UNICEF who died in 1995; James Scott, professor of political science and anthropology at Yale who is highly regarded for his writing on Southeast Asia; Crawford Young, professor of political science at the University of Wisconsin and well-known scholar of African studies; Luigi Einaudi, an American diplomat who served as acting secretary general of the Organization of American States; and Duncan Kennedy, professor of law at Harvard, whose emergence as a leading critical theorist is mentioned by Paget and who has been open about his onetime association with the CIA.

    Should disclosure of such relationships be considered obligatory for those who present themselves as independent scholars? Certainly, it should be incumbent on someone like Sigmund to disclose his covert connection to the CIA. Even if that relationship was long past, writing an essay exculpating that agency from a charge of subversion without such disclosure raises ethical issues.

    Aside from whether such persons should subsequently disclose that they once had a covert connection to the CIA, there is the question of whether it was appropriate to enter into such a relationship in the first place. Certainly, there was an idealistic component. Countering communism, I believed at the time and still do today, was the right thing to do. Yet doing so by covertly manipulating domestic organizations compromised American freedom of association. This contradiction, as more and more students came to oppose the Vietnam War, led to the eventual rupture of the NSA and its CIA patrons.

    We don’t know how the constituents of the NSA would have felt about their officers’ secret relationship with the CIA. What we can surmise, however, is that some would have been strongly opposed. The NSA’s members could not debate whether to enter into the relationship, and those opposed could not express their views because they were not in on the secret. Disclosure would have killed the program. Whatever one thinks about the importance of having had such means to wage the battles of the Cold War, it seems difficult to justify the deception that was central to its operation.

    Author’s Note: I was not shocked by the disclosures in Ramparts. Though I lacked definite information, I had been generally aware that there was a relationship between the CIA and the NSA. In 1957, as a student at Cornell, I became national president of the Student League for Industrial Democracy, a small organization with a social democratic bent that had chapters on several college campuses. Paget describes SLID as “fiercely anticommunist.” Yes, but we were also civil libertarians and vigorously opposed the college bans on communist speakers prevalent in that era. In 1959, I took the lead in relaunching SLID as Students for a Democratic Society, but I soon lost influence in SDS to Tom Hayden and others, who took it in a more radical direction. These activities put me in contact with some leaders of the NSA named by Paget. Though I did not know who wittingly collaborated with the Agency, I recall being quite sure that the Foundation for Youth and Student Affairs, the main source of funding for the NSA, was a CIA front.

    As Karen Paget notes in her “Acknowledgments,” her early work on this book was supported by a fellowship from the Open Society Institute when I was its president.

    ARYEH NEIER APRIL 14, 2015

    Find this story at 14 April 2015

    Copyright prospect.org

    A Friend of the Devil Inside a famous Cold War deception.

    Consider the following strategic dilemma. You are a superpower that hopes to convert other nations to principles you hold vital—these might be individual liberty, private property, and free markets. There is another superpower out there that is hoping to do the same thing, to persuade other nations to embrace its principles—for example, social equality, state ownership, and centralized planning.

    One day, you realize that this rival superpower has been busy creating international organizations and staging world congresses and festivals in the name of peace and democracy, and inviting people from other nations to participate.

    These organizations and festivals are fronts. Their membership, their programs, and the political positions they enthusiastically adopt are all clandestinely orchestrated by the rival superpower, which is pumping large amounts of money into them. What’s more, in your view that rival superpower is not a peace-loving democracy at all. It’s a totalitarian regime. Yet its slogans attract unwary writers and artists, intellectuals, students, organized labor—people who believe in world peace and international coöperation.

    You believe in those things, too. But you think that the slogans are being used to advance your rival’s interests, one of which is to rob you of your superpowers. What do you do? Doing nothing is not an option. Remember, you are a superpower.

    The obvious response is to create your own international organizations and sponsor your own world congresses and festivals, and use them to promote your interests. Sadly, however, you cannot do this in a public and transparent way. For it happens that your citizens are not all that taken with the ideals of world peace and international coöperation, and they would not be pleased to see you spend their tax dollars to support the kind of people who advance that agenda. They would prefer to see their tax dollars spent on defense. In fact, they would prefer for there to be no tax dollars at all.

    There is also the problem that one of your principles as a superpower is the belief that governments should not interfere with the activities of voluntary associations, such as writers’ congresses and student groups. You don’t believe in fronts. This is a key point of difference between you and your rival superpower. So your hands appear to be tied.

    Unless you could do it all in secret. Suppose you directed taxpayer dollars through back channels, disguised as gifts from private benefactors and foundations, to organizations that operated internationally, and that reached out to groups in other countries in the name of the principles you believe in. You would want to be sure that the people running those organizations either didn’t know where the money was coming from or could be trusted to keep it a secret. You might need to pull strings occasionally to get the right people in charge and the right positions enthusiastically adopted.

    Wouldn’t that be like creating fronts? Sort of. But here’s the thing: fundamentally, everyone would be on the same page. They just might not be knowingly on the same page. No one would be forced to do or say anything. After you succeeded in stripping your rival of its superpowers, there would no longer be a need for secrecy. Until that day arrived, however, national security might demand this tiny bite out of the principle of transparency. The only people who could object would be people who were already on the wrong side.

    After the Second World War, our superpower solved this dilemma in exactly this way and on exactly this line of reasoning. From the more or less official start of the Cold War, Harry Truman’s speech to Congress in March, 1947, announcing his policy “to support free peoples who are resisting attempted subjugation by armed minorities or by outside pressures”—that is, Communist aggression—the United States created fronts and secretly infiltrated existing nongovernmental organizations in order to advance American interests abroad.

    Almost exactly twenty years after Truman’s speech, in February, 1967, the government’s cover was spectacularly blown by a college dropout. The dropout’s name was Michael Wood, and the operation he exposed was the C.I.A.’s covert use of an organization called the National Student Association. The revelation had a cascading effect, and helped to mark the end of the first phase of the Cold War.

    The C.I.A. had its eye on the N.S.A. from the start—both were born in 1947, a few months after Truman’s speech—and the relationship gained steadily in strength and intimacy until the day the secret became public. Its story is now told in detail for the first time, in Karen M. Paget’s “Patriotic Betrayal” (Yale).

    “Patriotic Betrayal” is an amazing piece of research. Paget has industriously combed the archives and interviewed many of the surviving players, including former C.I.A. officials. And Paget herself is part of the story she tells. In 1965, her husband, a student-body president at the University of Colorado, became an officer in the N.S.A., and, as a spouse, she was informed of the covert relationship by two former N.S.A. officials who had become C.I.A. agents.

    She was sworn to secrecy. The penalty for violating the agreement was twenty years. Paget describes herself back then as “an apolitical twenty-year-old from a small town in Iowa,” and she says that she was terrified. Fifty years later, she is still angry. She has channelled her outrage into as scrupulous an investigation of the covert relationship as the circumstances allow.

    One circumstance is the fact that a good deal of material is classified. Paget was able to fish up bits and pieces using the Freedom of Information Act. But most of the iceberg is still underwater, and will probably remain there. So there is sometimes an aura of vagueness around who was calling the tune and why.

    The vagueness was also there by design. It was baked into the covert relationship. There was a lot of winking and nodding; that’s what helped people believe they were on the same page. But it means that much of the history of what passed between the C.I.A. and the N.S.A. is irrecoverable. Still, “Patriotic Betrayal” is a conscientious attempt to take the full measure of an iconic piece of Cold War subterfuge.

    It’s a dense book. Readers will be glad for the three-page guide in the back to abbreviations and acronyms. (There are also nearly ninety pages of endnotes, with more references accessible online.) Organizationally, the N.S.A.-C.I.A. affair was quite complex. There were a number of quasi-independent parts—another reason, besides the secrecy, that it was hard to see what was really going on.

    The parts included the World Federation of Democratic Youth, or W.F.D.Y., a Soviet front organization created right after the war; the International Union of Students, or I.U.S., formed at a world congress of students in Prague in 1946, with a Czech Communist elected president; and the N.S.A. itself, which was founded at a student convention in Madison, Wisconsin, in 1947, in order to represent the United States in the I.U.S.

    The Madison convention also created an N.S.A. subcommittee on international affairs and gave it authority to deal with international issues. The key move was the separation of the main N.S.A. office, which was in Madison, from the international division, which was housed in Cambridge, Massachusetts. It was the Cambridge branch of the N.S.A. that received most of the C.I.A.’s funding and did most of the C.I.A.’s bidding. Madison was kept out of the loop.

    In 1948, there was a Communist coup in Czechoslovakia, a crucial event in the hardening of postwar relations. When the I.U.S. refused to condemn the coup, the N.S.A. withdrew and set about forming a rival group, the International Student Conference, or I.S.C. These two organizations, the I.U.S. and the I.S.C., became superpower proxies in the looking-glass war that was the Cold War. Through the N.S.A., the C.I.A. tried to orchestrate what happened in the I.S.C., just as the I.U.S. was responsive to the demands of the Kremlin.

    The N.S.A. was never a virgin. Paget reveals that, even before Prague, American students were subject to surveillance and scheming by three groups of grownups: the State Department, the F.B.I., and the Catholic Church. It can be forgotten how influential a role the Church’s highly disciplined anti-Communism played in Cold War affairs. The Holy Father took a personal interest in the danger of Communist infiltration of youth organizations, including the N.S.A.; the bishops kept a close eye on Catholic student leaders; and Catholics usually voted as a bloc in N.S.A. and I.S.C. meetings.

    The Pope’s anti-Communism was too rigid for the C.I.A. The agency also had little use for J. Edgar Hoover, with whom the Church collaborated in investigating students’ backgrounds, or for Senator Joseph McCarthy and his hunt for Communists in the government. Agency politics—or, rather, the politics of agency policies—were farther to the left.

    The N.S.A., for example, was a forthrightly liberal organization. Civil rights was part of the agenda early on. The N.S.A.’s second president (1948-49), James (Ted) Harris, was an African-American (and a Catholic). Its fourth president (1950-51) was the future civil-rights and antiwar activist Allard Lowenstein (not a Catholic). The N.S.A. helped found the Student Non-Violent Coordinating Committee, a principal organizer of the march from Selma that led to the passage of the Voting Rights Act, in 1965. And the N.S.A.’s politics were typical of most of the organizations in the C.I.A.’s covert network: they were socially progressive, anti-colonialist, and sometimes even socialist.

    One customary explanation is that the people who ran covert operations at the C.I.A. from 1947 to 1967 were not right-wing jingoists. They were liberal anti-Communists, veterans of Roosevelt’s Office of Strategic Services, the forerunner of the C.I.A. They were good guys who despised the Soviet Union as a traitor to progressive principles.

    If people held this belief about the C.I.A., the agency exploited it. C.I.A. officials used to tell N.S.A. students who were in the know—the agency’s term for them was “witting” (or “witty”)—that, while the State Department supported authoritarian dictatorships, the C.I.A. supported foreign students who were involved in democratic resistance and national liberation movements. This was supposed to make the N.S.A. students feel that they had bargained with the right devil.

    The students were being misled. The C.I.A. is part of the executive branch. Its director reports to the President; its operations and expenditures are subject to congressional oversight. The director of the C.I.A. during the nineteen-fifties, Allen Dulles, was the Secretary of State’s brother. The notion that the C.I.A. was running its own foreign policy, or that it was a “rogue elephant,” as one senator later called it, is absurd.

    After the revelations of the nineteen-sixties and seventies, when many of the C.I.A.’s undercover operations were exposed, people began talking about the agency as though it were some kind of underground cell, an organization with no accountability, up to its own dirty tricks. But a report on the C.I.A.’s covert operations made immediately after the 1967 revelations concluded that the agency “did not act on its own initiative.” In 1976, a more critical congressional report, which was never officially released, stated, “All evidence in hand suggests that the CIA, far from being out of control, has been utterly responsive to the instructions of the President and the Assistant to the President for National Security Affairs.”

    It’s true that the C.I.A. did not always fully inform Administrations about what it was up to, but the agency had reason to believe that there were some things Administrations preferred not to know. Deniability is a crucial ingredient of covert operations. The C.I.A. used the N.S.A. to further the policies of the American government. If it had been found doing anything contrary to the wishes of the President, its plug would have been pulled very fast.

