Second Prism program emerges as Friedrich faces committee30 augustus 2013
As Germany’s interior minister faced a special select committee, another surveillance program – also called Prism – has come to light. Unlike its more famous global namesake, this Prism is said to be used in Afghanistan.
German mass-circulation daily Bild first found reference to the Afghanistan Prism program in an order sent out to regional command posts from the NATO headquarters in Kabul.
The communiqué told ISAF staff to use this Prism database for any data gleaned from monitoring telecommunications or emails, starting on September 15, 2011.
The German government said it knew nothing about the database, run by the US but accessible to ISAF troops across Afghanistan – including those with Germany’s Bundeswehr – until Wednesday’s report.
“I can only tell you that this was a NATO/ISAF program, one that was not classified as secret – according to the BND,” Chancellor Merkel’s spokesman Steffen Seibert said. Seibert was referring to a press release from Germany’s equivalent to Washington’s National Security Agency (NSA), the Bundesnachrichtendienst (BND). The BND also said this Prism was “not identical” to the now renowned program revealed by NSA contractor turned whistleblower Edward Snowden in May.
DW.DE
Itching to ask: What does Merkel know about NSA surveillance?
A parliamentary oversight committee in Berlin would like to know how much the German government really knows about NSA spying activities in Germany. Their leverage, however, is limited. (17.07.2013)
Another ministerial spokesman, Stefan Paris with the defense ministry, said it was quite normal for information like this not to filter back to Berlin unless there was a specific need.
Friedrich faces closed-door grilling
Elsewhere in Berlin, Interior Minister Hans-Peter Friedrich completed two days in front of the special committee for internal affairs on Wednesday, facing further questions after his impromptu visit to Washington at the weekend.
Opposition politicians, who see increasing mileage in the alleged NSA espionage activities, said after the session that Friedrich’s appearance shed little light on proceedings.
“Everywhere people seem to accept the way the US side is acting with a shrug of the shoulders, while there’s no clarity anywhere,” Social Democrat parliamentarian Michael Hartmann said, adding that he felt the chancellor’s office should be answering questions instead of the interior ministry.
“My personal impression: Before September 22, nothing is meant to be put on the table here,” Green party politician Wolfgang Wieland said, naming the date of federal elections in Germany.
Friedrich has so far stressed the NSA’s supposed contribution to stopping five terror plots in Germany, offering data on two of them to date, when discussing the issue. The minister controversially said on Monday that there was a “super-fundamental right” to protecting public safety that trumped even privacy laws.
British blow to EU data dreams?
Free Democrat politician Hartfried Wolff, a member of the Bundestag’s interior committee, said on Wednesday that Friedrich had outlined one blow to Chancellor Angela Merkel’s proposed response.
Merkel said in a key television interview on Sunday that she would be seeking unified EU rules on data protection to allow the bloc to handle the issue better.
According to Wolff, Friedrich said that the UK was unlikely to support such a move. Since Snowden went public, a UK espionage program called “Tempora” has also come to light.
Friedrich is a member of the Bavarian sister party of Merkel’s Christian Democrats, the CSU. Bavaria votes in state elections one week before the German ballot.
msh/rc (AFP, AP, Reuters)
Date 17.07.2013
Find this story at 717 July 2013
© 2013 Deutsche Welle
Prism in Afghanistan Conflicting Accounts By German Government30 augustus 2013
In Germany, the scandal surrounding NSA spying is getting odder by the day. A new Defense Ministry memo suggests a claim made by a mass-circulation newspaper that Germany’s army knew about Prism in 2011 is, in fact, true.
The scandal in Germany surrounding spying activities by the United States’ National Security Agency took a surprising twist on Thursday. A report by a German mass-circulation daily that described the use of a program called Prism in NATO-occupied Afghanistan has led to the German Defense Ministry contradicting the foreign intelligence agency BND.
It started on Wednesday when the broadsheet Bild reported that the American intelligence service NSA had deployed the controversial data-collection tool Prism in Afghanistan and that Germany’s armed forces, the Bundeswehr, knew of the program by the autumn of 2011 at the latest.
German government spokesman Steffen Seibert, speaking on behalf of the BND, was quick to deny the Bild report. He said on Wednesday that the software which had been used in Afghanistan was part of “a NATO/ISAF program and was not the same as the NSA’s Prism program.” Seibert said the programs were “not identical.” According to Seibert’s account, there are two different Prism programs — the much discussed NSA Prism program, which has been used in recent years to intensively monitor German communications, as well as an ISAF program for Afghanistan.
But the Defense Ministry is now contradicting that characterization. In a two-page memo obtained by several German media outlets, Rüdiger Wolf, a high-ranking ministry official, states that the Prism program used in Afghanistan is a “computer-aided US planning and information analysis tool” used for the coordination of “American intelligence systems,” that is “operated exclusively by US personnel” and is “used Afghanistan-wide by the US side.”
Prism Accessible Exclusively to Americans
Wolf describes in detail how the Bundeswehr and NATO have no access to the US program. He adds that while there may be computer terminals at the German base in Mazar-e-Sharif that are equipped to access the program, they can only be used by Americans.
If members of the Bundeswehr wanted access to information, they had to send a special form to the IJC command center in Kabul, almost entirely controlled by the US Army — that is, if they wanted US data that went beyond the information possessed by NATO intelligence. When they got the data back, “the origin of the information” was “fundamentally unrecognizable” to the Germans.
It is precisely such procedures that Bild reported on this week, citing a classified September NATO order. In the paper, NATO members, including the German-led Regional Command North in Afghanistan, are called upon to direct requests for the “Prism” system to American personnel — military or civilian (which in this case is a reference to intelligence workers) because NATO has no access to the system. Given that Bild printed a copy of the order in its newspaper, the BND’s portrayal already seemed odd on Wednesday.
According to Wolf’s own admissions, the Germans don’t know very much about the Prism program in Afghanistan. It is unclear, for example, how Prism is deployed at the US Army-dominated headquarters in Kabul and the ministry doesn’t know the “extent of use.” However, Wolf once more reiterated that all information obtained from intelligence sources served to protect German soldiers — including “insights provided by the US side that could have come from Prism.”
A Slap in the Face
The Defense Ministry is also very cautious compared to the BND when it comes to deferentiating the Prism program in Afghanistan from the Prism spying program that was exposed by former NSA contractor Edward Snowden and involves the systematic monitoring of German communications. The information supplied by the US would have pertained only to the situation in Afghanistan. It was “not a data fishing expedition” on German citizens, according to the memo, and in fact had “no proximity” to the NSA surveillance program in Germany and Europe.
With his cautious formulation, Wolf deliberately avoids saying whether or not the two programs are identical.
This representation of the facts, which was already made to some extent on Wednesday by Defense Ministry spokesman Stefan Paris, is like a slap in the face for the BND. Shortly after Seibert appeared at the press conference, insiders wondered why the intelligence agency would so unambiguously commit itself to the position that the Prism program in Afghanistan is part of the composite ISAF system. But the BND didn’t pull back on its position, although Paris clearly said that the Prism program in Afghanistan is operated exclusively by Americans.
Members of the opposition were quick to attack the BND for its assertions. “The Chancellery, acting on behalf of the BND, deliberately lied to the public on Wednesday,” Green Party defense expert Omid Nouripour told SPIEGEL ONLINE. According to Nouripour, Wolf’s description makes it clear that there is no NATO Prism program. The German government, he says, should stop making excuses and finally begin to seriously investigate the spying scandal.
07/18/2013 09:26 PM
By Matthias Gebauer
Find this story at 18 July 2013
© SPIEGEL ONLINE 2013
NSA and GCHQ – too close for comfort16 augustus 2013
It makes sense for the US and UK to co-operate and share, but payments between the two agencies must mean influence
‘One budget report states GCHQ (right) will spend money according to NSA and UK government requirements – in that order.’ Photographs: EPA/NSA; Barry Batchelor/PA
The intelligence files leaked by the whistleblower Edward Snowden have highlighted two major issues that are specific to Britain. Neither have been welcomed by the government or our security agencies, and most of the political classes are trying to ignore them too. The first involves tactics.
Thanks to Snowden, we have found out about techniques that have given GCHQ the capability to suck up vast amounts of people’s personal data from the cables that carry the internet in and out of the country.
The programme, called Tempora, is unquestionably ingenious, but it is underpinned by laws that are outdated and poorly worded.
Even the most sympathetic of scrutinising bodies – the parliamentary intelligence and security committee (ISC) – has put a question mark over this legislative framework.
The second issue involves British strategic thinking. The files seen by the Guardian are explicit about the importance of the UK’s relationship with the US, and the desire for GCHQ to be as tightly bound as possible to its US counterpart, the National Security Agency. They will doubtless be welcomed by anyone who believes that the need for a “special relationship” with Washington – which has underpinned UK foreign policy since the second world war – is pre-eminent.
But in the light of these latest revelations, it is also right to assess the price we are paying for this relationship, and the compromises that come with it.
Without Snowden, we would not have known that the NSA pays GCHQ tens of millions of pounds a year.
These are the payments we actually know about – there may be others, because so many of our intelligence projects and programmes are historic and interlinked.
Yet none of the bodies that have notional responsibility for overseeing the money flowing into and out of GCHQ – the National Audit Office (NAO), the public accounts committee, the ISC – have ever mentioned these sums.
