• Buro Jansen & Janssen is een onderzoeksburo dat politie, justitie, inlichtingendiensten, de overheid in Nederland en Europa kritisch volgt. Een grond-rechten kollektief dat al 30 jaar publiceert over uitbreiding van repressieve wetgeving, publiek-private samenwerking, bevoegdheden, overheids-optreden en andere staatsaangelegenheden.
    Buro Jansen & Janssen Postbus 10591, 1001EN Amsterdam, 020-6123202, 06-34339533, signal +31684065516, info@burojansen.nl (pgp)
    Steun Buro Jansen & Janssen. Word donateur, NL43 ASNB 0856 9868 52 of NL56 INGB 0000 6039 04 ten name van Stichting Res Publica, Postbus 11556, 1001 GN Amsterdam.

  • Categorieën

  • Europe shared spy data with US; Europe spy services ‘shared phone data’

    The NSA says European spy services shared phone data with it, and reports alleging otherwise are ‘false’.

    MILLIONS of phone records at the centre of a firestorm in Europe over spying by the National Security Agency were secretly supplied to the US by European intelligence services – not collected by the NSA, upending a furore that cast a pall over trans-Atlantic relations.

    The revelations suggest a greater level of European involvement in global surveillance, in conjunction at times with the NSA. The disclosures also put European leaders who loudly protested reports of the NSA’s spying in a difficult spot, showing how their spy agencies aided the Americans.

    The phone records collected by the Europeans – in war zones and other areas outside their borders – were shared with the NSA as part of efforts to help protect American and allied troops and civilians, US officials said.

    European leaders remain chagrined over revelations that the US was spying on dozens of world leaders, including close allies in Europe.

    The new disclosures were separate from those programs, but they underline the complexities of intelligence relationships, and how the US and its allies co-operate in some ways and compete in others.

    “That the evil NSA and the wicked US were the only ones engaged in this gross violation of international norms -that was the fairy tale,” said James Lewis, a former State Department official, now a technology-policy specialist at the Centre for Strategic and International Studies.

    “It was never true. The US’s behaviour wasn’t outside the norm. It is the norm.”

    Consecutive reports in French, Spanish and Italian newspapers over the past week sparked a frenzy of finger-pointing by European politicians. The reports were based on documents leaked by former NSA contractor Edward Snowden and purportedly showed the extent to which the NSA sweeps up phone records in those countries.

    France’s Le Monde said the documents showed that more than 70 million French phone records between early December last year and early January this year were collected by the NSA, prompting Paris to lodge a protest with the US. In Spain, El Mundo reported that it had seen NSA documents that showed the US spy agency had intercepted 60.5 million Spanish phone calls during the same time period.

    US officials initially responded to the reports by branding them as inaccurate, without specifying how. Late yesterday, The Wall Street Journal reported that the data cited by the European news reports wasn’t collected by the NSA but by its European partners.

    US officials said the data was provided to the NSA under long-standing intelligence sharing arrangements.

    Hours later, in a congressional hearing, the National Security Agency director, General Keith Alexander, confirmed the broad outlines of the Journal report, saying the specific documents released by Mr Snowden didn’t represent data collected by the NSA or any other US agency and didn’t include records from calls within those countries.

    He said the data, displayed in computer-screen shots, was instead from a system that contained phone records collected by the US and NATO countries “in defence of our countries and in support of military operations”.

    He said conclusions the US collected the data were “false. And it’s false that it was collected on European citizens. It was neither.”

    The US until now had been silent about the role of European partners in these collection efforts to protect the relationships. French officials declined to comment.

    A Spanish official said Spain’s intelligence collaboration with the NSA has been limited to theatres of operations in Afghanistan, Mali and international operations against jihadist groups. The data published in El Mundo was gathered during these operations, not in Spain.

    At yesterday’s house intelligence committee hearing, politicians pressed General Alexander and Director of National Intelligence James Clapper on the NSA’s tapping of world leaders’ phone conversations, including the German Chancellor, Angela Merkel.

    Asked whether US allies spy on the US, Mr Clapper said: “Absolutely.”

    Democrat congressman Adam Schiff asked why congress had not been informed when US spies tapped a world leader’s telephone.

    Mr Clapper said congress wasn’t told about each and every “selector”, the intelligence term for a phone number or other information that would identify an espionage target.

    “Not all selectors are equal,” Mr Schiff responded, especially “when the selector is the chancellor of an allied nation.”

    Mr Clapper said intelligence agencies followed the priorities set by the President and key departments, but did not necessarily provide top officials with details on how each requirement was being fulfilled.

    The White House did, however, see the final product, he said.

    Reporting to policymakers on the “plans and intentions” of world leaders was a standard request to intelligence agencies such as the NSA, Mr Clapper said, and the best way to understand a foreign leader’s intentions was to obtain their communications.

    Privately, some intelligence officials disputed claims that the President and top White House officials were unaware of how such information was obtained.

    “If there’s an intelligence report that says the leader of this country is likely to say X or Y, where do you think that comes from?” the official said

    Adam Entous and Siobhan Gorman
    The Wall Street Journal
    October 31, 2013 12:00AM

    Find this story at 31 October 2013

    © www.theaustralian.com.au

    NSA spy row: France and Spain ‘shared phone data’ with US

    Spain and France’s intelligence agencies carried out collection of phone records and shared them with NSA, agency says

    European intelligence agencies and not American spies were responsible for the mass collection of phone records which sparked outrage in France and Spain, the US has claimed.

    General Keith Alexander, the head of the National Security Agency, said reports that the US had collected millions of Spanish and French phone records were “absolutely false”.

    “To be perfectly clear, this is not information that we collected on European citizens,” Gen Alexander said when asked about the reports, which were based on classified documents leaked by Edward Snowden, the former NSA contractor.

    Shortly before the NSA chief appeared before a Congressional committee, US officials briefed the Wall Street Journal that in fact Spain and France’s own intelligence agencies had carried out the surveillance and then shared their findings with the NSA.

    The anonymous officials claimed that the monitored calls were not even made within Spanish and French borders and could be surveillance carried on outside of Europe.
    Related Articles
    GCHQ monitors luxury hotel bookings made by foreign diplomats 17 Nov 2013
    US spy chief defends spying on foreign leaders 30 Oct 2013
    Germany, France and Spain ‘were all spying on citizens’ 01 Nov 2013
    Anger in France over claims that NSA spied on politicians, business leaders as well as terrorists 21 Oct 2013
    NSA spying: US should not be collecting calls on allies, says top senator 28 Oct 2013
    Russia ‘spied on G20 leaders with USB sticks’ 29 Oct 2013

    In an aggressive rebuttal of the reports in the French paper Le Monde and the Spanish El Mundo, Gen Alexander said “they and the person who stole the classified data [Mr Snowden] do not understand what they were looking at” when they published slides from an NSA document.

    The US push back came as President Barack Obama was said to be on the verge of ordering a halt to spying on the heads of allied governments.

    The White House said it was looking at all US spy activities in the wake of leaks by Mr Snowden but was putting a “special emphasis on whether we have the appropriate posture when it comes to heads of state”.

    Mr Obama was reported to have already halted eavesdropping at UN’s headquarters in New York.

    German officials said that while the White House’s public statements had become more conciliatory there remained deep wariness and that little progress had been made behind closed doors in formalising an American commitment to curb spying.

    “An agreement that you feel might be broken at any time is not worth very much,” one diplomat told The Telegraph.

    “We need to re-establish trust and then come to some kind of understanding comparable to the [no spy agreement] the US has with other English speaking countries.”

    Despite the relatively close US-German relations, the White House is reluctant to be drawn into any formal agreement and especially resistant to demands that a no-spy deal be expanded to cover all 28 EU member states.

    Viviane Reding, vice-president of the European Commission and EU justice commissioner, warned that the spying row could spill over and damage talks on a free-trade agreement between the EU and US.

    “Friends and partners do not spy on each other,” she said in a speech in Washington. “For ambitious and complex negotiations to succeed there needs to be trust among the negotiating partners. It is urgent and essential that our US partners take clear action to rebuild trust.”

    A spokesman for the US trade negotiators said it would be “unfortunate to let these issues – however important – distract us” from reaching a deal vital to freeing up transatlantic trade worth $3.3 billion dollars (£2bn) a day.

    James Clapper, America’s top national intelligence, told a Congressional hearing yesterday the US does not “spy indiscriminately on the citizens of any country”.

    “We do not spy on anyone except for valid foreign intelligence purposes, and we only work within the law,” Mr Clapper said. “To be sure on occasions we’ve made mistakes, some quite significant, but these are usually caused by human error or technical problems.”

    Pressure from European leaders was added to as some of the US intelligence community’s key Congressional allies balked at the scale of surveillance on friendly governments.

    Dianne Feinstein, the chair of powerful Senate intelligence committee, said she was “totally opposed” to tapping allied leaders and called for a wide-ranging Senate review of the activities of US spy agencies.

    “I do not believe the United States should be collecting phone calls or emails of friendly presidents and prime ministers,” she said.

    John Boehner, the Republican speaker of the house and a traditional hawk on national security, said US spy policy was “imbalanced” and backed calls for a review.

    Mr Boehner has previously been a staunch advocate of the NSA and faced down a July rebellion by libertarian Republicans who tried to pass a law significantly curbing the agency’s power.

    By Raf Sanchez, Peter Foster in Washington

    8:35PM GMT 29 Oct 2013

    Find this story at 29 October 2013

    © Copyright of Telegraph Media Group Limited 2013

    ‘We didn’t spy on the Europeans, their OWN governments did’, says NSA (but still no apology for tapping German chancellor Merkel’s phone)

    Gen. Keith Alexander, the National Security Agency director, says foreign governments spied on their own people and shared data with the U.S.
    The NSA had been accused of snooping on 130.5 million phone calls in France and Spain, and keeping computerized records
    Sen. Dianne Feinstein said newspapers in Europe ‘got it all wrong’

    Alexander’s denial will fall heavily on the fugitive leaker Edward Snowden and his journalist cohorts, whom the NSA chief said ‘did not understand what they were looking at’
    The National Security Agency’s director flatly denied as ‘completely false’ claims that U.S. intelligence agencies monitored tens of millions of phone calls in France and Spain during a month-long period beginning in late 2012.

    Gen. Keith Alexander contradicted the news reports that said his NSA had collected data about the calls and stored it as part of a wide-ranging surveillance program, saying that the journalists who wrote them misinterpreted documents stolen by the fugitive leaker Edward Snowden.

    And a key Democratic senator added that European papers that leveled the allegations ‘got it all wrong’ with respect to at least two countries – saying that it was those nations’ intelligence services that collected the data and shared it with their U.S. counterparts as part of the global war on terror.

    Protests: (Left to right) NSA Deputy Director Chris Inglis, NSA Director General Keith Alexander and DNI James Clapper look on as a protestor disrupts the Capitol Hill hearing

    National Security Agency Director Gen. Keith Alexander testified Tuesday that the governments of France and Spain conducted surveillance on their own citizens’ phone conversations, and then shared the intelligence data with the U.S.

    On Monday newspapers in three countries published computer-screen images, reportedly provided by Snowden, showing what appeared to be data hoovered up by the United States from European citizens’ phone calls.

    But Alexander testified in a House Intelligence Committee hearing that ’those screenshots that show – or lead people to believe – that we, the NSA, or the U.S., collect that information is false.’

    ‘The assertions by reporters in France, Spain and Italy that NSA collected tens of millions of phone calls are completely false,’ Alexander said.

    According to the French newspaper Le Monde and the Spanish daily El Mundo, the NSA had collected the records of at least 70 million phone calls in France and another 60.5 million in Spain between December and January.

    Italy’s L’Espresso magazine also alleged, with help from Snowden, that the U.S. was engaged in persistent monitoring of Italy’s telecommunications networks.

    General Alexander denied it all.

    ‘To be perfectly clear, this is not information that we collected on European citizens. It represents information that we and our NATO allies have collected in defense of our countries and in support of military operations.’

    Reporters, he added, ‘cite as evidence screen shots of the results of a web tool used for data management purposes, but both they and the person who stole the classified data did not understand what they were looking at.’

    President Barack Obama said he is instituting a complete review of U.S. intelligence procedures in the wake of stinging allegations that the NSA has been peeping on foreign leaders through their phones and email accounts

    California Democratic Sen. Dianne Feinstein, who chairs the Senate Intelligence Committee, said Tuesday that ’the papers got it all wrong on the two programs, France and Germany.’

    ‘This was not the United States collecting on France and Germany. This was France and Germany collecting. And it had nothing to do with their citizens, it had to do with collecting in NATO areas of war, like Afghanistan.’

    Feinstein on Monday called for a complete review of all the U.S. intelligence community’s spying programs, saying that ‘Congress needs to know exactly what our intelligence community is doing.’

    In the weekend’s other intelligence bombshell, the U.S. stood accused of snooping on German Chancellor Angela Merkel’s cell phone and spying on Mexican President Felipe Calderon’s private emails.

    But Director of National Intelligence James Clapper told the committee that spying on foreign leaders is nothing new.

    ‘That’s a hardy perennial,’ he said, ‘and as long as I’ve been in the intelligence business, 50 years, leadership intentions, in whatever form that’s expressed, is kind of a basic tenet of what we are to collect and analyze.’

    ‘It’s one of the first things I learned in intel school in 1963,’ he assured the members of Congress, saying that the U.S. routinely spies on foreign leaders to ascertain their intentions, ‘no matter what level you’re talking about. That can be military leaders as well.’

    Clapper hinted that committee members had been briefed on such programs, saying that in cases where the NSA is surveilling foreign leaders, ’that should be reported to the committee … in considerable detail’ as a ‘significant’ intelligence activity over which Congress has oversight.’

    He added that ‘we do only what the policymakers, writ large, have actually asked us to do.’

    Republican committee chair Mike Rogers of Michigan began the hearing by acknowledging that ‘every nation collects foreign intelligence’ and ’that is not unique to the United States’.

    Clapper pleaded with the panel to think carefully before restricting the government’s ability to collect foreign intelligence, warning that they would be ‘incurring greater risks’ from overseas adversaries.

    Gen. Alexander dispensed with his prepared statement and spoke ‘from the heart,’ saying that his agency would rather ’take the beatings’ from reporters and the public ’than … give up a program’ that would prevent a future attack on the nation.

    The Wall Street Journal reported Tuesday afternoon that other U.S. officials had confirmed Alexander’s version of events, and that the electronic spying in France and Spain was carried out by those nations’ governments.

    The resulting phone records, they said, were then shared with the NSA as part of a program aimed at keeping U.S. military personnel and civilians safe in areas of military conflict.

    None of the nations involved would speak to the Journal about their own level of involvement in a scandal that initially touched only the U.S., but which now promises to embroil intelligence services on a global scale.

    By David Martosko, U.s. Political Editor

    PUBLISHED: 21:45 GMT, 29 October 2013 | UPDATED: 10:59 GMT, 30 October 2013

    Find this story at 29 October 2013

    © Associated Newspapers Ltd

     

    NSA Powerpoint Slides on BOUNDLESSINFORMANT

    These 4 slides are from the powerpoint “BOUNDLESSINFORMANT: Describing Mission Capabilities from Metadata Records.” They include the cover page and pages 3, 5, and 6 of the presentation. The powerpoint, leaked to the Guardian newspaper’s Glenn Greenwald by Edward Snowden, was first released by the Guardian newspaper on June 8, 2013 at this web page: http://www.guardian.co.uk/world/interactive/2013/jun/08/nsa-boundless-informant-data-mining-slides

    Also included with this collection is a “heat map” of parts of the world most subject to surveillance by Boundless Informant. This image was embedded in the Guardian’s story, which described Boundless Informant as “the NSA’s secret tool to track global surveillance data,” which collected “almost 3 billion pieces of intelligence from US computer networks over a 30-day period ending in March 2013.” http://www.theguardian.com/world/2013/jun/08/nsa-boundless-informant-global-datamining

    UNCLASSIFIED//FOR OFFICIAL USE ONLY
    BOUNDLESSINFORMANT – Frequently Asked Questions
    09-06-2012

     

    (U/FOUO) Questions

     

    1) What is BOUNDLESSINFORMANT! What is its purpose?

    2) Who are the intended users of the tool?

    3) What are the different views?

    4) Where do you get your data?

    5) Do you have all the data? What data is missing?

    6) Why are you showing metadata record counts versus content?

    7) Do you distinguish between sustained collect and survey collect?

    8) What is the technical architecture for the tool?

    9) What are some upcoming features/enhancements?

    1 0) How are new features or views requested and prioritized?

    1 1) Why are record counts different from other tools like ASDF and What’s On Cover?

    12) Why is the tool NOFORN? Is there a releasable version?

    13) How do you compile your record counts for each country?

     

    Note: This document is a work-in-progress and will be updated frequently as additional
    questions and guidance are provided.

    1) (U) What is BOUNDLESSINFORMANT? What is its purpose?

    (U//FOUO) BOUNDLESSINFORMANT is a GAO prototype tool for a self-documenting SIGINT
    system. The purpose of the tool is to fundamentally shift the manner in which GAO describes its
    collection posture. BOUNDLESSINFORMANT provides the ability to dynamically describe GAO’s
    collection capabilities (through metadata record counts) with no human intervention and graphically
    display the information in a map view, bar chart, or simple table. Prior to

    BOUNDLESSINFORMANT, the method for understanding the collection capabilities of GAO’s
    assets involved ad hoc surveying of repositories, sites, developers, and/or programs and offices. By
    extracting information from every DNI and DNR metadata record, the tool is able to create a near real-
    time snapshot of GAO’s collection capability at any given moment. The tool allows users to select a
    country on a map and view the metadata volume and select details about the collection against that
    country. The tool also allows users to view high level metrics by organization and then drill down to a
    more actionable level – down to the program and cover term.

    Sample Use Cases

    • (U//FOUO) How many records are collected for an organizational unit (e.g. FORNSAT)?

    • (U//FOUO) How many records (and what type) are collected against a particular country?

    • (U//FOUO) Are there any visible trends for the collection?

    • (U//FOUO) What assets collect against a specific country? What type of collection?

    • (U//FOUO) What is the field of view for a specific site? What countriees does it collect
    against? What type of collection?

    2) (U) Who are the intended users of the tool?

    • (U//FOUO) Mission and collection managers seeking to understand output characteristics
    of a site based on what is being ingested into downstream repositories. .

    (U//FOUO) Strategic Managers seeking to understand top level metrics at the

     

    organization/office level or seeking to answer data calls on NSA collection capability.

    BOUNDLESSINFORMANT – FAQ Page 1 o:

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

     

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

    BOUNDLESSINFORMANT – Frequently Asked Questions

    09-06-2012

    • (U//FOUO) Analysts looking for additional sites to task for coverage of a particular

    technology within a specific country.

    3) What are the different views?

    (U//FOUO) Map View – The Map View is designed to allow users to view overall DNI, DNR, or
    aggregated collection posture of the agency or a site. Clicking on a country will show the collection
    posture (record counts, type of collection, and contributing SIGADs or sites) against that particular
    country in addition to providing a graphical display of record count trends. In order to bin the records
    into a country, a normalized phone number (DNR) or an administrative region atom (DNI) must be
    populated within the record. Clicking on a site (within the Site Specific view) will show the viewshed
    for that site – what countries the site collects against.

    (U//FOUO) Org View – The Organization View is designed to allow users to view the metadata record
    counts by organizational structure (i.e. GAO – SSO – RAM-A – SPINNERET) all the way down to the
    cover term. Since it’s not necessary to have a normalized number or administrative region populated,
    the numbers in the Org View will be higher than the numbers in the Map View.

    (U//FOUO) Similarity View – The Similarity View is currently a placeholder view for an upcoming
    feature that will graphically display sites that are similar in nature. This can be used to identify areas
    for a de-duplication effort or to inform analysts of additional SIGADs to task for queries (similar to
    Amazon’s “if you like this item, you’ll also like these” feature).

     

    4) (U) Where do you get your data?

    (U//FOUO) BOUNDLESSINFORMANT extracts metadata records from GM-PLACE post-
    FALLOUT (DNI ingest processor) and post-TUSKATTIRE (DNR ingest processor). The records are
    enriched with organization information (e.g. SSO, FORNSAT) and cover term. Every valid DNI and
    DNR metadata record is aggregated to provide a count at the appropriate level. See the different views
    question above for additional information.

     

    5) (U) Do you have all the data? What data is missing?

    • (U//FOUO) The tool resides on GM-PLACE which is only accredited up to TS//SI//NOFORN.
    Therefore, the tool does not contain ECI or FISA data.

    • (U//FOUO) The Map View only shows counts for records with a valid normalized number
    (DNR) or administrative region atom (DNI).

    • (U//FOUO) Only metadata records that are sent back to NSA-W through FASCIA or
    FALLOUT are counted. Therefore, programs with a distributed data distribution system (e.g.
    MUSCULAR and Terrestrial RF) are not currently counted.

    • (U//FOUO) Only SIGINT records are currently counted. There are no ELINT or other “INT”
    records included.

    6) (U) Why are you showing metadata record counts versus content?

    (U//FOUO)

    7) (U ) Do you distin g uish between sustained collect and survey collect?

    (U//FOUO) The tool currently makes no distinction between sustained collect and survey collect. This
    feature is on the roadmap.

     

    BOUNDLESSINFORMANT – FAQ Page 2 o:

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

     

    UNCLASSIFIED//FOR OFFICIAL USE ONLY
    BOUNDLESSINFORMANT – Frequently Asked Questions
    09-06-2012

     

    8) What is the technical architecture for the tool?

    Click here for a graphical view of the tool’s architecture

    (U//FOUO) DNI metadata (ASDF), DNR metadata (FASCIA) delivered to Hadoop
    Distributed File System (HDFS) on GM-PLACE

    (U//FOUO) Use Java MapReduce job to transform/filter and enrich FASCIA/ASDF data with
    business logic to assign organization rules to data

    (U//FOUO) Bulk import of DNI/DNR data (serialized Google Protobuf objects) into
    Cloudbase (enabled by custom aggregators)

    (U//FOUO) Use Java web app (hosted via Tomcat) on MachineShop (formerly Turkey Tower)
    to query Cloudbase

    (U//FOUO) GUI triggers queries to CloudBase – GXT (ExtGWT)

     

    9) What are some upcoming features/enhancements?

    • (U//FOUO) Add technology type (e.g. JUGGERNAUT, LOPER) to provide additional
    granularity in the numbers

    (U//FOUO) Add additional details to the Differential view

    (U//FOUO) Refine the Site Specific view

    (U//FOUO) Include CASN information

    (U//FOUO) Add ability to export data behind any view (pddg,sigad,sysid,casn,tech,count)

    (U//FOUO) Add in selected (vs. unselected) data indicators

    (U//FOUO) Include filter for sustained versus survey collection

     

    10) How are new features or views requested and prioritized?

    (U//FOUO) The team uses Flawmill to accept user requests for additional functionality or
    enhancements. Users are also allowed to vote on which functionality or enhancements are most
    important to them (as well as add comments). The BOUNDLESSINFORMANT team will periodically
    review all requests and triage according to level of effort (Easy, Medium, Hard) and mission impact
    (High, Medium, Low). The team will review the queue with the project champion and government
    steering committee to be added onto the BOUNDLESSINFORMANT roadmap.

    1 1) Why are record counts different from other tools like ASDF and What’s On

    Cover?

    (U//FOUO) There are a number of reasons why record counts may vary. The purpose of the tool is to
    provide

     

    BOUNDLESSINFORMANT – FAQ

     

    Page 3 o:

     

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

    July 13, 2012

    Find this story at  txt

    Find this story at jpeg

    Find this story at pdf

    Order of Battle of the CIA-NSA Special Collection Service (SCS)

    The following page from an August 13, 2010 NSA powerpoint presentation on the joint CIA-NSA clandestine SIGINT unit known as the Special Collection Service (SCS) appeared on the Der Spiegel website last week. It has since be replaced by a heavily redacted version of the same page which deletes the locations of all SCS listening posts outside of Europe.

    The page shows the locations of all SCS listening posts around the world as of August 2010, of which 74 were active, 3 were listed as being dormant, 14 were unmanned remote controlled stations, three sites were then being surveyed, and two were listed as being “technical support activities.”

    In Europe, SCS sites were located at Athens and embassy annex, Baku, Berlin, Budapest, RAF Croughton (UK), Frankfurt, Geneva, Kiev, Madrid, Milan, Moscow and embassy annex, Paris, Prague, Pristina, Rome, Sarajevo, Sofia, Tblisi, Tirana, Vienna and embassy annex, and Zagreb.

    In Asia SCS were located at Bangkok and PSA, Beijing, Chengdu, Chiang Mai, Hong Kong, Jakarta, Kuala Lumpur, Manila, Phnom Penh, Rangoon, Shanghai, and Taipei.

    In the Middle East and North Africa (MENA) region, SCS sites were located at Abu Dhabi, Algiers, Amman, Amarah, Ankara, Baghdad and embassy annex, Basrah, Beirut, Benghazi, Cairo, Damascus, Istanbul, Jeddah, Khartoum, Kirkuk, Kuwait City, Manama, Mosul, Riyadh, Sana’a, Sulaymaniyah, Talil(?), “Tehran-in-Exile”, and Tripoli.

    In South Asia, SCS sites were located at one site illegible, Islamabad, Herat, Kabul and embassy annex, Karachi, Lahore, New Delhi, and Peshawar.

    In Africa, SCS sites were located inside the U.S. embassies in Abuja, Addis Ababa, Bamako, Lagos, Nairobi, Monrovia, Kinshasa, Lusaka, and Luanda.

    In Central America and the Caribbean, SCS sites were located at Guadalajara, Guatemala City, Havana, Hermosillo, Managua, Mexico City, Monterrey, Panama City, San Jose, and Tegucigalpa.

    And in South America, SCS sites were located in Brasilia, Bogota, Caracas, La Paz, Merida and Quito.

    Any corrections to the above would be gratefully received.

    Matthew M. Aid is the author of Intel Wars: The Secret History of the Fight Against Terror (January 2012) and The Secret Sentry, the definitive history of the National Security Agency. He is a leading intelligence historian and expert on the NSA, and a regular commentator on intelligence matters for the New York Times, the Financial Times, the National Journal, the Associated Press, CBS News, National Public Radio (NPR) and many others. He lives in Washington, DC.

    October 28, 2013

    Find this story at 28 October 2013

    Der Spiegel pdf 

    Der Spiegel unredacted image

    The Radome Archipelago (1999)

    During the Cold War there were hundreds of secret remote listening posts spread around the globe. From large stations in the moors of Scotland and mountains of Turkey that were complete with golf balllike structures called “radomes” to singly operated stations in the barren wilderness of Saint Lawrence Island between Alaska and Siberia that had only a few antennae, these stations constituted the ground-based portion of the United States Signals Intelligence (SIGINT) System or “USSS.”

    Operated by the supersecret National Security Agency (NSA), these stations were designed to intercept Morse Code, telephone, telex, radar, telemetry, and other signals emanating from behind the Iron Curtain. At one time, the NSA contemplated a worldwide, continuously operated array of 4120 intercept stations. While the agency never achieved that goal, it could still boast of several hundred intercept stations. These included its ground-based “outstations,” which were supplemented by other intercept units located on ships, submarines, aircraft (from U-2s to helicopters), unmanned drones, mobile vans, aerostats (balloons and dirigibles), and even large and cumbersome backpacks.

    With the collapse of the Communist “bloc” and the advent of microwaves, fiber optics, and cellular phones, NSA’s need for numerous ground-based intercept stations waned. It began to rely on a constellation of sophisticated SIGINT satellites with code names like Vortex, Magnum, Jumpseat, and Trumpet to sweep up the world’s satellite, microwave, cellular, and high-frequency communications and signals. Numerous outstations met with one of three fates: they were shut down completely, remoted to larger facilities called Regional SIGINT Operations Centers or “RSOCs,” or were turned over to host nation SIGINT agencies to be operated jointly with NSA.

    However, NSA’s jump to relying primarily on satellites proved premature. In 1993, Somali clan leader Mohammed Farah Aideed taught the agency an important lesson. Aideed’s reliance on older and lower-powered walkie-talkies and radio transmitters made his communications virtually silent to the orbiting SIGINT “birds” of the NSA. Therefore, NSA technicians came to realize there was still a need to get in close in some situations to pick up signals of interest. In NSA’s jargon this is called improving “hearability.”

    As NSA outstations were closed or remoted, new and relatively smaller intercept facilities such as the “gateway” facility in Bahrain, reportedly used for retransmit signals intercepted in Baghdad last year to the U.S. sprang up around the world. In addition to providing NSA operators with fresh and exotic duty stations, the new stations reflected an enhanced mission for NSA economic intelligence gathering. Scrapping its old Cold War A and B Group SIGINT organization, NSA expanded the functions of its W Group to include SIGINT operations against a multitude of targets. Another unit, M Group, would handle intercepts from new technologies like the Internet.

    Many people who follow the exploits of SIGINT and NSA are eager to peruse lists of secret listening posts operated by the agency and its partners around the world. While a master list probably exists somewhere in the impenetrable lair that is the NSA’s Fort Meade, Maryland, headquarters, it is assuredly stamped with one of the highest security classifications in the U.S. intelligence community.  W.M. & J.V.

    The United States SIGINT System (USSS)

    The following list is the best unclassified shot at describing the locations of the ground-based “ears” of the Puzzle Palace. It is culled from press accounts, informed experts, and books written about the NSA and its intelligence partners. It does not include the numerous listening units on naval vessels and aircraft nor those operating from U.S. and foreign embassies, consulates, and other diplomatic missions.