    So what, exactly, was the N.S.A. useful for? This is where things get murky. According to Paget’s account, the N.S.A. was apparently not used for what the C.I.A. called “political warfare.” The agency did create a front organization called the Independent Research Service (inventing titles that are as meaningless as possible is part of the spy game) for the purpose of recruiting American students to disrupt Soviet-controlled World Youth Festivals in Vienna, in 1959, and Helsinki, in 1962. The person in charge was the future feminist Gloria Steinem, who knew perfectly well where the money was coming from and never regretted taking it. “If I had a choice I would do it again,” she later said.

    Cartoon
    “What is friendship if not constant amateurish psychoanalysis?”
    BUY THE PRINT »
    But that operation did not involve the N.S.A. Nor was the N.S.A. used only to promote American principles abroad, although that was part of the reason for funding it. The C.I.A. embedded agents in the N.S.A., and it worked behind the scenes to insure that pliable students got elected to run the association and that the desired policy positions got adopted. It took the extra precaution of starting up a covertly funded summer program, called the International Student Relations Seminar, and using it to groom future N.S.A. leaders. A number of N.S.A. members who went through the seminar went on to have careers at the agency.

    Essentially, the N.S.A. functioned as a glove that concealed the American government’s hand and allowed it to do business with people who would never knowingly have done business with the American government. These people thought that they were dealing with a student group that was independent of the government. They had no idea that the N.S.A. was a front.

    And what did this permit the C.I.A. to do? First, the N.S.A. was used as a cutout. The C.I.A. funnelled financial support to favored foreign-student groups by means of grants ostensibly coming from the N.S.A. Second, the N.S.A. was a recruitment device. It enabled the agency to identify potential intelligence sources among student leaders in other countries. And, third, N.S.A. members who attended international conferences filed written reports or were debriefed afterward, giving the C.I.A. a huge database of information.

    The C.I.A. did not buy into the adage that the student leader of today is the student leader of tomorrow. It calculated that the heads of national student organizations were likely some day to become important figures in their countries’ governments. When that happened (and it often did), the American government had a file on them. “Over time, witting staff reported on thousands of foreign students’ political tendencies, personality traits, and future aspirations,” Paget writes. “They submitted detailed analyses of political dynamics within foreign student unions and countries.”

    This may seem benign enough, but there was a problem. It had to do with the “State Department bad guys, C.I.A. good guys” routine. The State Department deals with nations with which the United States has diplomatic relations. Having diplomatic relations with a foreign government prohibits you from negotiating with, or acknowledging the legitimacy of, groups committed to that government’s overthrow. This is why it’s convenient to have an agency that operates clandestinely. The C.I.A. could cultivate relations with opposition groups secretly, and this permitted the American government to work both sides of the street.

    Paget thinks that, in some cases, the information the C.I.A. gathered about students who were political opponents of a regime may have ended up in the hands of that regime, which could then have used the information to arrest and execute its enemies. She suspects that this may have happened in several countries where the American government was involved in regime change, including Iraq, Iran, and South Africa.

    But it’s all speculation. There are no smoking guns in Paget’s book—no specific cases in which the C.I.A. made students’ names available to a foreign government. And the reason, of course, has to do with the classified material. No intelligence agency will ever release documents that reveal the identities of people with whom it had contacts. That information is at the very bottom of the iceberg.

    It’s odd that the relationship remained secret as long as it did. The N.S.A. was one of many organizations covertly funded by the C.I.A. Over the life of those relationships, hundreds of people must have been in the know. But until Michael Wood spilled the beans no one ever spoke up publicly. This is a testament to something: in the case of the N.S.A., the naïveté of the students; the arrogance of the grownups (at the C.I.A., N.S.A. students were referred to as “the kiddies”); the power of anti-Communism to trump every scruple.

    One thing it is not a testament to is the C.I.A.’s tradecraft. The evidence of the agency’s covert funding system was hidden in plain sight. The world got a peek in 1964, when a House of Representatives subcommittee ran an investigation into the tax-exempt status of philanthropic foundations. The committee had trouble getting information from the I.R.S. about a certain New York-based charitable foundation, the J. M. Kaplan Fund.

    The chair of the committee, a Texas congressman named Wright Patman, surmised that the reason the I.R.S. was not coöperating was that the C.I.A. was preventing it. Patman didn’t appreciate the disrespect; in retaliation, he made public a list of eight foundations that, between 1961 and 1963, had given almost a million dollars to the J. M. Kaplan Fund.

    “PATMAN ATTACKS ‘SECRET’ C.I.A. LINK: Says Agency Gave Money to Private Group Acting as Its Sub-Rosa ‘Conduit’ ” was the headline in the Times, which published the names of the eight “conduit” foundations. After a closed-door meeting with representatives from the C.I.A. and the I.R.S., Patman emerged to announce that if there was a C.I.A. connection it was no longer of interest to his subcommittee, and that he was dropping the matter.

    But the cat was partway out of the bag. As their transparently invented names suggest—the Gotham Foundation, the Borden Trust, the Andrew Hamilton Fund, and so on—these eight foundations were C.I.A. cutouts. The agency had approached wealthy people it knew to be sympathetic and asked them to head dummy foundations. Those people were then put on a masthead, a name for the foundation was invented, sometimes an office was rented to provide an address, and a conduit came into being. The members of the phony boards even held annual meetings, at which “business” was discussed, expenses paid by the agency.

    The dummy foundations were used to channel money to groups the agency wanted to support. Sometimes the C.I.A. passed funds through the dummies to legitimate charitable foundations, like the Kaplan Fund, which in turn passed it along to groups like the National Student Association. Sometimes the cutouts existed solely to write checks to the C.I.A.’s beneficiaries.

    The C.I.A.’s name did not appear anywhere. The giveaway was the dollar-for-dollar equivalence of the amount received from the dummy and the amount granted to the target group. If the expenses side of Kaplan’s books showed a two-hundred-thousand-dollar grant to the N.S.A., the income side would show a two-hundred-thousand-dollar donation from one of the agency’s dummy foundations.

    The Times published an editorial saying that “the practice ought to stop. . . . The use of Government intelligence funds to get foundations to underwrite institutions, organizations, magazines and newspapers abroad is a distortion of C.I.A.’s mission on gathering and evaluating information.” In 1966, the paper ran a series of articles on the C.I.A.’s spying operations, in which it revealed that the C.I.A. was funding the Congress for Cultural Freedom and its many European-based magazines. The paper also reported that the agency had funded some American academics when they travelled abroad. The C.I.A. seems to have done nothing in response to these stories, and nothing came of them.

    Then Michael Wood made his appearance. Wood was from Glendale, California. In 1964, he had dropped out of Pomona College to become a civil-rights organizer in the Watts neighborhood of Los Angeles. His work there attracted the attention of the National Student Association, and it offered him a job.

    By then, the N.S.A. represented about a million students from more than four hundred American colleges. It had just moved its offices (with help from the C.I.A.) to Washington, D.C., to adjoining four-story town houses near Dupont Circle. Wood was soon promoted to the position of director of development—fund-raising.

    He discovered something strange. No one at the N.S.A. seemed terribly interested in raising money. Grant proposals were perfunctory, and Wood learned that the president of the N.S.A., Philip Sherburne, the man who had hired him, was negotiating for donations on his own. Wood confronted Sherburne and told him that unless he was given control of all fund-raising activities he would have to resign. Sherburne invited him to lunch. This was in March, 1966.

    Sherburne had grown up on a dairy farm in Oregon. Wood liked him. They met in a restaurant on Connecticut Avenue called the Sirloin and Saddle, where Sherburne violated his secrecy agreement and told Wood about the C.I.A. He told Wood that he was desperately trying to terminate the relationship (which was true), and asked him to keep their conversation secret.

    Wood knew that if he revealed the contents of the conversation Sherburne could go to jail. But he hated the thought that the C.I.A. had financial leverage over the N.S.A. That fall, Wood was fired from the N.S.A. Paget reports that he was not getting along with people at the office. But he had already decided to go public, and had begun surreptitiously making copies of N.S.A. financial records.

    Paget doesn’t explain how Wood contacted the press. The story is that he met Marc Stone, a public-relations man who happened to be the brother of the investigative journalist I. F. Stone, and who represented a West Coast magazine called Ramparts. Though only four years old, Ramparts had become a slick muckraker with a New Left slant and a rapidly growing circulation under its young editor, Warren Hinckle.

    The magazine began looking into Wood’s story, which seemed hard to believe and impossible to confirm. But its researchers discovered records showing that some of the eight dummy foundations named by Patman two years before were donors to the N.S.A. The C.I.A. had not even bothered to change their names. By February, 1967, the magazine had a story ready to go.

    The C.I.A. got wind of the magazine’s investigation. It gathered past presidents of the N.S.A. and scheduled a news conference at which the presidents were to admit receiving C.I.A. money but swear that the C.I.A. had never influenced N.S.A. policy. They thought this would defuse any story that the magazine eventually published.

    Ramparts, in turn, got wind of the C.I.A.’s plan to scoop its scoop. Hinckle bought ads in the New York Times and the Washington Post. These ran on February 14th, Valentine’s Day; they announced, “In its March issue, Ramparts magazine will document how the CIA has infiltrated and subverted the world of American student leaders.” Placing the ad tipped off the Times and the Post, and their reporters called the C.I.A. for comment. And so, on the same day the Ramparts ads appeared, both newspapers ran articles on the C.I.A.’s covert funding of the N.S.A.

    This time, the story caught fire. Wood went on ABC’s “Issues and Answers,” where he was asked whether he thought that he had destroyed the C.I.A. as an effective instrument in the Cold War. CBS News broadcast an hour-long program, hosted by Mike Wallace, called “In the Pay of the CIA.” The major news magazines ran cover stories.

    Once the N.S.A. thread had been pulled, the whole tapestry of C.I.A. covert operations started to unravel. Reporters discovered that the money trail wound through some eighteen dummy foundations and twenty-one legitimate foundations. The Los Angeles Times found more than fifty grantees. The agency gave money to the National Council of Churches, the United Auto Workers, the International Commission of Jurists, the International Marketing Institute, the American Friends of the Middle East, the Pan American Foundation, the American Newspaper Guild, the National Education Association, the Communications Workers of America, and the Synod of Bishops of the Russian Church Outside Russia.

    Some of the funded groups were creatures of the C.I.A. Radio Free Europe and the Free Russia Fund, which regularly appealed to the public for contributions, had actually been created by the government and were funded by the C.I.A. Other organizations had C.I.A. agents planted in them. A few groups had no idea about the real source of the funds they lived on. An organization headed by the socialist Norman Thomas got money from the C.I.A.

    The Ramparts story effectively killed the covert-funding system. As Hinckle put it in his delightful memoir, “If You Have a Lemon, Make Lemonade,” “It is a rare thing in this business when you say bang and somebody says I’m dead.” More than that, the revelations meant that the whole covert-funding operation had backfired. An effort to curry the allegiance of foreign élites ended up alienating them almost completely. After 1967, every American venture in international cultural relations, official or unofficial, became suspect. The cultural Cold War came apart.

    Paget struggles at the end of her book to find an upside to the story she tells, some case in which C.I.A. involvement in the N.S.A. helped the United States win the Cold War. The record, she concludes, “is mixed at best and frequently dismal.” There is no evidence, for example, that the N.S.A. ever persuaded anyone to renounce Communism. The most that can be said, she thinks, is that the Soviet Union did not get to have the field of international student affairs all to itself. There was another front in the game.

    A Critic at Large MARCH 23, 2015 ISSUE
    BY LOUIS MENAND

    Find this story at 23 March 2015

    Copyright newyorker.com

    The CIA, the National Student Association, and the Cold War

    Patriotic Betrayal: The Inside Story of the CIA’s Secret Campaign to Enroll American Students in the Crusade Against CommunismPatriotic Betrayal: The Inside Story of the CIA’s Secret Campaign to Enroll American Students in the Crusade Against Communism by Karen M Paget

    When I was growing up in the 1960’s my parents used to tell me stories about their activities in the National Student Association in the late 40’s and early 50’s. Liberal Democrats, they would tell us about parliamentary tactics deployed by Communist members to try to take control of the organization (late night quorum calls, for instance) and the efforts of anti-Communist liberals to prevent the organization converted to one whose activities would be dictated by the Soviet Union. I haven’t seen his letters (one of my brothers has them) I believe my father was at the organization’s constitutional convention in Madison in 1947.