The NAO and the public accounts committee almost certainly didn’t know about them. It is worth dwelling on this. The US government is paying money to support Britain’s most important intelligence-gathering service. Would this be regarded as normal, or acceptable, in any other institution, such as the police or the military, both of whom work closely with the US?
And what does the US expect to get from this investment? Quite a bit, seems to be the answer. The influence the NSA has over GCHQ seems considerable. Whether this is down to the money, or the pressure a senior partner in a relationship can bring to bear, is not entirely clear.
Common sense suggests it’s a mixture of the two. What is clear is this: the Snowden files are littered with remarks from GCHQ senior and middle managers worrying about the NSA “ask” and whether the British agency is doing enough to meet it.
One budget report states GCHQ will spend money according to NSA and UK government requirements – in that order. Does GCHQ feel compromised by this? If it does, it seems the imperative of keeping close to the Americans is overriding. That appears to be the view of the Cabinet Office too.
Asked about the NSA payments, the American demands and the concerns that the UK might be vulnerable to being pushed about, the Cabinet Office said: “In a 60-year close alliance it is entirely unsurprising that there are joint projects in which resources and expertise are pooled, but the benefits flow in both directions.”
It may be entirely unsurprising in Whitehall that our subservience has been institutionalised in this way, but everyone else is entitled to ask whether that makes it healthy or right.
People are also entitled to ponder whether the price of keeping the Americans so close might involve undertaking some of their “dirty work” – developing intelligence-gathering techniques that are beyond the US legislative and judicial framework, but can be accommodated within ours.
Critics of the ISC argue it is simply too under-resourced and uncritical to give plausible answers to such questions; and the pronouncements of ministers who sign hundreds of warrants every year are hardly reassuring.
It would be naive to think that the US and the UK could work – or would want to work – in isolation of each other when its government-class shares many of the same perspectives on the world.
There are many advantages to sharing intelligence. But sovereignty and independence are important too. The NSA and GCHQ seem deeply enmeshed and interlinked, but the line between the agencies needs to be drawn more clearly.
Follow Nick Hopkins by emailBeta
Nick Hopkins
theguardian.com, Thursday 1 August 2013 16.04 BST
Find this story at 1 August 2013
© 2013 Guardian News and Media Limited or its affiliated companies.
Exclusive: NSA pays £100m in secret funding for GCHQ16 augustus 2013
• Secret payments revealed in leaks by Edward Snowden
• GCHQ expected to ‘pull its weight’ for Americans
• Weaker regulation of British spies ‘a selling point’ for NSA
The NSA paid £15.5m towards redevelopments at GCHQ’s site in Bude, north Cornwall, which intercepts communications from the transatlantic cables that carry internet traffic. Photograph: Kieran Doherty/Reuters
The US government has paid at least £100m to the UK spy agency GCHQ over the last three years to secure access to and influence over Britain’s intelligence gathering programmes.
The top secret payments are set out in documents which make clear that the Americans expect a return on the investment, and that GCHQ has to work hard to meet their demands. “GCHQ must pull its weight and be seen to pull its weight,” a GCHQ strategy briefing said.
The funding underlines the closeness of the relationship between GCHQ and its US equivalent, the National Security Agency. But it will raise fears about the hold Washington has over the UK’s biggest and most important intelligence agency, and whether Britain’s dependency on the NSA has become too great.
In one revealing document from 2010, GCHQ acknowledged that the US had “raised a number of issues with regards to meeting NSA’s minimum expectations”. It said GCHQ “still remains short of the full NSA ask”.
Ministers have denied that GCHQ does the NSA’s “dirty work”, but in the documents GCHQ describes Britain’s surveillance laws and regulatory regime as a “selling point” for the Americans.
The papers are the latest to emerge from the cache leaked by the American whistleblower Edward Snowden, the former NSA contractor who has railed at the reach of the US and UK intelligence agencies.
Snowden warned about the relationship between the NSA and GCHQ, saying the organisations have been jointly responsible for developing techniques that allow the mass harvesting and analysis of internet traffic. “It’s not just a US problem,” he said. “They are worse than the US.”
As well as the payments, the documents seen by the Guardian reveal:
• GCHQ is pouring money into efforts to gather personal information from mobile phones and apps, and has said it wants to be able to “exploit any phone, anywhere, any time”.
• Some GCHQ staff working on one sensitive programme expressed concern about “the morality and ethics of their operational work, particularly given the level of deception involved”.
• The amount of personal data available to GCHQ from internet and mobile traffic has increased by 7,000% in the past five years – but 60% of all Britain’s refined intelligence still appears to come from the NSA.
• GCHQ blames China and Russia for the vast majority of cyber-attacks against the UK and is now working with the NSA to provide the British and US militaries with a cyberwarfare capability.
The details of the NSA payments, and the influence the US has over Britain, are set out in GCHQ’s annual “investment portfolios”. The papers show that the NSA gave GCHQ £22.9m in 2009. The following year the NSA’s contribution increased to £39.9m, which included £4m to support GCHQ’s work for Nato forces in Afghanistan, and £17.2m for the agency’s Mastering the Internet project, which gathers and stores vast amounts of “raw” information ready for analysis.
The NSA also paid £15.5m towards redevelopments at GCHQ’s sister site in Bude, north Cornwall, which intercepts communications from the transatlantic cables that carry internet traffic. “Securing external NSA funding for Bude has protected (GCHQ’s core) budget,” the paper said.
In 2011/12 the NSA paid another £34.7m to GCHQ.
The papers show the NSA pays half the costs of one of the UK’s main eavesdropping capabilities in Cyprus. In turn, GCHQ has to take the American view into account when deciding what to prioritise.
A document setting out GCHQ’s spending plans for 2010/11 stated: “The portfolio will spend money supplied by the NSA and UK government departments against agreed requirements.”
Other documents say the agency must ensure there has been “an appropriate level of contribution … from the NSA perspective”.
The leaked papers reveal that the UK’s biggest fear is that “US perceptions of the … partnership diminish, leading to loss of access, and/or reduction in investment … to the UK”.
When GCHQ does supply the US with valuable intelligence, the agency boasts about it. In one review, GCHQ boasted that it had supplied “unique contributions” to the NSA during its investigation of the American citizen responsible for an attempted car bomb attack in Times Square, New York City, in 2010.
No other detail is provided – but it raises the possibility that GCHQ might have been spying on an American living in the US. The NSA is prohibited from doing this by US law.
Asked about the payments, a Cabinet Office spokesman said: “In a 60-year alliance it is entirely unsurprising that there are joint projects in which resources and expertise are pooled, but the benefits flow in both directions.”
A senior security source in Whitehall added: “The fact is there is a close intelligence relationship between the UK and US and a number of other countries including Australia and Canada. There’s no automaticity, not everything is shared. A sentient human being takes decisions.”
Although the sums represent only a small percentage of the agencies’ budgets, the money has been an important source of income for GCHQ. The cash came during a period of cost-cutting at the agency that led to staff numbers being slashed from 6,485 in 2009 to 6,132 last year.
GCHQ seems desperate to please its American benefactor and the NSA does not hold back when it fails to get what it wants. On one project, GCHQ feared if it failed to deliver it would “diminish NSA’s confidence in GCHQ’s ability to meet minimum NSA requirements”. Another document warned: “The NSA ask is not static and retaining ‘equability’ will remain a challenge for the near future.”
In November 2011, a senior GCHQ manager working in Cyprus bemoaned the lack of staff devoted to one eavesdropping programme, saying: “This is not sustainable if numbers reduce further and reflects badly on our commitments to the NSA.”
The overriding necessity to keep on the right side of the US was revealed in a UK government paper that set out the views of GCHQ in the wake of the 2010 strategic defence and security review. The document was called: “GCHQ’s international alliances and partnerships: helping to maintain Britain’s standing and influence in the world.” It said: “Our key partnership is with the US. We need to keep this relationship healthy. The relationship remains strong but is not sentimental. GCHQ must pull its weight and be seen to pull its weight.”
Astonishingly, the document admitted that 60% of the UK’s high-value intelligence “is based on either NSA end-product or derived from NSA collection”. End product means official reports that are distillations of the best raw intelligence.
Another pitch to keep the US happy involves reminding Washington that the UK is less regulated than the US. The British agency described this as one of its key “selling points”. This was made explicit two years ago when GCHQ set out its priorities for the coming years.
“We both accept and accommodate NSA’s different way of working,” the document said. “We are less constrained by NSA’s concerns about compliance.”
GCHQ said that by 2013 it hoped to have “exploited to the full our unique selling points of geography, partnerships [and] the UK’s legal regime”.
However, there are indications from within GCHQ that senior staff are not at ease with the rate and pace of change. The head of one of its programmes warned the agency was now receiving so much new intelligence that its “mission management … is no longer fit for purpose”.
In June, the government announced that the “single intelligence account” fund that pays for GCHQ, MI5 and MI6 would be increased by 3.4% in 2015/16. This comes after three years in which the SIA has been cut from £1.92bn to £1.88bn. The agencies have also been told to make £220m savings on existing programmes.
The parliamentary intelligence and security committee (ISC) has questioned whether the agencies were making the claimed savings and said their budgets should be more rigorously scrutinised to ensure efficiencies were “independently verifiable and/or sustainable”.