    United States

    NSA Headquarters, Fort Meade, Maryland
    Buckley Air National Guard Ground Base, Colorado
    Fort Gordon, Georgia (RSOC)
    Imperial Beach, California
    Kunia, Hawaii (RSOC)
    Northwest, Virginia
    Sabana Seca, Puerto Rico
    San Antonio, Texas (RSOC)
    Shemya, Alaska -3
    Sugar Grove, West Virginia
    Winter Harbor, Maine
    Yakima, Washington

    Albania

    Durres -6
    Shkoder -6
    Tirana -6

    Ascension Island

    Two Boats -1

    Australia

    Bamaga -6 -7
    Cabarlah -7
    Canberra (Defense Signals Directorate Headquarters) -5
    Harman -7
    Kojarena, Geraldton -1
    Nurunggar -1
    Pearce -1
    Pine Gap, Alice Springs -1
    Riverina -7
    Shoal Bay, Darwin -1
    Watsonia -1

    Austria

    Konigswarte -7
    Neulengbach -7

    Bahrain

    Al-Muharraq Airport -3
    Bosnia and Herzegovina

    Tuzla

    Botswana

    Mapharangwane Air Base

    British Indian Ocean Territory

    Diego Garcia -1

    Brunei

    Bandar Seri Begawan -7

    Canada

    Alert -7
    Gander -7
    Leitrim -1
    Masset -6 -7
    Ottawa [Communications Security Establishment (CSE) Headquarters] -5

    China

    Korla -1 -6
    Qitai -1 -6

    Croatia

    Brac� Island, Croatia -6
    Zagreb-Lucko Airport -7

    Cuba

    Guantanamo Bay

    Cyprus

    Ayios Nikolaos -1

    Denmark

    Aflandshage -7
    Almindingen, Bornholm -7
    Dueodde, Bornholm -7
    Gedser -7
    Hj�rring -7
    L�gumkl�ster -7

    Eritrea

    Dahlak Island -1 (NSA/Israel “8200” site)

    Estonia

    Tallinn -7

    Ethiopia

    Addis Ababa -1

    Finland

    Santahamina -7

    French Guiana

    Kourou -7 (German Federal Intelligence Service station)

    Germany

    Achern -7
    Ahrweiler -7
    Bad Aibling -2
    Bad M�nstereifel -7
    Braunschweig -7
    Darmstadt -7
    Frankfurt -7
    Hof -7
    Husum -7
    Mainz -7
    Monschau -7
    Pullach (German Federal Intelligence Service Headquarters) -5
    Rheinhausen -7
    Stockdorf -7
    Strassburg -7
    Vogelweh, Germany

    Gibraltar

    Gibraltar -7

    Greece

    Ir�klion, Crete

    Guam

    Finegayan

    Hong Kong

    British Consulate, Victoria (“The Alamo”) -7

    Iceland

    Keflavik -3

    India

    Charbatia -7

    Israel

    Herzliyya (Unit 8200 Headquarters) -5
    Mitzpah Ramon -7
    Mount Hermon, Golan Heights -7
    Mount Meiron, Golan Heights -7

    Italy

    San Vito -6
    Sorico

    Japan

    Futenma, Okinawa
    Hanza, Okinawa
    Higashi Chitose -7
    Higashi Nemuro -7
    Kofunato -7
    Miho -7
    Misawa
    Nemuro -7
    Ohi -7
    Rebunto -7
    Shiraho -7
    Tachiarai -7
    Wakkanai

    Korea (South)

    Kanghwa-do Island -7
    Osan -1
    Pyong-dong Island -7
    P’yongt’aek -1
    Taegu -1 -2 -6
    Tongduchon -1
    Uijo�ngbu -1
    Yongsan -1

    Kuwait

    Kuwait

    Latvia

    Ventspils -7

    Lithuania

    Vilnius -7

    Netherlands

    Amsterdam (Technical Intelligence Analysis Center (TIVC) Headquarters)-5
    Emnes -7
    Terschelling -7

    New Zealand

    Tangimoana -7
    Waihopai -1
    Wellington (Government Communications Security Bureau Headquarters -5

    Norway

    Borhaug -7
    Fauske/Vetan -7
    Jessheim -7
    Kirkenes -1
    Randaberg -7
    Skage/Namdalen -7
    Vads� -7
    Vard� -7
    Viksjofellet -7

    Oman

    Abut -1
    Goat Island, Musandam Peninsula -3
    Khasab, Musandam Peninsula -3
    Masirah Island -3

    Pakistan

    Parachinar

    Panama

    Galeta Island -3

    Papua New Guinea

    Port Moresby -7

    Portugal

    Terceira Island, Azores

    Rwanda

    Kigali

    S�o Tom� and Pr�ncipe

    Pinheiro

    Saudi Arabia

    Araz -7
    Khafji -7

    Singapore

    Kranji -7

    Spain

    Pico de las Nieves, Grand Canary Island -7
    Manzanares -7
    Playa de Pals -3
    Rota

    Solomon Islands

    Honiara -7

    Sri Lanka

    Iranawilla

    Sweden

    Karlskrona -7
    Lov�n (Swedish FRA Headquarters) -7
    Musk� -7

    Switzerland

    Merishausen -7
    R�thi -7

    Taiwan:

    Quemoy -7
    Matsu -7
    Shu Lin Kuo -5 (German Federal Intelligence Service/NSA/Taiwan J-3 SIGINT service site)

    Turkey

    Adana
    Agri -7
    Antalya -7
    Diyarbakir
    Edirne -7
    Istanbul -7
    Izmir -7
    Kars
    Sinop -7

    Thailand

    Aranyaprathet -7
    Khon Kaen -1 -3
    Surin -7
    Trat -7

    Uganda

    Kabale
    Galangala Island, Ssese Islands (Lake Victoria)

    United Arab Emirates

    Az-Zarqa� -3
    Dalma� -3
    Ras al-Khaimah -3
    Sir Abu Nuayr Island -3

    United Kingdom:

    Belfast (Victoria Square) -7
    Brora, Scotland -7
    Cheltenham (Government Communications Headquarters) -5
    Chicksands -7
    Culm Head -7
    Digby -7
    Hawklaw, Scotland -7
    Irton Moor -7
    Menwith Hill, Harrogate -1 (RSOC)
    Molesworth -1
    Morwenstow -1
    Westminster, London -7
    (Palmer Street)
    Yemen
    Socotra Island (planned)

    KEY:

    -1 Joint facility operated with a SIGINT partner.

    -2 Joint facility partially operated with a SIGINT partner.

    -3 Contractor-operated facility.

    -4 Remoted facility.

    -5 NSA liaison is present.

    -6 Joint NSA-CIA site.

    -7 Foreign-operated “accommodation site” that provides occasional SIGINT product to the USSS.

    February 24 – March 2, 1999
    by
    jason vest and wayne madsen A Most Unusual Collection Agency

    Find this story at February March 1999

    Copyright 1999 The Village Voice – all rights reserved.

    A Most Unusual Collection Agency; How the U.S. undid UNSCOM through its empire of electronic ears (1999)

    When Saddam Hussein raised the possibility of attacking U.S. planes in Turkey last week, his threats illustrated what many in diplomatic circles regard as an international disgrace the emasculation of the UN by the U.S.

    When UNSCOM, the UN’s arms-inspection group for Iraq, was created in 1991, it drew on personnel who, despite their respective nationalities, would serve the UN. Whatever success UNSCOM achieved, however, was in spite of its multinational makeup. While a devoted group of UN staffers managed to set up an independent unit aimed at finding Saddam’s weapons and ways of concealing them, other countries seeking to do business with sanctions-impaired Iraq notably France and Russia used inspectors as spies for their own ends.

    But what ultimately killed UNSCOM were revelations that the U.S. government had manipulated it by assuming control of its intelligence apparatus last spring (or perhaps even earlier by using the group to slip spies into Iraq) not so much to aid UNSCOM’s mission, but to get information for use in future aerial bombardments. When stories to this effect broke last month, however, there was almost no consistency in descriptions of the agencies involved or techniques used. The New York Times, for example, said only one CIA spy had been sent into Baghdad last March to set up an automated eavesdropping device. Time had multiple Defense Intelligence Agency (DIA) operatives planting bugs around Baghdad throughout 1998. The Wall Street Journal referred to the use of one “device” from the National Security Agency (NSA) last year and “a series of espionage operations used by the U.S. [since] 1996 to monitor the communications” of Saddam and his elite.

    When probing the world of espionage, rarely does a clear picture emerge. But according to a handful of published sources, as well as assessments by independent experts and interviews with current and former intelligence officers, the U.S. government’s prime mover in Iraqi electronic surveillance was most likely a super-secret organization run jointly by the the CIA and the NSA the spy agency charged with gathering signals intelligence (known as SIGINT) called the Special Collection Service. Further, there is evidence to suggest that the Baghdad operation was an example of the deployment of a highly classified, multinational SIGINT agreement one that may have used Australians to help the U.S. listen in months after the CIA failed to realize the U.S. objective of overthrowing Saddam Hussein through covert action.

    According to former UNSCOM chief inspector Scott Ritter, when the U.S. took over the group’s intelligence last year, a caveat was added regarding staffing: only international personnel with U.S. clearances could participate. “This requirement,” says Ritter, “really shows the kind of perversion of mission that went on. The U.S. was in control, but the way it operated from day one was, U.S. runs it, but it had to be a foreigner [with a clearance] operating the equipment.”

    Under the still-classified 1948 UKUSA signals intelligence treaty, eavesdropping agencies of the U.S., United Kingdom, Canada, Australia, and New Zealand share the same clearances. According to Federation of American Scientists intelligence analyst John Pike, this gives the U.S. proxies for electronic espionage: “In the context of UKUSA, think of NSA as one office with five branches,” he says. As UNSCOM demonstrates, though, sometimes the partnership gets prickly; the British, according to Ritter, withdrew their personnel following the U.S.’s refusal to explain “how the data was going to be used.” (According to a longtime British intelligence officer, there was another reason: lingering bad feelings over the NSA’s cracking a secret UN code used by British and French peacekeepers during a Bosnian UN mission.) At this point, says Ritter, he was instructed to ask the Australian government for a “collection” specialist. “We deployed him to Baghdad in July of 1998,” recalls Ritter. “In early August, when I went to Baghdad, he pulled me aside and told me he had concerns about what was transpiring.

    He said there was a very high volume of data, and that he was getting no feedback about whether it was good, bad, or useful. He said that it was his experience that this was a massive intelligence collection operation one that was not in accordance with what UNSCOM was supposed to be doing.”

    In other words, the Australian most likely an officer from the Defence Signals Directorate, Australia’s NSA subsidiary, who was supposed to have been working for the UN may have been effectively spying for the U.S. Stephanie Jones, DSD’s liaison to NSA, did not take kindly to a Voice inquiry about this subject; indeed, despite being reached at a phone number with an NSA headquarters prefix, she would not even confirm her position with DSD. However, a former high-ranking U.S. intelligence official said that such a scenario was probable. “The relationship between the UKUSA partners has always been of enormous value to U.S. intelligence, even when their governments have been on the opposite sides of policy issues,” the official said. “I would not be surprised at all if the Aussies happened to be the ones who actually did this [at U.S. behest].”

    With an intelligence community of over a dozen components, billion-dollar budgets, and cutting-edge technology, the U.S. can cast a wide net, be it with human sources or signals interception. Iraq, however, has presented a special challenge since Saddam’s Ba’ath party took power in 1968. “In Iraq,” says Israeli intelligence expert Amatzai Baram, “you are dealing with what is arguably the best insulated security and counterintelligence operation in the world. The ability of Western or even unfriendly Arab states to penetrate the system is very, very limited.”

    According to the former Cairo station chief of the Australian Secret Intelligence Service (ASIS), the West got this message loud and clear after Iraqi counterintelligence pulled British MI6 case officers off a Baghdad street in the mid ’80s and took them to a warehouse on the outskirts of town. “They had arrayed before them the various agents they had been running,” the exASIS officer told the Australian Broadcasting Corporation in 1994. “There were wires hanging from the rafters in the warehouse. All the men were strung up by wires around their testicles and they were killed in front of the faces of their foreign operators, and they were told, you had better get out and never come back.”

    When UNSCOM was inaugurated in 1991, it quickly became apparent that the organization’s intelligence capability would depend largely on contributions from various UN member countries. According to several intelligence community sources, while the CIA did provide UNSCOM with information, and, later, serious hardware like a U-2 spy plane, the focus of the U.S. intelligence community at the time was on working with anti-Saddam groups in and around Iraq to foment a coup.

    What resulted, as investigative authors Andrew and Patrick Cockburn demonstrate in their just published book Out of the Ashes: The Resurrection of Saddam Hussein, were two of the most colossally bungled CIA covert operations since the Bay of Pigs. While details of one of the failed operations were widely reported, the Cockburns fleshed out details of an arguably worse coup attempt gone awry in June 1996. Iraqi counterintelligence had not only managed to finger most of the suspects in advance, but months before had even captured an encrypted mobile satellite communications device that the CIA gave the plotters. Adding insult to injury, the Cockburns report, Iraqi counterintelligence used the CIA’s own device to notify them of their failure: “We have arrested all your people,” the CIA team in Amman, Jordan, reportedly was told via their uplink. “You might as well pack up and go home.”

    Some UNSCOM staffers first under Russian Nikita Smidovich, later under American Scott Ritter managed to create what amounted to a formidable micro-espionage unit devoted to fulfilling UNSCOM’s mission. Between information passed on from various countries and use of unspecified but probably limited surveillance equipment, the inspectors were gathering a great deal. But in March 1998, according to Ritter, the U.S. told UNSCOM chair Richard Butler of Australia that it wanted to “coordinate” UNSCOM’s intelligence gathering.

    Ritter insists that no U.S. spies under UNSCOM cover could have been operating in Baghdad without his knowledge prior to his resignation in August 1998. However, as veteran spies point out, if they were, Ritter probably wouldn’t have known. A number of sources interviewed by the Voice believe it possible that Special Collection Service personnel may have been operating undercover in Baghdad.

    According to a former high-ranking intelligence official, SCS was formed in the late 1970s after competition between the NSA’s embassy-based eavesdroppers and the CIA’s globe-trotting bugging specialists from its Division D had become counterproductive. While sources differ on how SCS works some claim its agents never leave their secret embassy warrens where they perform close-quarters electronic eavesdropping, while others say agents operate embassy-based equipment in addition to performing riskier “black-bag” jobs, or break-ins, for purposes of bugging “there’s a lot of pride taken in what SCS has accomplished,” the former official says.

    Intriguingly, the only on-the-record account of the Special Collection Service has been provided not by an American but by a Canadian. Mike Frost, formerly of the Communications Security Establishment Canada’s NSA equivalent served as deputy director of CSE’s SCS counterpart and was trained by the SCS. In a 1994 memoir, Frost describes the complexities of mounting “special collection” operations finding ways to transport sophisticated eavesdropping equipment in diplomatic pouches without arousing suspicion, surreptitiously assembling a device without arousing suspicion in his embassy, technically troubleshooting under less than ideal conditions and also devotes considerable space to describing visits to SCS’s old College Park headquarters.

    “It is not the usual sanitorium-clean atmosphere you would expect to find in a top-secret installation,” writes Frost. “Wires everywhere, jerry-rigged gizmos everywhere, computers all over the place, some people buzzing around in three-piece suits, and others in jeans and t-shirts. [It was] the ultimate testing and engineering centre for any espionage equipment.” Perhaps one of its most extraordinary areas was its “live room,” a 30-foot-square area where NSA and CIA devices were put through dry runs, and where engineers simulated the electronic environment of cities where eavesdroppers are deployed. Several years ago, according to sources, SCS relocated to a new, 300-acre, three-building complex disguised as a corporate campus and shielded by a dense forest outside Beltsville, Maryland. Curious visitors to the site will find themselves stopped at a gate by a Department of Defense police officer who, if one lingers, will threaten arrest.

    There are good reasons, explains an old NSA hand, for havingelectronic ears on terra firma in addition to satellites. “If you’re listening to something from thousands of miles up, the footprint to sort through is so huge, and finding what you are looking for is not a simple chore. If you know more or less specifically what you want, it’s easier to get it in close proximity. And if it happens to be a low-powered signal, it may not travel far enough.”

    According to two sources familiar with intelligence activity in Iraq, the U.S. may have been aided by information delivered either to UNSCOM or SCS from Ericsson, the Swedish telecommunications firm. It’s not an unreasonable assumption; though Ericsson brushes off questions about it, in 1996 a Middle Eastern businessman filed suit against the company, claiming, among other things, that it had stiffed him on his commission for brokering a deal between the Iraqis and Ericsson for sensitive defense communications equipment, which, reportedly, included encrypted cell phones.

    Speaking on condition of anonymity, a veteran intelligence official confirmed that the NSA has “arrangements” with other communications firms that allow NSA to access supposedly secure communications, but cooperation from Ericsson would be “a breakthrough despite our best efforts, they always kept their distance. But it’s not beyond the realm of possibility.” (This is not without precedent; though hardly covered in the American press, it has been reported that Switzerland’s Crypto AG long the supplier of cipher equipment to many of the world’s neutral and “rogue” states enjoyed such an “arrangement” with the NSA for decades. Crypto AG denies this.)

    There is, however, another possible scenario regarding participation by Ericsson in an intelligence venture. According to FAS analyst Pike, it’s much more likely that anyone doing intelligence work in Iraq would want a schematic of Baghdad’s telephone system which Ericsson installed in the late ’60s and has subsequently updated. “I would find it to be far more plausible that the U.S. intelligence community would be interested in acquiring, and Ericsson would be interested in supplying, the wiring diagram for Baghdad’s telephone exchange than encryption algorithms for cell phones,” he says.

    Also, he explains, finding ways to tap into a whole phone system or pull short-range signals out of the air without being obvious is clearly SCS’s portfolio. “This type of risky close surveillance is what SCS was formed to do,” he says. “When you think of NSA, you think satellites. When you think CIA, you think James Bond and microfilm. But you don’t really think of an agency whose sole purpose is to get up real close and use the best technology there is to listen and transmit. That’s SCS.”

    Regarding any possible collaboration in Iraq with SCS or UNSCOM, Kathy Egan, Ericsson spokesperson, said she had no information on such an operation, but if there was one, “It would be classified and we would not be able to talk about it.” It’s also possible, according to Mike Frost, that cleverly disguised bugs might have been planted in Baghdad SCS, he recalls, managed to listen in on secured facilities by bugging pigeons. But, says a retired CIA veteran, with UNSCOM effectively dead, bugging is now out of the question. “I hope the take from this op,” he says, “was worth losing the only access the outside world’s disarmament experts had to Iraq.”

    February 24 – March 2, 1999
    by
    jason vest and wayne madsen

    Find this story at February March 1999

    Copyright 1999 The Village Voice

    The CIA’s New Black Bag Is Digital; When the NSA can’t break into your computer, these guys break into your house.

    During a coffee break at an intelligence conference held in The Netherlands a few years back, a senior Scandinavian counterterrorism official regaled me with a story. One of his service’s surveillance teams was conducting routine monitoring of a senior militant leader when they suddenly noticed through their high-powered surveillance cameras two men breaking into the militant’s apartment. The target was at Friday evening prayers at the local mosque. But rather than ransack the apartment and steal the computer equipment and other valuables while he was away — as any right-minded burglar would normally have done — one of the men pulled out a disk and loaded some programs onto the resident’s laptop computer while the other man kept watch at the window. The whole operation took less than two minutes, then the two trespassers fled the way they came, leaving no trace that they had ever been there.

    It did not take long for the official to determine that the two men were, in fact, Central Intelligence Agency (CIA) operatives conducting what is known in the U.S. intelligence community as either a “black bag job” or a “surreptitious entry” operation. Back in the Cold War, such a mission might have involved cracking safes, stealing code books, or photographing the settings on cipher machines. Today, this kind of break-in is known inside the CIA and National Security Agency as an “off-net operation,” a clandestine human intelligence mission whose specific purpose is to surreptitiously gain access to the computer systems and email accounts of targets of high interest to America’s spies. As we’ve learned in recent weeks, the National Security Agency’s ability to electronically eavesdrop from afar is massive. But it is not infinite. There are times when the agency cannot gain access to the computers or gadgets they’d like to listen in on. And so they call in the CIA’s black bag crew for help.

    The CIA’s clandestine service is now conducting these sorts of black bag operations on behalf of the NSA, but at a tempo not seen since the height of the Cold War. Moreover, these missions, as well as a series of parallel signals intelligence (SIGINT) collection operations conducted by the CIA’s Office of Technical Collection, have proven to be instrumental in facilitating and improving the NSA’s SIGINT collection efforts in the years since the 9/11 terrorist attacks.
    More FP Coverage
    the NSA Leaks
    Meet the Spies Doing the NSA’s Dirty Work
    Exclusive: Inside America’s Plan to Kill Online Privacy Rights Everywhere
    Spy Copters, Lasers, and Break-In Teams

    Over the past decade specially-trained CIA clandestine operators have mounted over one hundred extremely sensitive black bag jobs designed to penetrate foreign government and military communications and computer systems, as well as the computer systems of some of the world’s largest foreign multinational corporations. Spyware software has been secretly planted in computer servers; secure telephone lines have been bugged; fiber optic cables, data switching centers and telephone exchanges have been tapped; and computer backup tapes and disks have been stolen or surreptitiously copied in these operations.

    In other words, the CIA has become instrumental in setting up the shadowy surveillance dragnet that has now been thrown into public view. Sources within the U.S. intelligence community confirm that since 9/11, CIA clandestine operations have given the NSA access to a number of new and critically important targets around the world, especially in China and elsewhere in East Asia, as well as the Middle East, the Near East, and South Asia. (I’m not aware of any such operations here on U.S. soil.) In one particularly significant operation conducted a few years back in a strife-ridden South Asian nation, a team of CIA technical operations officers installed a sophisticated tap on a switching center servicing several fiber-optic cable trunk lines, which has allowed NSA to intercept in real time some of the most sensitive internal communications traffic by that country’s general staff and top military commanders for the past several years. In another more recent case, CIA case officers broke into a home in Western Europe and surreptitiously loaded Agency-developed spyware into the personal computer of a man suspected of being a major recruiter for individuals wishing to fight with the militant group al-Nusra Front in Syria, allowing CIA operatives to read all of his email traffic and monitor his Skype calls on his computer.

    The fact that the NSA and CIA now work so closely together is fascinating on a number of levels. But it’s particularly remarkable accomplishment, given the fact that the two agencies until fairly recently hated each others’ guts.

    Ingenues and TBARs

    As detailed in my history of the NSA, The Secret Sentry, the CIA and NSA had what could best be described as a contentious relationship during the Cold War era. Some NSA veterans still refer to their colleagues at the CIA as ‘TBARs,’ which stands for ‘Those Bastards Across the River,’ with the river in question being the Potomac. Perhaps reflecting their higher level of educational accomplishment, CIA officers have an even more lurid series of monikers for their NSA colleagues at Fort Meade, most of which cannot be repeated in polite company because of recurring references to fecal matter. One retired CIA official described his NSA counterparts as “a bunch of damn ingenues.” Another CIA veteran perhaps put it best when he described the Cold War relationship amongst and between his agency and the NSA as “the best of enemies.”

    The historical antagonism between the two agencies started at the top. Allen W. Dulles, who was the director of the CIA from 1953 to 1961, disliked NSA director General Ralph Canine so intensely that he deliberately kept the NSA in the dark about a number of the agency’s high-profile SIGINT projects, like the celebrated Berlin Tunnel cable tapping operation in the mid-1950s. The late Richard M. Helms, who was director of the CIA from 1966 to 1973, told me over drinks at the Army-Navy Club in downtown Washington, D.C. only half jokingly that during his thirty-plus years in the U.S. intelligence community, his relations with the KGB were, in his words, “warmer and more collegial” than with the NSA. William E. Colby, who served as Director of Central Intelligence from 1973-1976, had the same problem. Colby was so frustrated by his inability to assert any degree of control over the NSA that he told a congressional committee that “I think it is clear I do not have command authority over the [NSA].” And the animus between CIA director Admiral Stansfield Turner (CIA director from 1977-1981) and his counterpart at the NSA, Admiral Bobby Ray Inman, was so intense that they could only communicate through intermediaries.

    But the 9/11 terrorist attacks changed the operational dynamic between these two agencies, perhaps forever. In the thirteen years since the 9/11 terrorist attacks, the NSA and CIA have largely, but not completely, moved past the Cold War animus. In addition, both agencies have become increasingly dependent on one another for the success of their respective intelligence operations, leading to what can best be described as an increasingly close symbiotic relationship between these two titans of the U.S. intelligence community.

    While the increasingly intimate relationship between the NSA and CIA is not a secret, the specific nature and extent of the work that each agency does for the other is deemed to be extremely sensitive, especially since many of these operations are directed against friends and allies of the United States. For example, the Special Collection Service (SCS), the secretive joint CIA-NSA clandestine SIGINT organization based in Beltsville, Maryland, now operates more than 65 listening posts inside U.S. embassies and consulates around the world. While recent media reports have focused on the presence of SCS listening posts in certain Latin America capitals, intelligence sources confirm that most of the organization’s resources have been focused over the past decade on the Middle East, South Asia, and East Asia. For example, virtually every U.S. embassy in the Middle East now hosts a SCS SIGINT station that monitors, twenty-four hours a day, the complete spectrum of electronic communications traffic within a one hundred mile radius of the embassy site. The biggest problem that the SCS currently faces is that it has no presence in some of the U.S. intelligence community’s top targets, such as Iran and North Korea, because the U.S. government has no diplomatic relations with these countries.

    At the same time, SIGINT coming from the NSA has become a crucial means whereby the CIA can not only validate the intelligence it gets from its oftentimes unreliable agents, but SIGINT has been, and remains the lynchpin underlying the success over the past nine years of the CIA’s secret unmanned drone strikes in Pakistan, Yemen and elsewhere around the world.

    But the biggest changes have occurred in the CIA’s human intelligence (HUMINT) collection efforts on behalf of NSA. Over the past decade, foreign government telecommunications and computer systems have become one of the most important targeting priorities of the CIA’s National Clandestine Service (NCS), which since the spring of this year has been headed by one of the agency’s veteran Africa and Middle East hands. The previous director, Michael J. Sulick, is widely credited with making HUMINT collection against foreign computer and telecommunications systems one of the service’s top priority targets after he rose to the top of the NCS in September 2007.

    Today, a cadre of several hundred CIA NCS case officers, known as Technical Operations Officers, have been recruited and trained to work exclusively on penetrating foreign communications and computer systems targets so that NSA can gain access to the information stored on or transmitted by these systems. Several dozen of these officers now work fulltime in several offices at NSA headquarters at Fort George G. Meade, something which would have been inconceivable prior to 9/11.

    CIA operatives have also intensified their efforts to recruit IT specialists and computer systems operators employed by foreign government ministries, major military command headquarters staffs, big foreign multinational corporations, and important international non-governmental organizations.

    Since 9/11, the NCS has also developed a variety of so-called “black boxes” which can quickly crack computer passwords, bypass commercially-available computer security software systems, and clone cellular telephones — all without leaving a trace. To use one rudimentary example, computer users oftentimes forget to erase default accounts and passwords when installing a system, or incorrectly set protections on computer network servers or e-mail accounts. This is a vulnerability which operatives now routinely exploit.

    For many countries in the world, especially in the developing world, CIA operatives can now relatively easily obtain telephone metadata records, such as details of all long distance or international telephone calls, through secret liaison arrangements with local security services and police agencies.

    America’s European allies are a different story. While the connections between the NSA and, for example, the British signals intelligence service GCHQ are well-documented, the CIA has a harder time obtaining personal information of British citizens. The same is true in Germany, Scandinavia and the Netherlands, which have also been most reluctant to share this sort of data with the CIA. But the French intelligence and security services have continued to share this sort of data with the CIA, particularly in counterterrorism operations.

    U.S. intelligence officials are generally comfortable with the new collaboration. Those I have spoken to over the past three weeks have only one major concern. The fear is that details of these operations, including the identities of the targets covered by these operations, currently reside in the four laptops reportedly held by Edward Snowden, who has spent the past three weeks in the transit lounge at Sheremetyevo Airport outside Moscow waiting for his fate to be decided. Officials at both the CIA and NSA know that the public disclosure of these operations would cause incalculable damage to U.S. intelligence operations abroad as well as massive embarrassment to the U.S. government. If anyone wonders why the U.S. government wants to get its hands on Edward Snowden and his computers so badly, this is an important reason why.

    David Burnett/Newsmakers

    Matthew M. Aid is the author of Intel Wars: The Secret History of the Fight Against Terror and The Secret Sentry: The Untold History of the National Security Agency, and is co-editor with Cees Wiebes of Secrets of Signals Intelligence During the Cold War and Beyond.

    BY MATTHEW M. AID | JULY 17, 2013

    Find this story at 17 July 2013

    ©2013 The Slate Group, LLC. All rights reserved.

    Spy Copters, Lasers, and Break-In Teams; How the FBI keeps watch on foreign diplomats.

    Between 2006 and 2009, surveillance helicopters conducted daily flights over northwest Washington, D.C., taking high-resolution photographs of the new Chinese Embassy being constructed on Van Ness Street. The aircraft belonged to the Federal Bureau of Investigation, which wanted to determine where the embassy’s communications center was being located. But the Chinese construction crews hid their work on this part of the building by pulling tarpaulins over the site as it was being constructed.

    The FBI also monitored the movements and activities of the Chinese construction workers building the embassy, who were staying at a Days Inn on Connecticut Avenue just north of the construction site, in the hopes of possibly recruiting one or two of them. According to one Chinese diplomat, his fellow officials detected individuals who they assumed to be FBI agents covertly monitoring the construction materials and equipment being used to build the embassy, which were stored on the University of the District of Columbia’s soccer field across the street from where the Chinese Embassy currently stands. The diplomat added that Chinese security officials assumed that the FBI agents were trying to determine whether it was possible to plant eavesdropping devices inside the construction materials stored at the site.