    What I’m sure they didn’t know at the time was that, while the NSA was devoted to spreading democratic values around the world, and especially in nonaligned countries emerging from colonialism, and despite the fact that the NSA followed democratic forms and procedures for the elections of officers, the actual activities of the organization were determined and funded by the CIA, with help from the Catholic Church to promote its own conservative agenda. Each year the elected president would be taken to a mysterious and secret meeting in which they were brought into the fold, told to sign a security oath, and, in the parlance of the organization, made “witting”. It was only then that the president and other top officers of the organization would be taught that the CIA was making the decisions, funneling money for travel and other activities through pliable charities, and truly acquainted with the shadowy older men–former students–who seemed to have hung around the NSA far beyond the time that most people would be interested in working with an organization for college students.

    The secret was maintained for twenty years, until a few courageous officers and a major investigative effort by Ramparts magazine revealed the extent of CIA domination of this allegedly democratic organization. During that time the NSA was used to provide scholarships for promising foreign student leaders to study in the United States and to disrupt conventions staged by a rival, Soviet-dominated international student organization for propaganda value.

    The husband of the author of Patriotic Betrayal was elected vice-president and made witting, and the author followed within months. Consequently, the author has a wealth of personal information about the inner workings of the NSA, which she supplemented by over 150 interviews of other participants in the events recounted here and research documented in the 100+ pages of end notes.

    In the pages of Patriotic Betrayal we meet characters familiar and unfamiliar and, in most cases, whether they were in on the CIA factor. For instance, my parents’ friend and former liberal Congressman Allard Lowenstein (they called him Al) was considered to be an obstacle to CIA domination when he was president in 1950-51, although it is not known whether he was witting. Tom Hayden, working with the SDS, also tried to push the NSA to the left, while Gloria Steinem was working for the CIA when she directed CIA-funded activities in the late 50’s and early 60’s. We also see appearances by people who would later become important nationally or internationally, including Fidel Castro, future Swedish Prime Minister Olof Palme, and notorious right-wingers Howie Phillips and Richard Viguerie.

    Patriotic Betrayal goes into exhaustive detail of the inner workings of the NSA from year to year, and often from week to week. While this level of detail establishes the breadth and depth of the author’s knowledge, it could be debated whether she has trimmed enough of the details from what the author has told us was earlier even much longer. The author does successfully give us the final conflict as a real-life spy thriller, with insiders trying to wrest control from the CIA and expose the CIA’s role in the NSA, the CIA and its agents trying to block the effort and to punish the organization for these efforts, and a ragtag band of journalists and activists literally risking assassination to get the story into print.

    At fifty years’ remove from most of these events it’s hard to imagine so much effort and money invested in an organization of student governments to make sure the Commies’ student organization didn’t gain the upper hand. It’s almost Spy v. Spy stuff. It’s also ironic, of course, that the CIA’s idea of promoting democracy in even this voluntary group was to install its own men into positions of power, fund them, and tell them what to do. Ultimately this is the most important lesson: the dangers of secret government setting up secret activities to subvert democratic institutions. When Ramparts broke the story the secret government and its allies in Congress cooperated to squelch or neutralize the revelations. Patriotic Betrayal is an important revelation of these Cold War events.

    by: Jack McCullough
    Sat May 02, 2015 at 10:28:15 AM EDT

    Find this story at 2 May 2015

    Copyright greenmountaindaily.com

    GCHQ captured emails of journalists from top international media

    • Snowden files reveal emails of BBC, NY Times and more
    • Agency includes investigative journalists on ‘threat’ list
    • Editors call on Cameron to act against snooping on media
    GCHQ

    GCHQ’s bulk surveillance of electronic communications has scooped up emails to and from journalists working for some of the US and UK’s largest media organisations, analysis of documents released by whistleblower Edward Snowden reveals.

    Emails from the BBC, Reuters, the Guardian, the New York Times, Le Monde, the Sun, NBC and the Washington Post were saved by GCHQ and shared on the agency’s intranet as part of a test exercise by the signals intelligence agency.

    The disclosure comes as the British government faces intense pressure to protect the confidential communications of reporters, MPs and lawyers from snooping.

    The journalists’ communications were among 70,000 emails harvested in the space of less than 10 minutes on one day in November 2008 by one of GCHQ’s numerous taps on the fibre-optic cables that make up the backbone of the internet.

    The communications, which were sometimes simple mass-PR emails sent to dozens of journalists but also included correspondence between reporters and editors discussing stories, were retained by GCHQ and were available to all cleared staff on the agency intranet. There is nothing to indicate whether or not the journalists were intentionally targeted.

    The mails appeared to have been captured and stored as the output of a then-new tool being used to strip irrelevant data out of the agency’s tapping process.

    New evidence from other UK intelligence documents revealed by Snowden also shows that a GCHQ information security assessment listed “investigative journalists” as a threat in a hierarchy alongside terrorists or hackers.

    Senior editors and lawyers in the UK have called for the urgent introduction of a freedom of expression law amid growing concern over safeguards proposed by ministers to meet concerns over the police use of surveillance powers linked to the Regulation of Investigatory Powers Act 2000 (Ripa).

    More than 100 editors, including those from all the national newspapers, have signed a letter, coordinated by the Society of Editors and Press Gazette, to the UK prime minister, David Cameron, protesting at snooping on journalists’ communications.

    In the wake of terror attacks on the Charlie Hebdo offices and a Jewish grocer in Paris, Cameron has renewed calls for further bulk-surveillance powers, such as those which netted these journalistic communications.

    Ripa has been used to access journalists’ communications without a warrrant, with recent cases including police accessing the phone records of Tom Newton-Dunn, the Sun’s political editor, over the Plebgate investigation. The call records of Mail on Sunday reporters involved in the paper’s coverage of Chris Huhne’s speeding row were also accessed in this fashion.

    Under Ripa, neither the police nor the security services need to seek the permission of a judge to investigate any UK national’s phone records – instead, they must obtain permission from an appointed staff member from the same organisation, not involved in their investigation.

    However, there are some suggestions in the documents that the collection of billing data by GCHQ under Ripa goes wider – and that it may not be confined to specific target individuals.

    A top secret document discussing Ripa initially explains the fact that billing records captured under Ripa are available to any government agency is “unclassified” provided that there is “no mention of bulk”.

    The GCHQ document goes on to warn that the fact that billing records “kept under Ripa are not limited to warranted targets” must be kept as one of the agency’s most tightly guarded secrets, at a classification known as “Top secret strap 2”.

    That is two levels higher than a normal top secret classification – as it refers to “HMG [Her Majesty’s government] relationships with industry that have areas of extreme sensitivity”.

    Internal security advice shared among the intelligence agencies was often as preoccupied with the activities of journalists as with more conventional threats such as foreign intelligence, hackers or criminals.

    One restricted document intended for those in army intelligence warned that “journalists and reporters representing all types of news media represent a potential threat to security”.

    It continued: “Of specific concern are ‘investigative journalists’ who specialise in defence-related exposés either for profit or what they deem to be of the public interest.

    “All classes of journalists and reporters may try either a formal approach or an informal approach, possibly with off-duty personnel, in their attempts to gain official information to which they are not entitled.”

    It goes on to caution “such approaches pose a real threat”, and tells staff they must be “immediately reported” to the chain-of-command.

    GCHQ information security assessments, meanwhile, routinely list journalists between “terrorism” and “hackers” as “influencing threat sources”, with one matrix scoring journalists as having a “capability” score of two out of five, and a “priority” of three out of five, scoring an overall “low” information security risk.

    Terrorists, listed immediately above investigative journalists on the document, were given a much higher “capability” score of four out of five, but a lower “priority” of two. The matrix concluded terrorists were therefore a “moderate” information security risk.

    A spokesman for GCHQ said: “It is longstanding policy that we do not comment on intelligence matters. Furthermore, all of GCHQ’s work is carried out in accordance with a strict legal and policy framework, which ensures that our activities are authorised, necessary and proportionate, and that there is rigorous oversight, including from the secretary of state, the interception and intelligence services commissioners and the parliamentary intelligence and security committee.

    “All our operational processes rigorously support this position. In addition, the UK’s interception regime is entirely compatible with the European convention on human rights.”

    James Ball
    Monday 19 January 2015 15.04 GMT Last modified on Tuesday 20 January 2015 00.17 GMT

    Find this story at 19 January 2015

    © 2015 Guardian News

    Exclusive: “Eco-Terrorist” Freed 10 Years Early After Feds Withhold Evidence on Informant’s Role

    In a Democracy Now! exclusive, we speak to environmental activist Eric McDavid, who has just been released from prison 10 years early after federal prosecutors acknowledged withholding key evidence about how he may have been entrapped by an FBI informant with whom he had fallen in love. In 2008, McDavid was sentenced to 19 years in prison for conspiring to bomb sites in California including the Nimbus Dam. Defense attorneys say he was entrapped by a teenage informant who went by the name “Anna” and supplied him with food, housing and bomb-making instructions, and pressured him into illegal activity. As part of a settlement reached in the case on Thursday, federal prosecutors acknowledged withholding key evidence, including an FBI request for the informant to undergo a lie-detector test. This damning detail about the government’s star witness was found in thousands of documents released after his trial, when his supporters filed a Freedom of Information Act request. In his first interview since his release, McDavid joins us from Sacramento along with his partner Jenny Esquivel, a member of the group Sacramento Prisoner Support. We are also joined by McDavid’s lawyer, Ben Rosenfeld, a civil rights attorney who specializes in cases dealing with police and FBI misconduct.

    TRANSCRIPT
    This is a rush transcript. Copy may not be in its final form.

    JUAN GONZÁLEZ: Just a week ago, our next guest was a federal prisoner, serving a 19-year sentence for “eco-terrorism” in what his supporters say was a case of FBI entrapment. Today, he’s a free man. In 2007, Eric McDavid was convicted of conspiring to bomb sites in California including the Nimbus Dam. But his attorneys say he was entrapped by a teenage informant who went by the name “Anna” and supplied him with food, housing and bomb-making instructions, and pressured him into illegal activity. Two others arrested in the plot testified against McDavid in a deal that led to lighter sentences.

    AMY GOODMAN: For them. Well, as part of a settlement reached in the case on Thursday, federal prosecutors acknowledged withholding evidence in McDavid’s case, including an FBI request for the informant to undergo a lie-detector test. This damning detail about the government’s star witness was found in thousands of documents released after his trial, when his supporters filed a Freedom of Information Act request. During a hearing, federal judge Morrison England demanded to know how the prosecution failed to give potentially exculpatory evidence to the defense, saying, quote, “This is huge. This is something that needs to be dealt with,” the judge said. McDavid pleaded guilty to a conspiracy charge with a maximum five-year sentence. He had already served nine years in prison, and he was released.

    Eric McDavid now joins us from Sacramento for his first interview since his release. With him, his partner Jenny Esquivel, a member of the group Sacramento Prisoner Support. And in San Francisco, we’re joined by Ben Rosenfeld, McDavid’s lawyer. He is a civil rights attorney who specializes in cases dealing with police and FBI misconduct. He’s also an advisory board member of the Civil Liberties Defense Center.

    We welcome you all to Democracy Now! Eric, let’s begin with you. How does it feel to be free?

    ERIC McDAVID: There is no definition to that. There’s no way to express that with, I don’t think, any language, definitely not the English language.

    AMY GOODMAN: Explain what it is—

    ERIC McDAVID: But it’s definitely beautiful to be with my family.

    AMY GOODMAN: Explain what—how critical the information was that had you released.

    ERIC McDAVID: I think that’s pretty obvious. And to tell you the truth, I think Ben could address that with a lot more clarity.

    AMY GOODMAN: OK, Ben Rosenfeld in San Francisco, can you talk about what has taken place in this case? I mean, here you have Eric McDavid, who was supposed to serve 19 years in prison. He’s being released a decade early. Why?

    BEN ROSENFELD: Eleven years early, actually. And this was about as egregious a case of entrapment as I’ve seen in my entire legal career. And I should point out, too, that what they’ve done to Eric, they visit a thousandfold on Muslims in this country, so it’s very important that we raise public awareness about this.

    But in Eric’s case, in particular, a number of FOIA documents were turned over after the case was long concluded. And supporters started going through those documents, and they went, “Aha, this is stuff that should have been turned over to the defense that would have been absolutely critical to his defense.” It included evidence that the government had called urgently for a lie-detector examination of their informant and then inexplicably canceled it. There are indications that letters of a romantic nature that they had withheld from the defense were included in their files. But even the FOIA was the tip of the iceberg, because it pointed to or hinted at some of those documents, but didn’t include them. And we—as his lawyers, we incorporated that into his habeas claim, and the court showed interest in that. And ultimately, that set the table for his release, when the government was forced to admit that they had in fact withheld documents that should have been turned over to the defense.