The Snowden documents show GCHQ has become increasingly reliant on money from “external” sources. In 2006 it received the vast majority of its funding directly from Whitehall, with only £14m from “external” funding. In 2010 that rose to £118m and by 2011/12 it had reached £151m. Most of this comes from the Home Office.
Follow Julian Borger by emailBeta
Nick Hopkins and Julian Borger
The Guardian, Thursday 1 August 2013 16.04 BST
Find this story at 1 August 2013
© 2013 Guardian News and Media Limited or its affiliated companies.
Other Agencies Clamor for Data N.S.A. Compiles16 augustus 2013
WASHINGTON — The National Security Agency’s dominant role as the nation’s spy warehouse has spurred frequent tensions and turf fights with other federal intelligence agencies that want to use its surveillance tools for their own investigations, officials say.
Agencies working to curb drug trafficking, cyberattacks, money laundering, counterfeiting and even copyright infringement complain that their attempts to exploit the security agency’s vast resources have often been turned down because their own investigations are not considered a high enough priority, current and former government officials say.
Intelligence officials say they have been careful to limit the use of the security agency’s troves of data and eavesdropping spyware for fear they could be misused in ways that violate Americans’ privacy rights.
The recent disclosures of agency activities by its former contractor Edward J. Snowden have led to widespread criticism that its surveillance operations go too far and have prompted lawmakers in Washington to talk of reining them in. But out of public view, the intelligence community has been agitated in recent years for the opposite reason: frustrated officials outside the security agency say the spy tools are not used widely enough.
“It’s a very common complaint about N.S.A.,” said Timothy H. Edgar, a former senior intelligence official at the White House and at the office of the director of national intelligence. “They collect all this information, but it’s difficult for the other agencies to get access to what they want.”
“The other agencies feel they should be bigger players,” said Mr. Edgar, who heard many of the disputes before leaving government this year to become a visiting fellow at Brown University. “They view the N.S.A. — incorrectly, I think — as this big pot of data that they could go get if they were just able to pry it out of them.”
Smaller intelligence units within the Drug Enforcement Administration, the Secret Service, the Pentagon and the Department of Homeland Security have sometimes been given access to the security agency’s surveillance tools for particular cases, intelligence officials say.
But more often, their requests have been rejected because the links to terrorism or foreign intelligence, usually required by law or policy, are considered tenuous. Officials at some agencies see another motive — protecting the security agency’s turf — and have grown resentful over what they see as a second-tier status that has undermined their own investigations into security matters.
At the drug agency, for example, officials complained that they were blocked from using the security agency’s surveillance tools for several drug-trafficking cases in Latin America, which they said might be connected to financing terrorist groups in the Middle East and elsewhere.
At the Homeland Security Department, officials have repeatedly sought to use the security agency’s Internet and telephone databases and other resources to trace cyberattacks on American targets that are believed to have stemmed from China, Russia and Eastern Europe, according to officials. They have often been rebuffed.
Officials at the other agencies, speaking only on the condition of anonymity because they were not authorized to discuss the tensions, say the National Security Agency’s reluctance to allow access to data has been particularly frustrating because of post-Sept. 11 measures that were intended to encourage information-sharing among federal agencies.
In fact, a change made in 2008 in the executive order governing intelligence was intended to make it easier for the security agency to share surveillance information with other agencies if it was considered “relevant” to their own investigations. It has often been left to the national intelligence director’s office to referee the frequent disputes over how and when the security agency’s spy tools can be used. The director’s office declined to comment for this article.
Typically, the agencies request that the N.S.A. target individuals or groups for surveillance, search its databases for information about them, or share raw intelligence, rather than edited summaries, with them. If those under scrutiny are Americans, approval from the secret Foreign Intelligence Surveillance Court is required.
The security agency, whose mission is to spy overseas, and the F.B.I., its main partner in surveillance operations, dominate the process as the Justice Department’s main “customers” in seeking warrants from the intelligence court, with nearly 1,800 approved by the court last year.
In a statement, the security agency said that it “works closely with all intelligence community partners, and embeds liaison officers and other personnel at those agencies for the express purpose of ensuring N.S.A. is meeting their requirements and providing support to their missions.”
The security agency’s spy tools are attractive to other agencies for many reasons. Unlike traditional, narrowly tailored search warrants, those granted by the intelligence court often allow searches through records and data that are vast in scope. The standard of evidence needed to acquire them may be lower than in other courts, and the government may not be required to disclose for years, if ever, that someone was the focus of secret surveillance operations.
Decisions on using the security agency’s powers rest on many complicated variables, including a link to terrorism or “foreign intelligence,” the type of surveillance or data collection that is being conducted, the involvement of American targets, and the priority of the issue.
“Every agency wants to think that their mission has to be the highest priority,” said a former senior White House intelligence official involved in recent turf issues.
Other intelligence shops usually have quick access to N.S.A. tools and data on pressing matters of national security, like investigating a terrorism threat, planning battlefield operations or providing security for a presidential trip, officials say. But the conflicts arise during longer-term investigations with unclear foreign connections.
In pressing for greater access, a number of smaller agencies maintain that their cases involve legitimate national security threats and could be helped significantly by the N.S.A.’s ability to trace e-mails and Internet activity or other tools.
Drug agency officials, for instance, have sought a higher place for global drug trafficking on the intelligence community’s classified list of surveillance priorities, according to two officials.
Dawn Dearden, a drug agency spokeswoman, said it was comfortable allowing the N.S.A. and the F.B.I. to take the lead in seeking surveillance warrants. “We don’t have the authority, and we don’t want it, and that comes from the top down,” she said.
But privately, intelligence officials at the drug agency and elsewhere have complained that they feel shut out of the process by the N.S.A. and the F.B.I. from start to finish, with little input on what groups are targeted with surveillance and only sporadic access to the classified material that is ultimately collected.
Sometimes, security agency and bureau officials accuse the smaller agencies of exaggerating links to national security threats in their own cases when pushing for access to the security agency’s surveillance capabilities. Officials from the other agencies say that if a link to national security is considered legitimate, the F.B.I. will at times simply take over the case itself and work it with the N.S.A.
In one such case, the bureau took control of a Secret Service investigation after a hacker was linked to a foreign government, one law enforcement official said. Similarly, the bureau became more interested in investigating smuggled cigarettes as a means of financing terrorist groups after the case was developed by the Bureau of Alcohol, Tobacco, Firearms and Explosives.
Mr. Edgar said officials in the national intelligence director’s office occasionally allow other agencies a role in identifying surveillance targets and seeing the results when it is relevant to their own inquiries. But more often, he acknowledged, the office has come down on the side of keeping the process held to an “exclusive club” at the N.S.A., the F.B.I. and the Justice Department, with help from the Central Intelligence Agency on foreign issues.
Officials in the national intelligence director’s office worry about opening the surveillance too widely beyond the security agency and the F.B.I. for fear of abuse, Mr. Edgar said. The two intelligence giants have been “burned” by past wiretapping controversies and know the political consequences if they venture too far afield, he added.
“I would have been very uncomfortable if we had let these other agencies get access to the raw N.S.A. data,” he said.
As furious as the public criticism of the security agency’s programs has been in the two months since Mr. Snowden’s disclosures, “it could have been much, much worse, if we had let these other agencies loose and we had real abuses,” Mr. Edgar said. “That was the nightmare scenario we were worried about, and that hasn’t happened.”
Eric Schmitt contributed reporting.
August 3, 2013
By ERIC LICHTBLAU and MICHAEL S. SCHMIDT
Find this story at 3 August 2013
© 2013 The New York Times Company
For Western Allies, a Long History of Swapping Intelligence16 augustus 2013
BERLIN — When Edward J. Snowden disclosed the extent of the United States data mining operations in Germany, monitoring as many as 60 million of the country’s telephone and Internet connections in one day and bugging its embassy, politicians here, like others in Europe, were by turns appalled and indignant. But like the French before them, this week they found themselves backpedaling.
In an interview released this week Mr. Snowden said that Germany’s intelligence services are “in bed” with the National Security Agency, “the same as with most other Western countries.” The assertion has added to fresh scrutiny in the European news media of Berlin and other European governments that may have benefited from the enormous American snooping program known as Prism, or conducted wide-ranging surveillance operations of their own.
The outrage of European leaders notwithstanding, intelligence experts and historians say the most recent disclosures reflect the complicated nature of the relationship between the intelligence services of the United States and its allies, which have long quietly swapped information on each others’ citizens.
“The other services don’t ask us where our information is from and we don’t ask them,” Mr. Snowden said in the interview, conducted by the documentary filmmaker Laura Poitras and Jacob Appelbaum, a computer security researcher, and published this week in the German magazine Der Spiegel. “This way they can protect their political leaders from backlash, if it should become public how massively the private spheres of people around the globe are being violated.”
Britain, which has the closest intelligence relationship with the United States of any European country, has been implicated in several of the data operations described by Mr. Snowden, including claims that Britain’s agencies had access to the Prism computer network, which monitors data from a range of American Internet companies. Such sharing would have allowed British intelligence agencies to sidestep British legal restrictions on electronic snooping. Prime Minister David Cameron has insisted that its intelligence services operate within the law.
Another allegation, reported by The Guardian newspaper, is that the Government Communications Headquarters, the British surveillance center, tapped fiber-optic cables carrying international telephone and Internet traffic, then shared the information with the N.S.A. This program, known as Tempora, involved attaching intercept probes to trans-Atlantic cables when they land on British shores from North America, the report said.