    In recent weeks, the U.S. National Security Agency’s efforts to monitor foreign diplomats have become the stuff of worldwide headlines. But the FBI has been in the business of spying on diplomats and breaking their codes for far longer than the NSA has. The surveillance of the Chinese Embassy was just one piece of a far larger espionage operation. The FBI not only endeavors to steal or covertly compromise foreign government, military, and commercial computer, telecommunications, and encryption systems being used in the United States, but the FBI and NSA work closely to intercept the communications of all diplomatic missions and international organizations located on American soil. In some important respects, the FBI’s cryptologic work is more secretive than that being performed by the NSA because of the immense diplomatic sensitivity of these operations if they were to ever be exposed publicly.

    The Bureau of Investigation, the predecessor to today’s FBI, has been monitoring diplomatic communications since at least 1910, when it periodically solved Mexican government and revolutionary group cable traffic coming in and out of the United States. And for over a century, the FBI and its predecessors have been aggressive practitioners of the age-old art of stealing codes and ciphers. In June 1916, Bureau of Investigations agents surreptitiously obtained a copy of the new Mexican consular code by picking the pockets of a Mexican diplomatic courier while he cavorted with “fast women” in one of the innumerable border fleshpots along the Rio Grande.
    More FP Coverage
    the NSA Leaks
    Meet the Spies Doing the NSA’s Dirty Work
    Exclusive: Inside America’s Plan to Kill Online Privacy Rights Everywhere
    The FBI is Helping the NSA Spy, but Senators Don’t Want to Know About It

    Little has changed in the intervening century. Despite the creation of the NSA in 1952 to centralize in one agency all U.S. government signals intelligence (SIGINT) collection and processing work, the FBI, which did not respond to requests for comment for this story, has never ceased its own independent cryptologic efforts, especially when those efforts have been aim at diplomats on American soil.

    ***

    The number of foreign government targets that the FBI monitors inside the United States is huge and growing. State Department records show that 176 countries maintain embassies in Washington, not including Cuba and Iran, which the U.S. government does not have diplomatic relations with but which maintain interest sections inside the Swiss and Pakistani embassies, respectively.

    In addition, 115 of the 193 members of the United Nations maintain diplomatic missions of varying sizes in New York City. There are also 62 consulates in Los Angeles, 52 in Chicago, 42 in San Francisco, 38 in Houston, 35 in Miami, and 26 in Boston and Atlanta.

    All told, there are almost 600 foreign government embassies, consulates, missions, or representative offices in the United States, all of which are watched to one degree or another by the counterintelligence officers of the FBI. Only eight countries do not maintain any diplomatic presence in the United States whatsoever, the most important of which is nuclear-armed North Korea.

    Every one of these embassies and consulates is watched by the FBI’s legion of counterintelligence officers to one degree or another. But some countries’ receive the vast majority of the FBI’s attention, such as Russia, China, Libya, Israel, Egypt, Syria, Jordan, Lebanon, Saudi Arabia, Iraq, Afghanistan, India, Pakistan, and Venezuela. The Cuban and Iranian interests section in Washington — and their missions to the United Nations in New York — of course receive special attention as well.

    Unsurprisingly, most of the FBI’s surveillance is technical in nature. For example, with substantial technical assistance from the NSA and the “big three” American telecommunications companies (AT&T, Verizon, and Sprint), the FBI taps the phones (including cell phones) of virtually every embassy and consulate in the United States. The FBI also intercepts the home phones and emails of many diplomats. The FBI’s Washington and New York field offices have special wiretap centers that specialize in collecting all telephone, email, instant messaging, text messaging, and cellular telephone traffic coming in and out of all high-priority diplomatic targets in the United States 24 hours a day, seven days a week. According to a former Justice Department source, over the past decade these extremely sensitive intercepts have identified a number of spies working for governments that were caught in the act of stealing U.S. government secrets, as well as a larger number of cases involving the theft of industrial secrets from American companies.

    Since 1978, all electronic communications, both plaintext and encrypted, between these embassies and their home countries have been routinely intercepted by the NSA’s BLARNEY fiber-optic-cable intercept program. The NSA provides copies of all these intercepts, including telephone calls and emails, to the FBI’s secretive signals-intelligence unit, the Data Intercept Technology Unit (DITU) at the Quantico Marine Corps base in Northern Virginia, and to the FBI’s electronic-eavesdropping centers in Washington and New York.

    The FBI also uses a wide range of vehicles and airborne surveillance assets to monitor the movements and activities of foreign diplomats and intelligence operatives in Washington and New York. Some of the vans, aircraft, and helicopters used by the FBI for this purpose are equipped with equipment capable of intercepting cell-phone calls and other electronic forms of communication. And when that doesn’t work, the FBI calls in the burglars.

    ***

    Another important part of the FBI’s surveillance effort is dedicated to trying to surreptitiously get inside these diplomatic establishments on behalf of the NSA, which increasingly depends on the FBI to penetrate the computer and telecommunications networks used by these embassies and compromise their information security systems.

    The FBI perfected this clandestine technique, known as the Surreptitious Entry Program operation, during Cold War intelligence-gathering operations directed at the Soviet Union and its Eastern European allies. These missions remain highly classified because of the diplomatic sensitivity surrounding breaking into the embassies of friends and enemies alike. In one instance during the 1960s, FBI agents reportedly drove a garbage truck into the central courtyard of the Czech Embassy in the middle of the night and spirited away one of the embassy’s cipher machines for study by the NSA’s code breakers.

    The FBI is still conducting these highly sensitive operations. Specially trained teams of FBI agents are still periodically breaking into foreign embassies and consulates in the United States, primarily in New York and Washington. In New York, a special team of FBI burglars is based in a converted warehouse in Long Island City in Queens, according to a former FBI employee who worked there. The nondescript facility is large enough that the FBI can build mock-ups of the exteriors and interiors of embassies being targeted for break-ins. The FBI has a similar facility in Northern Virginia, where full-size mock-ups of embassies in Washington are constructed to train FBI teams prior to conducting black-bag jobs of the facilities.

    To facilitate these operations, the FBI has a huge library of architectural drawings, floor plans, building permits, and any other documents that it can lay its hands on concerning the layouts of every embassy and consulate in the United States. Many of these documents were obtained in close conjunction with the diplomatic security staff of the State Department and the uniformed branch of the Secret Service, which is responsible for providing security for foreign diplomatic establishments in the United States. The FBI also interviews the repair and maintenance personnel who service the leased computers and telecommunications equipment used by a host of embassies and other diplomatic establishments in Washington and New York.

    Since the 9/11 terrorist attacks, the tempo of FBI clandestine operations designed to steal, compromise, or influence foreign computer, telecommunications, or encryption systems has increased by several orders of magnitude. According to a former Justice Department official, over the past decade clandestine human-intelligence operations run by the FBI’s Washington and New York field offices have been enormously successful in compromising a wide range of computer systems and encryption technology used by foreign governments and corporate entities. In a number of important cases, these FBI operations have allowed the NSA’s code-breakers to penetrate foreign encryption systems that had defied the ability of the code-breakers to solve through conventional cryptanalytic means. For example, the FBI was able to give the NSA the daily changes in cipher keys for an encryption system used by a country in the developing world. In another case, the FBI was able to covertly insert spyware into the operating system of a computer being used by a foreign mission in New York, allowing the NSA to read the plaintext versions of cables before they were encrypted.

    ***

    But by far the most productive and sensitive intelligence source about what is going on inside embassies and consulates in the United States is a joint FBI-NSA electronic-eavesdropping program known as Close Access SIGINT. It enables the FBI and NSA to listen to what is transpiring inside these buildings by using a wide range of covert technical sensors that are monitored in real time from covert listening posts located in close proximity to the targets.

    Some of these operations involve spyware software that has been covertly planted inside the computer systems of embassies and consulates, which allows the NSA’s computer-hacking organization, the Office of Tailored Access Operations (TAO), to read in real time everything that is being stored on individual computers or on the computer network itself. Some of these implants are designed and operated by TAO. Others are designed by the FBI’s SIGINT unit, the DITU. Some sensors periodically copy the contents of computer hard drives; another sensor takes screen shots of documents being processed or reviewed on compromised computer systems. The FBI is also using sophisticated laser and acoustic systems to image and record the sounds of what is being typed on computers, according to a source with access to the trove of documents leaked to the media by former NSA contractor Edward Snowden.

    To pick up the signals from these clandestine sensors, the FBI uses front companies to lease office space within line of sight of nearly 50 embassies and consulates in Washington and New York. In other instances, the FBI and NSA have installed disguised receivers on building rooftops near these embassies to pick up the data signals from clandestine sensors implanted inside these embassies and consulates. Some of these disguised receivers can clearly be seen on the rooftop of a building located within line of sight of the Chinese, Israeli, and Pakistani embassies on Van Ness Street in northwest Washington. It’s a neighborhood that’s awfully familiar to the FBI and its eavesdroppers.
    Save big when you subscribe to FP.

    MICHAEL BRADLEY/AFP/Getty Images

    Matthew M. Aid is the author of Intel Wars: The Secret History of the Fight Against Terror and The Secret Sentry: The Untold History of the National Security Agency.

    BY MATTHEW M. AID | NOVEMBER 19, 2013

    Find this story at 19 November 2013

    © 2013 The Slate Group, LLC. All rights reserved.

    Outsourcing intelligence sinks Germany further into U.S.’s pocket

    When a private company is granted a government contract, it’s a stamp of approval. What about the flipside? What does it say when the government—say, the German government—does business with companies involved in abduction and torture? What does it say when German ministries share IT servicers with the CIA and the NSA? And what does it mean for Germany that those same agencies are involved in projects concerning top-secret material including ID cards, firearms registries and emails in the capitol?

    NDR (the German public radio and television broadcaster) and Süddeutsche Zeitung (SZ, Germany’s leading broadsheet newspaper) are proving that these aren’t just hypothetical questions. Especially when it comes to spying, security and an American contractor called Computer Sciences Corporation, the CSC.

    Khaled el-Masri sits blindfolded in a container in Kabul. His hands are tied and he can hear a plane engine. It’s a white gulfstream jet. It’s May 28, 2004 and el-Masri has lived through hell. For five months he was tortured while in U.S. custody. He was beaten and humiliated. He received enemas and had to wear diapers. He was drugged and interrogated repeatedly. All this is public knowledge. It eventually became clear—even to the CIA—that they had the wrong man; el-Masri was innocent.

    That’s where the CSC comes in.

    The CIA had had good experiences with the company for years, as one of its largest private contractors. The mission: the unrightfully detained prisoners should be unobtrusively removed from Afghanistan. So, the CSC subcontracted a company with a jet. Records from July 2, 2004 show that the CSC paid $11,048.94 to have el-Masri picked up in Kabul, flown in handcuffs to Albania and once there driven to some hinterland and dropped-off. Mission accomplished.

    Everyone knows about the el-Masri case, but it doesn’t stop the contracts from coming in. The German government continues to give work to the CSC. In the past five years German ministries have given over 100 contracts to the CSC and its subsidiaries. Since 2009 alone, the CSC has earned €25.5 million, some $34.5 million. And since 1990, it’s earned almost €300 million, some $405 million, from its German contracts.

    We paid a visit to the German headquarters at 1 Abraham Lincoln Park in Wiesbaden, Germany. It’s a modern building made of grey concrete, a little metal and a lot of glass. The receptionists are friendly, but will they talk? No one here wants to talk.

    The German branch of the CSC was incorporated in 1970. On the CSC’s homepage it states vaguely that the company is a world leader in providing “technology enabled business solutions and services”.

    In fact, the CSC is a massive company with at least 11 subsidiaries in 16 locations in Germany alone. It’s no coincidence that these locations are often close to U.S. military bases. The CSC and its subsidiaries are part of a secret industry, the military intelligence industry. And they do the work traditionally reserved for the military and intelligence agencies, but for cheaper and under much less scrutiny.

    Related branches in this industry include security servicers, such as Blackwater (now going by the name Academi). Blackwater is now being legally charged for a massacre in Iraq. And then there’s Caci, whose specialists were allegedly involved in Abu Ghraib and the ‘enhanced interrogation’ methods used there.

    German CSC operations refuse to be tarnished by their bad reputation in the Middle East. Every year German companies including Allianz, BASF, Commerzbank and Dailmer pay for their services. Mostly they pay for IT consulting. But some German ministries who are among their regular costumers request more than IT help.

    The CSC’s annual report says nothing abduction. (They don’t advertise that on their homepage either.) For that kind of information you have to read investigative reports or human rights organization statements.

    And the Ministry of the Interior is quick to say: “Neither the federal government nor the Office of Procurement know of any allegations against the U.S. parent company of CSC Germany.”

    The first report of the CSC’s involvement in extraordinary rendition flights came out in 2005 in the Boston Globe and then again in 2011 in the Guardian. Since then at least 22 subsequent contracts have been signed, among them a contract to begin a national arms registry.

    After the abduction and torture of el-Masri, in 2006, the CSC sold its subsidiary Dyncorp. But the CSC remains more involved than ever in American intelligence operations. Thus, the company was part of a consortium that was awarded the so-called Trailblazer project by the NSA. The contract was to build a giant data vacuum, which would have dwarfed the later-developed PRISM program whistleblower Edward Snowden revealed to the world. The program ran over budget, failed and was cancelled altogether. But the CSC continued to be granted contracts.

    Basically, the CSC is like the IT department for the entire U.S. intelligence apparatus. And this is the company that has been handling German information at the highest of levels security for years.

    A few examples? The CSC tested the controversial Trojan horse spyware for the Federal Criminal Police Office. It helped the Justice Department implement electronic federal court recordkeeping. It has received several contracts to encrypt government communications.

    Should Germany be putting so much trust in the CSC, when the company’s more important partner is the U.S. intelligence apparatus?

    The Federal Ministry of the Interior who awards the framework agreements assures us, “usually there is a clause in the contracts prohibiting confidential information be passed onto third parties.”

    Somehow, that’s not very assuring.

    By Christian Fuchs, John Goetz, Frederik Obermaier and Bastian Obermayer
    November 16, 2013 12:55 pm CET

    Find this story at 16 November 2013

    Copyright © Süddeutsche Zeitung Digitale Medien GmbH / Süddeutsche Zeitung GmbH

    Lloyds owns stake in US firm accused over CIA torture flights

    Banking group, which has £8.5m slice of CSC, is under pressure along with other City investors from human rights charity

    Computer Sciences Corporation, according to Reprieve, organised a flight that took Khaled al-Masri, a German mistakenly imprisoned by the CIA, from a secret detention centre in Afghanistan to Albania in 2004. Photograph: Thomas Kienzle/AP

    Lloyds Banking Group has become embroiled in a row over its investment in a company accused of involvement in the rendition of terror suspects on behalf of the CIA.

    Lloyds, which is just under 40% owned by the taxpayer, is one of a number of leading City institutions under fire for investing in US giant Computer Sciences Corporation (CSC), which is accused of helping to organise covert US government flights of terror suspects to Guantánamo Bay and other clandestine “black sites” around the world.

    Reprieve, the legal human rights charity run by the British lawyer Clive Stafford Smith, alleges that during the flights, suspects – some of whom were later proved innocent – were “stripped, dressed in a diaper and tracksuit, goggles and earphones, and had their hands and feet shackled”. Once delivered to the clandestine locations, they were subjected to beatings and sleep deprivation and forced into stress positions, a report from the International Committee of the Red Cross says.

    CSC, which is facing a backlash for allegedly botching its handling of a £3bn contract to upgrade the NHS IT system, has refused to comment on claims it was involved in rendition. It has also refused to sign a Reprieve pledge to “never knowingly facilitate torture” in the future. The claims about its involvement in rendition flights have not been confirmed.

    Reprieve has written to CSC investors to ask them to put pressure on the company to take a public stand against torture.

    Some of the City’s biggest institutions, including Lloyds and insurer Aviva, have demanded that CSC immediately address allegations that it played a part in arranging extraordinary rendition flights.

    Aviva, which holds a small stake in CSC via US tracker funds, said it had written to CSC’s executives to demand an investigation. The insurer said it would take further action if it was confirmed that CSC was linked to torture. “Aviva is of course concerned by the allegations made against CSC,” said a spokesman. “We are a signatory to the United Nations global compact, and support human rights principles, as outlined in the United Nations Universal Declaration of Human Rights. It is not yet clear that CSC is directly complicit in the activities outlined and we have written to the company seeking clarification. We will investigate these allegations further and take action as appropriate.”

    Lloyds said it was taking the allegations seriously and had launched its own investigation. A spokesman said: “Our policy is clear, we will not support companies whose ongoing business activities are illegal in the UK and breach the requirements of international conventions as ratified by the UK government. We are not aware of evidence that CSC is currently committed to activities inconsistent with our policy.”

    Lloyds holds an £8.5m stake in CSC via its Scottish Widows funds that track the S&P 500 index of America’s biggest companies.

    HSBC, another investor, said that it was not aware of evidence that CSC was breaching its ethical investment code.

    CSC’s alleged involvement with rendition came about after it purchased DynCorp, which was involved in hundreds of prisoner transfer flights, in 2003. While CSC went on to sell DynCorp in 2005, Reprieve alleges that CSC continued to be involved in the supervision of rendition flights until the end of 2006.

    None of CSC’s top 10 shareholders, including fund managers Dodge & Cox, Fidelity, Blackrock and Guggenheim Capital, a fund manager founded by a grandson of philanthropist Solomon Guggenheim, responded to the allegations made in a letter from Reprieve. Norway’s sovereign wealth fund is also an investor.

    One of the biggest investors, which declined to be identified due to its policy of refusing to comment on investment decisions, said its executives were “extremely concerned” about CSC’s alleged links to torture, and managers raised their concerns with CSC as soon as it was made aware of the allegations by the Guardian.

    Reprieve’s legal director, Cori Crider, said: “CSC evidently thinks it’s fine to profit from kidnap and torture as long as their shareholders are happy. It is now up to those shareholders, including British banks, pension funds and UK government [via Lloyds], to show this isn’t the case. These institutions must insist that CSC take their ethical concerns seriously. Alternatively, they can vote with their feet.”

    Crider told investors that Reprieve had obtained an invoice indicating CSC organised a flight that took Khaled al-Masri, a German citizen mistakenly imprisoned by the CIA, from a secret detention centre in Afghanistan to Albania in May 2004. The charity said in its letter: “Having belatedly concluded after months of torture and interrogation that they had imprisoned the wrong man, the CIA, acting through CSC, arranged for Richmor Aviation jet N982RK to transfer Mr al-Masri from an Afghan ‘black site’ to a remote roadside in Albania.”

    In a letter to Reprieve, Helaine Elderkin, CSC’s vice-president and senior deputy general counsel, said: “CSC’s board of directors … have a corporate responsibility programme that fosters CSC’s growth by promoting and increasing the value of the company to its shareholders, clients, communities and employees.”

    Lisa Nandy, the Labour MP who chairs the all-party parliamentary group on international corporate responsibility, also called on CSC’s biggest investors to hold the company to account. “Investors have a unique responsibility to hold businesses accountable for their ethical conduct, particularly in relation to human rights. Corporates should conduct due diligence down their supply chains to protect human rights, working under the assumption that business should do no harm. Those that refuse to do so should have investment withdrawn,” she said.

    “The UK must take the lead in this area and ensure its institutional investors, many of which are using pension funds to allow grievous abuse, are asking tough questions at board level, demanding changes in behaviour and a corporate policy to uphold human rights.”

    CSC is being sued by some of its investors in relation to its £3bn contract to upgrade NHS computer systems.

    Rupert Neate
    The Guardian, Sunday 6 May 2012 19.18 BST

    Find this story at 6 May 2013

    © 2013 Guardian News and Media Limited or its affiliated companies. All rights reserved.

    Dubioser Partner der Regierung

    Entführen für die CIA, spionieren für die NSA? Die Firma CSC kennt wenig Skrupel. Auf ihrer Kundenliste steht auch die Bundesregierung. Die weiß angeblich von nichts.

    Keine Frage, ein Auftrag der Bundesregierung schmückt jede Firma. Aber wie ist es andersherum? Kann, darf, soll die Berliner Regierung mit jeder beliebigen Firma ins Geschäft kommen? Sicher nicht – so viel ist einfach zu beantworten; dafür gibt es unzählige Regeln, fast alle beschäftigen sich mit formalen Dingen.

    Und was ist mit den moralischen? Sollte eine deutsche Bundesregierung beispielsweise Geschäfte mit einer Firma eingehen, die in Entführungen, in Folterungen verwickelt ist? Sollten sich deutsche Ministerien etwa einen IT-Dienstleister teilen mit CIA, NSA und anderen amerikanischen Geheimdiensten, zumal wenn es um sensible Aufgaben geht, um Personalausweise, Waffenregister und die E-Mail-Sicherheit im Berliner Regierungsviertel?

    Recherchen von NDR und Süddeutscher Zeitung belegen, dass beides der Fall gewesen ist beziehungsweise noch immer ist. Es geht um Geschäftsbeziehungen zu einer Firma namens Computer Sciences Corporation, kurz CSC.

    Khaled el-Masri sitzt mit verbundenen Augen und gefesselten Händen in einem Container in Kabul, als er die Motorengeräusche eines landenden Flugzeugs hört, eines weißen Gulfstream-Jets. Es ist der 28. Mai 2004, und el-Masri hat die Hölle hinter sich. Fünf Monate lang war er in US-Gefangenschaft gefoltert worden, im berüchtigten “Salt Pit”-Gefängnis in Afghanistan. Er war geschlagen worden und erniedrigt, vielfach, er hat Einläufe bekommen und Windeln tragen müssen, er ist unter Drogen gesetzt und immer wieder verhört worden. Alles bekannt, alles oft berichtet. Auch, dass den CIA-Leuten irgendwann klar wurde: Sie hatten den Falschen. El-Masri war unschuldig. An dieser Stelle kam CSC ins Spiel.

    Die CIA-Leute hatten mit der Firma über Jahre gute Erfahrungen gemacht, sie ist einer der größten Auftragnehmer von Amerikas Geheimdiensten. Die Aufgabe: Der falsche Gefangene sollte unauffällig aus Afghanistan herausgeschafft werden. Das Unternehmen beauftragte dafür seinerseits ein Subunternehmen mit dem Flug – laut Rechnung vom 2. Juni 2004 gegen 11048,94 Dollar – und so wurde al-Masri mit jenem weißen Jet in Kabul abgeholt, gefesselt nach Albanien geflogen, dort in ein Auto umgeladen und im Hinterland ausgesetzt. Mission erfüllt.

    Schon zu dieser Zeit machte auch die Bundesregierung mit CSC Geschäfte, und sie tut es bis heute – obwohl die Rolle von CSC im Fall el-Masri ihr bekannt sein müsste. Über 100 Aufträge haben deutsche Ministerien in den vergangenen fünf Jahren an die CSC und seine Tochterfirmen vergeben. Allein seit 2009 erhielt CSC für die Aufträge 25,5 Millionen Euro, von 1990 bis heute sind es fast 300 Millionen Euro.

    Besuch in der deutschen Firmenzentrale im Abraham-Lincoln-Park 1 in Wiesbaden. Ein moderner Bau, grauer Sichtbeton, wenig Metall, viel Glas. Steril, kühl, sachlich. Die Angestellten am Empfang sind höflich, aber reden? Reden will hier niemand. Den deutschen Ableger der 1959 in den USA gegründeten Firma gibt es seit 1970. Auf der Homepage heißt es nur vage, das Unternehmen sei weltweit führend in “IT-gestützten Businesslösungen und Dienstleistungen”.

    Tatsächlich ist die CSC ein großes Unternehmen, allein in Deutschland gibt es mindestens elf Tochtergesellschaften an insgesamt 16 Standorten. Auffallend oft residieren sie in der Nähe von US-Militärstützpunkten. Kein Zufall. Die CSC und ihre Tochterfirmen sind Teil jenes verschwiegenen Wirtschaftszweigs, der für Militär und Geheimdienste günstig und unsichtbar Arbeiten erledigt. Andere in der Branche sind die Sicherheitsdienstleister von Blackwater (die sich heute Academi nennen), denen im Irak Massaker angelastet werden. Oder Caci, deren Spezialisten angeblich in Abu Ghraib beteiligt waren, wenn es um verschärfte Verhöre ging.

    Die deutschen Geschäfte der CSC werden durch den schlechten Ruf im Nahen Osten nicht getrübt: Jedes Jahr überweisen deutsche Firmen wie Allianz, BASF, Commerzbank, Daimler und Deutsche Bahn Millionen. Meist geht es um technische Fragen, um Beratung. Aber zum Kundenstamm zählen auch Ministerien: Mit der Firma CSC Deutschland Solutions GmbH, in deren Aufsichtsrat auch ein ehemaliger CDU-Bundestagsabgeordneter sitzt, wurden innerhalb der vergangenen fünf Jahre durch das Beschaffungsamt des Bundesinnenministeriums insgesamt drei Rahmenverträge geschlossen, die wiederum Grundlage für Einzelaufträge verschiedener Bundesministerien waren.

    Im Geschäftsbericht der CSC ist von Entführungsflügen nichts zu finden, auch nicht auf deren Homepage. Dafür muss man schon Untersuchungsberichte lesen oder Reports von Menschenrechtsorganisationen. Was das Bundesinnenministerium indessen nicht zu tun scheint: “Weder dem Bundesverwaltungsamt noch dem Beschaffungsamt waren bei Abschluss der Verträge mit der CSC Deutschland Solutions GmbH Vorwürfe gegen den US-amerikanischen Mutterkonzern bekannt,” sagt ein Sprecher. Den ersten Bericht über die Beteiligung der CSC an CIA-Entführungsflügen gab es 2005 im Boston Globe, 2011 folgte der Guardian. Danach wurden von deutschen Ministerien noch mindestens 22 Verträge abgeschlossen, etwa über Beratungsleistungen bei der Einführung eines Nationalen Waffenregisters.

    Zwar hat die CSC ihre Tochterfirma Dyncorp, die einst Khaled el-Masris Verschleppung organisierte, schon 2005* verkauft – dennoch war die CSC auch danach noch immer oder noch viel mehr in amerikanische Geheimdienstaktivitäten involviert. So war die Firma Teil jenes Konsortiums, das den Zuschlag für das sogenannte Trailblazer-Programm der NSA erhielt: Dabei sollte ein gigantischer Datenstaubsauger entwickelt werden, gegen den das durch Edward Snowden öffentlich gewordene Spionageprogramm Prism beinahe niedlich wirken würde. Das Projekt wurde schließlich eingestellt, doch Aufträge bekam die CSC weiterhin. Im Grunde ist das Unternehmen so etwas wie die EDV-Abteilung der US-Geheimdienste. Und ausgerechnet diese Firma wird von deutschen Behörden seit Jahren mit Aufträgen bedacht, die enorm sensibel sind.

    Ein paar Beispiele? Die CSC testete den umstrittenen Staatstrojaner des Bundeskriminalamts. Das Unternehmen half dem Justizministerium bei der Einführung der elektronischen Akte für Bundesgerichte. Die CSC erhielt mehrere Aufträge, die mit der verschlüsselten Kommunikation der Regierung zu tun haben. Die CSC beriet das Innenministerium bei der Einführung des elektronischen Passes. Sie ist involviert in das Projekt De-Mail, dessen Ziel der sichere Mailverkehr ist – oder sein sollte. Sollte man solche Aufträge einer Firma überantworten, die im US-Geheimdienst im Zweifel möglicherweise den wichtigeren Partner sieht?

    Das zuständige Bundesinnenministerium lässt ausrichten, die Rahmenverträge enthielten “in der Regel Klauseln, nach denen es untersagt ist, bei der Vertragserfüllung zur Kenntnis erlangte vertrauliche Daten an Dritte weiterzuleiten”.

    *Anmerkung der Redaktion: In einer früheren Version hieß es, CSC habe Dyncorp 2006 verkauft. Es war 2005.

    16. November 2013 08:00 Deutsche Aufträge für CSC
    Von Christian Fuchs, John Goetz, Frederik Obermaier und Bastian Obermayer

    Find this story at 16 November 2013

    Copyright: Süddeutsche Zeitung Digitale Medien GmbH / Süddeutsche Zeitung GmbH

    Deutschland vergibt Aufträge an US-Spionagefirma

    Der Konzern steht dem Geheimdienst NSA nahe. Trotzdem beschäftigt die Bundesregierung seit Jahren das umstrittene Computerunternehmen CSC. Es arbeitet für Ministerien und Behörden und hat Zugriff auf hochsensible Daten.

    Die Bundesregierung macht umstrittene Geschäfte mit einem US-amerikanischen Spionage-Dienstleister. Dieser erhält dadurch Zugriff auf eine ganze Reihe hochsensibler Daten. Mehr als 100 Aufträge haben deutsche Ministerien nach Recherchen der Süddeutschen Zeitung und des Norddeutschen Rundfunks in den vergangenen fünf Jahren an deutsche Tochterfirmen der Computer Sciences Corporation (CSC) vergeben. Das US-Unternehmen gilt als einer der wichtigsten Partner der amerikanischen Geheimdienste und war in der Vergangenheit unter anderem an der Entwicklung von Spähprogrammen für die NSA beteiligt. Außerdem war eine Tochter der CSC 2004 in die Verschleppung des Deutschen Khaled el-Masri durch die CIA verwickelt.

    Seit 2009 erhielten die deutschen CSC-Ableger Staatsaufträge in Höhe von 25,5 Millionen Euro. Die Firma testete dafür unter anderem den Staatstrojaner des Bundeskriminalamts und unterstützte das Justizministerium bei der Einführung der elektronischen Akte für Bundesgerichte. Des Weiteren erhielt die CSC Aufträge, die mit dem sogenannten Regierungsnetz zu tun haben, über das die verschlüsselte Kommunikation von Ministerien und Behörden läuft. Die CSC beriet außerdem das Innenministerium bei der Einführung des elektronischen Passes und ist involviert in das Projekt De-Mail, dessen Ziel der sichere Mailverkehr ist. Alles heikle Aufträge.