    JUAN GONZÁLEZ: Ben Rosenfeld, the informant in this case is a critical part of what happened here. In 2008, Elle magazine featured an article about how the FBI paid a young woman, known as “Anna,” to befriend activists and pressure them into illegal activity. It describes in detail her relationship with Eric McDavid and her role in the case against him. In an interview for the piece, Anna says when the group planned to blow up the Nimbus Dam, her role was to track down bomb recipes. She said, quote, “I go to the FBI with this and they said, Well, of course we’re not going to give you bomb recipes that actually work. So they gave me about half a dozen recipes that were all missing components.” Could you talk about the role of Anna? Because she supposedly was involved in gathering evidence as an informant against many activists in the environmental movement.

    BEN ROSENFELD: Well, thank you. I want to point out first, there was never any plan to blow up the Nimbus Dam. There was actually never any plan to do anything. There was a lot of talk. And whatever plans there were, were 100 percent the FBI’s and Anna’s. I mean, this is a clear-cut case of entrapment. It’s a case of the government creating and then solving its own so-called conspiracy. The Nimbus Dam, if there was any agreement among the co-defendants in this case, it was specifically not to blow up the Nimbus Dam.

    But, yes, Anna entrapped them by literally herding them together from around the country, by plying them with the matériel they needed, by sheltering them and providing them food and transportation, and literally gathering them back together and trying to keep them interested in her plans and her schemes. And each of them, for their own reasons, was trying to please and placate her. It was a lot of talk. It was no action. Nothing was ever done. Nothing was ever agreed upon. Certainly, nothing was ever blown up.

    AMY GOODMAN: So, if you could talk about the case, Jenny, why you got involved, with Sacramento Prisoner Support, Jenny Esquivel, and how you applied for this information under the Freedom of Information Act?

    JENNY ESQUIVEL: Sure. I came to Sacramento immediately after Eric was arrested. He and I were partners right before he got arrested. And so, I came here just to be closer to him and do support work for him, and that’s how I originally got involved in Sacramento Prisoner Support.

    As far as the FOIA goes, you know, Mark Reichel, Eric’s original attorney for trial, filed a FOIA request before Eric’s trial in 2007. And at the time, the FBI responded, saying that they had no records responsive to our request, which was interesting. Also, clearly, it was a lie, as at that time we had thousands of pages of discovery that the government had turned over to us for trial. So, we were pretty busy, obviously, at that point in time with trial, also trying to support Eric while he was on hunger strike, trying to get vegan food at the Sacramento County Main Jail. And so, we just didn’t really have time to follow through on that or pursue it, even though we knew that they clearly did have records responsive to our request. So, after Eric was convicted and sentenced in 2008, we filed another Freedom of Information Act request, and about a year and a half later, we started finally receiving records that were responsive to that request. And at that time, we received three or four different packages of documents equaling about 2,500 pages. One other interesting thing about that, though, is that the government admitted to not handing over almost 900 more pages of information. And we still haven’t seen those documents. We still don’t know what’s in those documents, and perhaps, unfortunately, never will.

    JUAN GONZÁLEZ: Eric McDavid, can you talk about your reaction when you discovered that this Anna, the informant, was an informant and had been taping conversations, the very person who was trying to instigate activity among you and other activists? And your reaction to her testimony in court?

    ERIC McDAVID: Well, initially, to your first question, it was as I was sitting on the back of the car and I heard the locks click all the way around on the automatic lock of the vehicle that she was sitting in, while she was talking on the phone, as about eight—I don’t know, eight to 10 different vehicles pulled screeching up in front of me with JTTF hopping out, AR-15s, everybody all ready to roll. So, I mean, that’s—that was the first when it clicked. So it wasn’t—I had a whole bunch on my mind at the time, so it wasn’t really a predominant or a huge thought.

    During trial, that part, after—because I had read a whole bunch of the discovery, and we’d gone over transcripts and everything. And it was difficult to see, definitely, but—I don’t know. It was definitely hard to see. I mean, that part was definitely one of the more harder rides of the whole trial.

    AMY GOODMAN: This is an excerpt—

    ERIC McDAVID: After—

    AMY GOODMAN: I wanted to go to an excerpt of an exchange between, well, the woman who calls herself Anna—and for folks who are listening on the radio, we’re also showing pictures of her; she was featured, as we said, in Elle magazine—the exchange between Anna and Eric McDavid and another activist, Lauren Weiner, when they were in the cabin allegedly planning to bomb the Nimbus Dam. Anna says, “Tomorrow, what are we planning on doing tomorrow? Are we still planning on doing anything tomorrow? Or should I just stop talking about plans?” Eric McDavid says, “Hmmm.” Weiner says, “I would love it if you stopped talking.” Anna says, “I would love it if you guys followed a plan! How about that!” Ben Rosenfeld, what is the significance of this back-and-forth?

    BEN ROSENFELD: The significance of that back-and-forth is that it really illustrates 100 percent a case of egregious and grotesque entrapment by the government. Anna literally called them names and threw fits when they didn’t show enough enthusiasm for her plans. And I think that excerpt illustrates that perfectly.

    You know, for—and—and I would also point out that right now the government wants to skate away on the claim that this was purely a mistake or inadvertent, on the back of a press office statement. And whether it was a mistake or it was malfeasance or it was malevolence to withhold these documents, they really owe it to Eric, and they owe it to the public, to come up with a much more detailed explanation about how this could have happened. I mean, you know, the deck is completely stacked in their favor. I mean, the job of the defense, in essence, is to go fishing in their deck to ask, “Do you have anything?” And if you’re told they don’t have anything, you’re stuck with that answer, and sometimes for a long time and sometimes forever—in Eric’s case, for nine years of wrongful incarceration.

    JUAN GONZÁLEZ: But, Ben, in this situation where prosecutors clearly, deliberately withhold evidence, possibly exculpatory evidence—I’ve seen so many of these cases over the years—isn’t it the responsibility, to some degree, of the judge to insist that an investigation be conducted, because the trial itself was so tainted as a result of these actions of the prosecutors?

    BEN ROSENFELD: We’d certainly like to see the judge do that. We’d like to see the judiciary take that up. And there’s some indications by Ninth Circuit judges that they are very concerned about a potential epidemic of Brady violations. Brady is the Supreme Court case that speaks to the withholding of documents. I would point out, too, that from a legal standpoint it doesn’t matter whether it was inadvertent or deliberate. If they withheld documents which were helpful to the defense—in this case, documents showing that there was a romantic interest by Eric, a correspondence between Eric and Anna that the prosecutors held back, and a reciprocation by Anna—that’s good enough to satisfy that constitutional standard and to win release. It should be, but it’s very rare that it happens. And you can see that it takes years and years and years to correct a mistake which should have been corrected a long time ago. And there are a lot of people behind bars who may never get that chance.

    AMY GOODMAN: The 2008 Elle article about the Eric McDavid case quotes a juror named Diane Bennett, who was tracked down by the reporter after the trial. Bennett said, quote, “I’ve been bothered by this ever since that day. … [T]he FBI was an embarrassment. … I hope he gets a new trial. I’m not happy with the one he got.” Diane Bennett added, the foreman had “teared up” when he delivered the guilty verdict. She said the judge’s instructions were confusing, but, quote, “People were tired. … We wanted to go home.” Can you talk about the significance of this, Ben Rosenfeld?

    BEN ROSENFELD: Well, and she said that so long ago, and it just goes to show how long you can live in this Kafkaesque nightmare, where the government has engaged in total misconduct and the court, perhaps, has abdicated a responsibility to oversee this or maybe is hoodwinked along with the defense because of the overly trusting role and excessive trust that it places sometimes in the government and the prosecutor. I mean, in court on January 8th, the day that Eric walked free, I’ve never seen so many fireworks. And the judge really grilled the prosecutors, and he showed a lot of—a lot of personal pique and interest in getting to the bottom of this. And I really hope that he or somebody does follow up.

    AMY GOODMAN: Can you—could you explain the deal that was struck at the end, though?

    BEN ROSENFELD: Yeah. You know, Eric had to plead to a simple or general conspiracy count with a maximum penalty of five years. The judge vacated the original conviction and sentence of 20 years on a different charge. So the government extracts its pound of flesh. That’s probably as much justice as you’re going to get out of the Department of Just—Injustice in a case like this. Eric had to waive all civil claims, going forward.

    But he’s here now, and we’re extremely grateful for that and for everybody that made that possible and, I will say, too, the team of U.S. attorneys at the end of the case, who behaved extremely honorably and professionally in taking a fresh look at this and enabling that to happen, too. But it took a collaboration of a lot of people to end this nightmare. And there are a lot of people left in prison who are the victims of this kind of government malfeasance also, and there needs to be an inquiry.

    JUAN GONZÁLEZ: And, Eric, could you talk, in the about a minute and a half we have left, of your time in prison? Did you expect at some point to be able to get out and to have this nightmare behind you?

    ERIC McDAVID: I had a buddy at the medium-security prison where I was first held who always challenged me in keeping my mind open and keeping my heart open and making sure that I was ready for anything. And given the intensity of that environment, it definitely helped me to adapt to that whole situation. But he was always—every other week or every other day, he’d hit me up: “You ready to go home? You ready to go home?” I’m like, “Yes, I’m ready to go home.” And he’s like, “All right, so here’s the situation how you’re going to go home. Tell me how you’re going to do it.” And so, that part was always kept alive. And the amount of support that I got from folks has just—it’s blown my heart open every day and every moment that I’ve been—that I was away from my friends and family and my loved ones.

    AMY GOODMAN: And, Eric, did you meet other people behind bars who you felt were entrapped like you were?

    ERIC McDAVID: There is so many people that either are entrapped in the same way or pressured into taking a sentence because they’re threatened with 60, 70 years of prison, and they have to do the 15, or they have to do the 17, or even 20, because otherwise they’re going to spend the rest of their life back there. That was time and time again.

    AMY GOODMAN: Well, Eric McDavid, we want to thank you for being with us. Congratulations on your release. He was released from prison Thursday, less than a week after federal prosecutors [acknowledged withholding] key evidence in the 2008 trial that led to his conviction on eco-terrorism charges. Jenny Esquivel, member of the Sacramento Prisoner Support, also Eric McDavid’s partner. And thanks to Ben Rosenfeld, joining us from San Francisco, the civil rights attorney who specializes in cases dealing with police and FBI misconduct, the attorney for Eric McDavid.

    WEDNESDAY, JANUARY 14, 2015

    Find this story at 14 January 2015

    Creative Commons License The original content of this program is licensed under a Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 United States License. Please attribute legal copies of this work to democracynow.org. Some of the work(s) that this program incorporates, however, may be separately licensed. For further information or additional permissions, contact us.

    Home Stations Past Shows Topics Blog Get Involved Events Español About Contact Donate Mobile Site
    DONATE →This is viewer supported news

    Role of FBI informant in eco-terrorism case probed after documents hint at entrapment

    In the case of Eric McDavid, alleged to be ring-leader of eco-terrorist cell, ‘game-changing’ documents seen exclusively by the Guardian show informant may have entrapped him

    On the surface, she blended in very well. With a skull tattooed on her shoulder, a black-and-white keffiyeh around her neck, a shock of bright pink hair and her standard-issue dress of camouflage skirt and heavy boots, the energetic 17-year-old looked every bit the radical eco-activist she worked so hard to imitate.

    But “Anna”, as she called herself, was no ordinary eco-protester. Really, she wasn’t one at all. She was an FBI informant under instructions to infiltrate fringe green groups and anti-capitalist networks and report back on their activities to the US government.

    Now “Anna”, in her role at the center of a high-profile prosecution of alleged eco-terrorists in 2006-7, has been put under the spotlight following the embarrassing admission by the US Department of Justice that it failed to disclose crucial documents to defence attorneys at trial.

    On Thursday, Eric McDavid, a radical green activist aged 37, was allowed to walk free after having served nine years of a 19-year federal prison sentence. Prosecutors had alleged that he was the ringleader in a small cell of eco-terrorists connected to the Earth Liberation Front (ELF) conspiring to bomb the Nimbus Dam in California, cellphone towers, science labs and other targets.

    Last week’s dramatic scenes in a courtroom in Sacramento, California, have focused attention on the FBI’s use of undercover informants and prompted claims that the agency lured unsuspecting activists into criminal activity through blatant entrapment.