President François Hollande of France was among the first European leaders to express outrage at the revelations of American spying, and especially at accusations that the Americans had spied on French diplomatic posts in Washington and New York.
There is no evidence to date that French intelligence services were granted access to information from the N.S.A., Le Monde reported last week, however, that France’s external intelligence agency maintains a broad telecommunications data collection system of its own, amassing metadata on most, if not all, telephone calls, e-mails and Internet activity coming in and out of France.
Mr. Hollande and other officials have been notably less vocal regarding the claims advanced by Le Monde, which authorities in France have neither confirmed nor denied.
Given their bad experiences with domestic spying, first under the Nazis and then the former the East German secret police, Germans are touchy when it comes to issues of personal privacy and protection of their personal data. Guarantees ensuring the privacy of mail and all forms of long-distance communications are enshrined in Article 10 of their Constitution.
When the extent of the American spying in Germany came to light the chancellor’s spokesman, Steffen Seibert, decried such behavior as “unacceptable,” insisting that, “We are no longer in the cold war.”
But experts say ties between the intelligence services remain rooted in agreements stemming from that era, when West Germany depended on the United States to protect it from the former Soviet Union and its allies in the East.
“Of course the German government is very deeply entwined with the American intelligence services,” said Josef Foschepoth, a German historian from Freiburg University. Mr. Foschepoth spent several years combing through Germany’s federal archives, including formerly classified documents from the 1950s and 1960s, in an effort to uncover the roots of the trans-Atlantic cooperation.
In 1965, Germany’s foreign intelligence service, known by the initials BND, was created. Three years later, the West Germans signed a cooperation agreement effectively binding the Germans to an intensive exchange of information that continues up to the present day, despite changes to the agreements.
The attacks on Sept. 11, 2001, in the United States saw a fresh commitment by the Germans to cooperate with the Americans in the global war against terror. Using technology developed by the Americans and used by the N.S.A., the BND monitors networks from the Middle East, filtering the information before sending it to Washington, said Erich Schmidt-Eenboom, an expert on secret services who runs the Research Institute for Peace Politics in Bavaria.
In exchange, Washington shares intelligence with Germany that authorities here say has been essential to preventing terror attacks similar to those in Madrid or London. It is a matter of pride among German authorities that they have been able to swoop in and detain suspects, preventing several plots from being carried out.
By focusing the current public debate in Germany on the issue of personal data, experts say Chancellor Angela Merkel is able to steer clear of the stickier questions about Germany’s own surveillance programs and a long history of intelligence sharing with the United States, which still makes many Germans deeply uncomfortable, more than two decades after the end of the cold war.
“Every postwar German government, at some point, has been confronted with this problem,” Mr. Foschepoth said of the surveillance scandal. “The way that the chancellor is handling it shows that she knows very well, she is very well informed and she wants the issue to fade away.”
Reporting contributed by Stephen Castle from London, Scott Sayare from Paris and Eric Schmitt from Washington.
July 9, 2013
By MELISSA EDDY
Find this story at 9 July 2013
© 2013 The New York Times Company
Spy access to NZ used as bargaining tool16 augustus 2013
The Southern Cross Cable Network links Australia, New Zealand and the United States.
The ability for US intelligence agencies to access internet data was used as a bargaining tool by a Telecom-owned company trying to keep down the cost of the undersea cable from New Zealand.
Lawyers acting for Southern Cross Cable quoted a former CIA and NSA director who urged the Senate to “exploit” access to data for an intelligence edge.
The value of intercepted communications to the US was raised during negotiations last year which could increase internet costs 15 per cent.
Documents on the Federal Communications Commission website show the issue was raised by lawyers acting for “undersea cable operators”, including Southern Cross Cables, half-owned by Telecom and owner of the 28,900km cable which links New Zealand to the internet.
Lawyers acting for the cable operators told the FCC there were benefits to their clients not having to pay for their cables to land on US soil.
The FCC was told the number of internet connections passing through the US was dropping.
“There has long been speculation that US surveillance following implementation of the Patriot Act could push internet content and information storage outside the United States-to the detriment of the United States.”
The legal team footnoted the statement with a 2006 quote from former CIA director and National Security Agency director General Michael Hayden, who set up domestic wiretapping and widespread internet snooping during his terms as an intelligence chief.
He was quoted as saying: “Because of the nature of global telecommunications, we are playing with a tremendous home-field advantage, and we need to exploit that edge.
“We also need to protect that edge, and we need to protect those who provide it to us.”
In other documents, Southern Cross Cables raised the possibility of submarine cables coming to land in Canada or Mexico.
Southern Cross Cables lawyer Nikki Shone said the company was legally obliged to co-operate with US laws and it was in relation to those obligations that “it noted that the FCC’s proposed universal services charges could harm US security interests by encouraging infrastructure to bypass the United States”.
She said Southern Cross Cable was “wholly unaware of recently disclosed US surveillance programmes”.
A Telecom spokesman cited the company’s contract with residential customers, which tells them it will pass on their information without permission if it believes it is legally required to do so or if it is necessary “to help maintain the law”.
Telecom Users Association chief executive Paul Brislen said revelations about US interception of internet traffic meant “we have to assume that all our communications are intercepted”.
He said internet and telecoms companies had to comply with US rules or be shut out of lucrative contracts.
Mr Brislen believed the cable from Auckland to Los Angeles was secure but said intelligence agencies would access information beyond the landing stations.
Tech Liberty director Thomas Beagle said any use of American services and networks exposed data to being captured by the US.
But shifting to other countries “will just expose you to surveillance from their national governments”.
“It seems that we now have the choice between taking the time to understand and implement secure encryption or choosing services based on which governments we don’t mind spying on us.”
By David Fisher @DFisherJourno
5:30 AM Saturday Aug 10, 2013
Find this story at 10 August 2013
© Copyright 2013, APN Holdings NZ Limited
Bundesheer-Lauschstation als Teil einer US-Peilkette16 augustus 2013
Die Amerikaner finanzierten den Horchposten Königswarte bei Hainburg und banden ihn in ein ganzes Netz ein, das sich von Norwegen über Deutschland bis Italien zog.
Das österreichische Heeresnachrichtenamt (HNA) und der US-Militärgeheimdienst (NSA) tauschen seit mehr als 50 Jahren Informationen aus. Einer der Angelpunkte der Kooperation ist der Horchposten auf der Königswarte bei Hainburg an der Grenze zur Slowakei. Finanziert haben die Station die Amerikaner. Das bestätigte ein Sprecher des Verteidigungsministeriums bereits in der Samstagsausgabe der „Presse“. Das Nachrichtenmagazin „Profil“ förderte nun weitere Details zutage.
Redaktionspraktikum 2013
„Die Presse“ fördert mit Sommerpraktika Nachwuchsjournalisten mit Migrationshintergrund. Jetzt Praktikanten kennenlernen und Wissenswertes erfahren. Weitere Informationen »
Demnach waren die 1958 errichtete Königswarte und kleinere Stationen in Neulengbach, Großharras, Gols, Pirka bei Graz und Stockham bei Wels Teil einer amerikanischen Peilkette, die sich von Norwegen über Deutschland bis nach Italien zog. Österreich war der einzige neutrale Staat in diesem Nato-Lauschverbund. Die USA haben die immer noch aktive Anlage auf der Königswarte ständig erneuert. Von dort aus konnten vor 1989 Gespräche weit hinter dem Eisernen Vorhang belauscht werden. Jetzt stellt sich die Frage, ob immer noch in dieselbe Richtung gehorcht wird. Wie „Die Presse“ erfuhr, verhalfen die Österreicher der NSA zu Informationen, die 2007 zur Ergreifung einer deutschen Terrorzelle, der Sauerland-Gruppe, geführt haben.
Mit den abgefangenen Daten hat das Bundesheer laut „Profil“ immer schon wenig anfangen können. Die Bänder seien stets zu einer US-Station nahe Frankfurt geflogen worden. Wie „Die Presse“ berichtete, hat die NSA im Kalten Krieg einen Vertrag mit dem HNA abgeschlossen. In den Nullerjahren, nach den Terroranschlägen vom 11. September 2001, soll das Dokument erneuert und ergänzt worden sein. Das bestätigten mehrere Quellen, sowohl Politiker als auch hochrangige Beamte aus dem Sicherheitsbereich. Das Verteidigungsministerium wollte sich nichtdazu äußern, die US-Botschaft in Wien ebenso wenig, sie betonte jedoch die „sehr gute Kooperation mit dem österreichischen Militär und den österreichischen Nachrichtendiensten“.
FPÖ-Chef Heinz-Christian Strache forderte Bundeskanzler Faymann und Verteidigungsminister Klug auf, unverzüglich Stellung zum Geheimvertrag mit der NSA zu nehmen. Es müsse überprüft werden, inwieweit die Neutralität verletzt worden sei.
13.07.2013 | 17:57 | von CHRISTIAN ULTSCH (Die Presse)
Find this story at 13 July 2013
© 2013 DiePresse.com
NSA hat Vertrag mit Österreich abgeschlossen16 augustus 2013
Die National Security Agency schloss im Kalten Krieg eine Vereinbarung mit dem Heeresnachrichtenamt und finanzierte dessen Horchposten bei Hainburg. Im Krieg gegen den Terror haben Österreich und die USA das Abkommen erneuert.