    “Wir wissen jetzt ja leider, dass viele US-Firmen sehr eng mit der NSA kooperieren, da scheint blindes Vertrauen äußerst unangebracht”, sagt der Ex-Hacker und IT-Sicherheitsexperte Sandro Gaycken, der auch die Bundesregierung berät. Die CSC selbst teilte mit, “aus Gründen des Vertrauensschutzes” keine Auskunft über öffentliche Auftraggeber zu geben.

    Das Unternehmen ist Teil der amerikanischen Schattenarmee von Privatfirmen, die für Militär und Geheimdienste günstig und unsichtbar Arbeit erledigen. So gehörte das Unternehmen zu einem Konsortium, das den Zuschlag für das sogenannte Trailblazer-Projekt der NSA bekommen hatte: Dabei sollte ein Spähprogramm ähnlich dem jüngst bekannt gewordenen Programm Prism entwickelt werden.

    Die problematischen Verwicklungen sind teils seit Jahren bekannt – jedoch angeblich nicht dem Bundesinnenministerium, das die Rahmenverträge mit der CSC geschlossen hat. Das Ministerium habe dazu keine “eigenen Erkenntnisse”, teilte ein Sprecher mit. Mitarbeiter externer Unternehmen müssten sich einer Sicherheitsprüfung unterziehen, bevor sie mit einer “sicherheitsempfindlichen Tätigkeit” betraut würden. Im Übrigen enthielten die Rahmenverträge “in der Regel” Klauseln, nach denen es untersagt ist, “vertrauliche Daten an Dritte weiterzuleiten”.

    Thomas Drake, ein ehemaliger hochrangiger Mitarbeiter des US-Geheimdienstes NSA, hält derartige Klauseln für “naiv”. Er sagt: “Wenn es um eine Firma geht, die in der US-Geheimdienstbranche und speziell bei der NSA eine solch große Rolle spielt und dort so viel Unterstützung bekommt, dann würde ich den Worten eines Vertrags nicht trauen.”

    15. November 2013 19:00 CSC-Konzern
    Von Christian Fuchs, John Goetz, Frederik Obermaier und Bastian Obermayer

    Find this story at 15 November 2013

    Copyright: Süddeutsche Zeitung Digitale Medien GmbH / Süddeutsche Zeitung GmbH

    Outsourcing NSA, THE NEOCON POWER GRAB AT NSA AND AN ATTEMPT TO STIFLE THE PRESS (2005)

    In the past year, I have been threatened with a libel suit in London from a rich Saudi billionaire whose Washington-based law firm just so happens to have a former Bush-Cheney campaign finance chairman and one of George W. Bush’s closest Texas pals as two of its major partners. I have earned the attention of an Orwellian Ministry of Truth-like “counter-propaganda” office at the U.S. Department of State, which maintains a web site that criticizes my articles. It is against U.S. law for the International Public Diplomacy unit to directly respond to my counter-arguments, they can only legally respond to foreign queries and not from U.S. citizen journalists who they cavalierly attack. Apparently, the White House and some officials in the U.S. intelligence community have found it necessary to suppress from publication my book on corruption in the oil industry and defense contracting community. I have now been threatened by the company CACI International, which, according to the Taguba Report, was involved in the prison torture at Abu Ghraib. The threat was based on a very and important story concerning contract fraud and corruption at the super secret National Security Agency (NSA) — America’s premier electronic surveillance body.

    Unlike Newsweek, CBS News and 60 Minutes, and the Public Broadcasting System and National Public Radio, I do not intend to allow the friends of Bush and the globally-despised U.S. military intelligence complex to stymie my right to report on the graft and corruption and the steady move toward fascism from my vantage point inside the Washington Beltway. To George W. Bush, Dick Cheney, Karl Rove, CACI (and its law firm Steptoe & Johnson), and Akin Gump Strauss Hauer & Feld and its Bush buddies and Saudi paymasters, I have one simple admonition: “Go to Hell.”

    And to show that I mean business, I will soon establish a web site called the Wayne Madsen Report that will expose the bottom dwelling vermin now infesting our body politic. In the finest tradition of H. L. Mencken, Drew Pearson and Jack Anderson, Edward R. Murrow and other hard hitting members of the Fourth Estate, I have a simple warning: if you hold political office or another responsible position in this three degrees of separation town called Washington and you steal taxpayer’s money, hypocritically proclaim born-again Christianity and then go out and beat up a female prostitute or call a gay male prostitute hot line, get busted for public urination on Capitol Hill, or engage in disloyal behavior against the United States, you can be sure your name and your activities will be featured on the web site. You will be held accountable — it’s as simple as that. You may not have to worry about The Washington Post or CNN, but you will have to contend with me.

    And for Federal law enforcement officials who find it proper or exciting to subpoena journalists’ notebooks and require testimony before grand juries, forget about me. I won’t play your political games. I’ll gladly go to prison rather than subject myself and my sources to interrogations from a neocon fascist regime.

    ***************

    Now more on what is happening at NSA and how it is adversely affecting U.S. national security. On August 1, 2001, just five and a half weeks before the 911 attacks, NSA awarded Computer Sciences Corporation (CSC) a more than $2 billion, ten-year contract known as GROUNDBREAKER. The contract was never popular with NSA’s career professionals. Although GROUNDBREAKER was limited to outsourcing NSA’s administrative support functions such as telephones, data networks, distributed computing, and enterprise architecture design, the contract soon expanded into the operational areas — a sphere that had always been carefully restricted to contractors. NSA was once worried about buying commercial-off-the-shelf computer components such as semiconductors because they might contain foreign bugs. NSA manufactured its own computer chips at its own semiconductor factory at Fort Meade. Currently, NSA personnel are concerned that outsourcing mania at Fort Meade will soon involve foreign help desk technical maintenance provided from off-shore locations like India.

    CSC had originally gained access to NSA through a “buy in” project called BREAKTHROUGH, a mere $20 million contract awarded in 1998 that permitted CSC to operate and maintain NSA computer systems. When General Michael V. Hayden took over as NSA Director in 1999, the floodgates for outside contractors were opened and a resulting deluge saw most of NSA’s support personnel being converted to contractors working for GROUNDBREAKER’s Eagle Alliance (nicknamed the “Evil Alliance” by NSA government personnel), a consortium led by CSC. NSA personnel rosters of support personnel, considered protected information, were turned over to Eagle, which then made offers of employment to the affected NSA workers. The Eagle Alliance consists of CSC, Northrop Grumman, General Dynamics, CACI, Omen, Inc., Keane Federal Systems, ACS Defense, BTG, Compaq, Fiber Plus, Superior Communications, TRW (Raytheon), Verizon, and Windemere.

    In October 2002, Hayden, who has now been promoted by Bush to be Deputy Director of National Intelligence under John Negroponte, opened NSA up further to contractors. A Digital Network Enterprise (DNE) team led by SAIC won a $280 million, 26 month contract called TRAILBLAZER to develop a demonstration test bed for a new signals intelligence processing and analysis system. SAIC’s team members included Booz Allen Hamilton, Boeing, Northrop Grumman, and Eagle Alliance team leader CSC. TRAILBLAZER, according to Hayden’s own testimony before the Senate Select Committee on Intelligence, is now behind schedule and over budget to the tune of over $600 million.

    But that is not the only consequence of these two mega-contracts for NSA’s ability to monitor global communications for the next 911, which could be a terrorist nuclear strike on the United States.

    NSA insiders report that both contract teams have melded into one and that NSA’s operations are being adversely impacted. From simple tasks like phones being fixed to computers being updated with new software, the Eagle Alliance has been a disaster. The Eagle Alliance and DNE team members are rife with former NSA top officials who are reaping handsome bonuses from the contracts — and that has many NSA career employees crying conflict of interest and contract fraud.

    CACI, called “Colonels and Captains, Inc.” by critics who cite the revolving door from the Pentagon to its corporate office suites, counts former NSA Deputy Director Barbara McNamara as a member of its board of directors. CACI alumni include Thomas McDermott, a former NSA Deputy Director for Information Systems Security. Former NSA Director Adm. Mike McConnell is a Senior Vice President of Booz Allen. Former NSA Director General Ken Minihan is President of the Security Affairs Support Association (SASA), an intelligence business development association that includes Boeing, Booz Allen, CACI, CSC, the Eagle Alliance, General Dynamics, Northrop Grumman, Raytheon, SAIC, and Windemere, all GROUNDBREAKER and TRAILBLAZER contractors, among its membership. SASA’s board of directors (surprise, surprise) includes CACI’s Barbara McNamara. One of SASA’s distinguished advisers is none other than General Hayden.

    Although contractors are required to have the same high level security clearances as government personnel at NSA, there are close connections between some NSA contractors and countries with hostile intelligence services. For example, CACI’s president and CEO visited Israel in early 2004 and received the Albert Einstein Technology Award at ceremony in Jerusalem attended by Likud Party Defense Minister Shaul Mofaz. The special ceremony honoring CACI’s president was sponsored by the Aish HaTorah Yeshiva Fund. The ultra-Orthodox United Torah Judaism Party’s Jerusalem Mayor, Uri Lupolianski, was also in attendance. According to Lebanon’s Daily Star, CACI’s president also met with notorious racist Israeli retired General Effie Eitam who advocates expelling Palestinians from their lands. The U.S. delegation also included a number of homeland security officials, politicians, and businessmen. CACI has also received research grants from U.S.-Israeli bi-national foundations. A few months after the award ceremony for CACI’s president, the Taguba Report cited two CACI employees as being involved in the prison torture at Abu Ghraib prison in Iraq. The U.S. military commander for the Iraqi prisons, General Janis Karpinski, reported that she witnessed Israeli interrogators working alongside those from CACI and another contractor, Titan.

    When the Taguba Report was leaked, the office of Deputy Defense Secretary for Policy Douglas Feith issued an order to Pentagon employees not to download the report from the Internet. Feith is a well-known hard line supporter of Israel’s Likud Party and, according to U.S. government insiders, his name has come up in FBI wiretaps of individuals involved in the proliferation of nuclear weapons material to Israel via Turkish (including Turkish Jewish) intermediaries. These wiretaps are the subject of a Federal probe of who compromised a sensitive CIA counter-proliferation global operation that used a carve out company called Brewster Jennings & Associates to penetrate nuclear weapons smuggling networks with tentacles extending from Secaucus, New Jersey to South Africa and Pakistan and Turkey to Israel.

    According to the Jewish Telegraph Agency, some six months before the Abu Ghraib torture scandal was first uncovered, one of Feith’s assistants, Larry Franklin, met with two officials of the American Israel Public Affairs Committee (AIPAC) at the Tivoli Restaurant in Arlington, Virginia. According to FBI surveillance tapes, Franklin relayed top secret information to Steve Rosen, AIPAC’s then policy director, and Keith Weissman, a senior Iran analyst with AIPAC. Franklin has been indicted for passing classified information to AIPAC. In addition, three Israeli citizens have been identified as possible participants in the spy scandal. They are Naor Gilon, the political officer at the Israeli embassy in Washington; Uzi Arad, an analyst with the Institute for Policy and Strategy in Herzliya (the northern Tel Aviv suburb where the headquarters of Mossad is located); and Eran Lerman, a former Mossad official who is now with the American Jewish Committee.

    What has some NSA officials worried is that with pro-Israeli neocons now engrained within the CIA, Defense Intelligence Agency (DIA), State Department, and National Security Council, NSA is ripe for penetration by Israeli intelligence. NSA has a troubled past with Israel. In 1967, Israeli warplanes launched a premeditated attack on the NSA surveillance ship, the USS Liberty, killing and wounding a number of U.S. sailors and NSA civilian personnel. Convicted Israeli spy Jonathan Pollard compromised a number of NSA sensitive sources and methods when he provided a garage full of classified documents to Israel. But NSA is also aware of an incident where Israelis used a contractor, RCA, to gain access to yet additional NSA sources and methods. In the 1980s, against the wishes of NSA, the Reagan administration forced NSA to permit RCA, one of its major contractors, to develop a tethered aerostat (balloon) signals intelligence and direction finding system for the Israeli Defense Force. According to NSA officials, the Israeli-NSA joint project, codenamed DINDI, was established at a separate facility in Mount Laurel, New Jersey and apart from the main NSA developmental center at RCA’s facility in Camden, New Jersey. Although NSA and RCA set up a strict firewall between the contractor’s national intelligence contract work and the separate DINDI contract, Israeli engineers, who were working for Mossad, soon broke down the security firewall with the assistance of a few American Jewish engineers assigned to the DINDI project. The security breach resulted in a number of national intelligence developmental systems being compromised to the Israelis, including those code named PIEREX, MAROON ARCHER, and MAROON SHIELD. DINDI was quickly cancelled but due to the sensitivity surrounding the American Jewish engineers, the Reagan Justice Department avoided bringing espionage charges. There were some forced retirements and transfers, but little more. But for NSA, the duplicity of the Israelis added to the enmity between Fort Meade and Israeli intelligence.

    With outside contractors now permeating NSA and a major Israeli espionage operation being discovered inside the Pentagon, once again there is a fear within NSA that foreign intelligence services such as the Mossad could make another attempt to penetrate America’s virtual “Fort Knox” of intelligence treasures and secrets.

    Thanks to some very patriotic and loyal Americans inside NSA, this author is now in possession of an internal NSA contract document from November 2002 that shows how GROUNDBREAKER and TRAILBLAZER have allowed the Eagle Alliance and other contractors to gain access to and even virtual control over some of the most sensitive systems within the U.S. intelligence community. One suspect in this unchecked outsourcing is the person Hayden hired from the outside to act as Special Adviser to his Executive Leadership Team, Beverly Wright, who had been the Chief Financial Officer for Legg Mason Wood Walker in Baltimore. Before that, Wright had been the Chief Financial Officer for Alex Brown, the investment firm at which George W. Bush’s grandfather, Prescott Bush, once served as a board member. As one senior NSA official sarcastically put it, “She’s highly qualified to work in intelligence!”

    According to the document, the future of some 10,000 Windows NT and UNIX workstations and servers that handle some of NSA’s most sensitive signals intelligence (SIGINT) (the Signals Intelligence Directorate workstation upgrade is code named BEANSTALK) and electronics intelligence (ELINT) applications, including databases that contain communications intercepts, are now firmly in the grasp of the Eagle Alliance. Operational workstations are being migrated to a less-than-reliable Windows/Intel or “WINTEL” environment. The document boldly calls for the Eagle Alliance to establish a SIGINT Service Applications Office (SASO) to “provide and maintain Information Technology services, tools, and capabilities for all [emphasis added] SIGINT mission applications at the NSA.” This is a far cry from the non-operational administrative support functions originally specified in the GROUNDBREAKER contract.

    The document also calls for NSA to provide extremely sensitive information on SIGINT users to the contractors: “Identification of target sets of users in order to successfully coordinate with the Eagle Alliance modernization program.” The Eagle Alliance is involved in a number of systems that impact on other members of the U.S. intelligence community, foreign SIGINT partners, and national command authorities. These systems include INTELINK, Common Remoted Systems, National SIGINT Requirements Process, Overhead Tasking Distribution, RSOC (Regional SIGINT Operations Center) Monitoring Tool, RSOC Modeling Tool, Speech Activity Detection, Network Analysis Tools, Network Reconstruction Tools, Advanced Speech Processing Services, Automatic Message Handling System, CRITIC Alert, Cross Agency Multimedia Database Querying, Message Format Converter, Central Strategic Processing and Reporting, Collection Knowledge Base, Language Knowledge Base and Capabilities, K2000 Advanced ELINT Signals, Speech Content Services, Speech Information Extraction, Dominant Facsimile Processing System and DEFSMAC Support, Data Delivery (TINMAN), High Frequency Direction Finding (HFDF) Database, Satellite database, Protocol Analysis Terminal, Global Numbering Database, Intercept Tasking Databases, DEFSMAC Space Systems Utilities, Message Server, Extended Tether Program, Language Knowledge Services, Trend Analysis in Data Streams, Signal Related Database, SANDKEY Support (SIGINT Analysis and Reporting), and the SIGINT interception database ANCHORY and the ELINT database WRANGLER. In fact, the document states that the contractors’ plans foresee the inclusion of NSA’s intelligence community partners (foreign and domestic) in the contractors’ revamping of NSA’s operational systems.

    The servers include those that support mission-critical National Time Sensitive Systems (NTSS). These National Time Sensitive System servers have been assigned various cover terms:

    CANUCKS
    DOLLAR
    EASTCAKE
    HEALYCUFF
    MUDDYSWELT
    NEEDYWHAT
    RIMTITLE
    RISKDIME
    ROWLOAD
    SEAWATER
    CURACAO
    HALF
    HEALYMINK
    LEARNGILT
    LINEFURL
    MOBLOOSE
    SPELLBEAK
    THOSEHOT

    A number of SIGINT applications are also impacted by the outsourcing mania. They are also assigned cover terms:

    ADVERSARY
    ADVERSARY GOLD
    CHECKMATE
    FANBELT
    FANBELT II
    FIREBLAZE
    GALE-LITE (the primary owner of which is DIA)
    GALLEYMAN
    GALLEYPROOF
    JAGUAR
    KAFFS
    MAGNIFORM
    MAINCHANCE
    OILSTOCK
    PATHSETTER
    PINSETTER
    SIGDASYS FILE II, III, and KL
    TEXTA SPOT

    In fact, the document indicates that literally hundreds of NSA intelligence applications are now subject to the whims of outside contractors. These systems include

    ABEYANCE, ACROPOLIS, ADROIT, ADVANTAGE, AGILITY, AIRLINE, AIRMAIL, ALERT, ALCHEMIST, ANTARES, APPLEWOOD II, ARCHIVER, ARCVIEW GIS, ARROWGATE, ARROWWOOD, ARTFUL, ASPEN, ASSOCIATION, ATOMICRAFT, ATTRACTION, AUTOPILOT, AUTOSTAR, AXIOMATIC

    BABBLEQUEST, BACKSAW, BANYAN, BARAD, BASERUNNER, BEAMER, BEIKAO, BELLVIEW, BIRDSNEST, BISON, BLACKBIRD, BLACKBOOK, BLACKFIN, BLACKHAWK, BLACKNIGHT/SHIPMASTER, BLACKMAGIC, BLACKONYX, BLACKOPAL, BLACKSEA, BLACKSHACK, BLACKSHIRT, BLACKSMYTH, BLACKSNAKE, BLACKSPIDER, BLACKSTAR, BLACKSTORM, BLACKSTRIKE, BLACKWATCH PULL, BLOODHUNTER, BLACKSWORD, BLOSSOM, BLUEBERRY, BLUESKY, BLUESTREAM, BOTTOM, BOTTOMLINE, BOWHUNT, BRAILLEWRITER, BRICKLOCK, BRIGHTENER, BROADWAY, BRIO INSIGHT, BUCKFEVER, BUILDINGCODE, BULK, BUMPER

    CADENCE, CAINOTOPHOBIA, CALLIOPE, CALVIN, CANDID, CANDELIGHTER, CANDLESTICK, CAPRICORN, CARNIVAL, CARRAGEEN, CARTOGRAPHER, CAT, CATCOVE, CELLBLOCK, CELTIC II, CELTIC CROSS, CENTERBOARD, CENTERCOIL, CENTERPOINT, CENTRALIST, CERCIS, CHAGRIN, CHAMELEON, CHAMITE, CHAPELVIEW, CHARIOT, CHARMANDER, CHARTS, CHATEAU, CHECKMATE, CHECKWEAVE, CHERRYLAMBIC, CHEWSTICK, CHICKENOFF, CHILLFLAME, CHIMERA, CHIPBOARD, CHUJING, CIVORG, CHUCKLE, CLEANSLATE, CLIPS, CLOSEREEF I, CLOUDBURST, CLOUDCOVER, CLOUDCOVER II, CLUBMAN, COASTLINE, COASTLINE COMPASSPOINT, CLIENT, CODEFINDER, COMMONVIEW, CONCERTO, CONDENSOR, CONESTOGA, CONFRONT, CONTRIVER, CONUNDRUM, CONVEYANCE, COPPERHEAD, CORESPACE, CORTEZ, COUNTERSINK, COUNTERSPY, CRAZYTRAIN, CRISSCROSS, CRUISESHIP, CRYSTALLIZE, CYBERENGINE, CYGNUS

    DAFIF, DANCEHALL, DARKSHROUD, DATATANK, DAYPUL, DAZZLER, DEATHRAY, DECOMA, DELTAWING, DEPTHGAUGE, DESERTFOX, DESOTO, DESPERADO, DIALOG, DIAMONDCHIP, DIFFRACTION, DISPLAYLINE, DITCHDIGGER, DITTO/UNDITTO, DIVINATION, DOITREE, DOLLARFISH, DOUBLEVISION, DRAGONMAKER, DUALIST

    EAGERNESS, EAGLESTONE, EASYRIDER, ECTOPLASM, ELATION, ELECTRIFY, ELTON, ELEVATOR, EMPERORFISH, ENCAPSULATE, ENGRAFT, ETCHINGNEEDLE, EXPATRIATE, EXPERTPLAYER, EXTENDER, EXTRACTOR, EUREKA, EYELET

    FAIRHILL, FAIRVIEW, FALCONRY, FALLOWHAUNT, FANATIC, FANCINESS, FASCIA II, FATFREE, FENESTRA, FIESTA, FINECOMB, FIREBOLT, FINETUNE, FIREBRAND II, FIRELAKE, FIRERUNG, FIRETOWER, FIRSTVIEW, FISHERMAN, FISHINGBOAT, FISHWAY, FLAGHOIST (OCS), FLASHFORWARD, FLEXAGON, FLEXMUX, FLEXSTART, FLIP, FLOTSAM, FOLKART, FORESITE, FORTITUDE, FOURSCORE, FOXFUR, FPGA GSM ATTACK, FIRSTPOINT, FARMHOUSE, FLODAR, FLOVIEW, FOSSIK, FROZENTUNDRA, FREESTONE, FRENZY/GRANULE, FUSEDPULL

    GALAXYDUST, GARDENVIEW, GATCHWORK, GATOR, GAUNTLET, GAYFEATHER, GAZELLE, GEMTRAIL, GENED, GHOSTVIEW, GHOSTWIRE, GIGACOPE, GIGASCOPE B, GISTER, GIVE, GLIDEPLANE, GOLDVEIN, GOLDPOINT, GNATCATCHER-GRADUS, GOKART, GOLDENEYE, GOLDENFLAX, GOLDENPERCH, GOLDMINE, GOMBROON, GOTHAM, GRADIENT, GRANDMASTER, GRAPEANGLE, GRAPEVINE, GRAPHWORK, GREATHALL, GREENHOUSE, GREMLIN, GUARDDOG, GUIDETOWER

    HACKER, HABANERO, HAMBURGER, HAMMER, HARPSTRING, HARVESTER, HARVESTTIME, HEARTLAND II, HEARTLAND III, HEDGEHOG, HELMET II, HELMET III, HERONPOND, HIGHPOWER, HIGHTIDE, HILLBILLY BRIDE, HIPPIE, HOBBIN, HOKUSAI, HOMBRE, HOMEBASE, HOODEDVIPER, HOODQUERY, HOPPER, HOST, HORIZON, HOTSPOT, HOTZONE, HOUSELEEK/SPAREROOF, HYPERLITE, HYPERWIDE

    ICARUS, ICICLE, IMAGERY, INFOCOMPASS, INNOVATOR, INQUISITOR, INROAD, INSPIRATION, INTEGRA, INTERIM, INTERNIST, INTERSTATE, INTRAHELP, IOWA, ISLANDER, IVORY ROSE, IVORY SNOW

    JABSUM, JACAMAR, JADEFALCON, JARGON, JARKMAN, JASPERRED, JAZZ, JEALOUSFLASH, JEWELHEIST, JOVIAL, JOBBER INCOMING, JOSY, JUMBLEDPET, JUPITER

    KAHALA, KAINITE, KEBBIE, KEELSON, KEEPTOWER, KEYCARD, KEYMASTER, KEYS, KEYSTONE WEB, KINGCRAFT, KINGLESS, KINSFOLK, KLASHES, KLOPPER, KNOSSOS, KRYPTONITE

    LADYSHIP, LAKESIDE, LAKEVIEW, LAMPSHADE, LAMPWICK, LARGO, LASERDOME, LASERSHIP, LASTEFFORT, LATENTHEART, LATENTHEAT, LEGAL REPTILE, LETHALPAN, LIBERTY WALK, LIGHTNING, LIGHTSWITCH, LINKAGE, LIONFEED, LIONHEART, LIONROAR, LIONWATCH, LOAD, LOCKSTOCK, LOGBOOK, LONGROOT, LUMINARY

    MACEMAN, MACHISMO, MADONNA, MAESTRO, MAGENTA II, MAGIC BELT, MAGICSKY, MAGISTRAND, MAGYK, MAKAH, MAINWAY, MARINER II, MARKETSQUARE, MARLIN, MARSUPIAL, MARTES, MASTERCLASS, MASTERSHIP, MASTERSHIP II, MASTING, MATCHLITE, MAUI, MAVERICK, MECA, MEDIASTORM, MEDIATOR, MEDIEVAL, MEGAMOUSE, MEGASCOPE, MEGASTAR, MERSHIP (CARILLON), MESSIAH, MICOM, MIGHTYMAIL, MILLANG, MONITOR, MONOCLE, MOONDANCE, MOONFOX, MOORHAWK, MORETOWN, MOSTWANTED, MOVIETONE III, MUSICHALL, MUSTANG, MYTHOLOGY

    NABOBS, NATIONHOOD, NAUTILUS, NDAKLEDIT, NEMESIS, NERVETRUNK, NETGRAPH, NEWSBREAK, NEWSHOUND, NEXUS, NIGHTFALL 16, NIGHTFALL 32, NIGHTWATCH, NOBLEQUEST, NOBLESPIRIT, NOBLEVISION, NSOC SHIFTER, NUCLEON, NUMERIC

    OAKSMITH, OBLIGATOR, OCEANARIUM, OCEANFRONT, OCTAGON, OCTAVE, OFFSHOOT, OLYMPIAD, ONEROOF, ONEROOF-WORD 2000 TRANSCRIPTION, OPALSCORE, OPENSEARCH, OPERA, ORCHID, ORIANA, OUTERBANKS, OUTFLASH, OUTREACH

    PADDOCK, PACESETTER, PALINDROME, PAPERHANGER II, PARTHENON, PARTHENON II, PASSBACK, PASTURE, PATCHING, PATHFINDER, PATRIARCH, PAYMASTER, PAYTON, PEDDLER, PEARLWARE, PERFECTO, PERSEUS, PERSEVERE, PICKET, PINWALE, PIEREX, PILEHAMMER, PINNACLE, PINSTRIPE, PITONS, PIXIEDUST, PIZARRO, PLATINUM PLUS, PLATINUMRING, PLUMMER, PLUS, PLUTO, POLARFRONT, POLYSTYRENE, POPPYBASE, POPTOP, PORCELAIN, PORTCULLIS, POSTCARD, POWDERKEG, POWERPLANT, PRAIRIE DOG, PRANKSTER, PREDATOR, PRELUDE, PROSCAN, PROSPERITY, PRIZEWINNER, PROPELLER, PROTOVIEW, PUFFERFISH, PYTHON II

    QUARTERBACK, QUASAR, QUEST, QUICKER, QUICKSILVER

    RAGBOLT, RAINGAUGE, RAINMAN, RAKERTOOTH, RAMJET, RAP, RAPPEL, RAUCOVER, REACTANT, RECEPTOR, RECOGNITION, RED ARMY, RED BACK, RED BELLY, RED DAWN, RED DEMON, RED ROOSTER, RED ROVER, REDALERT, REDCAP, REDCENT, REDCOATS, REDMENACE, REDSEA, REDSTORM, REDZONE, RELAYER, RENEGADE, RENOIR, RIGEL LIBRARY, RIKER, RIMA, ROADBED, ROADTURN, ROCKDOVE, ROOFTOP, ROOTBEER, ROSEVINE, RUTLEY

    SAGACITY, SANDSAILOR, SASPLOT, SATINWOOD, SATURN, SAYA, SCANNER, SEALION, SEAPLUM, SCISSORS, SCREENWORK, SEABEACH II, SEARCHLIGHT, SELLERS, SEMITONE, SENIOR GLASS, SENTINEL, SHADOWBOXER, SHADOWCHASER, SHANTY, SHARK, SHARKBITE, SHARKKNIFE, SHARPSHOOTER, SHILLET, SHILOH, SHIPMASTER, SHORTSWING, SIDEMIRROR, SIGHTREADY, SIGNATURE, SILKRUG, SILVERFISH, SILVERHOOK, SILVERLINER, SILVERVINE, SINGLEPOINT, SINGLESHOT, SITA, SKEPTIC, SKILLFUL, SKYBOARD, SKYCAST, SKYGAZER, SKYLINE, SKYLOFT, SKYWRITER, SLAMDANCE, SLATEWRITER, SLIDESHOW, SMOKEPPIT, SNAKEBOOT, SNAKECHARMER, SNAKEDANCE II, SNAKERANCH II, SNORKEL, SNOWMAN, SOAPOPERA, SOAPSHELL, SOFTBOUND, SOFTRING, SORCERY, SPANISH MOSS, SPARKVOYAGE, SPEARHEAD, SPECOL, SPECTAR, SPIROGRAPH, SPLINTER, SPLITTER, SPORADIC, SPOTBEAM, SPRINGRAY, SPUDLITE, STAIRWAY, STAR SAPPHIRE, STARCICLE, STARGLORY, STARLOG, STARQUAKE, STARSWORD, STATIONMASTER, STEAKHOUSE, STELLAH, STONEGATE, STORMCHASER, STORMPEAK, STOWAWAY, STRONGHOLD, SUBSHELL, SUNDIAL, SUPERCODING, SURREY, SWEETDREAM, SWEETTALK, SWEEPINGCHANGE, SWITCHPOINT

    TABLELAMP, TALION, TANGOR, TAROTCARD, TARP, TARSIS, TART, TAXIDRIVER, TEAS, TECBIRD, TEL, TELE, TELESTO, TELLTALE, TELLURITE, TEMAR, TERMINAL VELOCITY, THINKCHEW, THINTHREAD, THUNDERWEB, TIDYTIPS III, TIEBREAKER, TIGER, TIMELINE, TIMEPIECE, TIMETRAVELER, TINKERTOY, TINSEL, TIPPIE, TOPSHELF, TOPSPIN II, TOPVIEW, TRACECHAIN, TRAILBLAZER, TRBUSTER, TREASURE, TREASURE TROVE, TRED, TRIFECTA, TRINFO, TRINIAN, TROLLEYTRACK, TROLLEYMASTER, TRUNK MOBILE, TRYSTER, TSUNAMI, TWILIGHT, TWOBIT

    UMORPH, UNLIMITED

    VIEWEXCHANGE, VEILED DATABASE, VEILED FORTHCOMING, VENTURER II, VICTORY DAEMON, VINTAGE HARVEST, VIOLATION, VISIONARY, VISIONQUEST, VOICECAST, VOICESAIL, VOIP SEED

    WARGODDESS, WARSTOCK, WATCHOUT, WAXFLOWER, WAYLAND, WEALTHYCLUSTER, WEBSPINNER, WEBSPINNER — ACCESS TO DBS, WESTRICK, WHARFMAN II, WHITE SEA, WHIRLPOOL, WHITE SHARK, WHITE SWORD, WHITESAIL, WHITEWASH, WILDFIRE, WINDSHIELD, WINTERFEED, WIREDART, WIREWEED, WORLDWIDE, WIZARDRY, WOLFPACK, WRAPUP

    XVTUBA

    YELLOWSTONE, YETLING

    ZENTOOLS, ZIGZAG, and ZIRCON

    24 May 2005
    By Wayne Madsen

    Find this story at 24 May 2005

    Defense Contractors Cyber Expertise Behind ‘PRISM’ And ‘Boundless Informant’

    A string of U.S. and international defense contractors helped in developing the now infamous ‘PRISM’ and ‘Boundless Informant’ systems that spy’s on American and international internet and telephone traffic.