    But last November, the US attorney’s office in the eastern district of California admitted that it had “inadvertently” failed to disclose numerous documents that went to the very heart of the case. Crucially, those previously undisclosed files included correspondence between “Anna” and McDavid that suggests that, far from being the neutral intelligence-gatherer portrayed by prosecutors, she might have entrapped her prey by encouraging him to behave conspiratorially in the hope of romantic fulfilment.

    ‘I think you and I could be great’
    Among the files are a letter and 10 emails written by McDavid to the teenaged woman he thought at the time to be his friend, peer and potential sexual partner. The writings have been seen by the Guardian and extracts of them are published here for the first time.

    In the letter, McDavid declared his love for “Anna”, though he coyly added that he was not sure whether his feelings for her amounted to “just infatuation, a crush, or whatever box anybody has for this emotion”. Scrawled diagonally across the page in spindly script, his words expressed the trepidation of someone unused to venting openly his emotions. He feared that unless he shared his feelings, they would “eat me from the inside out”.

    “I hope that my forwardness w/expressing all this doesn’t scare the shit out of u,” he wrote, “cause I know if I got this letter I’d probably trip out a bit, to say the least …” Having opened his heart, he blurted out with palpable relief: “Fuck that feels soooooo much better.”

    At McDavid’s 2006 trial, his defence team presented evidence to the jury that McDavid had fallen in love with the woman who would turn out to be his downfall. What wasn’t known at that time, and what is revealed by the newly disclosed documents, was that “Anna”, in her guise as a fellow radical, clearly reciprocated.

    In an email dated 27 June 2005, six months before McDavid’s arrest, “Anna” responded explicitly to his previous amorous advances. She said: “I think you and I could be great, but we have LOTS of little kinks to work out.” She went on to say: “I hope in Indiana we can spend more quality time together, and really chat about life and our things.”

    The tone of romantic encouragement in the email had an immediate impact on McDavid. He replied three days later, using the ungrammatical language of texting: “hey cheeka, so far as us B’n great, that i think is an understatement… along w/the ‘LOTS of little kinks 2 wk out’… but if u aint learning, u aint live’n… & I do think we could learn a lot from each other.”

    In subsequent emails, McDavid continued to express his feelings for her, sending her “big hugs” and saying “miss you much”. Only one of “Anna’s” replies to McDavid is included among the new batch of documents disclosed after so many years. In it she wrote intimately about her hairstyle: “I took out the braids. : ( They were hurting my head SO BADLY by the last night in philly that I was just getting pissy. I’ll do it again, but I think I want the loose pink hair, like I told you about; and I can DIY that. But pain isn’t worth that much – besides, identity is so fluid… but that’s another convo, hopefully for IN. : )”

    The tone is almost flirtatious. McDavid evidently took it to be such, because he replied: “sad & glad 2 hear about the braids, glad 2 hear they Rn’t hurting u’r head anymore, sad 2 c them gone… they were pretty damn cute, & that princess laya thing was 2 hot (inside shiver)”.

    McDavid’s treatment: ‘not fair’ or an ‘inadvertent mistake’?
    Eric McDavid walks out of the Federal Courthouse in Sacramento after being released from prison
    The judge in McDavid’s case expressed astonishment and dismay that game-changing documents had not been shown at 2007 trial, adding McDavid’s treatment was ‘not fair’. Photograph: Jose Luis Villegas/AP
    It took McDavid’s defence team and his large band of devoted supporters seven years after he was sentenced to extract from the Justice Department those 11 precious documents. They were finally released on 6 November last year, fully two years after reference was made to their existence in a court declaration by “Anna’s” FBI handler, special agent Nasson Walker. That two-year delay alone belies the assurance made by the US attorney’s office in Sacramento to the New York Times after last week’s hearing that “the documents were produced to the defendant promptly after their discovery.”

    At the hearing, federal judge Morrison England expressed astonishment and dismay that such game-changing documents had not been shown to the defence at the 10-day trial over which he had presided in 2007. “I’ve never heard or seen anything like this,” he said, adding that McDavid’s treatment was “not fair”.

    The judge demanded to be told how such a flagrant breach of disclosure – under the 14th amendment of the US constitution, the prosecution must turn over potentially exculpatory evidence to the defence – could have occurred: “This is huge. This is something that needs to be dealt with, and I want to know what happened.”

    McDavid’s current lawyers, Mark Vermeulen and Ben Rosenfeld, said the documents they battled for years to wrestle from US prosecutors would have transformed the trial had they been available at the time. “If the defence had the evidence it has now – that ‘Anna’ encouraged Eric’s romantic advances, leading him to believe that sexual fulfilment would be conditional on him following her plans – that would have confirmed in the jury’s mind that she entrapped him. He would have been acquitted, it’s as simple as that,” Rosenfeld told the Guardian.

    If the defence had the evidence it has now … He would have been acquitted, it’s as simple as that.
    Ben Rosenfeld
    The Justice Department continues to insist it was all an “inadvertent” mistake. But that narrative does not cut it for McDavid’s legal team and supporters. “They took nine years of Eric’s life away from him and they shouldn’t be able to gloss over that with a press release – there needs to be a detailed explanation,” Rosenfeld said.

    Concerns raised by the McDavid case about the use of undercover informants will resonate today given the FBI’s continued reliance upon infiltration as a major plank of its counter-terrorism strategy. Its paid moles, especially those planted within Muslim communities in the wake of 9/11, are regularly accused of crossing the line from observation into entrapment.

    Rosenfeld said that McDavid’s story was a warning for today’s justice system: “When people see the TV news and hear of the latest foiled terrorist outrage they think ‘Wow! The FBI is so good at its job.’ But so many of these apparent plots are complete inventions of the government in the first place – they are creating and then solving their own conspiracies.”

    ‘I wanted to get a conversation going with everyone’
    Throughout almost a decade of legal wrangling over the McDavid case, the mysterious “Anna” has been a constant factor. In her only known interview, for a 2008 article in Elle magazine, she posed for photographs in her normal outfit of jeans, T-shirt and suede jacket, her hair by then faded from lurid pink to its natural brown.

    She told the magazine that 9/11 had motivated her to engage in counter-intelligence. A year after the attacks, when she was just 15, she contacted the Militarywomen.org website to inquire about enlisting in the army.

    At a community college night class in Miami she tried to impress her professor by sneaking into a meeting of anti-free trade protesters for what she called “anthropological observation”. The report she presented to class so struck a police officer who was also taking the course that he passed her details to the Miami police department, which in turn quickly recommended her to the FBI.

    Within months, she was going undercover among protesters at the G8 summit of leading economic powers in Atlanta. Over the next two years she was given more than 10 federal assignments, including infiltrating protest groups at the Democratic and Republican National Conventions in Boston and New York respectively, and delving into the world of radical environmental activism.

    At the G8 she met an anarchist named Zach Jenson, and through him fellow eco-activists Lauren Weiner and McDavid who she first met in 2004. All three were eventually arrested, though Jenson and Weiner cut a deal with prosecutors in which they gave evidence against their co-defendant in exchange for a lesser sentence.

    “Anna” told the jury at McDavid’s trial that she had been scrupulously impartial, sticking closely to legal guidelines for informants that forbade her from playing a leadership position in the group or from pushing anybody to do anything. Yet under cross-examination, she described some of the proactive steps she took to bring the “cell” together.

    She bought plane tickets for Weiner to fly her to McDavid’s house for a group meeting. “I wanted to get a conversation going between everyone,” she said.

    Later, she drove Weiner and Jenson across the country to meet McDavid, using a ’96 Chevrolet paid for by the FBI and kitted out with recording equipment. When Weiner showed signs of losing enthusiasm for the project, “Anna” sent her an email saying: “There’s no going back … I don’t want to be dilly-dallying around forever, which I know I could do and fall into that trap but I want to avoid you doing that too.”

    In email correspondence that is included in the newly disclosed documents seen by the Guardian, “Anna” wrote to Weiner in September 2005, telling her “I’ve made some more contacts in Philly, esp with the animal liberation movement, which I’d like to bring you and the rest of teh (sic) crew more into. I already talked a little bit about it with [McDavid] – we could make a big difference on multiple fronts.”

    In a later email, also to Weiner, she said: “I’d love to start helping you and the rest of the Philly kids in whatever your hearts find to do.”

    The FBI also paid for a cabin in Dutch Flat, California, heavily rigged with surveillance devices, where “Anna” assembled the group, telling them she had earned the rent money working as a dancer-cum-escort. There she presented the others with a “burn book” containing six recipes for concocting firebombs, though she told the jury the devices were designed by the FBI to be duds.

    ‘The government owes it to Eric – to tell the truth’
    As these final planning meetings for a potential attack on a science lab were taking place, the FBI appeared to grow jittery about an operation that depended entirely on “Anna”. In November 2005, just weeks before the three activists were arrested at the cabin, a formal request was made to subject her to a lie-detector test.

    The request form says the purpose of the polygraph would be to “confirm veracity of [“Anna’s”] reporting prior to the expenditure of substantial efforts and money based on source’s reporting.”

    The polygraph was disclosed to McDavid’s defence team under freedom of information laws in 2012, five years after the trial. A small, but potentially significant, footnote to the request form reveals that a senior federal prosecutor (AUSA) approved the test, though the identity of the official is redacted on grounds of “personal privacy”.

    The emergence of the polygraph test, and of the romantically tinged correspondence, has incensed Mark Reichel who acted as McDavid’s lawyer at trial. He tried to mount an entrapment defence, having been told by his client of “Anna’s” amorous behaviour, but was ultimately stymied by lack of evidence.

    Before the trial began Reichel filed a motion to dismiss the case on grounds of an improper romance between informant and defendant. In it, he accused “Anna” of having “encouraged and urged him on, to write love letters and emails to her”. The US government’s response to the motion left no room for doubt: “The defendant’s claim of a romantic relationship between him and the informant is categorically untrue”.

    I demanded to see the love letters before the trial, but the government told me they didn’t exist
    Mark Reichel
    “I demanded to see the love letters before the trial, but the government told me they didn’t exist,” Reichel said. “They wanted the world to see they had captured a member of ELF. He was innocent, they knew that, but they couldn’t let it be seen.”

    The revelation of the newly disclosed documents is likely to prompt a flurry of litigation. Jeffrey Weiner, Lauren Weiner’s attorney (and cousin), told the Guardian that he was considering legal action to have her federal conviction lifted.

    He said that “Anna” had encouraged a strong and intimate personal relationship with Lauren that was “so intense and continuous she literally took over Lauren’s will. ‘Anna’ chose the most gullible people that she could find and stopped at nothing to persuade them to commit criminal acts. I’m not saying my client did nothing, but her crime was created by the US government.”

    For McDavid, too, this story is not at an end. As part of his release deal, he pleaded guilty to a single conspiracy charge with a terrorism enhancement attached, meaning that although he is a free man he will continue to labour under the stigma of a serious federal conviction.

    Nor is the full extent of the official deception yet known. In 2010 the Justice Department released 2,500 pages relating to the case under freedom of information rules, but it refused to hand over a further 900 pages. What nuggets of information those pages contain, particularly among “Anna’s” replies to McDavid’s emails – most of which remain hidden – only the US government knows.

    McDavid’s current partner, Jenny Esquivel, who has been a leading member of his support group, said she feared the remaining documents would never see the light of day. “The government keeps trying to frame this as a mistake, but they are the only people who knows what happened and they owe it to the American people – and to Eric – to tell the truth.”

    She said that in the five days of freedom he has enjoyed, McDavid has revelled in being reunited with his family and spending time with his two nieces, both of whom were born while he was in prison. “The girls were overjoyed when they heard the news that he was coming home. It was almost impossible to pull them away from him while they were here,” she said.

    Amid his joy, McDavid hasn’t lost sight, Esquivel said, of those who remain in the clutches of FBI entrapment. “The travesty is that so many people are dealing right now with exactly the same problem. Hundreds are serving decades in prison for crimes that never happened.”

    Ed Pilkington in New York
    @edpilkington
    Tuesday 13 January 2015 20.01 GMT Last modified on Tuesday 13 January 2015 23.50 GMT

    Find this story at 13 January 2015

    © 2015 Guardian News and Media Limited

    Man convicted of ‘eco-terrorism’ freed amid claims FBI hid evidence

    Eric McDavid sentenced to nearly 20 years in 2007 for conspiring to bomb one or more targets including electric power stations and cellphone towers
    Eric McDavid.