Es ist eines der großen Geheimnisse der Republik, aber wirklich gut gehütet ist es nicht: Das neutrale Österreich hat mit dem US-Nachrichtendienst NSA (National Security Agency) einen Vertrag abgeschlossen. Darin sind die Rahmenbedingungen für die Zusammenarbeit und den Informationsaustausch zwischen der US-Überwachungsbehörde und dem Heeresnachrichtenamt HNaA, dem Auslandsnachrichtendienst des österreichischen Bundesheeres, festgelegt. Seine Wurzeln hat das Dokument im Kalten Krieg, doch nach den Terroranschlägen vom 11. September 2001 hat es der damalige NSA-Direktor, Michael Hayden, erneuern lassen. Das erfuhr „Die Presse“ aus mehreren Quellen: von österreichischen Politikern und hochrangigen Beamten im Sicherheitsbereich.
Die erste Wahl bei politischer Berichterstattung!
Für alle, die im Superwahljahr 2013 objektiv und bestens informiert sein wollen, gibt´s jetzt die “Presse” und die “Presse am Sonntag” 8 Wochen um 8 Euro. Weitere Informationen »
Michael Bauer, der Sprecher des Verteidigungsministeriums, will die Existenz des NSA-Vertrags mit Österreich weder bestätigen noch dementieren: „Ich kann dazu nichts sagen.“ Auch die US-Botschaft in Wien äußert sich nicht zu der Vereinbarung. Sie weist jedoch ausdrücklich auf die „sehr gute Kooperation mit dem österreichischen Militär und den österreichischen Nachrichtendiensten“ hin.
Minister Klug schweigt
Die NSA war zuletzt auch Thema im parlamentarischen Unterausschuss für Landesverteidigung. Doch Verteidigungsminister Gerald Klug zog es vor, über den Vertrag zu schweigen. Dass das Heeresnachrichtenamt als Kontaktstelle für die NSA fungiert, ist bekannt. Das Verteidigungsressort hat diesen Umstand nach einem Bericht der „Presse“ vom 13. Juni nicht abgestritten. Damals wie heute betont das Ministerium jedoch, dass das HNaA keinen Massenaustausch von Daten mit anderen Nachrichtendiensten betreibe.
Wie breit der Fluss österreichischer Daten in die USA ist, darüber gehen die Einschätzungen auseinander. Ein Geheimdienst-Insider gab sich gegenüber der „Presse“ überzeugt, dass die Amerikaner in der Lage sind, jegliche elektronische Kommunikation abzufangen. Allein mithilfe ihres Überwachungsprogramms Prism kann die NSA die Verbindungsdaten jeglichen Internetverkehrs aufzeichnen, der über US-Server läuft. Das gestand der US-Botschafter in Wien bei einem Treffen mit Innenministerin Johanna Mikl-Leitner ein. Nachzuvollziehen ist ihre Empörung nicht ganz. Denn ihr Verfassungsschutz ist im Bild über die Aktivitäten der NSA in Österreich.
Die Amerikaner sind unglücklich über den Verlauf der Diskussion seit den Enthüllungen des Ex-NSA-Mitarbeiters Snowden. Denn ihre Dienste nehmen nicht nur, sie geben auch. So halfen sie jüngst bei der Befreiung der österreichischen Geisel im Jemen. Umgekehrt lieferte Österreich angeblich Informationen an die NSA, die 2007 zur Ergreifung der Sauerland-Gruppe, einer deutschen Terrorzelle, führten.
Die Partnerschaft zwischen österreichischen und US-Geheimdiensten reicht lang zurück, in die Zeit, als Europa noch geteilt war. Einer ihrer Brennpunkte war immer die Königswarte, ein Horchposten des Heeresnachrichtenamts bei Hainburg an der Grenze zur Slowakei, dort, wo früher der Eiserne Vorhang verlief. Die Österreicher waren in der Lage, von den niederen Karpaten aus tief in das sowjetische Imperium hineinzuhören. Ihre Informationen teilten sie zuweilen mit den Amerikanern.
Unterschrieb Platter das Papier?
Auch 24 Jahre nach Ende des Kalten Kriegs ist die Lauschstation des HNaA noch in Betrieb. Vor einiger Zeit wurde sie erneuert. In Militärkreisen kursieren Gerüchte, dass die teure Ausrüstung auf der Königswarte aus den USA stamme. Unter anderem das sei in einem Appendix zum NSA-Vertrag mit Hayden in den Nullerjahren vereinbart worden. Das Papier soll die Unterschrift von Günther Platter tragen, der 2003 bis 2007 Verteidigungsminister war. Im Büro des heutigen Tiroler Landeshauptmannes will man davon nichts wissen.
Michael Bauer, der Sprecher des Verteidigungsministeriums, bestreitet, dass die Amerikaner die Renovierung der Königswarte finanziert hätten. Ob sie freilich Equipment zur Verfügung stellten, kann der Oberst nicht sagen. Was er jedoch bestätigen kann, ist für das historische Selbstverständnis Österreichs brisant: „Die Königswarte war zur Zeit des Kalten Krieges ein Vorposten der Amerikaner. Sie haben die Anlage finanziell unterstützt.“ Wirklich neutral agierte Österreich schon damals nicht.
(“Die Presse” Printausgabe vom 13.07.2013)
12.07.2013 | 17:08 | VON RAINER NOWAK UND CHRISTIAN ULTSCH (Die Presse)
Find this story at 12 July 2013
© 2013 DiePresse.com
The NSA’s mass and indiscriminate spying on Brazilians16 augustus 2013
As it does in many non-adversarial countries, the surveillance agency is bulk collecting the communications of millions of citizens of Brazil
Follow Glenn Greenwald on security and liberty by emailBeta
The National Security Administration headquarters in Fort Meade, Maryland. Whistleblower Edward Snowden worked as a data miner for the NSA in Hawaii. Photograph: Jim Lo Scalzo/EPA
I’ve written an article on NSA surveillance for the front page of the Sunday edition of O Globo, the large Brazilian newspaper based in Rio de Janeiro. The article is headlined (translated) “US spied on millions of emails and calls of Brazilians”, and I co-wrote it with Globo reporters Roberto Kaz and Jose Casado. The rough translation of the article into English is here. The main page of Globo’s website lists related NSA stories: here.
As the headline suggests, the crux of the main article details how the NSA has, for years, systematically tapped into the Brazilian telecommunication network and indiscriminately intercepted, collected and stored the email and telephone records of millions of Brazilians. The story follows an article in Der Spiegel last week, written by Laura Poitras and reporters from that paper, detailing the NSA’s mass and indiscriminate collection of the electronic communications of millions of Germans. There are many more populations of non-adversarial countries which have been subjected to the same type of mass surveillance net by the NSA: indeed, the list of those which haven’t been are shorter than those which have. The claim that any other nation is engaging in anything remotely approaching indiscriminate worldwide surveillance of this sort is baseless.
As those two articles detail, all of this bulk, indiscriminate surveillance aimed at populations of friendly foreign nations is part of the NSA’s “FAIRVIEW” program. Under that program, the NSA partners with a large US telecommunications company, the identity of which is currently unknown, and that US company then partners with telecoms in the foreign countries. Those partnerships allow the US company access to those countries’ telecommunications systems, and that access is then exploited to direct traffic to the NSA’s repositories. Both articles are based on top secret documents provided by Edward Snowden; O Globo published several of them.
The vast majority of the GuardianUS’s revelations thus far have concerned NSA domestic spying: the bulk collection of telephone records, the PRISM program, Obama’s presidential directive that authorizes domestic use of cyber-operations, the Boundless Informant data detailing billions of records collected from US systems, the serial falsehoods publicly voiced by top Obama officials about the NSA’s surveillance schemes, and most recently, the bulk collection of email and internet metadata records for Americans. Future stories in the GuardianUS will largely continue to focus on the NSA’s domestic spying.
But contrary to what some want to suggest, the privacy rights of Americans aren’t the only ones that matter. That the US government – in complete secrecy – is constructing a ubiquitous spying apparatus aimed not only at its own citizens, but all of the world’s citizens, has profound consequences. It erodes, if not eliminates, the ability to use the internet with any remnant of privacy or personal security. It vests the US government with boundless power over those to whom it has no accountability. It permits allies of the US – including aggressively oppressive ones – to benefit from indiscriminate spying on their citizens’ communications. It radically alters the balance of power between the US and ordinary citizens of the world. And it sends an unmistakable signal to the world that while the US very minimally values the privacy rights of Americans, it assigns zero value to the privacy of everyone else on the planet.
This development – the construction of a worldwide, ubiquitous electronic surveillance apparatus – is self-evidently newsworthy, extreme, and dangerous. It deserves transparency. People around the world have no idea that all of their telephonic and internet communications are being collected, stored and analyzed by a distant government. But that’s exactly what is happening, in secrecy and with virtually no accountability. And it is inexorably growing, all in the dark. At the very least, it merits public understanding and debate. That is now possible thanks solely to these disclosures.