    Defenseworld.net took a close look at the contractors which supplied equipment and expertise to the U.S. National Security Administration (NSA) to help develop the all-pervasive spying technology.

    Among the NSA’s top contractors are Booz Allen Hamilton thanks to its wide range of intelligence and surveillance expertise. Another top contractor heavily involved with the NSA is SAIC. Of its 42,000 employees, more than 20,000 hold U.S. government security clearances, making it one of the largest private intelligence services in the world, according to U.S. media reports.

    “SAIC provides a full suite of intelligence, surveillance and reconnaissance (ISR) and cybersecurity solutions across a broad spectrum of national security programs,” it says on its website.

    Northrop Grumman, Raytheon and, CACI International act as the NSA’s SIGINT analysis team making them integral to ISR projects. “SIGINT involves collecting foreign intelligence from communications and information systems and providing it to customers across the U.S. government, such as senior civilian and military officials,” according to the NSA website.

    “NSA/CSS collects SIGINT from various sources, including foreign communications, radar and other electronic systems.” Most recently, BAE Systems announced that its experts will provide architecture, installation and administration for a complex networking environment that supports multiple network enclaves and high-speed datacenter access.

    “BAE Systems’ Intelligence & Security manages big data, informs big decisions, and supports big missions. BAE Systems delivers a broad range of services including IT, cybersecurity and intelligence analysis to enable the U.S. military and government to recognize, manage and defeat threats,” according to a company statement.

    Northrop Grumman, CACI International and Raytheon all boast an impressive array of ISR capabilities. Northrop Grumman has recently bagged several IT contracts from the NSA including a Cloud-Based Cyber Security Contract in 2012 to develop, integrate and sustain cloud-based information repositories.

    In 2007, the company along with Computer Sciences Corporation was awarded Project Groundbreaker, a $5 billion contract to rebuild and operate the NSA’s “nonmission-critical” internal telephone and computer networking systems.

    In managing the project for the NSA, CSC and Logicon created the “Eagle Alliance” consortium that drew in practically every major company involved in defense and intelligence outsourcing. Subcontractors included General Dynamics, BAE Systems, Titan Corp. (now L-3 Communications Inc.), CACI International, TRW (now part of Northrop Grumman), Mantech, Lockheed Martin, and Verizon (one of the companies that allegedly granted the NSA access to its consumer database under the Terrorist Surveillance Program), as well as Dell Computers, Hewlett-Packard, and Nortel Networks.

    Earlier last year, Northrop Grumman and DRS Technologies won a $67 million NATO contract for cybersecurity and computer management services. Northrop said the team will implement a computer incident response capability for 50 NATO websites in 28 countries from cyber threats and vulnerabilities.

    The same year, it was revealed that the NSA had a Raytheon ‘semi-secret’ technology to protect the nation’s power grid called “Perfect Citizen.” Since a crippling cyber attack in 2010, a 491 million contract was awarded to Raytheon to develop its overall mission.

    Virtually all other details about the program are secret, including any information on whether the technology will allow any kind of domestic data collection on citizens. NSA vigorously denies that it will. “Perfect Citizen” would be able to detect cyber assaults on private companies and government agencies running such critical infrastructure as the electricity grid and nuclear-power plants. It would rely on a set of sensors deployed in computer networks for critical infrastructure that would be triggered by unusual activity suggesting an impending cyber attack.

    Meanwhile, NATO earlier last month announced plans to set up rapid reaction teams to fight the number of growing cyber-attacks on their military alliances. “In the progress report we have adopted today, we agreed to establish rapid reaction teams that can help protect NATO’s own systems,” alliance head Anders Fogh Rasmussen said. This “cyber-defence capability should be fully operational by the autumn,” Rasmussen told a press conference. “This is a first phase. A second phase would be to look into how the alliance can respond to requests from Allies who come under cyber-attack,” he said.

    Operational since 2007, the program codenamed PRISM was intended to monitor foreign communications that take place on US servers. It allowed the NSA to listen in on Skype conversations as long as one person was using a conventional phone. Edward Snowden’s leaked documents revealed that the NSA is monitoring Google products such as Gmail, voice and video chat, file transfers, photos, and a live surveillance of your search terms.

    Users of social media and cloud services (such as iCloud, Google Drive and Dropbox) are also being monitored, according to the Washington Post. About one in seven intelligence reports contain data collected by PRISM, according to the leaked documents. PRISM monitors the internet traffic of foreigners, but sweeps up American communicators in the process while the Boundless Information program analyzes and is fed in part by metadata on calls routed through Verizon, and other telecommunications carriers as well.

    The telecommunications data mining appears to be both vast and indiscriminate but only collects so-called metadata; that is, data on which phone numbers called which other numbers, how long the calls lasted, the locations where calls were made and received and the like. No conversations have been recorded, so what was said is forever beyond the government’s reach, according to reports.

    PRISM is a finer intelligence gathering program but far more invasive.

    It can confine not just metadata but the content of communications transmitted via the web, including messages sent and retrieved, uploaded videos et al.

    “NSA’s systems environment is a haven for computer scientists, with vast networks able to manipulate and analyze huge volumes of data at mind-boggling speeds,” the agency says on its website.

    The NSA and the the Government Communications Headquarters (GCHQ), a British intelligence agency, had hacked Chinese mobile-phone companies to collect millions of text messages and computers in China and Hong Kong for over a four-year period, according to Snowden’s documents.

    U.S officials have confirmed they do not know how many documents Snowden took but the enormity of the implication is staggering. China has come out in support of Snowden and even aided him in fleeing from Hong Kong to Moscow saying it will says it will “absolutely not accept” U.S.

    charges. Snowden’s passport has been revoked and charged with theft of government property, indicted by the United States for stealing and leaking classified documents.

    Source : Bindiya Thomas ~ Dated : Monday, July 1, 2013 @ 01:36 PM

    Find this story at 1 July 2013

    Defense World © 2012

    Washington gunman vetted by same firm behind Snowden checks

    USIS, one of the US’s largest security providers, admits to carrying out vetting procedures on Aaron Alexis

    Aaron Alexis had been arrested three times before the Navy Yard incident, including two suspected offences involving guns. Photograph: Kristi Suthamtewakul/Reuters

    Pressure to overhaul vetting procedures for US government contractors grew on Thursday after one of the largest US security providers admitted that it carried out background checks on Navy Yard gunman Aaron Alexis.

    USIS, a Virginia-based company owned by private equity group Providence, had previously denied conducting background investigations into Alexis, according to a report by Bloomberg. Alexis had been arrested three times, including two suspected offences involving guns, although he was not charged or convicted. On Thursday USIS issued a statement in response to mounting questions over how Alexis received the “secret” level clearance that allowed him access to military facilities such as Navy Yard. “Today we were informed that in 2007, USIS conducted a background check of Aaron Alexis for OPM,” said a company spokesman in a statement provided to the Guardian. “We are contractually prohibited from retaining case information gathered as part of the background checks we conduct for OPM and therefore are unable to comment further on the nature or scope of this or any other background check.”

    USIS, formerly known as US Investigations Services, was also involved in background checks on National Security Agency whistleblower Edward Snowden, but subsequently defended its role. In a statement to the Wall Street Journal last month, the company said the federal government did not raise any concerns at the time about its work in February 2011 on the five-year “periodic reinvestigation” of Snowden. The company said the NSA, not USIS, was ultimately responsible for approving or denying Snowden’s security clearance.

    Snowden’s leaks of classified material revealing the extent of the NSA’s surveillance activities in the US and abroad prompted a review of vetting procedures for contractors by the Office of the Director of National Intelligence.

    On Tuesday, the White House also announced a separate review by the Office of Management and Budget to examine “standards for contractors and employees across federal agencies”.

    Follow Dan Roberts by emailBeta
    Dan Roberts in Washington
    theguardian.com, Thursday 19 September 2013 23.54 BST

    Find this story at 19 September 2013

    © 2013 Guardian News and Media Limited or its affiliated companies. All rights reserved.

    USIS Under Investigation Over Edward Snowden Background Check

    WASHINGTON — The government contractor that performed a background investigation of the man who says he disclosed two National Security Agency surveillance programs is under investigation, a government watchdog said Thursday.

    Patrick McFarland, the inspector general at the Office of Personnel Management, said during a Senate hearing that the contractor USIS is being investigated and that the company performed a background investigation of Edward Snowden.

    McFarland also told lawmakers that there may have been problems with the way the background check of Snowden was done, but McFarland and one of his assistants declined to say after the hearing what triggered the decision to investigate USIS and whether it involved the company’s check of Snowden.

    “To answer that question would require me to talk about an ongoing investigation. That’s against our policy,” Michelle Schmitz, assistant inspector general for investigations, told reporters after the hearing. “We are not going to make any comment at all on the investigation of USIS.”

    USIS, which is based in Falls Church, Va., did not immediately respond to a request for comment.

    Sen. Claire McCaskill, D-Mo., said she and her staff have been told that the inquiry is a criminal investigation related “to USIS’ systemic failure to adequately conduct investigations under its contract” with the Office of Personnel Management.

    McCaskill said that USIS conducted a background investigation in 2011 for Snowden, who worked for government contractor Booz Allen Hamilton. Snowden says he is behind the revelations about the NSA’s collection of Americans’ phone records and Internet data from U.S. Internet companies.

    “We are limited in what we can say about this investigation because it is an ongoing criminal matter,” McCaskill said. “But it is a reminder that background investigations can have real consequences for our national security.”

    McFarland told reporters that his office has the authority to conduct criminal investigations.

    A background investigation is required for federal employees and contractors seeking a security clearance that gives them access to classified information.

    Of the 4.9 million people with clearance to access “confidential and secret” government information, 1.1 million, or 21 percent, work for outside contractors, according to a January report from the Office of the Director of National Intelligence. Of the 1.4 million who have the higher “top secret” access, 483,000, or 34 percent, work for contractors.

    By RICHARD LARDNER 06/20/13 04:51 PM ET EDT

    Find this story at 20 June 2013

    © 2013 TheHuffingtonPost.com, Inc.

    U.S. Probes Firm That Vetted NSA Leaker

    WASHINGTON—Federal inspectors have been conducting a criminal investigation for more than a year of the company that performed a background check on Edward Snowden, the former systems analyst who leaked some of the nation’s most closely held secrets to the media, U.S. officials said on Thursday.

    Federal inspectors have been conducting a criminal investigation for more than a year of the company that performed a background check on Edward Snowden, the former systems analyst who leaked some of the nation’s most closely held secrets to the media. Dion Nissenbaum reports.

    USIS, the largest contractor involved in conducting security background checks for the federal government, is being scrutinized over allegations about a “systematic failure to adequately conduct investigations,” Sen. Claire McCaskill (D., Mo.) said during a special congressional hearing. Those allegations aren’t related to Mr. Snowden.

    Federal officials confirmed the investigation Thursday and added that there also may have been problems with USIS’s 2011 security background check of Mr. Snowden, 29 years old, who fled to Hong Kong to avoid prosecution for admittedly taking years of classified documents while working as a Booz Allen Hamilton contractor at a National Security Agency office in Hawaii.

    Later that year, inspectors at the Office of Personnel Management—which oversees more than 90% of the government’s security background checks—launched the continuing contracting-fraud investigation of USIS.

    Patrick McFarland, inspector general for the Office of Personnel Management, said that there appear to have been problems with the USIS investigation of Mr. Snowden in 2011, though he didn’t provide any details. The 2011 background check of Mr. Snowden was a re-investigation for his security clearance.

    “We do believe that there may be some problems,” Mr. McFarland said during the hearing.

    USIS, a Falls Church, Va., company owned by private-equity firm Providence Equity Partners LLC, has more than 7,000 employees and conducts 45% of OPM investigations done by contractors, officials said. Last year, USIS received $200 million for its work, Ms. McCaskill said.

    In a statement, USIS said it turned over records last year in response to a subpoena from the agency’s inspector general, but that it had never been informed it is under criminal investigation. With regards to Mr. Snowden’s security check, the company said it wouldn’t comment on confidential investigations.

    The nation’s background-check system has come under renewed scrutiny in the wake of Mr. Snowden’s revelations.

    The federal agency spends more than $1 billion a year to conduct 2 million investigations of people seeking security clearances for jobs doing everything from cleaning offices at the State Department to working as covert operatives overseas. Most of that money goes to contractors like USIS.

    Of the roughly 2 million investigations in 2012, more than 770,000 involved people requesting new or continued access to classified information.

    The system has been plagued by massive backlogs and delays of more than a year for completion of investigations. Current and former investigators have complained the process is antiquated and focuses more on making sure applicants properly fill out a 127-page application form than on thorough background checks.

    On Thursday, Mr. McFarland warned that the investigative process is so flawed that it poses a security risk. “There is an alarmingly insufficient level of oversight of the federal investigative-services program,” he told lawmakers. “A lack of independent verification of the organization that conducts these important background investigations is a clear threat to national security,” he said.

    One concern for lawmakers is the pressure on contractors to quickly complete cases to bring in more money for their firms.

    Since 2007, 18 people have been convicted of falsifying records while conducting background checks, officials said. Eleven of those were federal workers; seven were contractors.

    The latest case came Thursday when Ramon Davila, a former Virgin Islands police commissioner who worked as an independent contractor conducting background checks, pleaded guilty to making false statements about his work. Mr. Davila, who worked at one time for USIS, admitted he didn’t conduct a thorough inquiry while working as a contractor for the agency in 2007.

    On Thursday, Mr. McFarland said such cases may be the tip of the iceberg. “I believe there may be considerably more,” he told lawmakers. “I don’t believe that we’ve caught it all by any stretch.”

    Federal officials were pressed to explain why USIS could continue to conduct sensitive investigations while under criminal investigation.

    Formerly a branch of the federal government, U.S. Investigations Services LLC was spun out of the Office of Personnel Management in 1996. It was renamed USIS after it was acquired by private-equity firms Carlyle Group LP and Welsh, Carson, Anderson & Stowe in early 2003 for about $1 billion. Those firms flipped the Falls Church, Va., company to fellow private-equity firm Providence four years later for about $1.5 billion.

    Providence, which specializes in buying and selling media, telecom and data companies, has since combined USIS with pre-employment-screening firm HireRight Inc., corporate-investigations firm Kroll Inc. and others under the name Altegrity Inc.

    —Ryan Dezember and Evan Perez contributed to this article.
    Write to Dion Nissenbaum at dion.nissenbaum@wsj.com

    By Dion Nissenbaum
    Updated June 21, 2013 3:56 a.m. ET

    Find this story at 21 June 2013

    Copyright 2013 Dow Jones & Company, Inc. All Rights Reserved

    Contractors Providing Background Checks For NSA Caught Falsifying Reports, Interviewing The Dead from the the-talking-dead dept

    The fallout from Ed Snowden’s leaks has taken many forms, one of which is the NSA taking a long look at its contractors’ hiring processes. Snowden claims to have taken the job solely to gathering damning info. This revelation, combined with some inconsistencies in his educational history, have placed the companies who perform background and credit checks under the microscope.

    What these agencies are now discovering can’t be making them happy, including the news that one contractor’s investigative work apparently involved a seance.
    Anthony J. Domico, a former contractor hired to check the backgrounds of U.S. government workers, filed a 2006 report with the results of an investigation.

    There was just one snag: A person he claimed to have interviewed had been dead for more than a decade. Domico, who had worked for contractors CACI International Inc. (CACI) and Systems Application & Technologies Inc., found himself the subject of a federal probe.
    It’s not as if Domico’s case is an anomaly.
    Domico is among 20 investigators who have pleaded guilty or have been convicted of falsifying such reports since 2006. Half of them worked for companies such as Altegrity Inc., which performed a background check on national-security contractor Edward Snowden. The cases may represent a fraction of the fabrications in a government vetting process with little oversight, according to lawmakers and U.S. watchdog officials.
    Who watches the watchers’ watchers? It appears as if that crucial link in the chain has been ignored. Give any number of people a job to do and, no matter how important that position is, a certain percentage will cut so many corners their cubicles will start resembling spheres.

    These are the people entrusted to help ensure our nation’s harvested data remains in safe hands, or at least, less abusive ones. Those defending the NSA claim this data is well-protected and surrounded by safeguards against abuse. Those claims were always a tad hollow, but this information shows them to be complete artifice. The NSA, along with several other government agencies, cannot positively say that they have taken the proper steps vetting their personnel.

    USIS, the contractor who vetted Ed Snowden, openly admits there were “shortcomings” in its investigation of the whistleblower. Perhaps Snowden’s background check was a little off, but overall, calling the USIS’ problems “shortcomings” is an understatement.
    Among the 10 background-check workers employed by contractors who have been convicted or pleaded guilty to falsifying records since 2006, eight of them had worked for USIS, according to the inspector general for the U.S. Office of Personnel Management. The personnel agency is responsible for about 90 percent of the government’s background checks.

    In one case, Kayla M. Smith, a former investigative specialist for USIS, submitted some 1,600 falsified credit reports, according to the inspector general’s office.
    Smith spent 18 months turning in these falsified reports, which accounted for a third of her total output. One might wonder how someone like Smith ends up working for a background check contractor. The answer? This problem isn’t confined to one level.
    [T]he investigator who had vetted Smith was convicted in a separate falsification case, Patrick McFarland, inspector general for the personnel office, said at a June 20 hearing held by two Senate panel.
    Will it get better? USIS is already ceding market share to other contractors but it’s impossible to say whether its competitors will be more trustworthy. McFarland says his office doesn’t have enough funding to perform thorough probes, which indicates what’s been caught so far is just skimming the surface. These agencies harvesting our data (and their defenders) all expect Americans (and others around the world) to simply trust them. Meanwhile, the reasons why we shouldn’t continue to mount unabated.

    A couple of senators are hoping their new piece of oversight legislation will fix the problem. It would provide McFarland’s office with more investigation funding, but simply adding more “oversight” isn’t going to make the problem go away. The NSA’s mouthpieces continue to insist that everything it does is subject to tons and tons of “oversight,” but that has done very little to improve its standing in the “trustworthy” department. There are systemic issues that need to be addressed, both in these agencies and the contractors they hire and expecting to paper over the cracks with a little legislation will only result in more revelations of wrongdoing, rather than fewer occurrences.

    by Tim Cushing
    Wed, Jul 10th 2013 8:49am

    Find this story at 10 July 2013

    Top-Secret Crate Packers Among Legions Hired With Leaker

    To the growing list of U.S. jobs that require Top Secret clearances add this one: packing and crating.

    A June 2 job posting on the website of CACI International Inc. (CACI), a government contractor that works for the Defense Department and intelligence agencies, seeks a full-time “packer/crater” to prepare products such as “chillers, generators, boats and vehicles” for shipping.

    The listing says the candidate must have a high-school diploma and hold a Top Secret/Sensitive Compartmented Information clearance, the type held by Edward Snowden, 29, the former National Security Agency contractor who says he passed information about classified electronic surveillance programs to two newspapers.

    From packers to computer specialists, the number of U.S. military and intelligence jobs requiring Top Secret clearances has risen since the attacks of Sept. 11, 2001, as the federal government expanded efforts to track and stop terrorists globally. That has made the government more dependent on contractors such as Arlington, Virginia-based CACI to fill many of these roles, and it has increased the workload on investigators who must process security clearances.

    “Perhaps the government should take a look at the number of people being granted access to sensitive information” and the security risks of that proliferation, said Robert Burton, a partner at the law firm of Venable LLP in Washington who served as acting administrator of the Office of Federal Procurement Policy in President George W. Bush’s administration.
    About 1.4 Million

    About 1.4 million Americans held Top Secret clearances as of October, including about 483,000 who worked for contractors, according to data from the Office of the Director of National Intelligence. Packer/Crater is listed among occupational specialties on the Central Intelligence Agency’s jobs website, which says the job pays $23.94 an hour and requires a polygraph examination.

    Access to Sensitive Compartmented Information, or SCI, is limited to those cleared for specific Top Secret programs or information.

    Among those with Top Secret clearances was Snowden, who had been working as a computer technician for government contractor Booz Allen Hamilton Holding Corp. (BAH) for less than three months after previously holding a position with the CIA. Booz Allen said yesterday it had fired Snowden, who it said had a salary of $122,000 a year, for “violations of the firm’s code of ethics and firm policy.”

    For Booz Allen, based in McLean, Virginia, almost a quarter of annual revenue comes from work for intelligence agencies, according to its annual regulatory filing. About 27 percent of its employees held Top Secret/Sensitive Compartmented Information clearances, according to the company.
    Lockheed, SAIC

    The company, which reported sales for the year ending March 31 of $5.76 billion, was acquired in 2008 by the Washington-based private-equity firm Carlyle Group LP, which still holds 67 percent of the company, according to data compiled by Bloomberg.

    Booz Allen, the 13th-largest federal contractor, competes with Lockheed Martin Corp. (LMT), SAIC Inc. (SAI), CACI and other companies for U.S. intelligence contracts.

    Jobs seeking candidates with Top Secret clearances are among the five most-advertised requirements in the U.S., according to Wanted Technologies, a Quebec City-based company that collects and analyzes job ads.

    While postings for Top Secret jobs declined about 23 percent in March from a year earlier, there were still 20,000 such ads posted online, according to “Hiring Demand Indicators” published in April by Wanted Technologies. All of the top five job categories were related to computer technologies.
    Security Clearances

    Government agencies must turn to contractors for almost a half-million workers with Top Secret clearances because agencies can’t meet their needs for such “highly prized” workers from within, said Stan Soloway, president and chief executive officer of the Professional Services Council, an Arlington, Virginia-based group that represents contractors such as SAIC and CACI.

    The danger of leaks isn’t exacerbated by having workers for contractors holding Top Secret clearances, Soloway said.

    “You’d still have an overwhelming number of people” working in this area, even if the government was hiring federal workers rather than contractors, Soloway said. “The sheer growth in the intel community increased the potential for leaks.”
    Background Investigations

    The demand for workers with security clearances has grown so much that many of the background investigations that once were done by the Federal Bureau of Investigation and the Office of Personnel Management are now farmed out to contractors as well, said Charles Tiefer, a University of Baltimore law professor and former member of the U.S. Commission on Wartime Contracting.

    “You couldn’t fill a need as large as it is today if you still depended on the FBI to do field work on every job applicant for a clearance in the government or as a government contractor,” Tiefer said. “So many clearances are being granted that they are doing it by having contractors process the clearances.”

    The boost in jobs requiring Top Secret clearances has another effect too: It costs money.

    The U.S. Government Accountability Office said in a July 2012 report that the Director of National Intelligence hadn’t provided other government agencies with a clear policy and instructions for determining which civilian jobs needed that clearance.
    ‘Investigative Workload’

    “Developing a sound requirements process is important because requests for clearances for positions that do not need a clearance or need a lower level of clearance increase investigative workload and costs unnecessarily,” according to the GAO report.

    To issue a Top Secret clearance, the government or a designated contractor conducts a Single Scope Background Investigation, which includes a review of everywhere an individual has lived, attended school and worked, according to the GAO. Investigators also interview four references who have social knowledge of the individual, talk to former spouses and conduct a check of financial records. Top Secret clearances must be renewed every five years. Some also require a polygraph examination.

    The U.S. spent $1 billion in 2011 to conduct background investigations for a variety of classifications, the GAO said.

    In 2012, each investigation to issue a new Top Secret clearance costs about $4,000 with a renewal cost of $2,711, compared with the base price of $260 for a more routine Secret clearance, according to the GAO.

    “A lot of security reform efforts have been focused on other aspects” of how intelligence agencies work, Brenda Farrell, author the GAO report said in a phone interview. “This one definitely needs attention.”

    To contact the reporters on this story: Gopal Ratnam in Washington at gratnam1@bloomberg.net; Danielle Ivory in Washington at divory@bloomberg.net

    To contact the editors responsible for this story: Stephanie Stoughton at sstoughton@bloomberg.net; John Walcott at jwalcott9@bloomberg.net

    By Gopal Ratnam and Danielle Ivory – Jun 12, 2013

    Find this story at 12 June 2013

    ®2013 BLOOMBERG L.P.

    C.I.A. Warning on Snowden in ’09 Said to Slip Through the Cracks

    WASHINGTON — Just as Edward J. Snowden was preparing to leave Geneva and a job as a C.I.A. technician in 2009, his supervisor wrote a derogatory report in his personnel file, noting a distinct change in the young man’s behavior and work habits, as well as a troubling suspicion.

    The C.I.A. suspected that Mr. Snowden was trying to break into classified computer files to which he was not authorized to have access, and decided to send him home, according to two senior American officials.

    But the red flags went unheeded. Mr. Snowden left the C.I.A. to become a contractor for the National Security Agency, and four years later he leaked thousands of classified documents. The supervisor’s cautionary note and the C.I.A.’s suspicions apparently were not forwarded to the N.S.A. or its contractors, and surfaced only after federal investigators began scrutinizing Mr. Snowden’s record once the documents began spilling out, intelligence and law enforcement officials said.

    “It slipped through the cracks,” one veteran law enforcement official said of the report.

    Spokesmen for the C.I.A., N.S.A. and F.B.I. all declined to comment on the precise nature of the warning and why it was not forwarded, citing the investigation into Mr. Snowden’s activities.

    Half a dozen law enforcement, intelligence and Congressional officials with direct knowledge of the supervisor’s report were contacted for this article. All of the officials agreed to speak on the condition of anonymity because of the continuing criminal investigation.

    In hindsight, officials said, the report by the C.I.A. supervisor and the agency’s suspicions might have been the first serious warnings of the disclosures to come, and the biggest missed opportunity to review Mr. Snowden’s top-secret clearance or at least put his future work at the N.S.A. under much greater scrutiny.

    “The weakness of the system was if derogatory information came in, he could still keep his security clearance and move to another job, and the information wasn’t passed on,” said a Republican lawmaker who has been briefed on Mr. Snowden’s activities.

    Mr. Snowden now lives in Moscow, where he surfaced this week for the first time since receiving temporary asylum from the Russian government over the summer. On Wednesday night, he met with four American whistle-blowers who have championed his case in the United States and who presented him with an award they said was given annually by a group of retired C.I.A. officers to members of the intelligence community “who exhibit integrity in intelligence.”

    In a television interview, one member of the group, Jesselyn Radack, a former Justice Department official, said that Mr. Snowden “looked great.”

    “He seemed very centered and brilliant,” Ms. Radack said. “Smart, funny, very engaged. I thought he looked very well.”

    Another of the whistle-blowers, Coleen Rowley, a former F.B.I. agent who testified before the Senate about missteps in the agency’s investigation of the Sept. 11, 2001, attacks, said, “We talked about prior examples of great people in history that had themselves been under this kind of pressure, and he’s remarkably centered.”

    On Thursday, Mr. Snowden’s father, Lon, arrived in Moscow to see his son after assurances from Mr. Snowden’s legal aide that there would be “no complications” in organizing a meeting with his father. But in a telephone interview later in the day, Lon Snowden said he had not yet been able to meet with his son.

    “I can’t tell you the where and the when,” the elder Mr. Snowden said. “I have no idea. I hope something happens.”

    It is difficult to tell what would have happened had N.S.A. supervisors been made aware of the warning the C.I.A. issued Mr. Snowden in what is called a “derog” in federal personnel policy parlance.

    “The spectrum of things in your personnel file could be A to Z,” said Charles B. Sowell, who until June was a top official in the Office of the Director of National Intelligence working on improving the security clearance process. “There’s a chance that that information could be missed and might not be surfaced.”

    Mr. Sowell, now a senior vice president at Salient Federal Solutions, an information technology company in Fairfax, Va., emphasized that he left the government before Mr. Snowden’s disclosures became public.

    Intelligence and law enforcement officials say the report could have affected the assignments Mr. Snowden was given, first as an N.S.A. contractor with the computer company Dell in Japan and later with Booz Allen Hamilton in Hawaii, as well as the level of supervision he received.