    Eric McDavid, who the US government has considered an eco-terrorist since 2007, was released on Thursday night after a judge determined that important documents related to his case had been filed away in an FBI office.

    The government handed over thousands of pages of documents – including love notes from from McDavid to an informant – as part of a trial this week in Sacramento, California.

    “I’ve never heard or seen of anything like this,” said US district judge Morrison England, the same man who sentenced McDavid in 2007. England ordered McDavid be released and asked to be given information showing how such evidence was hidden.

    “I know [McDavid is] not necessarily a choirboy, but he doesn’t deserve to go through this, either,” England told the Sacramento Bee. “It’s not fair.”

    McDavid, 37, was three days away from having spent nine years in prison. As part of the agreement, McDavid pleaded guilty to a single conspiracy count and was released with time served.

    His lawyers say he was entrapped by an FBI informant – “Anna” – the recipient of the love notes which were hidden away in the FBI office. She was named in the trial and was the subject of a feature in Elle magazine. McDavid’s supporters say she encouraged him to engage in violent acts against the government while suggesting future romantic encounters.

    McDavid was arrested in January 2006, and sentenced to nearly 20 years in federal prison in September 2007. He was convicted of conspiring to bomb one or more targets including electric power stations, California’s Nimbus Dam, cell phone towers and the United States Forest Service Institute of Forest Genetics.

    A September 2007 release from the FBI said he and two others, in the presence of “a confidential source”, met at his parents’ house, purchased a book with instructions on how to make homemade bombs, and bought the necessary supplies.

    McDavid’s lawyers had been searching for more evidence, but did not receive confirmation from the government about the existence of the hidden documents until recently.

    It is not yet clear why the documents sat in the Sacramento FBI office as McDavid served his sentence in a prison near Los Angeles.

    “We don’t know exactly why they weren’t turned over,” the chief of the US attorney’s criminal division, John Vincent, told the court.

    The US attorney’s office in the Eastern District of California acknowledged that the government’s failure to produce the documents is grounds for a retrial, but both sides agreed to the deal without a retrial to avoid further possible litigation on both sides.

    “As the United States stated at the hearing, the nondisclosure was inadvertent, and the documents were produced to the defendant promptly after their discovery,” the office said in a statement.

    Soon after England reached his decision, McDavid left a federal building in Sacramento and was met by his parents, sister and girlfriend.

    “We are thrilled beyond word that Eric is coming home to us after nine years in prison,” Eric’s mother, Eileen McDavid, said in a statement on behalf of the family.

    “We never stopped believing he was wrongly accused. Blessing to all those who made his early release possible.”

    Amanda Holpuch in Washington
    Friday 9 January 2015 15.35 GMT Last modified on Friday 9 January 2015 23.53 GMT

    Find this story at 9 January 2015

    © 2015 Guardian News and Media Limited

    How an FBI Informant Sent a Radical Environmentalist to Prison, and How He Got Out Again (2015)

    An extraordinary thing happened last month: US prosecutors admitted the government messed up.

    Well, technically they admitted that a judge could conceivably decide that the government might have possibly messed up enough to warrant a new trial. But still.

    As part of a unusual deal brokered between his defense team and chagrined US attorneys, Eric McDavid, who in 2007 was sentenced to nearly 20 years in prison on domestic terrorism charges, walked free on January 8 after the government told a judge it had “inadvertently” failed to hand over thousands of pages of FBI documents to his defense counsel in his original trial.

    McDavid, 37, served three days short of nine years in custody before US District Judge Morrison England agreed to reduce his sentence to a lone count of conspiracy and released him on time served.

    “This is one of the most unusual things I’ve had to deal with, if not the most unusual, since I started on the bench in 1996 and on this court since 2002,” England said, according to court transcripts. “I’ve never heard or seen of anything like this.”

    As part of his deal, McDavid waived his right to sue the government. He is now a free man, but the conclusion of his case is an embarrassing coda to the Bush-era surveillance of radical environmentalists and anti-capitalists in the years following the 9/11 attacks.

    McDavid and two other radical environmentalists, Zach Jenson and Lauren Weiner, were convicted in 2007 of conspiring to blow up a dam, cellphone towers, and a US Forest Service lab after a paid FBI informant—an unassuming 18-year-old known only as “Anna”—infiltrated their group, egged them on, and exposed them.

    That would have likely been the end of McDavid’s story, but a Freedom of Information Act (FOIA) request by two of his supporters dredged up nearly 2,500 pages of FBI documents that prosecutors had previously insisted did not exist.

    The tranche of files led the US attorneys office in Sacramento to turn over even more documents that it had—according to a letter to McDavid’s lawyers—”inadvertently not disclosed during discovery.” Among the documents were flirty notes between McDavid and Anna, as well as a request from an FBI agent for a polygraph exam on Anna to test the veracity of her statements. All of which McDavid’s attorneys say would have been crucial in bolstering McDavid’s entrapment defense.

    “It’s somewhere along the continuum of mistake, malfeasance, and malevolence.”

    “[Anna] fomented the alleged conspiracy, literally herding defendants together from around the country for meetings, badgering them to form a plan, and mocking and berating them when they showed disinterest,” McDavid’s lawyers Ben Rosenfeld and Mark Vermeulen wrote in a motion last year.

    The Sacramento Bee described England, who presided over McDavid’s original ten-day trial, as “clearly exasperated” and “sometimes stopping to hold his head in his left hand” during last month’s hearing.

    “I know he’s not necessarily a choirboy, but he doesn’t deserve to go through this, either,” England said. “It’s not fair.”

    Prosecutors and top brass from the US Attorney’s office, none of whom were involved in the original trial, had little to offer for explanation.

    “We don’t know exactly why they weren’t turned over,” John Vincent, chief of the US Attorney’s criminal division, told England. According to the US Attorney’s office, the documents were sitting in an FBI file in Sacramento.

    In a statement released following the hearing, the US Attorney’s Office of Eastern California said that “although those documents do not directly bear upon whether the defendant committed the underlying acts… the United States agreed that it is conceivable that a court could conclude that the failure to produce them required a retrial.”

    This is a master class in ass-covering, impressive even by government standards. Note how it starts by reaffirming McDavid’s guilt, and then avoids admitting any wrongdoing by saying that the government agreed, in its great magnanimity, that others might come to the conclusion that it had seriously screwed the pooch

    Some prosecutors were a bit more forthright.

    “We absolutely admit that we made a mistake, but there was no deliberate, knowing withholding of any documents,” said First Assistant US Attorney Philip A. Ferrari in January.

    But the notion that the FBI and prosecutors simply misplaced thousands of pages of documents from a highly touted anti-terror investigation and then rediscovered them years later is hard to swallow for many who watched McDavid’s case unfold.

    “It’s somewhere along the continuum of mistake, malfeasance, and malevolence,” McDavid’s lawyer Rosenfeld said in a phone interview. “The point is that only the government can explain what level of mistake this was, and the public should demand that explanation.”

    In an interview, Will Potter, an independent journalist who has written extensively about the government’s surveillance of radical environmental groups, called the government’s claim that it accidentally failed to hand over the documents “complete nonsense.”

    “The FBI and prosecutors have been intimately aware of how many boundaries have been pushed and crossed along the way, and they’ve relentlessly defended it,” Potter said. “Jurors came afterward and said they thought they were misled. In recordings, the court heard [Anna] constantly berating McDavid for not taking action. Every step of the way the government pushed and pushed to get the conviction at any cost.”

    The Green Scare

    McDavid first met Anna in 2004 at an invitation-only anarchist gathering in Des Moines, Iowa. It was a heady time for both radical leftists and federal law enforcement, which had been given broad discretion and nearly unlimited resources to root out terrorism threats. Love was in the air.

    McDavid, 26 at the time, was an on-again, off-again college student from Auburn, California, with a muddled interest in anarchism and environmentalism.

    Anna was a no-nonsense girl with pink hair, a short camo skirt, and a keffiyeh around her neck. She told McDavid she had hitchhiked to the gathering. In reality, she had flown out on the FBI’s dime.

    She had gotten a taste for informant work after infiltrating an anti-globalization protest group for a paper for her community college class. Impressed by her initiative, a police officer in her class put her in touch with the Miami Police Department, which in turn referred her to the FBI. In a flattering 2008 profile in Elle magazine, Anna said she was a patriotic hawk who wanted to do something for her country after 9/11.

    She was a godsend for the FBI. Radicals seemed to be able to sniff out professional undercover officers before they even stepped through the door. But Anna was a natural—quick-thinking, reliable, and able to move through activist circles with ease. She didn’t walk like a cop or otherwise exude cop-ness.

    McDavid didn’t know it when he first laid his smitten eyes on Anna in Iowa, but he had just been snared in what activists would later dub the “green scare,” an allusion to the anti-communist red scare of the 1950s.

    “The only reason they got on the radar was because they had a political viewpoint,” Mark Reichel, McDavid’s lawyer at his original trial, said in an interview. “At the same time, the head of the Justice Department was testifying before Congress, saying, ‘No, we don’t do that. We don’t spy on people because of political reasons.'”

    Indeed, here’s former FBI director Robert Mueller speaking at a press conference announcing the 2006 indictment of 11 “eco-terrorists” responsible for an estimated $80 million in property damages: “The FBI becomes involved, as it did in this case, only when volatile talk crosses the line into violence and criminal activity.”

    This is a key point in McDavid’s entrapment defense. Contrary to Mueller’s reassurances, McDavid and Jenson’s rhetoric when Anna first met them in ’04 was about as violent as the average Rage Against the Machine album.

    Anna caught up with McDavid again in ’05 in Philadelphia, where he was staying with two friends, Jenson and Weiner. Anna reported back to the FBI that McDavid had become thoroughly radicalized since their first meeting.

    Anna’s FBI handlers put her on McDavid, Jenson, and Weiner full-time and outfitted her with the finest in spy gear: a bugged ’96 Chevy Lumina that she used to drive the group around. The FBI also provided Anna with a small cabin in the Sierra Nevada foothills that was to act as the quartet’s base of operations. She paid for groceries and even doled out spending money to the group, sometimes in $100 bills. She wasn’t old enough to buy beer yet, but Anna was passing along fake bomb recipes from the FBI to the trio.

    Anna’s recordings of late-night bull sessions showed the trio talking about bombing targets like cell phone towers and fish hatcheries. Later in court, the three activists would try to play off the conversations as purely hypothetical, the musings of some stoned anarchists with delusions of grandeur.

    “Anarchists usually just talk shit,” Jenson said in a 2012 Outside story on the case, “but they never really do that much.”

    In court, the bumbling anarchists became cold, calculating terrorists.

    But one day, the group drove to a Kmart in Auburn to pick up ingredients for a bomb test. McDavid was sitting on the back of Anna’s car in the parking lot, waiting for Jenson and Weiner to return, when he heard the automatic locks on the car doors click shut. He looked in. Anna was on her cell phone. Moments later, black SUVs screeched into the parking lot, and he was surrounded by heavily armed agents from the Joint Terrorism Task Force. In an interview with Democracy Now!—his first after being released from prison—McDavid said that that was the moment he realized Anna was a snitch.

    McDavid, Jenson, and Weiner were charged with conspiracy based on their recorded conversations, their purchase of a book that included bomb-making instructions, their scouting of potential targets, and their purchase of bomb-making materials at Kmart.

    For the government’s prosecution of radical environmentalists, Potter said that the McDavid case “represented a turning point in a couple of ways.

    “Around September 11, the actions by the radical environmental movement had really subsided significantly,” Potter said. “There were not a lot of crimes by the Animal Liberation Front or Earth Liberation Front. There were very heavy prosecutions of a few cases, but the climate as a whole, there wasn’t a lot happening. The McDavid case represented a shift. They manufactured terrorism plots, and that’s precisely what McDavid’s case was all about.”

    The Trial

    In court, the bumbling anarchists became cold, calculating terrorists. US Attorney McGregor Scott claimed the group’s plot to bomb the Nimbus dam, had it not been thwarted by Anna, would have made “what happened in New Orleans after Hurricane Katrina look like a Sunday pancake breakfast.” (A spokesman for the dam later said that blowing up the gates would just cause water to “trickle” down the American and Sacramento rivers.)

    Anna testified that she woke up in the cabin one night with McDavid looming above her holding an eight-inch hunting knife. Meanwhile, Jenson and Weiner both flipped and agreed to testify against McDavid in return for lighter sentences. Years later, Jenson would provide McDavid’s lawyer with a sworn declaration saying he was pressured to contort his testimony to agree with the government’s version of events.