The Guardian’s reporting
One brief note on the Guardian is merited here: I’ve been continuously amazed by how intrepid, fearless and committed the Guardian’s editors have been in reporting these NSA stories as effectively and aggressively as possible. They have never flinched in reporting these stories, have spared no expense in pursuing them, have refused to allow vague and baseless government assertions to suppress any of the newsworthy revelations, have devoted extraordinary resources to ensure accuracy and potency, and have generally been animated by exactly the kind of adversarial journalistic ethos that has been all too lacking over the last decade or so (see this Atlantic article from yesterday highlighting the role played by the Guardian US’s editor-in-chief, Janine Gibson).
I don’t need to say any of this, but do so only because it’s so true and impressive: they deserve a lot of credit for the impact these stories have had. To underscore that: because we’re currently working on so many articles involving NSA domestic spying, it would have been weeks, at least, before we would have been able to publish this story about indiscriminate NSA surveillance of Brazilians. Rather than sit on such a newsworthy story – especially at a time when Latin America, for several reasons, is so focused on these revelations – they were enthused about my partnering with O Globo, where it could produce the most impact. In other words, they sacrificed short-term competitive advantage for the sake of the story by encouraging me to write this story with O Globo. I don’t think many media outlets would have made that choice, but that’s the kind of journalistic virtue that has driven the paper’s editors from the start of this story.
This has been a Guardian story from the start and will continue to be. Snowden came to us before coming to any other media outlet, and I’ll continue to write virtually all NSA stories right in this very space. But the O Globo story will resonate greatly in Brazil and more broadly in Latin America, where most people had no idea that their electronic communications were being collected in bulk by this highly secretive US agency. For more on how the Guardian’s editors have overseen the reporting of the NSA stories, see this informative interview on the Charlie Rose Show from last week with Gibson and Guardian editor-in-chief Alan Rusbridger:
Glenn Greenwald
theguardian.com, Sunday 7 July 2013 00.32 BST
Find this story at 7 July 2013
© 2013 Guardian News and Media Limited or its affiliated companies. All rights reserved.
Brazil wants answers on US surveillance16 augustus 2013
Foreign Minister Antonio Patriota is deeply concerned about the scope of a US monitoring programme targeting Brazilians.
Whistleblower Edward Snowden revealed top secret US surveillance programmes to alert the public [Reuters]
Brazil’s foreign minister has said his government is worried by a report that the United States has collected data on millions of telephone and email conversations in his country and promised to push for international protection of internet privacy.
Foreign Minister Antonio Patriota on Sunday expressed “deep concern at the report that electronic and telephone communications of Brazilian citizens are being the object of espionage by organs of American intelligence.
“The Brazilian government has asked for clarifications” through the US Embassy in Brazil and Brazil’s embassy in Washington, he said.
Patriota also said Brazil will ask the UN for measures “to impede abuses and protect the privacy” of internet users, laying down rules for governments.
The O Globo newspaper reported over the weekend that information released by NSA leaker Edward Snowden shows that the number of telephone and email messages logged by the US National Security Agency in January alone was not
far behind the 2.3 million reportedly collected in the United States.
The spokesman for the US embassy in Brazil’s capital, Dean Chaves, said earlier that any response to the O Globo report would be issued in Washington.
There was no immediate response from the office of the US national intelligence director’s office on Sunday, but in response to earlier reports of covert monitoring in Europe, the office said it would respond to concerns of specific nations through diplomatic channels.
However, “as a matter of policy, we have made clear that the United States gathers foreign intelligence of the type gathered by all nations,” last month’s statement said, without providing further details.
The chairman of the US Joint Chiefs of Staff warned Sunday that Snowden’s overall disclosures have undermined US relationships with other countries and affected what he calls “the importance of trust”.
O Globo’s article said that “Brazil, with extensive digitalised public and private networks operated by large telecommunications and internet companies, appears to stand out on maps of the US agency as a priority target for telephony and data traffic, alongside nations such as China, Russia and Pakistan.”
The report did not describe the sort of data collected, but the US programs appear to gather what is called metadata: Logs of message times, addresses and other information rather than the content of the messages.
The report was co-authored by US journalist Glenn Greenwald, who has been key in earlier reports on Snowden’s revelations.
In a column Sunday for the British-based newspaper The Guardian, Greenwald said that “the NSA has, for years, systematically tapped into the Brazilian telecommunication network and indiscriminately intercepted, collected and stored the email and telephone records of millions of Brazilians.”
He said Brazil was merely an example of a global practice.
Last Modified: 07 Jul 2013 20:49
Find this story at 7 July 2013
© www.aljazeera.com
XKeyscore: NSA tool collects ‘nearly everything a user does on the internet’16 augustus 2013
• XKeyscore gives ‘widest-reaching’ collection of online data
• NSA analysts require no prior authorization for searches
• Sweeps up emails, social media activity and browsing history
• NSA’s XKeyscore program – read one of the presentations
One presentation claims the XKeyscore program covers ‘nearly everything a typical user does on the internet’
A top secret National Security Agency program allows analysts to search with no prior authorization through vast databases containing emails, online chats and the browsing histories of millions of individuals, according to documents provided by whistleblower Edward Snowden.
The NSA boasts in training materials that the program, called XKeyscore, is its “widest-reaching” system for developing intelligence from the internet.
The latest revelations will add to the intense public and congressional debate around the extent of NSA surveillance programs. They come as senior intelligence officials testify to the Senate judiciary committee on Wednesday, releasing classified documents in response to the Guardian’s earlier stories on bulk collection of phone records and Fisa surveillance court oversight.
The files shed light on one of Snowden’s most controversial statements, made in his first video interview published by the Guardian on June 10.
“I, sitting at my desk,” said Snowden, could “wiretap anyone, from you or your accountant, to a federal judge or even the president, if I had a personal email”.
US officials vehemently denied this specific claim. Mike Rogers, the Republican chairman of the House intelligence committee, said of Snowden’s assertion: “He’s lying. It’s impossible for him to do what he was saying he could do.”
But training materials for XKeyscore detail how analysts can use it and other systems to mine enormous agency databases by filling in a simple on-screen form giving only a broad justification for the search. The request is not reviewed by a court or any NSA personnel before it is processed.
XKeyscore, the documents boast, is the NSA’s “widest reaching” system developing intelligence from computer networks – what the agency calls Digital Network Intelligence (DNI). One presentation claims the program covers “nearly everything a typical user does on the internet”, including the content of emails, websites visited and searches, as well as their metadata.
Analysts can also use XKeyscore and other NSA systems to obtain ongoing “real-time” interception of an individual’s internet activity.
Under US law, the NSA is required to obtain an individualized Fisa warrant only if the target of their surveillance is a ‘US person’, though no such warrant is required for intercepting the communications of Americans with foreign targets. But XKeyscore provides the technological capability, if not the legal authority, to target even US persons for extensive electronic surveillance without a warrant provided that some identifying information, such as their email or IP address, is known to the analyst.
One training slide illustrates the digital activity constantly being collected by XKeyscore and the analyst’s ability to query the databases at any time.
The purpose of XKeyscore is to allow analysts to search the metadata as well as the content of emails and other internet activity, such as browser history, even when there is no known email account (a “selector” in NSA parlance) associated with the individual being targeted.
Analysts can also search by name, telephone number, IP address, keywords, the language in which the internet activity was conducted or the type of browser used.
One document notes that this is because “strong selection [search by email address] itself gives us only a very limited capability” because “a large amount of time spent on the web is performing actions that are anonymous.”
The NSA documents assert that by 2008, 300 terrorists had been captured using intelligence from XKeyscore.
Analysts are warned that searching the full database for content will yield too many results to sift through. Instead they are advised to use the metadata also stored in the databases to narrow down what to review.
A slide entitled “plug-ins” in a December 2012 document describes the various fields of information that can be searched. It includes “every email address seen in a session by both username and domain”, “every phone number seen in a session (eg address book entries or signature block)” and user activity – “the webmail and chat activity to include username, buddylist, machine specific cookies etc”.
Email monitoring
In a second Guardian interview in June, Snowden elaborated on his statement about being able to read any individual’s email if he had their email address. He said the claim was based in part on the email search capabilities of XKeyscore, which Snowden says he was authorized to use while working as a Booz Allen contractor for the NSA.
One top-secret document describes how the program “searches within bodies of emails, webpages and documents”, including the “To, From, CC, BCC lines” and the ‘Contact Us’ pages on websites”.
To search for emails, an analyst using XKS enters the individual’s email address into a simple online search form, along with the “justification” for the search and the time period for which the emails are sought.
The analyst then selects which of those returned emails they want to read by opening them in NSA reading software.
The system is similar to the way in which NSA analysts generally can intercept the communications of anyone they select, including, as one NSA document put it, “communications that transit the United States and communications that terminate in the United States”.
One document, a top secret 2010 guide describing the training received by NSA analysts for general surveillance under the Fisa Amendments Act of 2008, explains that analysts can begin surveillance on anyone by clicking a few simple pull-down menus designed to provide both legal and targeting justifications. Once options on the pull-down menus are selected, their target is marked for electronic surveillance and the analyst is able to review the content of their communications:
Chats, browsing history and other internet activity
Beyond emails, the XKeyscore system allows analysts to monitor a virtually unlimited array of other internet activities, including those within social media.
An NSA tool called DNI Presenter, used to read the content of stored emails, also enables an analyst using XKeyscore to read the content of Facebook chats or private messages.
An analyst can monitor such Facebook chats by entering the Facebook user name and a date range into a simple search screen.
Analysts can search for internet browsing activities using a wide range of information, including search terms entered by the user or the websites viewed.