    The electronic systems the C.I.A. and N.S.A. use to manage the security clearances for its full-time and contracted employees are intended to track major rule-based infractions, not less serious complaints about personal behavior, a senior law enforcement official said. Thus, lesser derogatory information about Mr. Snowden was unlikely to have been given to the N.S.A. unless it was specifically requested. As a result of Mr. Snowden’s case, two law enforcement officials said, that flaw has since been corrected and such information is now being pushed forward.

    The revelation of the C.I.A.’s derogatory report comes as Congress is examining the process of granting security clearances, particularly by USIS, a company that has performed 700,000 yearly security checks for the government. Among the individuals the company vetted were Mr. Snowden and Aaron Alexis, who the police say shot and killed 12 people at the Washington Navy Yard last month.

    “We have a compelling need to monitor those trusted with this sensitive information on a more regular basis and with broader sets of data,” said Kathy Pherson, a former C.I.A. security officer who belongs to an intelligence industry task force that is expected to issue a report on the matter by year’s end.

    While it is unclear what exactly the supervisor’s negative report said, it coincides with a period of Mr. Snowden’s life in 2009 when he was a prolific online commenter on government and security issues, complained about civil surveillance and, according to a friend, was suffering “a crisis of conscience.”

    Mr. Snowden got an information technology job at the C.I.A. in mid-2006. Despite his lack of formal credentials, he gained a top-secret clearance and a choice job under State Department cover in Geneva. Little is known about what his duties were there.

    Mavanee Anderson, who worked with Mr. Snowden in Geneva and also had a high security clearance, said in an article in The Chattanooga Times Free Press of Tennessee in June that when they worked from 2007 through early 2009, Mr. Snowden “was already experiencing a crisis of conscience of sorts.”

    “Anyone smart enough to be involved in the type of work he does, who is privy to the type of information to which he was privy, will have at least moments like these,” she said.

    Later, Mr. Snowden would tell the newspaper The Guardian that he was shocked and saddened by some of the techniques C.I.A. operatives in Geneva used to recruit sources. “Much of what I saw in Geneva really disillusioned me about how my government functions and what its impact is in the world,” he told The Guardian. “I realized that I was part of something that was doing far more harm than good.”

    There were other signs that have since drawn investigators’ attention. In early 2009, someone using Mr. Snowden’s screen name expressed outrage at government officials who leaked information to the news media, telling a friend in an Internet chat that leakers “should be shot.”

    “They’re just like WikiLeaks,” Mr. Snowden — or someone identified as him from his screen name, “TheTrueHOOHA,” and other details — wrote in January 2009 about an article in The New York Times on secret exchanges between Israel and the United States about Iran’s nuclear program.

    He later told The Guardian he was disappointed that President Obama “advanced the very policies that I thought would be reined in.”

    “I got hardened,” he said.

    Michael S. Schmidt contributed reporting from Washington, and Andrew Roth from Moscow.

    October 10, 2013
    By ERIC SCHMITT

    Find this story at 10 October 2013

    © 2013 The New York Times Company

    Exclusive: NSA delayed anti-leak software at base where Snowden worked -officials

    WASHINGTON (Reuters) – The U.S. National Security Agency failed to install the most up-to-date anti-leak software at a site in Hawaii before contractor Edward Snowden went to work there and downloaded tens of thousands of highly classified documents, current and former U.S. officials told Reuters.

    Well before Snowden joined Booz Allen Hamilton last spring and was assigned to the NSA site as a systems administrator, other U.S. government facilities had begun to install software designed to spot attempts by unauthorized people to access or download data.

    The purpose of the software, which in the NSA’s case is made by a division of Raytheon Co, is to block so-called “insider threats” – a response to an order by President Barack Obama to tighten up access controls for classified information in the wake of the leak of hundreds of thousands of Pentagon and State Department documents by an Army private to WikiLeaks website in 2010.

    The main reason the software had not been installed at the NSA’s Hawaii facility by the time Snowden took up his assignment there was that it had insufficient bandwidth to comfortably install it and ensure its effective operation, according to one of the officials.

    Due to the bandwidth issue, intelligence agencies in general moved more slowly than non-spy government units, including the Defense Department, to install anti-leak software, officials said.

    NBC News reported earlier this year that Snowden, who has been charged with espionage but was granted asylum in Russia, took advantage of antiquated security systems to rummage through the NSA’s computer systems but details of the lapses in Hawaii have not previously been reported.

    A spokeswoman for the NSA declined to discuss details of the agency’s schedule for installing anti-leak software in Hawaii. She said the agency has had to speed up its efforts to tighten security in the wake of Snowden’s disclosures.

    “We open our facilities only after we have met all of the necessary regulatory, statutory, and infrastructure requirements,” the spokeswoman said. “NSA has a very large, diverse and complex IT infrastructure across our global enterprise, and many features of that infrastructure evolve over time as new capabilities are developed, refined, and deployed.”

    She added: “NSA and the Intelligence Community at large have been moving forward with IT efficiency initiatives for several years. … The unauthorized disclosures have naturally compelled NSA and the rest of the IC to accelerate the timeline.”

    Raytheon had no immediate comment.

    INSIDER THREAT

    In December 2010, the White House created a task force, headed by a former senior intelligence officer, to develop plans and systems to tighten access controls for classified information.

    One of the specific initiatives announced by the White House for spy agencies was the installation of a program described as “Enhanced Automated, On-Line Audit Capability: Systems will monitor user activity on all IC classified computer systems to detect unusual behavior.”

    The NSA Hawaii facility, known as a Remote Operations Center, opened in January 2012, replacing an older site located in a nearby World War II-era facility. The facility is focused on intercepting communications from Asia, and the Washington Post has reported that it also is involved in operations in cyberspace such as mapping adversaries’ computer networks and implanting electronic beacons.

    Snowden was assigned by Booz Allen Hamilton to the Hawaii facility in late March or early April 2013, after first attending training sessions near NSA’s Maryland headquarters.

    He was only there for a few weeks before he told his employers that he needed time off because of health problems. Snowden then disappeared and turned up several weeks later in Hong Kong. There, he gave a TV interview and a trove of secrets from the NSA and its British counterpart, Government Communications Headquarters, to writer Glenn Greenwald, filmmaker Laura Poitras, and journalists from Britain’s Guardian newspaper.

    Reuters reported in August that Snowden began downloading documents describing the U.S. government’s electronic spying on an earlier job working for Dell Inc in April 2012.

    One official said Congressional oversight committees had repeatedly expressed concerns to the administration that agencies across the government, including spy units, had moved too slowly to install updated security software.

    Another official said that U.S. agencies were still not positive they knew the details of all the material which Snowden had downloaded and turned over to journalists.

    (Editing by Tiffany Wu and Grant McCool)

    Fri, Oct 18 2013

    By Mark Hosenball and Warren Strobel

    Find this story at 18 October 2013

    © Thomson Reuters 2011.

    Alle Geheimdienst-Aufträge an Privatfirmen in Deutschland

    Was treiben die USA in Deutschland? Antworten finden sich auch in einer offiziellen US-Datenbank. Hier finden Sie alle Verträge für Geheimdienstarbeiten in Deutschland.

    Was treiben die USA in Deutschland? Antworten finden sich auch in der offiziellen Datenbank FPDS.gov. Hier müssen alle vergebenen Staatsaufträge praktisch in Echtzeit eingebucht werden, wenn ihr Volumen 3000 Dollar übersteigt.

    Die Webseite bietet eine Volltextsuche, lässt sich jedoch auch nach Kategorien filtern. Wer sich für Aufträge in Deutschland interessiert, gibt POP_COUNTRY_NAME:”GERMANY” in das Feld ein. Wer nach PRODUCT_OR_SERVICE_CODE:”R423″ sucht, findet alle Aufträge die mit “Intelligence” zu tun haben, mit Geheimdienstarbeit.
    Amerikanische Auftragnehmer
    Was Spionagefirmen in Deutschland für die USA treiben

    Die US-Geheimdienste sammeln so viele Daten, dass sie alleine nicht hinterherkommen. Deswegen mieten sie Zusatzkräfte bei privaten Dienstleistern. Die arbeiten wie Spione – auch in Deutschland.

    Diese Daten kann man dann als Excel-Datei herunterladen. Hier finden Sie die Tabelle mit allen Intelligence-Aufträgen in Deutschland zum Herunterladen.

    Das bedeuten die wichtigsten Spalten in der Tabelle:

    Contract ID: Auftragsnummer, über die man in der Regel leicht in der FPDS-Datenbank den Auftrag mit weiteren Zusatzinformationen findet

    Vendor Name: Dienstleisterfirma

    Year signed: Jahr, in dem der Vertrag geschlossen wurde

    Action Obligation ($): Auftragssumme (manchmal negativ, wenn Aufträge stoniert oder rückwirkend verringert werden)

    NAICS Description und PSC Description: Kategorie des Auftrags

    Global Vendor Name: Mutterkonzern
    Aufträge in Deutschland
    Die Top 3 der Mietspione

    Alleine in Deutschland haben die USA bisher 140 Millionen Euro für private Spione ausgegeben. Die meisten Aufträge gingen an die drei Firmen SOSi, Caci und MacAulay-Brown. Was sind das für Konzerne?
    Demonstration gegen NSA-Horchposten bei Darmstadt: Auch Staatsaufträge für den Dagger-Complex finden sich in der Datenbank (Foto: dpa)

    16. November 2013 11:05 Datenbank-Recherche
    Von Bastian Brinkmann

    Find this story at 16 November 2013

    Vijf bedrijven in een excel

    Copyright: Süddeutsche Zeitung Digitale Medien GmbH / Süddeutsche Zeitung GmbH

    Die Top 3 der Mietspione

    Alleine in Deutschland haben die USA bisher 140 Millionen Euro für private Spione ausgegeben. Die meisten Aufträge gingen an die drei Firmen SOSi, Caci und MacAulay-Brown. Was sind das für Konzerne?

    Etwa 70 Prozent ihres Budgets geben die US-Geheimdienste für Aufträge an Privatfirmen aus. Das ist bekannt, seit vor Jahren eine interne Präsentation des amerikanischen Geheimdienstdirektors im Internet auftauchte. Die privaten Auftragnehmer, auf Englisch Contractors, sind eine riesige Schattenarmee (mehr dazu hier).

    Und sie sind auch in Deutschland tätig: Rund 140 Millionen Dollar haben die USA in den vergangenen zehn Jahren in Deutschland für private Spione ausgegeben (hier alle Aufträge in einer Tabelle zum Herunterladen). Dazu kommen Hunderte Millionen Dollar für spionagenahe Dienstleistungen wie Datenbankpflege oder Datenverarbeitung.

    Süddeutsche.de stellt die drei Spionagehelfer vor, die am meisten Umsatz in Deutschland mit Geheimdienstarbeiten machen.
    Nummer 1: SOSi – Vom Übersetzungsbüro zum Flughafenbetreiber

    Mitarbeiter von SOSi seien das Ziel von internationalen Terroristen und ausländischen Geheimdiensten, sagt der Sicherheitschef der Firma. Das Unternehmen arbeite mit den geheimsten Daten der US-Regierung. Es gelte daher, besondere Sicherheitsmaßnahmen zu treffen, erzählt er in einem Video im Intranet. Nach dem Urlaub müssten die Mitarbeiter eine kurze Befragung über sich ergehen lassen: Wen haben sie getroffen? Warum? Änderungen im Privatleben seien der Firma bitte umgehend zu melden. Und wichtig sei auch, sagt er, den Vorgesetzten von verdächtigem Verhalten von Kollegen zu berichten.

    SOS International, der Sicherheitschef kürzt es gerne S-O-S-i ab, ist der größte Spionagedienstleister der Amerikaner in Deutschland. Allein 2012 hat die Firma für Geheimdiensttätigkeiten in Deutschland 11,8 Millionen Euro von der US-Regierung bekommen, insgesamt waren es in den vergangenen Jahren rund 60 Millionen Dollar.

    Auf den ersten Blick gibt sich die Firma offen: Es gibt eine Internetseite, eine Facebook-Seite, die Vorstände twittern, der Firmenchef sendet Videobotschaften. Mehrere Anfragen zu ihrer Tätigkeit in Deutschland ließ die Firma allerdings unbeantwortet. Wie die Firma tickt lässt sich trotzdem gut rekonstruieren: aus den öffentlichen Daten – und aus einer älteren Version des Intranets der Firma, die sie offenbar versehentlich ins Internet stellte.

    Dort findet sich allerhand: Hinweise zum Dresscode (konservativ-professionell), Empfehlungen zum Umgang mit Drogen (geringe Mengen Alkohol bei Firmenfeiern erlaubt) oder Anweisungen zur Reaktion auf Kontaktversuche der Medien (nichts herausgeben). Und auch das eindringliche Briefing des Sicherheitschefs, in dem er an den Patriotismus und die Paranoia seiner Mitarbeiter appelliert.

    Öffentlich verkauft sich das Unternehmen als Familienunternehmen mit Vom-Tellerwäscher-zum-Millionär-Geschichte. Ursprünglich ist Sosi der Vorname der Unternehmensgründerin: Sosi Setian kam 1959 als Flüchtling aus Armenien nach Amerika, heißt es in der Selbstdarstellung der Firma. Sie arbeitete als Übersetzerin für US-Behörden, gründete 1989 ein Übersetzungsbüro. Nach sechs Monaten hatte sie 52 Mitarbeiter, die sie angeblich alle regelmäßig zum Abendessen in ihr Zuhause einlud.

    Heute ist der Sohn der Gründerin, Julian Setian, Geschäftsführer, seine Schwester Pandora sitzt ebenfalls im Vorstand. Der große Erfolg kam nach dem 11. September 2001 – und mit den immens gestiegenen Spionageausgaben der USA. 2002 begann SOSi Übersetzer nach Afghanistan und in den Irak zu schicken. Ein Jahr später heuerten sie auch Spionageanalysten und Sicherheitstrainer an – die Firma hatte erkannt, wie lukrativ das Geheimdienstgeschäft war. Inzwischen beschäftigt das Unternehmen zwischen 800 bis 1200 Mitarbeiter und ist auf allen Feldern der Spionage aktiv, steht auf der Firmenhomepage.

    Was das konkret heißt, lässt sich mit Broschüren aus dem Intranet rekonstruieren: SOSi hat die US Army in Europa bei der Auswertung ihrer Spionageergebnisse unterstützt, in Afghanistan PR-Arbeit für die US-Truppen gemacht, im Irak Einheimische auf der Straße angeworben, um die Sicherheitslage im Land einzuschätzen, und in Amerika FBI-Agenten die Techniken der Gegenspionage beigebracht.

    Neben den USA hat die Firma Büros in acht weiteren Ländern, darunter Deutschland, heißt es in der Broschüre, die aus dem Jahr 2010 stammt. Auf seiner Homepage sucht das Unternehmen Mitarbeiter in Darmstadt, Heidelberg, Mannheim, Stuttgart und Wiesbaden – also an den traditionellen Standorten der Amerikaner. Im September hat SOSi in einer Pressemitteilung veröffentlicht, dass sie die 66. Military Intelligence Brigade in Darmstadt in den kommenden drei Jahren beim Planen, Sammeln und Auswerten von Geo-Daten unterstützen werde, der sogenannten Geospatial-Intelligence.
    Solche Software müssen GEOINT-Analysten von SOSi bedienen können. (Foto: Screenshot exelisvis.com)

    Im Mai gewann die Firma eine Ausschreibung der irakischen Regierung. SOSi übernimmt nach dem Abzug der letzten amerikanischen Truppen aus dem Irak die Verantwortung für die Logistik und die Sicherheit von drei ehemaligen US-Stützpunkten sowie einem Flugplatz. Mehr als 1500 Mitarbeiter werden dafür gebraucht, das würde die Unternehmensgröße fast verdoppeln.

    Die Verantwortung für das Geschäft trägt dann Frank Helmick, der seit Dezember 2012 bei SOSi arbeitet. Vor seiner Pensionierung war Helmick übrigens General der US-Army. Zuletzt kommandierte er den Abzug der US-Truppen aus dem Irak.

    “Du siehst den Hund dort? Wenn du mir nicht sagst, was ich wissen will, werde ich den Hund auf dich hetzen”, soll Zivilist 11 gesagt haben, damals 2003 im berüchtigten US-Militärgefängnis Abu Ghraib im Irak. Sein Kollege, Zivilist 21, soll einen Gefangenen gezwungen haben, rote Frauen-Unterwäsche auf dem Kopf zu tragen. So steht es in zwei internen Berichten des US-Militärs (dem Fay- und dem Tabuga-Report). Und dort steht auch: Zivilist 11 und Zivilist 21 waren Angestellte der US-Firma Caci.

    Bis heute bestreitet das Unternehmen, an den Misshandlungen beteiligt gewesen zu sein, deren Bilder damals um die Welt gingen: Nackte Häftlinge aufgestapelt zu menschlichen Pyramiden, traktiert mit Elektroschocks, angeleint wie Hunde. Unstrittig ist nur, dass Dutzende Mitarbeiter der Firma im Irak waren, um dort Gefangene zu befragen – weil das US-Militär mit dem eigenen Personal nicht mehr hinterherkam. Für viele Kritiker der US-Geheimdienste ist Caci damit zum erschreckendsten Beispiel geworden, wie weit Privatfirmen in die schmutzigen Kriege der Amerikaner verstrickt sind.

    Nachhaltig geschadet haben die Foltervorwürfe der Firma aber nicht: 2012 hat Caci einen Rekordumsatz von 3,8 Milliarden Dollar erwirtschaftet, 75 Prozent davon stammen immer noch aus Mitteln des US-Verteidigungsministeriums. 15.000 Mitarbeiter sind weltweit für das Unternehmen tätig. Unter dem Firmenmotto “Ever vigilant” (stets wachsam) bieten sie den Geheimdiensten Unterstützung in allen Bereichen der Spionage, wie das Unternehmen im Jahresbericht 2006 schrieb: Informationen sammeln, Daten analysieren, Berichte schreiben, die Geheimdienstarbeit managen.

    Caci hat 120 Büros rund um die Welt, in Deutschland sitzt die Firmen in Leimen, einer Kreisstadt in Baden mit 25.000 Einwohnern. Laut der offiziellen Datenbank der US-Regierung hat die Firma in den vergangenen zehn Jahren in Deutschland 128 Millionen Dollar umgesetzt. Auf seiner Homepage hat Caci Mitarbeiter in Wiesbaden, Schweinfurt, Stuttgart, Heidelberg, Darmstadt und Bamberg gesucht, den klassischen Standorten des US-Militärs. Bei manchen Jobs sind die genauen Standorte geheim, bei fast allen die Berechtigung nötig, “Top Secret” arbeiten zu dürfen.

    Was die Firma in Deutschland treibt, zeigt sich an einem Auftrag aus dem Jahr 2009. Damals bekam das Unternehmen den Zuschlag, für fast 40 Millionen Dollar SIGINT-Analysten nach Deutschland zu schicken. SIGINT steht für Signals Intelligence, Fernmeldeaufklärung sagen die deutschen Behörden. Was das heißt? Mitarbeiter von Caci haben in Deutschland demnach Telefonate und Internetdaten wie E-Mails abgefangen und ausgewertet.

    MacAulay-Brown, Eberstädter Weg 51, Griesheim bei Darmstadt. Offiziell ist der Deutschlandsitz des drittgrößten Spionagezulieferers des US-Militärs in Deutschland nirgendwo angegeben. Doch in einem Prospekt aus dem Jahr 2012 findet sich diese Adresse. Und die ist durchaus brisant: Es ist die Adresse des Dagger Complex. Streng abgeschirmt sitzt dort die 66. Military Intelligence Brigade des US-Militärs und offenbar auch die NSA.

    Sogar eine Telefonnummer mit Griesheimer Vorwahl hatte MacAulay-Brown veröffentlicht. Wer dort anruft, bekommt erzählt, dass der Mitarbeiter der Firma etwa seit einem Jahr dort nicht mehr arbeitet. Mehr erfährt man nicht; nicht einmal, wer den Anruf jetzt entgegengenommen hat.

    Dass die Firma so engen Kontakt zu Geheimdiensten und Militär hat, überrascht nicht. Geschäftsführer Sid Fuchs war früher Agent der CIA. Weitere Vorstandsmitglieder waren Agenten oder ranghohe Militärs. Die Firma rühmt sich damit, dass 60 Prozent ihrer Mitarbeiter mehr als 15 Jahre Erfahrung im Militär oder sonstigen Regierungstätigkeiten hat.

    Dementsprechend ist auch das Tätigkeitsspektrum von MacAulay-Brown, die sich auch MacB abkürzen. Auf seiner Homepage wirbt das Unternehmen damit, einen Rundum-Service für Geheimdienste anzubieten. Die Firma habe, heißt es, kostengünstige, innovative und effiziente Spionage-Möglichkeiten für die Geheimdienste gefunden. Der Fokus liegt dabei auf den eher technischen Spionagebereichen der Signalauswertung und Erderkundung (Fachwörter: Geoint, Masint, Sigint).

    Auch in Deutschland hat MacB in diesem Bereich gearbeitet. 2008 hat das Unternehmen mitgeteilt, einen Auftrag der 66. Military Intelligence Brigade in Darmstadt für technische Spionage über Satelliten und Sensoren bekommen zu haben. Insgesamt hat MacAulay-Brown laut Zahlen aus der offiziellen US-Datenbank für Staatsaufträge in den vergangenen Jahren fast zehn Millionen Dollar von der 66. Military Intelligence Brigade erhalten, mit der sich das Unternehmen den Bürositz in Darmstadt zumindest zeitweise teilte.

    Mit Signaltechnik und Erderkundung hat das Unternehmen lange Erfahrung. MacAulay-Brown wurde 1979 von zwei Technikern gegründet, John MacAulay und Dr. Charles Brown. Sie waren zunächst ein Ingenieurbüro für die Army, arbeiteten unter anderem an Radarsystemen. Später fokussierte sich die Firma auf das Testen militärischer System für die Air Force. Bis heute ist MacB in diesem Bereich tätig, auch in Deutschland: Das Unternehmen sucht beispielsweise derzeit in Spangdahlem einen Flugzeugtechniker, in dem Ort in Rheinland-Pfalz unterhält die Air Force einen Flughafen.

    Ein weiterer Geschäftsbereich von MacB ist die Cybersicherheit – auch hier ist die Firma offenbar in Deutschland tätig: Dem veröffentlichten Prospekt mit der Büroadresse im Dagger-Complex ist eine Liste von Experten angehängt, die das Militär auf Abruf von dem Unternehmen mieten kann – inklusive der Stundenpreise. Neben technischen Schreibern und Grafikdesignern finden sich dabei auch Jobbeschreibungen, die Hackertätigkeiten beinhalten.

    Bis heute ist die Firma in Privatbesitz. Sie gehört Syd und Sharon Martin, die MacB 2001 mit ihrer inzwischen verkauften Mutterfirma Sytex gekauft hatten. Als sie 2005 Sytex an den US-Rüstungskonzern Lockheed Martin verkauften, behielten sie MacB – und machten es immer erfolgreicher. Der Umsatz ist seit 2005 von 65 auf 350 Millionen Dollar gewachsen. Die Firma beschäftigt inzwischen 2000 Mitarbeiter weltweit.

    Den Erfolg haben dabei vor allem Verträge der US-Regierung gebracht. 2012 war das Unternehmen erstmals auf der Liste der 100 größten Regierungs-Contractors, 2013 steht sie bereits auf Platz 91. Und wenn es nach dem Management geht, soll es so weiter gehen. In einem Interview mit den Dayton Business News sagte Geschäftsführer Fuchs, er wolle in den kommenden Jahren den Umsatz auf eine Milliarde steigern und die Mitarbeiterzahl verdoppeln.

    16. November 2013 12:21 Aufträge in Deutschland
    Von Oliver Hollenstein

    Find this story at 16 November 2013

    © Süddeutsche Zeitung Digitale Medien GmbH / Süddeutsche Zeitung GmbH

    Private firms selling mass surveillance systems around world, documents show

    One Dubai-based firm offers DIY system similar to GCHQ’s Tempora programme, which taps fibre-optic cables

    Advanced Middle East Systems has been offering a device called Cerebro, which taps information from fibre-optic cables carrying internet traffic. Photograph: Corbis

    Private firms are selling spying tools and mass surveillance technologies to developing countries with promises that “off the shelf” equipment will allow them to snoop on millions of emails, text messages and phone calls, according to a cache of documents published on Monday.

    The papers show how firms, including dozens from Britain, tout the capabilities at private trade fairs aimed at offering nations in Africa, Asia and the Middle East the kind of powerful capabilities that are usually associated with government agencies such as GCHQ and its US counterpart, the National Security Agency.

    The market has raised concerns among human rights groups and ministers, who are poised to announce new rules about the sale of such equipment from Britain.

    “The government agrees that further regulation is necessary,” a spokesman for the Department for Business, Innovation and Skills said. “These products have legitimate uses … but we recognise that they may also be used to conduct espionage.”

    The documents are included in an online database compiled by the research watchdog Privacy International, which has spent four years gathering 1,203 brochures and sales pitches used at conventions in Dubai, Prague, Brasilia, Washington, Kuala Lumpur, Paris and London. Analysts posed as potential buyers to gain access to the private fairs.

    The database, called the Surveillance Industry Index, shows how firms from the UK, Israel, Germany, France and the US offer governments a range of systems that allow them to secretly hack into internet cables carrying email and phone traffic.

    The index has details from 338 companies, including 77 from the UK, offering a total of 97 different technologies.

    One firm says its “massive passive monitoring” equipment can “capture up to 1bn intercepts a day”. Some offer cameras hidden in cola cans, bricks or children’s carseats, while one manufacturer turns cars or vans into surveillance control centres.

    There is nothing illegal about selling such equipment, and the companies say the new technologies are there to help governments defeat terrorism and crime.

    But human rights and privacy campaigners are alarmed at the sophistication of the systems, and worry that unscrupulous regimes could use them as tools to spy on dissidents and critics.

    Libya’s former leader Muammar Gaddafi is known to have used off-the-shelf surveillance equipment to clamp down on opposition leaders.

    Privacy International believes UK firms should now be subject to the same strict export licence rules faced by arms manufacturers.

    “There is a culture of impunity permeating across the private surveillance market, given that there are no strict export controls on the sale of this technology, as there are on the sale of conventional weapons,” said Matthew Rice, research consultant with Privacy International.

    “This market profits off the suffering of people around the world, yet it lacks any sort of effective oversight or accountability.

    “This lack of regulation has allowed companies to export surveillance technology to countries that use their newly acquired surveillance capability to spy on human rights activists, journalists and political movements.”

    Privacy International hopes the Surveillance Industry Index will give academics, politicians and campaigners a chance to look at the type of surveillance technologies now available in the hope of sparking a debate about improved regulation.

    The documents include a brochure from a company called Advanced Middle East Systems (AMES), based in Dubai. It has been offering a device called Cerebro – a DIY system similar to the Tempora programme run by GCHQ – that taps information from fibre-optic cables carrying internet traffic.

    AMES describes Cerebro as a “core technology designed to monitor and analyse in real time communications … including SMS (texting), GSM (mobile calls), billing data, emails, conversations, webmail, chat sessions and social networks.”

    The company brochure makes clear this is done by attaching probes to internet cables. “No co-operation with the providers is required,” it adds.

    “Cerebro is designed to store several billions of records – metadata and/or communication contents. At any time the investigators can follow the live activity of their target with advanced targeting criteria (email addresses, phone numbers, key words),” says the brochure.

    AMES refused to comment after being contacted by the Guardian, but said it followed similar protocols to other surveillance companies. “We don’t want to interact with the press,” said a spokesman.

    Another firm selling similar equipment is VASTech, based in South Africa, which has a system called Zebra. Potential buyers are told it has been designed to help “government security agencies face huge challenges in their combat against crime and terrorism”.

    VASTech says Zebra offers “access to high volumes of information generated via telecommunication services for the purposes of analysis and investigation”.

    It has been designed to “intercept all content and metadata of voice, SMS, email and fax communications on the connected network, creating a rich repository of information”.

    A spokesman for the company said: “VASTech produces products for governmental law enforcement agencies. These products have the primary goal of reducing specifically cross-border crimes such as child pornography, human trafficking, drug smuggling, weapon smuggling, money laundering, corruption and terrorist activities. We compete internationally and openly against several suppliers of similar systems.

    “We only supply legal governments, which are not subjected to international sanctions. Should their status change in this regard, we hold the right to withdraw our supplies and support unilaterally.”

    Ann McKechin, a Labour member of the arms export control committee, said: “Obviously we are concerned about how our government provides licences, given these new types of technology.

    “Software technology is now becoming a very large component of our total exports and how we police it before it gets out of country will become an increasingly difficult question and I think the government has to review its processes to consider whether they are fit for the task.”

    She said the Department for Business, Innovation and Skills, which has responsibility for granting export licences, had to ensure it has the skills and knowledge to assess new technologies, particularly if they were being sold to “countries of concern”.

    “The knowledge of staff which maybe more geared to more traditional types of weaponry,” she added.

    A business department spokesperson said: “The government agrees that further regulation is necessary. These products have legitimate uses in defending networks and tracking and disrupting criminals, but we recognise that they may also be used to conduct espionage.

    “Given the international nature of this problem we believe that an internationally agreed solution will be the most effective response. That is why the UK is leading international efforts to agree export controls on specific technologies of concern.

    “We expect to be able to announce real progress in this area in early December.”
    What’s on offer

    Some companies offer a range of spy equipment that would not look out of place in a James Bond film

    Spy vans

    Ordinary vans, cars and motorbikes can be customised to offer everything a spy could need. Tiny cameras and microphones are hidden in wing mirrors, headlights and even the makers’ logo. Vehicles can also be fitted with the latest mass surveillance technology, allowing them to intercept, assess and store a range of digital communications from the surrounding area.

    Hidden cameras

    The range of objects that can hide high-quality cameras and recording equipment appears almost limitless; from a box of tissues giving a 360-degree view of the room, to a child’s car seat, a brick and a key fob. Remote controls allow cameras to follow targets as they move around a room and have a powerful zoom to give high definition close-ups.