    “I became very aware that if I did not testify to the facts that the government felt occurred, which I did not believe occurred, that my plea bargain would be taken away and I would be charged with the major federal charge and would very likely receive a 20-year sentence,” Jenson said. “This was a lot of pressure for me to handle.”

    The jury also received confusing, sometimes contradictory instructions. They were told entrapment required a government “agent,” and Judge England told the jurors from the bench that Anna was an agent, but then later sent a written note to the jury that she was not one.

    The jury was also told, when considering McDavid’s predisposition for violence, to limit the timeframe to June 2005 and onward, not from when Anna first began reporting on him in 2004.

    Of the 12 jurors, ten would later go on the record to various publications expressing serious doubts about the government’s case against McDavid. “I hope he gets a new trial,” Diane Bennett, one of the jurors, told Elle in 2008. “I’m not happy with the one he got.”

    England sentenced McDavid to 235 months in prison on an enhanced terrorism charge. He spent the first 28 months of his sentence in solitary confinement. Jenson and Weiner served six months and two weeks in prison, respectively. Anna consulted for the FBI for a bit longer before giving up the spy game and trying to move on with her life.

    But perhaps more interesting than the vagaries of the case is what never made it to the jury’s ears. During the trial, Reichel filed dozens of motions to suppress, dismiss, and otherwise muck up the government’s case against McDavid. Among those were numerous motions for discovery for the FBI files on McDavid and Anna.

    “The hell that we had been through for so long, we knew we had to pursue it, but it was like, ‘God, is this even going to work?'”

    “The FBI filed responses in writing saying none of this stuff exists. No cell phone records, no polygraphs, no internal FBI reports, no letters,” Reichel said. “So I did a FOIA and it came back with not much, maybe 20 pages, items of discovery I already had.”

    Reichel also filed a motion to dismiss the case based on McDavid’s infatuation with Anna. The prosecution’s response to Reichel’s motion: “The defendant’s claim of a romantic relationship between him and the informant is categorically untrue.”

    “I Think You and I Could Be Great”

    McDavid lost an appeal before the Ninth Circuit, and the Supreme Court refused to hear his case. He would have languished in prison for the rest of his long sentence had it not been for the dogged work of two of his supporters, Jenny Esquivel and Evan Tucker.

    Tucker, now living in Spain, had started a group called Sacramento Prisoner Support in 2004 to help activists who had been targeted by the federal government. In 2008, Esquivel and Tucker filed a FOIA request for McDavid’s FBI file.

    “Jenny and I always felt that the government was hiding evidence from the defense,” Tucker said. “How could a person who was investigated by the FBI for one and a half years and then convicted of a federal crime not have an FBI file? So we decided to do our own request. Originally they told us there was nothing, but we kept pushing and finally, one day, several thousand pages of documents showed up in our PO box.”

    Tucker says the FOIA sleuthing revealed the FBI was also interested in him.

    “They interviewed people about me, sat outside my house, and followed me around,” Tucker said. “They sent informants to our fundraisers and had them report back on me as well. There is a lot I still don’t know about the investigation because they would only give me half my file and even that was heavily redacted.”

    With a batch of fresh evidence in hand, McDavid’s lawyers filed a writ for habeas corpus in 2010. The government continued to fight the appeal, but in November 2014 it handed over even more files that should have been given to McDavid’s defense counsel in his original trial. The new documents included mushy notes from McDavid professing his interest in Anna, as well as never-before-seen responses from Anna leading him on.

    In a 2005 email six months before McDavid’s arrest, Anna wrote, “I think you and I could be great, but we have LOTS of little kinks to work out. I hope in Indiana we can spend more quality time together, and really chat about life and our things.”

    McDavid replied three days later in his idiosyncratic syntax: “hey cheeka, so far as us B’n great, that i think is an understatement… along w/the ‘LOTS of little kinks 2 wk out’… but if u aint learning, u aint live’n… & I do think we could learn a lot from each other.”

    It’s fair to say they learned a lot from each other, although Anna and McDavid both clarified that their relationship was never physical. For the most part, it seemed one-sided, with Anna brushing McDavid off and telling him to wait until after their “mission.”

    The US Attorney’s Office also handed over a request for a polygraph test on Anna. The request form said the polygraph was to “confirm veracity of [Anna’s] reporting prior to the expenditure of substantial efforts and money based on source’s reporting.”

    But the polygraph test never took place. No documents provided by the FBI or the US Attorney’s Office explain why, and the name of the US prosecutor who signed off on the polygraph request was redacted for “privacy” reasons.

    I asked Reichel if he was surprised at the contents of the documents, considering the FBI had insisted they didn’t exist. He replied with the typical bravado of a criminal defense attorney who’s been proven right.

    “You remember that Johnny Carson bit, Carnac the Magnificent, where he would hold the letter up to his head and predict what was inside?” Reichel said. “I knew exactly what was in those documents.”

    But McDavid’s release was far from certain. Even after securing a deal with the US attorneys office, no one was sure how Judge England, who had previously thrown the book at McDavid, would react to such a bizarre request.

    “The hell that we had been through for so long, we knew we had to pursue it, but it was like, ‘God is this even going to work?'” Esquivel said in an interview. “It was nine years of struggle and fighting and hoping against hope. A lot of hard work and luck came together.”

    There are lingering questions surrounding McDavid’s case. According to Esquivel, the FBI is still withholding 900 pages of documents. And although McDavid cannot sue under the terms of his plea agreement to a single conspiracy charge, a lawyer for Weiner told the Guardian she is considering suing to get her own conviction lifted.

    There is also the case of Steve Lapham, the assistant US attorney in McDavid’s case. Lapham fought McDavid’s Habeas appeal tooth and nail.

    “The government concedes that a relatively small amount of information pertaining to the case was apparently not disclosed to the defense,” Lapham wrote in response to the appeal. “However, the omitted material was either inculpatory or benign. None of the omitted material was exculpatory.”

    It was only after Lapham departed the US Attorney’s Office, according to Tucker, that the government showed any interest in releasing the withheld documents. Lapham is now a judge for the Sacramento County Superior Court.

    February 27, 2015
    by CJ Ciaramella

    Find this story at 27 February 2015

    Copyright Vice.com

    How the FBI Used “Anna” the Informant to Entrap Eric McDavid and other Environmentalists as “Terrorists” (2008)

    Elle Anna Informant Green Scare Eco-terrorism McDavid

    The May issue of Elle has an article on how the FBI paid a young woman, known as “Anna,” to befriend activists and pressure them into illegal activity. Now, some of those she befriended and entrapped, including environmentalist Eric McDavid, are going to prison as terrorists.

    “For two years now, a young woman in camo pants, black sweatshirt, military boots and pink hair, known to both her fellow eco-activists and FBI employers as ‘Anna,’ had been crashing the party.”

    Unfortunately Andrea Todd’s article misses the big picture—questioning the relentless push to label non-violent activists as “terrorists,” and the sleazy methods used to do that– for the sake of glamming up an interesting spy story.

    She falls head-over-heels for the sexiness of the story—shadowy activists in love out to save the world—and swallows a series of absurdities provided by the FBI. Rather than pick apart every paragraph, I wanted to highlight a few good points buried within the sensationalism:

    Eric McDavid, Lauren Weiner and Zachary Jenson are accused of plotting to sabotage a U.S. Forest Service genetics tree lab and the Nimbus Dam. U.S. Attorney McGregor Scott has claimed that damage to the dam would have made “what happened in New Orleans after Hurricane Katrina look like a Sunday pancake breakfast.” Todd reports that Jeff McCracken, a spokesperson for the dam, says the water would just “trickle.” (p. 323)This is an important point when we’re talking about labeling people as “terrorists” who endangered human life. It’s a good example of how the government has consistently twisted the truth in the hopes of chalking up a victory in the “War on Terrorism.”
    The FBI supplied Anna with a ’96 Chevy Lumina, and gas money, and food money, to drive Jenson and Weiner across the country and meet McDavid. There, the FBI paid for a cabin. And on top of that, the FBI supplied bomb-making recipes and materials.All that was needed was a little encouragement. And the FBI supplied that, too.
    At one point when tensions were very high, McDavid tried to calm Anna and Weiner down, saying “relax and chill out and maybe come back and chitchat later.” Weiner agreed, offering to make pasta. Anna flipped out.

    Anna: Tomorrow, what are we planning on doing tomorrow? Are we still planning on doing anything tomorrow? Or should I just stop talking about plans?
    McDavid: Hmmm.
    Weiner: I would love it if you stopped talking.
    Anna: I would love it if you guys followed a plan! How about that! (p. 324)

    This is a critical exchange, because Jenson’s attorneys argued that his client was “entrapped.” In other words, the three were not likely going to commit these crimes, and Anna was trying to push them down that path, in the hopes of getting a big gold star from the FBI.

    “Under cross-examination by Reichel [Jenson’s attorney], Torres [FBI] admitted he hadn’t read all of the literature on informants; nor could he recall any specifics about the Attorney General’s guidelines regarding political protests.” (p. 324)Anna infiltrated lawful gatherings, like a CrimethInc convergence and G8 protests. Todd says that they were secretive and require a special eco-terrorist invitation. In reality, they’re posted widely on the Internet. The danger of tactics like this, beyond ruining the lives of those entrapped and watering down public faith in the criminal justice system, is that basic First Amendment rights are a casualty as well.
    During Jenson’s trial, prosecutors went to great lengths to conceal Anna’s identity, even from the attorneys. Part of the justification was that Anna could be a target for retaliation, retaliation by environmentalists who have yet to harm anyone. If environmentalists are such a threat, why is Anna posing glamour-shot-style in the world’s largest fashion magazine?
    Perhaps the most disturbing piece in all of this is the final section of the article, where Todd interviewed one of the jurors, Diane Bennett.“I said the FBI was an embarrassment,” she says, as other jurors scrambled to unload similar opinions. “I hope he gets a new trial. I’m not happy with the one he got.”
    Bennett said that the foreman “teared up” when he delivered the guilty verdict. But the judge’s instructions were confusing, she said, and “people were tired… we wanted to go home.”

    The piece could have been much worse. As someone posted anonymously on Indymedia in Portland: “Perhaps Andrea Todd deserves a little credit. She was, after all, attempting to write an article about someone who lies for a living.”

    In light of that, has Elle issued a retraction? These stickers have mysteriously appeared in copies of the magazine on newsstands around the country.

    They read, in part:

    Following consultation with federal agencies, we at Elle wish to retract this article. Not because of the stream of factual inaccuracies beginning in the second sentence (there has never been a CrimethInc. convergence in Athens, Georgia), but because in the current political climate it is irresponsible to even pretend to give a fair hearing to radical anti-capitalists. Even if Anna’s story is a cut-and-dried case of entrapment, we have to understand this as a necessary defense of our free market freedoms.

    by WILL POTTER on MAY 2, 2008

    Find this story at 2 May 2008

    Elle article

    Copyright greenisthenewred.com

    FBI Surveillance Of Occupy Wall Street Detailed

    WASHINGTON — Was Tim Franzen stockpiling weapons? What was Tim Franzen’s philosophy? What was his political affiliation? Did Tim Franzen ever talk about violent revolution?

    The Federal Bureau of Investigation wanted to know. In late 2011, an agent or agents — Franzen still isn’t quite sure — began trying to find out. It was during this time that Franzen became a well-known and central presence in Occupy Atlanta. He helped start the Occupy Wall Street offshoot, and had been arrested when police razed their encampment in a downtown Atlanta park.

    After the first police sweep of the park, Franzen told The Huffington Post that the FBI began interviewing his fellow Occupy Atlanta activists about whether Franzen might have a cache of weapons for a future violent revolution. He said the feds interviewed three different activists at their homes about his activities and beliefs.

    “It definitely rattled my cage to have these kids getting knocks on their door,” Franzen said.

    Here’s what the feds would have found out in the course of a background check on the activist: Franzen had a criminal record related to teenage drug use and robberies that supported his habit. But he last spent time in prison when he was 19. Franzen, now 35, went on to found a chain of halfway houses to help people make the transition from addiction to recovery. He later became a community organizer with the Quaker social justice organization American Friends Service Committee, a position he continues to hold while working within Occupy Atlanta.

    During one interview, an FBI agent gave one of Franzen’s fellow activists a business card, which was handed over to Franzen, who decided to call the agent and have a little fun.

    “I have an expert on all things Tim Franzen,” Franzen remembers telling the agent over the phone. “I said, ‘I’m Tim Franzen.’ … He was sort of dumbfounded. He didn’t know what to say.”