As one slide indicates, the ability to search HTTP activity by keyword permits the analyst access to what the NSA calls “nearly everything a typical user does on the internet”.
The XKeyscore program also allows an analyst to learn the IP addresses of every person who visits any website the analyst specifies.
The quantity of communications accessible through programs such as XKeyscore is staggeringly large. One NSA report from 2007 estimated that there were 850bn “call events” collected and stored in the NSA databases, and close to 150bn internet records. Each day, the document says, 1-2bn records were added.
William Binney, a former NSA mathematician, said last year that the agency had “assembled on the order of 20tn transactions about US citizens with other US citizens”, an estimate, he said, that “only was involving phone calls and emails”. A 2010 Washington Post article reported that “every day, collection systems at the [NSA] intercept and store 1.7bn emails, phone calls and other type of communications.”
The XKeyscore system is continuously collecting so much internet data that it can be stored only for short periods of time. Content remains on the system for only three to five days, while metadata is stored for 30 days. One document explains: “At some sites, the amount of data we receive per day (20+ terabytes) can only be stored for as little as 24 hours.”
To solve this problem, the NSA has created a multi-tiered system that allows analysts to store “interesting” content in other databases, such as one named Pinwale which can store material for up to five years.
It is the databases of XKeyscore, one document shows, that now contain the greatest amount of communications data collected by the NSA.
In 2012, there were at least 41 billion total records collected and stored in XKeyscore for a single 30-day period.
Legal v technical restrictions
While the Fisa Amendments Act of 2008 requires an individualized warrant for the targeting of US persons, NSA analysts are permitted to intercept the communications of such individuals without a warrant if they are in contact with one of the NSA’s foreign targets.
The ACLU’s deputy legal director, Jameel Jaffer, told the Guardian last month that national security officials expressly said that a primary purpose of the new law was to enable them to collect large amounts of Americans’ communications without individualized warrants.
“The government doesn’t need to ’target’ Americans in order to collect huge volumes of their communications,” said Jaffer. “The government inevitably sweeps up the communications of many Americans” when targeting foreign nationals for surveillance.
An example is provided by one XKeyscore document showing an NSA target in Tehran communicating with people in Frankfurt, Amsterdam and New York.
In recent years, the NSA has attempted to segregate exclusively domestic US communications in separate databases. But even NSA documents acknowledge that such efforts are imperfect, as even purely domestic communications can travel on foreign systems, and NSA tools are sometimes unable to identify the national origins of communications.
Moreover, all communications between Americans and someone on foreign soil are included in the same databases as foreign-to-foreign communications, making them readily searchable without warrants.
Some searches conducted by NSA analysts are periodically reviewed by their supervisors within the NSA. “It’s very rare to be questioned on our searches,” Snowden told the Guardian in June, “and even when we are, it’s usually along the lines of: ‘let’s bulk up the justification’.”
In a letter this week to senator Ron Wyden, director of national intelligence James Clapper acknowledged that NSA analysts have exceeded even legal limits as interpreted by the NSA in domestic surveillance.
Acknowledging what he called “a number of compliance problems”, Clapper attributed them to “human error” or “highly sophisticated technology issues” rather than “bad faith”.
However, Wyden said on the Senate floor on Tuesday: “These violations are more serious than those stated by the intelligence community, and are troubling.”
In a statement to the Guardian, the NSA said: “NSA’s activities are focused and specifically deployed against – and only against – legitimate foreign intelligence targets in response to requirements that our leaders need for information necessary to protect our nation and its interests.
“XKeyscore is used as a part of NSA’s lawful foreign signals intelligence collection system.
“Allegations of widespread, unchecked analyst access to NSA collection data are simply not true. Access to XKeyscore, as well as all of NSA’s analytic tools, is limited to only those personnel who require access for their assigned tasks … In addition, there are multiple technical, manual and supervisory checks and balances within the system to prevent deliberate misuse from occurring.”
“Every search by an NSA analyst is fully auditable, to ensure that they are proper and within the law.
“These types of programs allow us to collect the information that enables us to perform our missions successfully – to defend the nation and to protect US and allied troops abroad.”
Glenn Greenwald
theguardian.com, Wednesday 31 July 2013 13.56 BST
Find this story at 31 July 2013
© 2013 Guardian News and Media Limited or its affiliated companies
Snooping Fears; German Firms Race to Shield Secrets16 augustus 2013
Edward Snowden’s revelations about data surveillance have left German firms feeling acutely vulnerable to industrial espionage. In the medium-sized business sector, which contains a host of world leaders in high-tech fields, the race is on to shield vital know-how.
Markus Stäudinger is a cautious person — especially when he’s sitting in front of his computer. He’s an IT security expert at Gustav Eirich, a southern German engineering company that makes industrial mixing equipment, and he has been encrypting his emails for years. “While I was typing I always had in the back of my mind that it could still be deciphered,” says Stäudinger, 48. He has tried to entrench that mindset in his company.
Stäudinger has spent years trying to enhance the security of Eirich’s data and communications. He kept telling colleagues to be careful when dealing with sensitive information. He installed extra security features on notebooks and smartphones before they were taken off company premises. Some of the firm’s 750 employees probably shook their heads at all this paranoia. But now, after the NSA revelations of whistleblower Edward Snowden, they all know that Stäudinger was right. “We were always aware that the intelligence services and business work closely together in the US,” said the IT expert. “When we heard about what’s been going on, it didn’t hit us completely out of the blue.”
Other companies were taken by surprise, though. Be it Prism, Tempora or XKeyscore, reports about mass electronic surveillance and tapped Internet hubs and trans-Atlantic data lines have alarmed German companies. Many firms are now worried that the intelligence services aren’t just trying to pinpoint terrorists but to get at German industrial secrets as well. They fear that their lead over US, British and French competitors could be at risk. And they’ve suddenly realized that they’ve got to do something to protect themselves against the organized theft of data.
“The reports of the activities of intelligence services are a wake-up call for many companies. It sent alarm bells ringing,” said Rainer Glatz, director of product and know-how protection at the VDMA German engineering association. In the past, warnings of hacker attacks and IT espionage often fell on deaf ears. But now Germany’s small and medium-sized business sector, or Mittelstand, often described as the backbone of the German economy, has woken up to the risk. “There is growing sensitivity,” said Glatz. “In many firms, the management boards are now thinking about how they can shield themselves better.”
Spying Causes Billions of Euros in Damage
Action is urgently needed. At most, only one in four Mittelstand firms has an IT security strategy, said Christian Schaaf, founder of the Munich-based consultancy Corporate Trust. Many have limited themselves to a simple firewall and a few anti-virus programs. But that’s not enough to keep out professional hackers, let alone the likes of the NSA. “Many companies are starting to realize that they have to cast a safety net over their data,” said Schaaf.
There’s plenty to spy on in the Mittelstand, with its thousands of high-tech businesses, ranging from newly developed products to production processes and process control systems, as well as customer lists and price offers in contract tenders. Germany’s domestic intelligence agency, the Office for the Protection of the Constitution, estimates that industrial espionage causes damage totalling between €30 billion and €60 billion ($40 billion to $80 billion) per year. No one knows the exact figure because companies in Germany and across Europe tend to keep quiet when they find out they have been spied on. There are a number of reasons for this: They’re afraid of copycat espionage, they don’t want to reveal to potential new attackers where their weak points are and what they’re doing to protect themselves. And they’re afraid that they may lose customers if their data leaks become public.
Engineering company Gustav Eirich would be worth spying on. The 150-year-old, family-owned business from Hardheim in the Odenwald region of southern Germany is among the world leaders in its field. Eirich’s machines can mix chemicals and all sorts of materials faster, more thoroughly and more efficiently than those of its international competitors. This is thanks to a host of inventions and innovations that the company has had patented. “Our know-how is our big competitive advantage,” said security chief Stäudinger. And Eirich is doing all it possibly can to protect that lead.
Possible Boost For German Data Security Firms
The company refrains from storing information in foreign data processing centers. Video conferences, data transmission and emails — Eirich handles all that via its own cloud server. Skype is forbidden, and the use of Facebook is discouraged. All staff members are given clear instructions to avoid any unintentional releases of sensitive data. As a rule, the company encrypts all emails it sends outside the firm, if the clients go along with that, and they use German software to do the encrypting. “With US programs the intelligence agency will definitely have the general key,” said Stäudinger. “That’s why we try to use domestic products whenever we can.” In Germany, security authorities usually don’t get access to the algorhythms of firms that offer encryption.
Germany’s comparatively strict rules on data privacy protection represent a possible competitive advantage for German suppliers of IT security. Data processing centers based in Germany have been enjoying a strong increase in demand of late, said Gatz, VDMA’s IT security expert. Providers of private clouds such as Demando, a subsdiary of the Kaiserslautern municipal utility company, offer their customers their own server cabinets and can even make exclusive glass fiber lines available to them so that they don’t have to send sensitive data through the Internet.
However, even such lines can be tapped into, and almost every encryption code can be cracked. “You can never guarantee 100 percent security,” said Stäudinger. “We know there’s a residual risk. But we set the hurdles as high as possible.” Maybe that will make potential attackers seek easier targets: among companies with less distrustful security chiefs.