    Recorders

    As with cameras recording equipment is getting more sophisticated and more ubiquitous. From cigarette lighters to pens their are limitless ways to listen in on other people’s conversations. One firm offers a special strap microphone that straps to the wearer’s would be spies’ back and records conversations going on directly behind them. According to the brochure: “[This] is ideal because people in a crowd think that someone with their back turned can’t hear their conversation.. Operatives can work much closer to their target.”

    Handheld ‘biometric cameras’

    This system, made by a UK firm, is currently being used by British forces in Afghanistan to help troops identify potential terrorists. The brochure for the Mobile Biometric Platform says: “Innocent civilian or Insurgent? Not Certain? Our systems are.” It adds: “The MBP is tailored for military use and enables biometric enrolment and identification of finger, face and iris against on board watchlists in real time from live or forensic data.”

    Mobile phone locators

    It is now possible, from a single laptop computer, to locate where a mobile phone is calling from anywhere in the world, with an accuracy of between 200 metres and a mile. This is not done by attaching probes, and it is not limited to the area where the laptop is working from. The “cross border” system means it is now theoretically possible to locate a mobile phone call from a town abroad from a laptop in London.

    Nick Hopkins and Matthew Taylor
    The Guardian, Monday 18 November 2013 21.42 GMT

    Find this story at 18 November 2013

    © 2013 Guardian News and Media Limited or its affiliated companies. All rights reserved.

    Documents reveal NSA’s extensive involvement in targeted killing program

    It was an innocuous e-mail, one of millions sent every day by spouses with updates on the situation at home. But this one was of particular interest to the National Security Agency and contained clues that put the sender’s husband in the crosshairs of a CIA drone.

    Days later, Hassan Ghul — an associate of Osama bin Laden who provided a critical piece of intelligence that helped the CIA find the al-Qaeda leader — was killed by a drone strike in Pakistan’s tribal belt.

    The U.S. government has never publicly acknowledged killing Ghul. But documents provided to The Washington Post by former NSA contractor Edward Snowden confirm his demise in October 2012 and reveal the agency’s extensive involvement in the targeted killing program that has served as a centerpiece of President Obama’s counterterrorism strategy.

    An al-Qaeda operative who had a knack for surfacing at dramatic moments in the post-Sept. 11 story line, Ghul was an emissary to Iraq for the terrorist group at the height of that war. He was captured in 2004 and helped expose bin Laden’s courier network before spending two years at a secret CIA prison. Then, in 2006, the United States delivered him to his native Pakistan, where he was released and returned to the al-Qaeda fold.

    But beyond filling in gaps about Ghul, the documents provide the most detailed account of the intricate collaboration between the CIA and the NSA in the drone campaign.

    The Post is withholding many details about those missions, at the request of U.S. intelligence officials who cited potential damage to ongoing operations and national security.

    The NSA is “focused on discovering and developing intelligence about valid foreign intelligence targets,” an NSA spokeswoman said in a statement provided to The Post on Wednesday, adding that the agency’s operations “protect the nation and its interests from threats such as terrorism and the proliferation of weapons of mass destruction.”

    In the search for targets, the NSA has draped a surveillance blanket over dozens of square miles of northwest Pakistan. In Ghul’s case, the agency deployed an arsenal of cyber-espionage tools, secretly seizing control of laptops, siphoning audio files and other messages, and tracking radio transmissions to determine where Ghul might “bed down.”

    The e-mail from Ghul’s wife “about her current living conditions” contained enough detail to confirm the coordinates of that household, according to a document summarizing the mission. “This information enabled a capture/kill operation against an individual believed to be Hassan Ghul on October 1,” it said.

    The file is part of a collection of records in the Snowden trove that make clear that the drone campaign — often depicted as the CIA’s exclusive domain — relies heavily on the NSA’s ability to vacuum up enormous quantities of e-mail, phone calls and other fragments of signals intelligence, or SIGINT.

    To handle the expanding workload, the NSA created a secret unit known as the Counter-Terrorism Mission Aligned Cell, or CT MAC, to concentrate the agency’s vast resources on hard-to-find terrorism targets. The unit spent a year tracking Ghul and his courier network, tunneling into an array of systems and devices, before he was killed. Without those penetrations, the document concluded, “this opportunity would not have been possible.”

    At a time when the NSA is facing intense criticism for gathering data on Americans, the drone files may bolster the agency’s case that its resources are focused on fighting terrorism and supporting U.S. operations overseas.

    “Ours is a noble cause,” NSA Director Keith B. Alexander said during a public event last month. “Our job is to defend this nation and to protect our civil liberties and privacy.”

    The documents do not explain how the Ghul e-mail was obtained or whether it was intercepted using legal authorities that have emerged as a source of controversy in recent months and enable the NSA to compel technology giants including Microsoft and Google to turn over information about their users. Nor is there a reference to another NSA program facing scrutiny after Snowden’s leaks, its metadata collection of numbers dialed by nearly every person in the United States.

    To the contrary, the records indicate that the agency depends heavily on highly targeted network penetrations to gather information that wouldn’t otherwise be trapped in surveillance nets that it has set at key Internet gateways.

    The new documents are self-congratulatory in tone, drafted to tout the NSA’s counterterrorism capabilities. One is titled “CT MAC Hassan Gul Success.” The files make no mention of other agencies’ roles in a drone program that escalated dramatically in 2009 and 2010 before tapering off in recent years.

    Even so, former CIA officials said the files are an accurate reflection of the NSA’s contribution to finding targets in a campaign that has killed more than 3,000 people, including thousands of alleged militants and hundreds of civilians, in Pakistan, according to independent surveys. The officials said the agency has assigned senior analysts to the CIA’s Counterterrorism Center, and deployed others to work alongside CIA counterparts at almost every major U.S. embassy or military base overseas.

    “NSA threw the kitchen sink at the FATA,” said a former U.S. intelligence official with experience in Afghanistan and Pakistan, referring to the Federally Administered Tribal Areas, the region in northwest Pakistan where al-Qaeda’s leadership is based.

    NSA employees rarely ventured beyond the security gates of the U.S. Embassy in Islamabad, officials said. Surveillance operations that required placing a device or sensor near an al-Qaeda compound were handled by the CIA’s Information Operations Center, which specializes in high-tech devices and “close-in” surveillance work.

    “But if you wanted huge coverage of the FATA, NSA had 10 times the manpower, 20 times the budget and 100 times the brainpower,” the former intelligence official said, comparing the surveillance resources of the NSA to the smaller capabilities of the agency’s IOC. The two agencies are the largest in the U.S. intelligence community, with budgets last year of $14.7 billion for the CIA and $10.8 billion for the NSA. “We provided the map,” the former official said, “and they just filled in the pieces.”

    In broad terms, the NSA relies on increasingly sophisticated versions of online attacks that are well-known among security experts. Many rely on software implants developed by the agency’s Tailored Access Operations division with code-names such as UNITEDRAKE and VALIDATOR. In other cases, the agency runs “man-in-the-middle” attacks in which it positions itself unnoticed midstream between computers communicating with one another, diverting files for real-time alerts and longer-term analysis in data repositories.

    Through these and other tactics, the NSA is able to extract vast quantities of digital information, including audio files, imagery and keystroke logs. The operations amount to silent raids on suspected safe houses and often are carried out by experts sitting behind desks thousands of miles from their targets.

    The reach of the NSA’s Tailored Access Operations division extends far beyond Pakistan. Other documents describe efforts to tunnel into systems used by al-Qaeda affiliates in Yemen and Africa, each breach exposing other corridors.

    An operation against a suspected facilitator for al-Qaeda’s branch in Yemen led to a trove of files that could be used to “help NSA map out the movement of terrorists and aspiring extremists between Yemen, Syria, Turkey, Egypt, Libya and Iran,” according to the documents. “This may enable NSA to better flag the movement of these individuals” to allied security services that “can put individuals on no-fly lists or monitor them once in country.”

    A single penetration yielded 90 encrypted al-Qaeda documents, 16 encryption keys, 30 unencrypted messages as well as “thousands” of chat logs, according to an inventory described in one of the Snowden documents.

    The operations are so easy, in some cases, that the NSA is able to start downloading data in less time than it takes the targeted machine to boot up. Last year, a user account on a social media Web site provided an instant portal to an al-Qaeda operative’s hard drive. “Within minutes, we successfully exploited the target,” the document said.

    The hunt for Ghul followed a more elaborate path.

    Ghul, who is listed in other documents as Mustafa Haji Muhammad Khan, had surfaced on U.S. radar as early as 2003, when an al-Qaeda detainee disclosed that Ghul escorted one of the intended hijackers to a Pakistani safe house a year before the Sept. 11, 2001, attacks.

    A trusted facilitator and courier, Ghul was dispatched to Iraq in 2003 to deliver a message to Abu Musab al-Zarqawi, the al-Qaeda firebrand who angered the network’s leaders in Pakistan by launching attacks that often slaughtered innocent Muslims.

    When Ghul made another attempt to enter Iraq in 2004, he was detained by Kurdish authorities in an operation directed by the CIA. Almost immediately, Ghul provided a piece of intelligence that would prove more consequential than he may have anticipated: He disclosed that bin Laden relied on a trusted courier known as al-Kuwaiti.

    The ripples from that revelation wouldn’t subside for years. The CIA went on to determine the true identity of al-Kuwaiti and followed him to a heavily fortified compound in Abbottabad, Pakistan, where bin Laden was killed in 2011.

    Because of the courier tip, Ghul became an unwitting figure in the contentious debate over CIA interrogation measures. He was held at a CIA black site in Eastern Europe, according to declassified Justice Department memos, where he was slapped and subjected to stress positions and sleep deprivation to break his will.

    Defenders of the interrogation program have cited Ghul’s courier disclosure as evidence that the agency’s interrogation program was crucial to getting bin Laden. But others, including former CIA operatives directly involved in Ghul’s case, said that he identified the courier while he was being interrogated by Kurdish authorities, who posed questions scripted by CIA analysts in the background.

    The debate resurfaced amid the release of the movie “Zero Dark Thirty” last year, in which a detainee’s slip after a brutal interrogation sequence is depicted as a breakthrough in the bin Laden hunt. Ghul’s case also has been explored in detail in a 6,000-page investigation of the CIA interrogation program by the Senate Intelligence Committee that has yet to be released.

    Sen. Dianne Feinstein (D-Calif.), the chairman of the panel, sought to settle the Ghul debate in a statement last year that alluded to his role but didn’t mention him by name.

    “The CIA detainee who provided the most significant information about the courier provided the information prior to being subjected to coercive interrogation techniques,” Feinstein said in the statement, which was signed by Sen. Carl Levin (D-Mich.).

    The George W. Bush administration’s decision to close the secret CIA prisons in 2006 set off a scramble to place prisoners whom the agency did not regard as dangerous or valuable enough to transfer to Guantanamo Bay. Ghul was not among the original 14 high-value CIA detainees sent to the U.S. installation in Cuba. Instead, he was turned over to the CIA’s counterpart in Pakistan, with ostensible assurances that he would remain in custody.

    A year later, Ghul was released. There was no public explanation from Pakistani authorities. CIA officials have noted that Ghul had ties to Lashkar-e-Taiba, a militant group supported by Pakistan’s intelligence service. By 2007, he had returned to al-Qaeda’s stronghold in Waziristan.

    In 2011, the Treasury Department named Ghul a target of U.S. counterterrorism sanctions. Since his release, the department said, he had helped al-Qaeda reestablish logistics networks, enabling al-Qaeda to move people and money in and out of the country. The NSA document described Ghul as al-Qaeda’s chief of military operations and detailed a broad surveillance effort to find him.

    “The most critical piece” came with a discovery that “provided a vector” for compounds used by Ghul, the document said. After months of investigation, and surveillance by CIA drones, the e-mail from his wife erased any remaining doubt.

    Even after Ghul was killed in Mir Ali, the NSA’s role in the drone strike wasn’t done. Although the attack was aimed at “an individual believed to be” the correct target, the outcome wasn’t certain until later when, “through SIGINT, it was confirmed that Hassan Ghul was in fact killed.”

    By Greg Miller, Julie Tate and Barton Gellman, Published: October 17

    Find this story at 17 October 2013

    © The Washington Post Company

    Oil Espionage; How the NSA and GCHQ Spied on OPEC

    America’s NSA and Britain’s GCHQ are both spying on the OPEC oil cartel, documents from whistleblower Edward Snowden reveal. The security of the global energy supply is one of the most important issues for the intelligence agencies.

    Documents disclosed by whistleblower Edward Snowden reveal that both America’s National Security Agency (NSA) and Britain’s Government Communications Headquarters (GCHQ) have infiltrated the computer network of the the Organization of the Petroleum Exporting Countries (OPEC).

    In January 2008, the NSA department in charge of energy issues reported it had accomplished its mission. Intelligence information about individual petroleum-exporting countries had existed before then, but now the NSA had managed, for the first time, to infiltrate OPEC in its entirety.

    OPEC, founded in 1960, has its headquarters in a box-like building in Vienna. Its main objective is to control the global oil market, and to keep prices high. The 12 member states include Saudi Arabia, Venezuela, Iran and Iraq.

    A Treasure Trove of Information

    When the NSA used the Internet to infiltrate OPEC’s computers, its analysts discovered an internal study in the OPEC Research Division. It stated that OPEC officials were trying to cast the blame for high oil prices on speculators. A look at files in the OPEC legal department revealed how the organization was preparing itself for an antitrust suit in the United States. And a review of the section reserved for the OPEC secretary general documented that the Saudis were using underhanded tactics, even within the organization. According to the NSA analysts, Riyadh had tried to keep an increase in oil production a secret for as long as possible.

    Saudi Arabia’s OPEC governor is also on the list of individuals targeted for surveillance, for which the NSA had secured approval from the secret Foreign Intelligence Surveillance Court. The documents show how careful the Americans were to suspend their surveillance when the Saudi visited the United States. But as soon as he had returned to Riyadh, the NSA analysts began infiltrating his communications once again.

    Praise from Department of Energy

    According to a 2010 report, one of the analysts’ conclusions was that the Saudis had released incorrect oil production figures. The typical “customers” for such information were the CIA, the US State Department and the Department of Energy, which promptly praised the NSA for confirming what it had suspected for years.

    The British, who also targeted OPEC’s Vienna headquarters, were at least as successful as the NSA. A secret GCHQ document dating from 2010 states that the agency had traditionally had “poor access” to OPEC. But that year, after a long period of meticulous work, it had managed to infiltrate the computers of nine OPEC employees by using the “Quantum Insert” method, which then creates a gateway to gain access into OPEC’s computer system. GCHQ analysts were even able to acquire administrator privileges for the OPEC network and gain access to two secret servers containing “many documents of interest.”

    OPEC appears in the “National Intelligence Priorities Framework,” which the White House issues to the US intelligence community. Although the organization is still listed as an intelligence target in the April 2013 list, it is no longer a high-priority target. Now that the United States is less dependent on Saudi petroleum, thanks to fracking and new oil discoveries, the fact that OPEC is not identified as a top priority anymore indicates that interest in the organization has declined.

    11/11/2013 12:05 AM
    By SPIEGEL Staff

    Find this story at 11 November 2013

    © SPIEGEL ONLINE 2013

    CSEC and Brazil: “Whose interests are being served”? (2013)

    Amusing to see both NaPo and the G&M hosting remarks from former CSIS deputy director Ray Boisvert dismissing the recent Snowden/Greenwald docs which revealed CSEC spied on Brazil’s Mines and Energy Ministry.

    Snowden was present at the Five Eyes conference where the CSEC presentation on their Olympia spying program on Brazil took place.

    Boisvert in both papers:

    “We were all too busy chasing bad guys who can actually kill people. The idea that we spend a lot of time, or any time at all, on a country like Brazil is pretty low margin stuff, not likely to happen.”

    The docs probably only represent “a war gaming exercise,” says Boisvert:

    “They have to do paper exercises and say, ‘OK, let’s say our target in counter-terrorism lives in Mali and we have to go up against the Malian telecommunications system.’ They’ll go look at another country and say, ‘OK, well they have a similar network so let’s do a paper exercise and say ‘what do we need?’” he said. ‘I think that’s all this was.’”

    Because when you’re “busy chasing bad guys who can actually kill people” and stuff, naturally your anti-terrorism war games will entail a cyber-espionage program searching for corporate secrets in a country where 40 of your own country’s mining corporations are operating.

    Wouldn’t have anything to do with looking for info on Brazil wanting to block a Canadian mining company from opening the largest open pit gold mine in Brazil, would it? Brazilian prosecutors say the company has failed to study the impact on local Indian communities and has advertised on its own website “plans to build a mine twice the size of the project first described in an environmental assessment it gave state officials.”

    Ok, foreign media. The Guardian, today:

    Canadian spies met with energy firms, documents reveal

    “The Canadian government agency that allegedly hacked into the Brazilian mining and energy ministry has participated in secret meetings in Ottawa where Canadian security agencies briefed energy corporations.

    According to freedom of information documents obtained by the Guardian, the meetings – conducted twice a year since 2005 – involved federal ministries, spy and police agencies, and representatives from scores of companies who obtained high-level security clearance.

    Meetings were officially billed to discuss ‘threats’ to energy infrastructure but also covered ‘challenges to energy projects from environmental groups,’ ‘cyber security initiatives’ and ‘economic and corporate espionage.’

    The documents – heavily redacted agendas – do not indicate that any international espionage was shared by CSEC officials, but the meetings were an opportunity for government agencies and companies to develop ‘ongoing trusting relations’ that would help them exchange information ‘off the record,’ wrote an official from the Natural Resources ministry in 2010.”

    Thank you, Enbridge, for providing the snacks for the one in May 2013.

    “Keith Stewart, an energy policy analyst with Greenpeace Canada, said: ‘There seems to be no limit to what the Harper government will do to help their friends in the oil and mining industries. They’ve muzzled scientists, gutted environmental laws, reneged on our international climate commitments, labelled environmental critics as criminals and traitors, and have now been caught engaging in economic espionage in a friendly country. Canadians, and our allies, have a right to ask who exactly is receiving the gathered intelligence and whose interests are being served.’”

    Good question. And did no Canadian media request these same FOIs?

    You know, I think I blogged about government security briefings to energy companies a few years ago — I’ll see if I can find it.

    Meanwhile, would be interesting to hear Boisvert’s explanation as to why the CSEC logo appeared on another NSA doc about intercepting phone calls and emails of ministers and diplomats at the 2009 G20 summit in London.

    More “paper exercises”? Filling in an empty spot on the page while chasing bad guys?

    And re the recent NSA spying on Brazil PM Dilma Rousseff and the state oil company Petrobras: Did CSEC help out its Five Eyes partner there too?

    Back in 1983, CSEC spied on two of Margaret Thatcher’s cabinet ministers on behalf of Thatcher and Britain’s spy agency GCHQ, so this wouldn’t exactly be new territory for CSEC.

    Fun fact : The annual report on CSEC produced by its independent watchdog commissioner must first be vetted by CSEC “for national security reasons” before it can be released.

    P.S. I pillaged the CSEC slide at top from Lux ex Umbra, where you can view the rest of them.

    Posted by admin on October 10, 2013 · Leave a Comment
    By Alison@Creekside

    Find this story at 10 October 2013

    Copyright © 2013

    Trade Secrets : Is the U.S.’s most advanced surveillance system feeding economic intelligence to American businesses? (1999)

    No one is surprised that the United States uses sophisticated electronic spying techniques against its enemies. But Europeans are increasingly worried about allegations that the U.S. uses those same techniques to gather economic intelligence about its allies.

    The most extensive claims yet came this spring in a report written for the European Parliament. The report says that the U.S.

    National Security Agency, through an electronic surveillance system called Echelon, routinely tracks telephone, fax, and e-mail transmissions from around the world and passes on useful corporate intelligence to American companies.

    Among the allegations: that the NSA fed information to Boeing and McDonnell Douglas enabling the companies to beat out European Airbus Industrie for a $ 6 billion contract; and that Raytheon received information that helped it win a $ 1.3 billion contract to provide radar to Brazil, edging out the French company Thomson-CSF. These claims follow previous allegations that the NSA supplied U.S. automakers with information that helped improve their competitiveness with the Japanese (see “Company Spies,” May/June 1994).

    Is there truth to these allegations? The NSA is among the most secretive of U.S. intelligence agencies and won’t say much beyond the fact that its mission is “foreign signals intelligence.” The companies involved all refused to comment.

    “Since the NSA’s collection capabilities are so grotesquely powerful, it’s difficult to know what’s going on over there,” says John Pike, an analyst at the watchdog group Federation of American Scientists, who has tracked the NSA for years.

    This much is known: The NSA owns one of the largest collections of supercomputers in the world, and it’s an open secret–as documented in the European Parliament report–that Echelon vacuums up massive amounts of data from communications satellites and the Internet and then uses its computers to winnow it down. The system scans communications for keywords–“bomb,” for instance–that might tip off analysts to an interesting topic.

    Fueling allegations of corporate espionage is the fact that defense contractors and U.S. intelligence agencies are linked extensively through business relationships. Raytheon, for instance, has large contracts to service NSA equipment, according to the European report.

    Englishman Glyn Ford, the European Parliament member who initiated the study, wants the NSA to come clean about its activities in Europe. And the Europeans have some leverage on this issue, if they decide to use it. In a drive to improve surveillance, the United States is pressuring European governments to make telephone companies build eavesdropping capabilities into their new systems. But if that’s what the U.S. wants, says Ford, it’s going to have to be open about what information it’s collecting: “If we are going to leave the keys under the doormat for the United States, we want a guarantee that they’re not going to steal the family silver,” he says.

    In the meantime, congressional critics have started to wonder if all that high-powered eavesdropping is limited to overseas snooping. In April, Bob Barr (R-Ga.), a member of the House Government Reform Committee, said he was worried by reports that the NSA was engaged in illicit domestic spying.

    “We don’t have any direct evidence from the NSA, since they’ve refused to provide any reports, even when asked by the House Intelligence Committee,” Barr says. “But if in fact the NSA is pulling two million transmissions an hour off of these satellites, I don’t think there’s any way they have of limiting them to non-U.S. citizens.”

    Last May, after the NSA stonewalled requests to discuss the issue, Congress amended the intelligence appropriations bill to require the agency to submit a report to Congress. (The bill is still in a conference committee.) And the NSA will face more questions when the Government Reform Committee holds hearings on Echelon and other surveillance programs.

    “We ought to prevent any agency from the dragnet approach–where they throw out a net and drag anything in,” Barr says.

    Kurt Kleiner
    Mother Jones November 1, 1999

    Find this story at 1 November 2013

    Copyright ©2013 Mother Jones and the Foundation for National Progress.

    Embassy Row: Charges of U.S. spying erupt in Asia

    The U.S. spying scandal is spreading to Asia, where the foreign ministers of Malaysia and Indonesia have chastised American diplomats and publicly denounced the National Security Agency.

    Malaysian Foreign Minister Anifah Aman also complained to Australian diplomats after reports that Australian intelligence agencies were cooperating with the NSA.

    The Sydney Morning Herald last week reported that the U.S. embassies in Cambodia, Indonesia, Malaysia, Myanmar and Thailand are engaged in electronic surveillance of the governments in those South Asian nations.

    Mr. Aman on Friday summoned Lee McClenny, the deputy ambassador at the U.S. Embassy in Malaysia, and Miles Kupa, the Australian ambassador in Kuala Lumpur. Mr. McClenny represented U.S. Ambassador Joseph Y. Yun, who was out of town.

    The foreign minister delivered protest notes to each diplomat “in response to the alleged spying activities carried out by the two embassies” in the Malaysian capital.

    In Indonesia, Foreign Minister Marty Natalegawa last week complained to Kristen F. Bauer, who has been acting U.S. ambassador since Ambassador ScotMarciel left Jakarta in July.

    “Indonesia cannot accept and protests strongly over the report about wiretapping facilities at the U.S. Embassy in Jakarta,” the foreign minister told reporters.

    PLAYING BALL

    President Obama stepped up to the plate to reward a loyal political supporter who once played outfield for his favorite baseball team, the Chicago White Sox.

    Mr. Obama last week nominated Mark D. Gilbert to serve as ambassador to New Zealand.

    Mr. Gilbert, who spent only 11 days in the major leagues during the 1985 season, is believed to be the only former professional baseball player to be nominated for such a high rank in the U.S. diplomatic service.

    “Baseball is America’s pastime, so what better way to represent the United States overseas than with someone who began his career as a major league baseball player?” State Department spokeswoman Marie Harf told The Associated Press.

    Mr. Gilbert, a 57-year-old bank executive and former Obama fundraiser, played in only seven games for the White Sox before he was sent back to a minor league team in Buffalo, N.Y. He also served two terms as deputy finance chairman of the Democratic National Committee.

    By James Morrison
    The Washington Times
    Sunday, November 3, 2013

    Find this story at 3 November 2013

    © Copyright 2013 The Washington Times, LLC.

    Listening post revealed on Cocos Islands

    Australia’s electronic spy agency is intercepting Indonesian naval and military communications through a secret radio listening post on the remote Cocos Islands.

    According to former defence officials, the Defence Signals Directorate runs the signals interception and monitoring base on Australia’s Indian Ocean territory, 1100 kilometres south-west of Java.

    Along with the better-known Shoal Bay Receiving Station near Darwin, the previously unreported Cocos Island facility forms a key part of Australia’s signals intelligence efforts targeting Indonesia.

    Known locally as ”the house without windows”, it includes radio monitoring and direction-finding equipment and a satellite ground station. But the station is of little help in combating people smuggling, according to the former intelligence officers.

    The station has never been publicly acknowledged by the government, nor previously reported in the media, despite operating for more than two decades.

    The Defence Department would not comment, and said only that it hosts ”a communications station” that formed part of the wider defence communications network.

    But former defence officers have confirmed that the station is a Defence Signals Directorate facility devoted to maritime and military surveillance, especially Indonesian naval, air force and military communications.

    Google Earth imagery of the property, discreetly placed amid coconut palm groves on the south-east part of West Island, shows four cleared areas each with radio mast sets, including a 44-metre-wide ”circularly disposed antenna array” for high-frequency and very high-frequency radio direction finding.

    Australian National University intelligence expert Des Ball said the facility was operated remotely from the Defence Signals Directorate headquarters at Russel Hill, in Canberra. Intercepted signals are encrypted and relayed to Canberra.

    He said preparations for the Cocos station began in the late 1980s, and involved a highly secretive signals intelligence group, the Royal Australian Air Force’s No. 3 Telecommunications Unit.

    In the face of what it described as ”extremely challenging logistics”, an Adelaide-based company, Australian Satellite Communication, then installed a communications satellite earth station at the facility.

    The Cocos Island signals intelligence station forms part of broad Australian espionage efforts directed at the Indonesian government.

    As reported by Fairfax Media on Thursday, these programs include a covert Defence Signals Directorate surveillance facility at the Australian embassy in Jakarta. One former defence intelligence officer said Australia’s monitoring of Indonesian communications was ”very effective” and allowed assessments of the seriousness of Indonesian efforts to combat people smuggling.

    But the former intelligence officer said the Cocos and Shoal Bay facilities were of ”limited utility” in finding vessels carrying asylum seekers that avoided using radios or satellite phones until they contacted the Australian Maritime Safety Authority.

    Richard Tanter, of the Nautilus Institute of Security and Sustainability, said the Cocos Islands station was likely to be intercepting increasing volumes of naval and military communications.

    ”With the increasing Australian and US interest in the Indian Ocean region, it is likely to become more important,” he said.

    Date: November 01 2013

    Philip Dorling

     Find this story at 1 November 2013

     

     

    Copyright © 2013
    Fairfax Media

    Spy expert says Australia operating as ‘listening post’ for US agencies including the NSA

    Spy expert says Australia operating as ‘listening post’ for US agencies including the NSA

    A veteran spy watcher claims Australia is playing a role in America’s intelligence networks by monitoring vast swathes of the Asia Pacific region and feeding information to the US.

    Intelligence expert Professor Des Ball says the Australian Signals Directorate – formerly known as the Defence Signals Directorate – is sharing information with the National Security Agency (NSA).

    The NSA is the agency at the heart of whistleblower Edward Snowden’s leaks, and has recently been accused of tapping into millions of phone calls of ordinary citizens in France, Germany and Spain.

    Mr Ball says Australia has been monitoring the Asia Pacific region for the US using local listening posts.

    “You can’t get into the information circuits and play information warfare successfully unless you’re into the communications of the higher commands in [the] various countries in our neighbourhood,” he told Lateline.

    Mr Ball says Australia has four key facilities that are part of the XKeyscore program, the NSA’s controversial computer system that searches and analyses vast amounts of internet data.

    They include the jointly-run Pine Gap base near Alice Springs, a satellite station outside Geraldton in Western Australia, a facility at Shoal Bay, near Darwin, and a new centre in Canberra.

    Mr Ball says security is the focus for Australia’s intelligence agencies.

    “At the top of [the list of priorities] you’re going to find communications relating to terrorist activities, particularly if there’s alerts about particular incidents,” Mr Ball said.

    A secret map released by Snowden revealed the US had also set up surveillance facilities in embassies and consulates, including in Jakarta, Kuala Lumpur, Phnom Penh, Bangkok, Yangon, Manila, Hong Kong, Taipei, Shanghai and Beijing.

    “Australia itself has used foreign embassies for listening purposes [in] an operation codenamed Reprieve … in which we’ve used embassies in our region to monitor local, essentially microwave-relayed telephone conversations,” Mr Ball said.

    “The fact that the United States has special collection elements that are doing this today is no different from what many other countries are doing today. It’s not unusual.”

    Some critics have raised concerns about the extent of the NSA’s spying program, suggesting that communications of ordinary Australians may have been pried on.

    Xenophon calls on Government to protect Australians from US surveillance

    Mr Ball says Australia, the US, the UK, New Zealand and Canada have a long-standing “five eyes” agreement to not spy on each other, and he believes it has not been breached.