    Franzen chastised the federal agent for scaring his younger activist friends. “At first he started denying it,” he said. “He tried to write it off as not a big deal, as sort of protocol.”

    At the end of December, the FBI released internal documents that revealed a coordinated — if quixotic — surveillance of the Occupy Wall Street movement. Just about every law enforcement agency gets a cameo in the correspondence: Homeland Security, the Joint Terrorism Task Force, the Naval Criminal Investigative Service, an entity known as the Domestic Security Alliance Council — and even the Federal Reserve. But the extremely limited disclosure makes it difficult to assess exactly with whom the government agencies were coordinating, or why. Was the FBI attempting to infiltrate and undermine the Occupy movement, or simply trying to keep tabs on protesters who were hoping to spark political change?

    Of the 110 pages released — first obtained by the Partnership for Civil Justice Fund through a Freedom of Information Act request — dozens are heavily redacted. The documents state that 287 additional pages on the FBI’s Occupy activities were “deleted” from the release by the agency for various reasons, including nine labeled “outside the scope” and 14 tagged “duplicate.”

    At times, the documents are contradictory and show FBI agents spreading false information. The earliest memo erroneously describes Adbusters, the Canadian magazine that came up with the idea behind Occupy, as a “self-identified American revolutionary anarchist group.” In another, OWS is lumped in with the “Aryan Nations (sic)” and hacker-activists Anonymous as “domestic terrorists.”

    In response to a request for comment, FBI spokesperson Christopher Allen replied via email, “The FBI cautions against drawing conclusions from redacted FOIA documents.” He continued, “While the FBI is obligated to thoroughly investigate any serious allegations involving threats of violence, we do not open investigations based solely on 1st Amendment activity. In fact, DOJ and the FBI’s own internal guidelines on domestic operations strictly forbid that.”

    If there was a unified mission behind the Occupy surveillance, it appears the purpose was to pass information about activists’ plans to the finance industry. In one memo from August 2011, the FBI discusses informing officials at the New York Stock Exchange about “the planned Anarchist protest titled ‘occupy Wall Street’, scheduled for September 17, 2011.[sic] Numerous incidents have occurred in the past which show attempts by Anarchist groups to disrupt, influence, and or shut down normal business operations of financial districts.”

    The documents reveal that the FBI met with officials from four banks and one credit union, and spoke over the phone with a representative from a fifth bank. The FBI also talked with officials from the Richmond Federal Reserve, a branch of the central bank that covers much of the American South. If the FBI communicated with any of the trillion-dollar banks that were the primary subject of Occupy Wall Street’s economic critique, however, those discussions have been redacted from the documents.

    Citigroup, for example, is not mentioned anywhere the documents, while Bank of America, Wells Fargo, Goldman Sachs and JPMorgan are each mentioned once in passing. No documents show coordination between the FBI and any of those banks — although it would be conspicuous for the FBI to have communicated with smaller banks that were not a major focus of the Occupy movement while ignoring the much larger institutions that were recipients of the 2008-2009 bailouts.

    The few direct communications with banks that are detailed in the documents reveal little evidence of improper behavior. On Oct. 6, 2011, the FBI called Zions Bank to inform the bankers that “Anonymous hactivists” had distributed the personal phone numbers of “the CEOs of Goldman Sachs and JP Morgan Chase” online, implying that Zions executives might also be subject to such treatment per an impending Occupy rally in Salt Lake City, where Zions is headquartered. Zions declined to comment on the call for this article, but the bank — which has about 2 percent of the total assets of JPMorgan — has not been a target of Occupy rhetoric before or since the FBI call.

    The only other banks named in the FBI documents are Hancock Bank, Peoples Bank, Bancorp South and Regions Bank — all of which declined to comment for this article. The FBI attended a Nov. 16, 2011, meeting of officials from those banks in Biloxi, Miss., where someone from Hancock Bank warned attendees to expect an Occupy protest on Dec. 7 that could include a “sit-in” or efforts to “lock the bank doors.”

    None of the banks mentioned in the FBI file would comment on whether the FBI met regularly with bank officials. Bank robbery is a federal crime, which gives FBI jurisdiction.

    All of these banks would have been small-ball for a protest movement that targeted massive income inequality and outrageous executive pay. But if the FBI was issuing warnings to and meeting on security issues with these smaller banks, they were almost certainly having talks with bigger New York banks — meaning the portrait of the FBI’s activities around Occupy, insofar as the internal documents are concerned, is likely incomplete in a significant dimension.

    Recent FBI investigations have at times put big banks in a negative light, but have yet to result in major actions against financial institutions. In July 2012, an FBI probe found that Bank of America had allowed a Mexican drug cartel to launder money through the bank. While BofA has yet to face any fines for the episode, the head of the FBI in Charlotte, N.C., BofA’s headquarters, recently left the law enforcement agency for a job at Bank of America.

    While the FBI communicated with the financial sector about Occupy, it’s unclear the degree to which they engaged with actual Occupy activists like Franzen.

    Kevin Zeese was one of the founding organizers of Occupy Washington, D.C., which set up camp just blocks from FBI headquarters and the Department of Justice. Zeese told HuffPost that infiltration by law enforcement agents or informants was an issue, but whether much of it was just shadowy conspiracy or serious agitating remains a mystery.

    In one exchange he had with a Homeland Security officer, Zeese said the agent knew a key detail about a scheduled protest at the Environmental Protection Agency. Zeese joked that the officer knew more than he did about what was going on.

    Zeese did remember one FBI agent who would bike over to the camp. Some of the younger activists talked regularly with the agent. “He was open about it,” Zeese said. “He would ride through on a bike with the FBI thing on his back.” The agent ended up spending a weekend at the camp and even donating funds to help pay for security.

    Whether law enforcement had a hand in breaking up camps, Zeese said, “I can’t tell.” To which he added, “Down the road, there may be proof.”

    Franzen suggests that federal agents conducted more clandestine activities than simple Internet searches and protest monitoring. Occupiers frequently complained that the more outspoken activists within their ranks appeared to be targeted by police for arrest. Franzen said there is a connection between the agent who inquired about him among his friends and his subsequent arrest at a protest. He chronicled the incident on his blog a year ago:

    Before the police officers warned the crowd to disperse from the street I had already gotten onto the side walk. One of the police Lieutenants yelled to his officers, ‘Get him’ and pointed at me. The police had to worm their way through the crowd in order to grab me and drag me into the street.
    When I was dragged into the street, I asked the lieutenant what he was doing and he said, ‘arresting you.’
    ‘For what,’ I asked.
    ‘For being in the street,’ he said.
    ‘But I was on the sidewalk,’ I replied.
    ‘You’re not now,’ he said with a smile.

    Jason Cherkis
    Zach Carter
    Posted: 01/05/2013 7:42 am EST Updated: 01/23/2014 6:58 pm EST

    Find this story at 23 January 2013

    Copyright ©2015 TheHuffingtonPost.com, Inc.

    Dissent or Terror: Counterterrorism Apparatus Used to Monitor Occupy Movement Nationwide

    Newly revealed documents show how police partnered with corporations to monitor the Occupy Wall Street movement. DBA Press and the Center for Media and Democracy have obtained thousands of pages of records from counterterrorism and law enforcement agencies that detail how so-called fusions centers monitored the Occupy Wall Street movement over the course of 2011 and 2012. These fusion centers are comprised of employees from municipal, county and federal counterterrorism and homeland security entities, as well as local police departments, the FBI and the Department of Homeland Security.

    Click here to see our extensive coverage of the police crackdown of the Occupy movement.

    Read full report on government surveillance of Occupy movement by the Center for Media and Democracy / DBA Press.

    TRANSCRIPT:

    AMY GOODMAN: Matt Rothschild, it’s great to have you with us, editor of The Progressive magazine. And he did this very interesting story, a cover story for June issue of the magazine, “Spying on Occupy Activists: How Cops and Homeland Security Help Wall Street.” Can you compare what you have found—and start off by saying why Phoenix. Why did you focus on Phoenix?

    MATTHEW ROTHSCHILD: Well, I focused on Phoenix because the primary researcher for this story, Beau Hodai of DBA Press and the Center for Media and Democracy, had compiled tremendous amounts of information. He had issued Freedom of Information Act requests from the Phoenix Police Department, from the Arizona Counter Terrorism Information Center. And so, he got thousands, literally thousands, of pages of information, primarily about Phoenix and Arizona, but also some national context. But I thought by focusing on this one city, you could really tell, at the most granular level, how police officers and Homeland Security are really going after left-wing activists. And I thought it was important to really focus in narrowly, because I think those narrow details really give a clearer picture of just how hand-in-glove local law enforcement is with the private sector in going after these Occupy protesters.

    AMY GOODMAN: How does this compare to the IRS monitoring tea party groups or, you know, sort of specially targeting them for deciding whether they should get nonprofit status?

    MATTHEW ROTHSCHILD: Well, I thought it was outrageous what the IRS was doing in that Cincinnati office. But this, to me, is much worse because, whereas the IRS office in Cincinnati, that may have been, you know, a bureaucratic mistake or bungling or lack of supervision, what’s going on with the spying on Occupy activists was a systematic effort by police departments, not just in Phoenix, but around the country, with Homeland Security, to track the Occupy activists—and to coordinate a response, even. One of the documents that Beau Hodai released, from the Center for Media and Democracy and DBA Press, was a file—a report on a teleconference that 13 police departments around the country had as to how to respond to Occupy, what they called “growing concerns” about the burgeoning Occupy movement, and that they needed to coordinate an effective response. And so, you know, when we had that crackdown on Occupy simultaneously over a weekend in many different cities, I wondered at the time whether there wasn’t coordination going on between the police departments to crush the Occupy movement. And this suggests that there was.

    NERMEEN SHAIKH: Matt Rothschild, you also speak specifically about the way in which protests against the NDAA, the National Defense Authorization Act, occurred. Could you elaborate on that and why that was a particular focus of law enforcement?

    MATTHEW ROTHSCHILD: Yeah, there’s documents, again, that show that police, from the U.S. Capitol Police all the way to the Phoenix Police Department, were monitoring protests of the National Defense Authorization Act. The National Defense Authorization Act allows the president of the United States to grab any single one of us and throw us into jail and deny us due process and access to a judge for as long as the president says so. And so, this is a huge clampdown on our civil liberties, and people should be protesting it. And it’s ironic that people trying to defend their civil liberties are having their civil liberties violated at the same time.

    AMY GOODMAN: Matt Rothschild, explain what these fusion centers are and how they work, both with public law enforcement and with private companies.

    MATTHEW ROTHSCHILD: Well, this is a real problem I have with fusion centers, Amy. Fusion centers are—in each state, there’s a fusion center. And the fusion center is supposed to represent law enforcement at every level, from, you know, campus police to city police, to sheriffs, to the FBI and state police. But also, within these fusion centers, there are representatives of the private sector. And there’s also an organization called InfraGard in these fusion centers. Now, InfraGard is an association of more than 50,000 business people with the FBI. They’re essentially FBI minders, with these business people in each state. And sometimes these business people get information from the FBI even before elected officials get it. And also, the FBI tells these business members of InfraGard, “Hey, if you ever have a problem with an employee, just let us know.” And so, you know, is this the kind of collaboration we want? That a boss, who doesn’t like what you’re doing on the workplace—maybe you’re forming a union, the boss calls the FBI, and then what? The FBI opens a file on you? We need to be careful of this institution called InfraGard, too, which was part of the Arizona fusion center, by the way.

    AMY GOODMAN: Matt, we want to thank you for being with us. Matt Rothschild, editor and publisher of The Progressive magazine, wrote the cover story for the June issue of the magazine, “Spying on Occupy Activists: How Cops and Homeland Security Help Wall Street.” The piece draws heavily on documents obtained by the Center for Media and Democracy and DBA Press. Matt Rothschild is also author of You Have No Rights: Stories of America in an Age of Repression.

    WEDNESDAY, MAY 22, 2013

    Watch Part One of our interview with Matthew Rothschild of The Progressive

    Find this story at 22 May 2013

    Creative Commons License The original content of this program is licensed under a Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 United States License. Please attribute legal copies of this work to democracynow.org. Some of the work(s) that this program incorporates, however, may be separately licensed. For further information or additional permissions, contact us.

    Home Stations Past Shows Topics Blog Get Involved Events Español About Contact Donate Mobile Site

    << oudere artikelen  nieuwere artikelen >>