    “The fact that it hasn’t [been breached] for over five decades I think signifies to the integrity of at least that part of the arrangement,” he said.

    But independent Senator Nick Xenophon says the Government should do more to ensure Australians are not subject to the surveillence from US agencies.

    “At the very least, the Australian Government should be calling in the US ambassador and asking whether the level of scrutiny, the level of access to citizens’ phone records in Germany, France and Spain, has been happening here,” he said.

    “I think we deserve an answer on that.”

    Former NSA executive lifts lid on spy practices

    In 2010, former NSA senior executive Thomas Drake was charged with leaking government secrets to a journalist.

    He was tried under the US espionage act but his case was ultimately reduced to a minor misdemeanour charge. He escaped a jail sentence after a finding that the information he disclosed was not classified.

    He agrees with Mr Ball that the US has not breached its spying agreement with Australia.

    But he told Lateline those five nations do “utilise each other’s services” to gather information on other “fair game” nations.

    “Much of it is legit, but increasingly since 9/11 because of the sheer power of technology and access to the world’s communication systems … [agencies have] extraordinary access to even more data on just about anything and anybody,” he told Lateline.

    “And what they want is to do so and have access to it any time, anywhere, any place.”

    US moves to ease concerns about NSA

    US president Barack Obama has come under fierce criticism over allegations that the NSA tapped the mobile phone of German chancellor Angela Merkel and conducted widespread electronic snooping in France, Italy, Spain and elsewhere.

    Amid a growing uproar, White House officials have said they will review intelligence collection programs with an eye to narrowing their scope.

    “We need to make sure that we’re collecting intelligence in a way that advances our security needs and that we don’t just do it because we can,” White House spokesman Jay Carney said.

    Mr Drake says it is alarming that a nation would spy on those it considers allies.

    “Spying on others is considered the world’s second oldest profession and so the idea that nation states would engage in spying on others is no surprise, not at all,” he said.

    “I think what’s particularly pernicious here is the fact we’re actually listening on the personal communications of the highest levels of governments in countries that are supposed to be our allies and are actually partnered with us in ensuring that we deal and defend against threats to international order and stability.”

    Spying ‘done behind the veil of secrecy’

    He says most countries go along with US requests for data.

    “It’s heavy stuff and when it’s done behind the veil of secrecy, outside the public view then hey, it’s whatever you can get away with because you can,” he said.

    “Just because you can doesn’t mean you should and I actually think it’s encouraging the countries are standing up against the US in this regard because it is overreach.

    “It really is going far beyond the mandate to ensure international order and stability, even in partnership with other countries.

    “The real fundamental threat here though is ultimately the sovereignty of individuals, who we are as people. We’re supposed to have rights.

    “What’s happened after 9/11 is now security has kind of taken primacy over rights and liberties because of the real or perceived threat.”

    Snowden ‘aware his revelations have been explosive’

    Snowden is currently holed up in Russia after leaking information about America’s vast surveillance operations.

    Mr Drake recently met Snowden in Moscow, and says the former NSA contractor is aware his disclosures have been “quite explosive”.

    “His focus is on reform. His focus is on rolling back the surveillance data. His focus is repealing many of the enabling act legislation that put all this into place, or at least enabled the government in secrecy to expand the surveillance date far beyond its original mandate,” Mr Drake said.

    “He’s obviously grateful that he’s got temporary asylum in Russia. I don’t think it was certainly not a place he was planning on going to or remaining in for any length of time.

    “He’s looking forward, at some point in the future, to returning to the US but that’s certainly not possible right now.

    “The US has already levied serious charges against him including the same charges that they levied against me under the espionage act.”

    By Jason Om and staff –
    October 30, 2013, 11:54 am

    Find this story at 30 October 2013

    Copyright © 2013 Yahoo!7 Pty Limited.

    Stateroom

    STATEROOM sites are covert SIGINT collection sites located in diplomatic facilities abroad. SIGINT agencies hosting such sites include SCS (at U.S> diplomatic facilities), Government Communications headquarters or GCHQ (at British diplomatic facilities), Communication Security Establishments or CSE (at Canadian diplomatic facilities), and Defense Signals Directorate (at Australian diplomatic facilities). These sites are small in size and in the number of personnel staffing them. They are covert, and their true mission is not known by the majority of the diplomatic staff at the facility where they are assigned.”

    Find this story at 27 October 2013

    Outrage at alleged U.S. spying efforts gathers steam in Asian capitals

    China’s government is “severely concerned about the reports and demands a clarification and explanation,” Foreign Ministry spokeswoman Hua Chunying said. Government officials in Indonesia, Malaysia and Thailand – all U.S. allies – made similarly angry statements.

    “Indonesia strongly protests the existence of a tapping facility in the U.S. Embassy in Jakarta,” Indonesian Foreign Minister Marty Natalegawa said. “If it’s confirmed, such action is not only a breach of security, but also a serious violation of diplomatic norms and ethics, and certainly not in tune with the spirit of friendly relations between nations.”

    The Asian leaders were reacting to a report this week in the German magazine Der Spiegel and a Sydney Morning Herald article Thursday that named cities in which embassies are used for electronic surveillance by the United States, Britain, Australia, Canada and New Zealand – a group of intelligence partners known as the “5-eyes.”

    The reports were based on a secret National Security Agency document that was leaked by former contractor Edward Snowden and first published by Der Spiegel. The Sydney newspaper, part of the Fairfax Media group, also included information provided by an unidentified former Australian intelligence officer.

    Code-named STATEROOM, the program used disguised surveillance equipment in about 80 embassies and consulates worldwide, the Herald reported, adding that the equipment is concealed in roof maintenance sheds or as features of the building itself.

    Nineteen of the diplomatic facilities are in Europe. The Asian embassies involved include those in Jakarta; Bangkok; Hanoi; Beijing; Dili, East Timor; Kuala Lumpur, Malaysia; and Port Moresby, Papua New Guinea.

    Australian Prime Minister Tony Abbott declined to discuss the Herald report in detail, but he told reporters, “Every Australian governmental agency, every Australian official at home and abroad operates in accordance with the law, and that’s the assurance that I can give people at home and abroad.”

    In an interview with the Associated Press, Australian intelligence expert Desmond Ball said he had seen covert antennas in five of the embassies named in the Australian media report. But Ball, a professor with the Australian National University’s Strategic and Defense Studies Center, declined to specify which embassies.

    Notably absent from the list of countries reportedly under surveillance in the program are the staunchest U.S. allies in Asia, Japan and South Korea. This week, Japanese media reported that the NSA had asked the Japanese government in 2011 for permission to tap fiber-optic cables in Japan, which carries much traffic throughout East Asia, as a way to collect surveillance on China. But the Japanese government refused, citing legal hurdles and lack of manpower.

    On Wednesday, in response to reports of U.S. surveillance of European leaders, the Chinese Foreign Ministry called cybersecurity “a matter of sovereignty” and said China was taking steps to increase its security, as well as joining Russia in backing a U.N. proposal to address such surveillance.

    China’s state-run media have also roundly criticized the United States, with headlines declaring that the revelations would weaken U.S. global influence. Commentators accusedthe United States, which for years has complained of Chinese cyberattacks, of hypocrisy and demanded U.S. apologies.

    According to U.S. security experts, Chinese cyberspies, including hackers affiliated with the Chinese military, have stolen industrial secrets for years and have penetrated powerful Washington institutions, including law firms, think tanks, news organizations, human rights groups, contractors, congressional offices, embassies and federal agencies.

    Malaysian Home Minister Ahmad Zahid Hamidi said his government takes the reports seriously and is trying to confirm whether such intelligence gathering had taken place. “It is a sensitive issue since it involves several countries,” Zahid said.

    The opposition party criticized Malaysia’s government for being too “submissive” in its reaction to the United States.

    Lt. Gen. Paradorn Pattanatabut, secretary-general of Thailand’s National Security Council, said his government would tell Washington that such surveillance is against Thai law and that Thai security agencies have been put on alert.

    If asked, Paradorn said, Thailand would not cooperate with such U.S. spying programs. But he also emphasized that “we believe that Thailand and the U.S. still enjoy good and cordial relations.”

    Chico Harlan in Seoul contributed to this report.

    Michael Birnbaum 12:00 PM ET

    Find this story at 31 October 2013

    © 1996-2013 The Washington Post

    Australia accused of using embassies to spy on neighbours

    Documents leaked by whistleblower Edward Snowden contain details of surveillance collection programme across Asia

    Australia’s embassies are part of a US-led global spying network and are being used to intercept calls and data across Asia, it has been claimed.

    There are surveillance collection facilities at embassies in Jakarta, Bangkok, Hanoi, Beijing and Dili, and high commissions in Kuala Lumpur and Port Moresby, Fairfax Media reports, with diplomats unaware of them.

    Some of the details are in a secret US National Security Agency (NSA) document leaked by whistleblower Edward Snowden and published by Germany’s Der Spiegel magazine.

    The document reveals the existence of a signals intelligence collection program – codenamed STATEROOM – conducted from sites at US embassies and consulates and from the diplomatic missions of intelligence partners including Australia, Britain and Canada.

    The document says the Australian Defence Signals Directorate operates STATEROOM facilities “at Australian diplomatic facilities”.

    “They are covert, and their true mission is not known by the majority of the diplomatic staff at the facility where they are assigned,” the document says.

    A former Australian Defence Intelligence officer told Fairfax the directorate conducted surveillance operations from Australian embassies across Asia and the Pacific.

    The Department of Foreign Affairs would not comment on “intelligence matters”, Fairfax said.

    The US has been embarrassed by media leaks from Snowden that the NSA listened in on the communications of dozens of foreign leaders, including the German chancellor, Angela Merkel.

    Australian Associated Press
    theguardian.com, Wednesday 30 October 2013 22.30 GMT

    Find this story at 30 October 2013

    © 2013 Guardian News and Media Limited or its affiliated companies. All rights reserved.

    Exposed: Australia’s Asia spy network

    Leading intelligence and security academic Prof. Des Ball discusses the history of embassy spying and says Australia is a target in our own capital.

    Australian embassies are being secretly used to intercept phone calls and data across Asia as part of a US-led global spying network, according to whistleblower Edward Snowden and a former Australian intelligence officer.

    The top secret Defence Signals Directorate operates the clandestine surveillance facilities at embassies without the knowledge of most Australian diplomats.

    International outcry: A Stop Watching US Rally in Washington D.C. Photo: Getty Images

    The revelations come as the US has been left red-faced by news it has been eavesdropping on foreign leaders, including German Chancellor Angela Merkel.
    Advertisement

    US President Barack Obama is said to be on the verge of ordering a halt to spying on the heads of allied governments following the international outcry.

    Fairfax Media has been told that signals intelligence collection takes place from embassies in Jakarta, Bangkok, Hanoi, Beijing and Dili, and High Commissions in Kuala Lumpur and Port Moresby, as well as other diplomatic posts.

    Edward Snowden: Leaked a secret US National Security Agency document. Photo: Reuters

    A secret US National Security Agency document leaked by Mr Snowden and published by Germany’s Der Speigel reveals the existence of a highly sensitive signals intelligence collection program conducted from sites at US embassies and consulates and from the diplomatic missions of other “Five eyes” intelligence partners including Australia, Britain and Canada.

    Codenamed STATEROOM, the program involves the interception of radio, telecommunications and internet traffic.

    The document explicitly states that the Australian Defence Signals Directorate operates STATEROOM facilities “at Australian diplomatic facilities”.

    The document notes that the surveillance facilities “are small in size and in number of personnel staffing them”.

    “They are covert, and their true mission is not known by the majority of the diplomatic staff at the facility where they are assigned,” the document says.

    The National Security Agency document also observed the facilities were carefully concealed: “For example antennas are sometimes hidden in false architectural features or roof maintenance sheds.”

    The Department of Foreign Affairs and Trade declined to comment on the potential diplomatic implications of the disclosure. A departmental spokesperson said: “It is the long-standing practice of Australian governments not to comment on intelligence matters.”

    The leaked NSA document does not identify the location of specific Defence Signals Directorate facilities overseas.

    However, a former Australian Defence Intelligence officer has told Fairfax Media the directorate conducts surveillance operations from Australian embassies across Asia and the Pacific.

    The former intelligence officer said the interception facility at the Australian Embassy in Jakarta played an important role in collecting intelligence on terrorist threats and people-smuggling, “but the main focus is political, diplomatic and economic intelligence”.

    “The huge growth of mobile phone networks has been a great boon and Jakarta’s political elite are a loquacious bunch; even when they think their own intelligence services are listening they just keep talking,” the source said.

    He said the Australian Consulate in Denpasar, Bali, has also been used for signals intelligence collection.

    In June the East Timorese government complained publicly about Australian spying, including communications interception and bugging government offices during negotiations on the future of the Timor Gap oil and gas reserves.

    Intelligence leaks to the media in the 1980s disclosed installation of ”extraordinarily sophisticated” intercept equipment in Australia’s High Commission in Port Moresby and in the Australian embassies in Jakarta and Bangkok.

    Further leaks of top secret Defence Intelligence reports on Indonesia and East Timor in 1999 also indicated that Australia intelligence has extensive access to sensitive Indonesian military and civilian communications.

    Intelligence expert Des Ball said the Defence Signals Directorate had long co-operated with the US in monitoring the Asia-Pacific region, including using listening posts in embassies and consulates.

    “Knowing what our neighbours are really thinking is important for all sorts of diplomatic and trade negotiations,” Professor Ball told Fairfax Media.

    October 31, 2013
    Read later
    Philip Dorling

    Find this story at 31 October 2013

    Copyright © 2013
    Fairfax Media

    Australia Said to Play Part in N.S.A. Effort

    BEIJING — Australia, a close ally of the United States, has used its embassies in Asia to collect intelligence as part of the National Security Agency’s global surveillance efforts, according to a document leaked by the former agency contractor Edward J. Snowden and published this week in the German newsmagazine Der Spiegel.

    The Chinese Foreign Ministry reacted angrily on Thursday to the assertions in the document, which also said that the American Embassy in Beijing and consulates in Shanghai and Chengdu operated special intelligence gathering facilities, and it demanded an explanation from the United States.

    “We demand that foreign entities and personnel in China strictly abide by the Vienna Convention on Diplomatic Relations, the Vienna Convention on Consular Relations and other international treaties, and they must not, in any form, engage in activities that are incompatible with their position and status and that are harmful to China’s national security and interest,” Hua Chunying, a spokeswoman for the ministry, said at a daily briefing for reporters.

    Australia is one of the so-called Five Eyes countries that share highly classified intelligence and agree not to spy on one another; the other four are the United States, Britain, Canada and New Zealand.

    The report by Der Spiegel and a report in The Sydney Morning Herald said that the intelligence collection program was conducted from Australian Embassies in China, Thailand, Indonesia, Vietnam and East Timor, and the country’s high commissions — the equivalent of embassies among Commonwealth countries — in Kuala Lumpur, Malaysia, and Port Moresby, Papua New Guinea.

    The N.S.A. program was called Stateroom, and was operated by the Australian Defense Signals Directorate, Der Spiegel quoted the N.S.A. document as saying.

    A former Australian official with knowledge of Australia’s relationship with the United States said that Australia took part in the intelligence gathering to further its own national interests as well as to contribute to its alliance with Washington. The Australian intelligence operations had been going on in various forms for 20 to 30 years, the former official said.

    Australia has long felt a need to gather information in Indonesia, the world’s most populous Muslim country, which lies just to the north of Australia, the former official said. The country’s volatile politics and security problems were of the highest priority to Australia for many years, and more recently the rise in the smuggling of people to Australia from there had increased the need, the former official said.

    “This was done not as a favor to the United States,” said the former official, who spoke on the condition of anonymity because of the delicacy of the matter. “It was more cooperative than at the U.S.’s request.”

    Describing the surveillance operations at the Australian facilities, the N.S.A. document quoted by Der Spiegel said they were “small in size and in number of personnel staffing them.” The document added, “They are covert, and their true mission is not known by the majority of the diplomatic staff at the facility where they are assigned.”

    An email to the Australian agency assigned to answer questions about the program, the Attorney General’s Department in Canberra, was not immediately answered.

    The reports were an embarrassment to the new conservative government in Australia, especially regarding the Australian Embassy in Beijing. The buoyant Australian economy depends on China’s appetite for Australian iron ore, and Prime Minister Tony Abbott said this month that he wanted to complete a free-trade agreement with China within a year.

    The Chinese Foreign Ministry spokeswoman, Ms. Hua, alluded to the relationship in her comments on Thursday. China and Australia had a consensus to increase cooperation, she said, and “we hope and expect that Australia can work hard with China in this regard.”

    The New York Times
    October 31, 2013
    By JANE PERLEZ

    Find this story at 31 October 2013

    © 2013 The New York Times Company

    Revealed: How Australia spies on its neighbours

    Australia’s electronic spy agency is using the nation’s embassies to intercept phone calls and internet data in neighbouring countries, according to new information disclosed by intelligence whistleblower Edward Snowden and a former Australian intelligence officer.

    The secret Defence Signals Directorate operates clandestine surveillance facilities at embassies without the knowledge of most Australian diplomats.

    Fairfax Media has been told that signals intelligence collection occurs from Australian embassies in Jakarta, Bangkok, Hanoi, Beijing and Dili, the high commissions in Kuala Lumpur and Port Moresby and other diplomatic posts.

    A secret US National Security Agency document leaked by Mr Snowden and published by Germany’s Der Speigel magazine reveals a highly sensitive signals intelligence collection program conducted from US embassies and consulates and from the diplomatic missions of other “Five Eyes” intelligence partners, including Australia, Britain and Canada.

    Codenamed STATEROOM, the collection program involves interception of radio, telecommunications and internet traffic.

    The document says the DSD operates STATEROOM facilities at Australian diplomatic posts. It says the surveillance facilities are “small in size and in number of personnel staffing them”.

    “They are covert, and their true mission is not known by the majority of the diplomatic staff at the facility where they are assigned,” it says.

    The document says the DSD facilities are carefully concealed. “For example, antennas are sometimes hidden in false architectural features or roof maintenance sheds.”

    The Department of Foreign Affairs and Trade declined to comment on the potential diplomatic implications of the disclosure. A spokesperson said: “It is the long-standing practice of Australian governments not to comment on intelligence matters.”

    The leaked NSA document does not identify the location of the DSD facilities overseas. However, a former Australian defence intelligence officer told Fairfax Media that the directorate conducted surveillance from Australian embassies across Asia and the Pacific.

    In June, the East Timorese government complained publicly about Australian spying, including communications interception and the bugging of government offices during negotiations on the Timor Gap oil and gas reserves.

    The former intelligence officer said the interception facility at the Australian embassy in Jakarta played an important role in collecting intelligence on terrorist threats and people smuggling, “but the main focus is political, diplomatic and economic intelligence”.

    “The huge growth of mobile phone networks has been a great boon and Jakarta’s political elite are a loquacious bunch. Even when they think their own intelligence services are listening they just keep talking,” he said.

    He said the Australian consulate in Denpasar, Bali, had also been used for intelligence collection.

    Intelligence expert Des Ball said the DSD had long co-operated with the US in monitoring the Asia-Pacific region, including using listening posts in Australian embassies and consulates.

    “Knowing what our neighbours are really thinking is important for all sorts of diplomatic and trade negotiations,” Professor Ball told Fairfax Media.

    “It’s also necessary to map the whole of the telecommunications infrastructure in any area where we might one day have to conduct military operations so that we can make most use of our cyber warfare capabilities, however remote those contingencies might be, because you can’t get that knowledge and build those capabilities once a conflict starts.”

    Meanwhile, Indonesian Foreign Minister Marty Natalegawa has demanded an explanation of news that the US embassy in Jakarta has been used to tap the phones of Indonesian officials.

    “Indonesia cannot accept and strongly protests the news about the existence of tapping facilities at the US embassy in Jakarta,” Mr Natalegawa said.

    ”We have spoken to the US embassy representative in Jakarta demanding an official explanation from the US government about the news. If it’s confirmed, then it’s not only a breach of security, but a serious breach of diplomatic norms and ethics, and of course it’s not in line with the spirit of having a good relationship between the two countries.”

    The Age
    Date: October 31 2013
    Philip Dorling

    Find this story at 31 October 2013

    Copyright © 2013
    Fairfax Media

    Malaysia protests at ‘US and Australia spying’ in Asia

    Malaysia has protested at the alleged spying, saying “such activities are not done among close friends”
    Continue reading the main story

    The Malaysian government has summoned the heads of the US and Australian diplomatic missions in Kuala Lumpur over a row about an alleged American-led spying network in Asia.

    The Malaysian foreign ministry said the reports of spying could “severely damage” relations.

    It said a protest note was handed over.

    China and Indonesia have already protested at the claims that Australian embassies were being used to monitor phones and collect data for the US.

    Malaysian Foreign Minister Anifah Aman said “such activities are not done amongst close friends”.

    Mr Anifah said his Australian counterpart, Julie Bishop, replied that it was not her government’s policy to comment on intelligence matters, but she accepted Malaysia’s concerns.

    The Sydney Morning Herald (SMH) has reported that Australian diplomatic posts in Asia were being used to intercept phone calls and data.

    The reports were based on a US National Security Agency document leaked by whistleblower Edward Snowden.

    Australia’s Department of Foreign Affairs and Trade has declined to comment on the reports.

    Prime Minister Tony Abbott said: “Every Australian governmental agency, every Australian official… operates in accordance with the law.”

    Find this story at 2 November 2013

    BBC © 2013 The BBC

    Canada’s electronic watchers enjoy secrecy second to none

    Unlike in Britain and the United States, Parliament is not involved in holding Canada’s intelligence gathering agency to account.

    Creepy truth: American spies with access to everyone’s data do occasionally succumb to the urge to snoop illegally through their love lives, peering into the private communications of former paramours.
    Creepier truth: if you’re Canadian, you have no way of knowing whether one of your own spies does it to you.
    Hypothetically, they don’t. Legally, they can’t. But that’s the problem, say critics of the fast-growing Communications Security Establishment Canada (CSEC), the Ottawa agency that scours global telephone logs, email and Internet trails for worrisome patterns — with CSEC it’s all hypothetical because Canada’s electronic watchers enjoy a secrecy second to none.
    Nearly six months after former computer specialist Edward Snowden began tearing back the curtain on America’s National Security Agency with a series of stunning disclosures about the true extent of U.S. mass surveillance, Canada’s CSEC remains a silent bystander.
    Apart from a single report by journalist Glenn Greenwald accusing CSEC of eavesdropping on Brazil’s mining and energy ministry, Canada’s electronic spies have thus far escaped the brunt of Snowden’s cascading disclosures.
    That’s good, right? Sure it is. But it also leaves Canadians, including Parliament, almost completely in the dark on what the underscrutinized CSEC actually does, even as outraged Americans and Britons shine a bright light on — and mobilize to change — the ways their own governments consume private data.
    “Canadians who think they are in the clear on these ongoing scandals need to grasp that we are the ones who need the debate the most,” said Ron Deibert, director of the University of Toronto’s Citizen Lab.
    “The Canadian checks and balances just aren’t there. We have no parliamentary oversight of CSEC, no adequate independent entity to watch the watchers and act as a constraint on misbehaviour. It just doesn’t exist now.
    “It’s not a question of people shrugging and saying, ‘Well, I’ve got nothing to hide.’ The real problem is oversight — and the potential for abuse if left unchecked.”
    It’s an idea that even CSEC’s former chief, John Adams, concedes would be helpful.
    Adams doesn’t think “oversight” is realistic, but supports the robust “review” of CSEC’s activities and sees the value in having a committee of security-cleared parliamentarians “fully briefed on what CSEC is doing.
    “It would be an opportunity for them to provide feedback and observations and raise concerns perhaps about what CSEC is doing and CSEC could also use that forum as an opportunity to talk about what they might be doing or consider doing or to bounce off of them some thoughts,” said Adams.
    “It would be an opportunity for (Parliament) to have some public debate but it would be a limited public debate because they’d have to be sworn to secrecy.”
    This review does exist in the United States, though many argue the checks and balances have been abused and subverted in light of Snowden’s NSA disclosures.
    Yet in the U.S., as the scandal grew, so too did Congressional scrutiny, with American politicians like Sen. Ron Wyden of Oregon leading the pushback against secrecy.
    A case in point came in August, when the leak of a top-secret document revealed the NSA broke privacy rules and overstepped its legal authority thousands of times a year after 2008, when the agency was granted broad new powers by Congress.
    Most of the violations were “unintentional,” but that sparked congressional queries for details on cases involving wilful misconduct by NSA spies. As pressure mounted, the NSA took the extraordinary measure of a public statement, acknowledging that a handful of its officers had used the agency’s enormous eavesdropping power to spy on romantic interests.
    Those instances, though rare, were common enough to warrant their own spycraft label — LOVEINT, or “love intelligence.” Most of the officials involved resigned, were dismissed or were demoted to a lower pay grade with limited security clearance, the agency said.
    But that’s only one piece of a much broader debate taking place in Washington, as two competing pieces of legislation emerge with the intent to rein back NSA powers and place congressional checks and balances on a stronger footing. An important element of that debate is whether America’s massive metadata effort — the gathering up of the entire haystack of phone and Internet communications — is worth the cost.
    These questions are hardly ever asked north of the border, even though Canada is a partner in the so-called Five Eyes, sharing intelligence-gathering chores alongside the U.S., Britain, Australia and New Zealand.
    Little is known of what that entails, precisely, although the Globe and Mail penetrated one layer of the CSEC bubble in June. The newspaper disclosed that a secret Canadian metadata surveillance program first launched in 2005 under then-prime minister Paul Martin was frozen amid privacy concerns, only to be reinstated in 2011 under new rules.
    Hundreds of pages of records on the program, obtained through Access to Information requests, came back with large passages blacked out on grounds of national security, the Globe reported.
    The lone watchdog agency overseeing CSEC, the Office of the CSE Commissioner, has given its blessing to the metadata program. But critics say the office and its staff of eight, which until recently received its funding directly from the Department of National Defence, as does CSEC, remains too close to Canada’s security establishment to effectively safeguard privacy concerns.
    Once a year CSEC’s watchdog reports to Canadians. But far more often, it reports secretly to the defence minister with recommendations for adjustments in how CSEC conducts its business. In his most recent public report, released in August, outgoing commissioner Robert Decary ended his three-year term proclaiming that all activities complied with Canadian law with the exception of “a small number of records (which) suggested the possibility that some activities may have been directed at Canadians, contrary to the law . . . I was unable to reach a definitive conclusion.”
    Decary, in a final assessment of his time as CSEC watchdog, wrote that he saw little value in a confrontational relationship. “With my years of experience, I see the office more CSEC’s conscience than as a sword of Damocles,” he wrote.
    But even Decary nudged Canada’s spymasters toward greater openness, writing that “I believe that the ice has been broken and that the security and intelligence agencies understand they can speak more openly about their work without betraying state secrets or compromising national security.
    “The greater the transparency, the less skeptical and cynical the public will be.”
    University of Ottawa scholar Wesley Wark, who specializes in national security and the history of intelligence agencies, says the CSEC watchdog is simply not enough.
    Unlike Britain and the United States, Canadian oversight leaves a “gaping hole . . . a big gap” because Parliament is not involved in holding intelligence agencies to account as Adams suggested, Wark told The Star.
    The issue has simmered for years, said Wark, with failed attempts, most recently in 2005, to create a British-style Committee of Parliamentarians on National Security.
    But oversight actually grew worse in 2011, said Wark, when CSEC was deemed an independent agency within the Department of National Defence, effectively eliminating a requirement to report to the national security adviser and Privy Council office. “It took that away entirely,” said Wark, “and put it all within (DND), where it’s very easy for CSEC to disappear down its secret hole.
    “There’s a question about who is really in charge and who’s deciding to apportion CSEC resources in terms of current operations,” he said.
    Among the key questions Wark says remain unanswered is how much bang CSEC gets for its buck. And whether, in Canada’s haste to satisfy the obligations of its Five Eyes commitments, we sell Canadian interests short.
    Deibert, who this year published Black Code: Inside the Battle for Cyberspace, argues that while parliamentary oversight remains an admirable goal, the evolving issue of privacy-versus-surveillance warrants something more ambitious.
    “I would go further: There needs to be somebody who is not part of Ottawa culture, who is adversarial, something with the authority and credibility of the Privacy Commission’s office,” said Deibert.
    “Parliamentary oversight is necessary. But you also need oversight that doesn’t depend on favours or look through the lens of partisan politics.
    “I just don’t think, as a society, Canada has caught up with the epochal scope of what has changed in the last 10 years. We’ve gone through the most profound transformation in how we communicate. Mobile and broadband technologies have turned us inside out — and at the same time these Cold War agencies are now turning their gaze inwards on us.
    “It’s no longer spy-versus-spy and concern over foreign states with nuclear weapons. Now it’s about somebody blowing themselves up in a shopping mall. And so the threat model has turned toward all of society.”
    Canada’s security agencies cannot do their jobs in total transparency, of course. Some degree of secrecy is crucial. But that is no hindrance, if a committee of Parliament were to be vetted and cleared — a commonplace practice in other jurisdictions — and thus able to absorb firsthand the full heft of CSEC activities.
    But if CSEC’s critics and former bosses agree on at least some increased scrutiny, Adams doesn’t buy into all the Snowden hype. He shrugs, for example, at the furor that followed October’s disclosure of U.S. eavesdropping on German Chancellor Angela Merkel’s cellphone.
    “Every leader in the world knows that people would love to know what they’re thinking, where they’re heading . . . anyone who doesn’t think that is happening is in never-never land,” Adams said.
    “It’s not illegal but it’s embarrassing. There are 12 rules and 11 of them are, ‘Don’t get caught.’ ”

    By: Mitch Potter Washington Bureau, Michelle Shephard National Security
    Reporter, Published on Sat Nov 09 2013

    Find this story at 9 November 2013

    © Copyright Toronto Star Newspapers Ltd. 1996-2013

    << oudere artikelen  nieuwere artikelen >>