07/23/2013 06:04 PM
By Claus Hecking
Find this story at 23 July 2013
© SPIEGEL ONLINE 2013
Ghosts of the NSA Relics of Cold War Spying Dot Germany16 augustus 2013
The National Security Agency has long been active in Germany, though much of its spying was conducted against the Eastern Bloc during the Cold War. Today, former listening stations and other facilities dot the German landscape.
Tracking down traces of the National Security Agency in Germany isn’t particularly difficult. One merely has to head to Berlin and look for the city’s highest point. It can be found in the southwest corner of the city — Teufeslberg, or “Devil’s Mountain.” Made of piled up rubble gathered from Berlin following World War II, the “mountain” rises 115 meters (377 feet) above the nearby waterway known as the Havel.
In the winter, it is the place where Berliners meet to sled; in the summer it is a haven for mountain bikers and daytrippers. And hobby historians: At the very top of the hill stands the most famous NSA relict in Germany — five gigantic white radar balls. The listening station was used until the end of the Cold War, primarily to spy on the east.
Teufelsberg used to be part of the NSA’s global espionage network called Echelon, which the US intelligence service used to keep an eye on Moscow. From 1957 to 1991, the NSA maintained a presence on Teufelsberg and eavesdropped on satellite-based telephone conversations, filtered fax reports and analyzed Internet datasets. The NSA was still doing all that in 2013, as SPIEGEL recently reported, but it no longer requires the massive radar towers.
Desolate and in Disrepair
Today, the artificial hill looks desolate. When the Americans withdrew, the listening station began to fall into disrepair. The covering on the radomes is torn in many places, and inside the facility weeds are growing out of the debris.
But it’s not just weather and age that have led the buildings to deteriorate. Shortly after the turn of the century, the government of the city-state of Berlin decided that guarding the empty facility had become too expensive. It then became the target of regular break-ins and vandalism. Rotraud von der Heide, an artist and the curator of the Initiative Teufelsberg, a group seeking to preserve the facility, says, “the facility is totally destroyed because private owners weren’t able to carry out their construction plans, and now the building permits have expired. For the past year-and-a-half, two young people have been leasing it.” Originally, a conference hotel had been envisioned for the site, but those plans ultimately failed.
Those leasing the site are now responsible for security at the facility. Using revenues generated through frequent tours, they are financing the constant repairs required for the fence surrounding property. “New holes are cut in the fence every night, and we turn trespassers over to the police,” said von der Heide. “Earlier, people had parties in the facility. There were also copper thieves who ripped wires out of the walls. That’s no longer possible now.”
Big Plans
The initiative has big plans for the hill. During Germany’s “Day of Open Monuments,” in September, they plan to open the former listening station to the public for three days.
By then, von der Heide plans to completely transform the area into one giant artwork. “The hill is becoming more and more fantastic. It’s a magical art space that is constantly changing,” the artist says. That’s also a product of anonymous graffiti artists whose paintings cover the massive walls and the insides of the radomes, she says.
A second NSA listening station in Germany, located some 200 kilometers to the west — represents the opposite extreme. Whereas the Teufelsberg radomes were difficult to ignore, the facility in Schöningen, near Braunschweig, was more hidden. Mayor Henry Bäsecke says that there was an American facility in the nearby forest consisting of “containers and large antennas. But the facility has since been torn down. “There’s nothing left here, and nature is slowly reconquering the property,” Bäsecke says.
At Least 17 Surveillance Hubs at Cold War Peak
Some 50 kilometers south of Munich is yet another listening post of note. Bad Aibling the southernmost facility in a chain of such espionage centers operated in Germany by US intelligence agencies. In 1989, shortly before the end of the Cold War, SPIEGEL counted 17 such surveillance hubs. But it’s a figure that may have been even higher. The network extended from the town of Schleswig near the Danish border right down to the edge of the Alps. Most of the facilities were located close to the former border between West and East Germany, as close as possible to the enemy.
In Bad Aibling, the outsized radomes of the disused listening station also dominate the landscape. In 2004, the Americans left, but Germany’s foreign intelligence agency, the BND, continues to operate nearby. The 17,000 resident city is hard at work transforming the 134 hectare (331 acre) property for civilian use. The community has already turned a small part of the property into sporting facilities, Peter Schmid of the city administration says. Here, local teams play football in the shadows of the radomes. The rest is to be built up by a property developer, with plans for a zero-energy settlement to be constructed.
Still, the area’s eventful history hasn’t been forgotten. Since 2009, it has hosted an annual electro- and house-music festival that attracted 17,000 fans last year to revel between the radar towers and a former aircraft hangar. The name of the two-day festival recalls the American spy network: The Echelon festival.
07/05/2013 03:24 PM
By Johannes Korge
Find this story at 5 July 2013
© SPIEGEL ONLINE 2013
„Prism ist nur die Spitze des Eisbergs“ NSA-Mitarbeiter: BND nutzt seit den 90ern Spähsoftware16 augustus 2013
Eine Kuppel der ehemaligen Abhörstation der NSA auf dem Teufelsberg in Berlin
Der BND und der US-Geheimdienst NSA arbeiten offenbar bereits 20 Jahre bei der Datenspionage zusammen. Einem Medienbericht zufolge wurden entsprechende Spähprogramme schon früher geteilt. Auch Kanzlerin Merkel könnte ausspioniert worden sein.
Die Zusammenarbeit des Bundesnachrichtendienstes BND und der amerikanischen National Security Agency (NSA) bei der Nutzung von Spähsoftware war offenbar schon in den 1990er-Jahren intensiver als bislang bekannt. In einem Gespräch mit dem Magazin „Stern“ sagte der langjährige NSA-Mitarbeiter William Binney, der BND habe neben „Xkeyscore“ noch ein weiteres NSA-Ausspähprogramm genutzt. Der Entschlüsselungsspezialist arbeitete mehr als 30 Jahre in leitender Funktion bei der NSA und war viele Jahre auch für die technische Zusammenarbeit mit dem BND zuständig.
Laut Binney soll die Zusammenarbeit im Bereich der Spähsoftware bereits Anfang der 1990er-Jahre begonnen haben. 1999 habe der BND von der NSA den Quellcode zum damals entwickelten Spähprogramm „Thin Thread“ erhalten. „Thin Thread“ sollte die Erfassung und Analyse von Verbindungsdaten wie Telefondaten, E-Mails oder Kreditkartenrechnungen weltweit ermöglichen. „Mein Ziel war es, den Datenverkehr der ganzen Welt zu erfassen“, sagte Binney dem „Stern“. Der BND sei „bis heute einer unserer wichtigsten Partner“.
Mindestens 50 Spähprogramm lieferten Daten
Auf der Basis von „Thin Thread“ sei eine Vielzahl von Abhör- und Spähprogrammen entwickelt worden. Eines der wichtigsten davon soll das Dachprogramm „Stellar Wind“ sein, dem nach Angaben von Binney mindestens 50 Spähprogramme Daten zugeliefert haben – auch die durch Edward Snowden bekannt gewordene Software „Prism“ zur direkten Erfassung von Telefon- und Internetdaten bei Telekommunikationsunternehmen.
„Stellar Wind“ sei mindestens bis 2009, möglicherweise auch bis 2011 im Einsatz gewesen. Es werde heute wahrscheinlich unter anderem Namen fortgeführt, so Binney gegenüber dem Magazin.
Nach Schätzungen von Binney speichert die NSA mittlerweile zwischen 40 und 50 Billionen Telefonate und E-Mails aus der ganzen Welt, vor allem Verbindungsdaten, aber auch Inhalte. Das von der NSA zurzeit gebaute Datenzentrum in Bluffdale im US-Bundesstaat Utah könne aufgrund seiner Kapazitäten „mindestens 100 Jahre der globalen Kommunikation speichern“, sagte Binney dem „Stern“. „Dieser Ort sollte uns endgültig in Angst und Schrecken versetzen. Die NSA will alles. Jederzeit.“ Er fügte hinzu: „Diese Macht gefährdet unsere Demokratie.“
Regierungskommunikation im Visier der NSA
Neben William Binney äußerten sich im „Stern“ zwei weitere ehemalige ranghohe NSA-Mitarbeiter, die zu Whistleblowern wurden: J. Kirk Wiebe, der für die Datenanalyse zuständig war, und Thomas Drake, der zur Führungsebene des Geheimdienstes gehörte. Binney trat im Oktober 2001 aus Protest gegen die NSA-Spähprogramme unter der Regierung von George W. Bush von seinem Posten zurück.
Die Ex-Geheimdienstler halten es für möglich, dass selbst Daten von Kanzlerin Angela Merkels Handy auf den Servern der NSA landen. „Prism ist nur die Spitze des Eisbergs“, so Drake gegenüber dem „Stern“. „Ihre Kanzlerin könnte sich einmal für das Programm „Ragtime“ interessieren. Es dient unter anderem der Abschöpfung von Regierungskommunikation durch die NSA“. Auch Binney hält das Ausspionieren von Merkels Verbindungsdaten für nicht ausgeschlossen. „Ich würde sogar sagen, dass es durchaus möglich ist“, sagte er dem Magazin.
Mittwoch, 24.07.2013, 16:59
Find this story at 24 July 2013
© FOCUS Online 1996-2013
BND nutzte bislang unbekanntes NSA-Spähprogramm16 augustus 2013
Im stern packen drei Ex-NSA-Mitarbeiter aus: Der BND nutzte seit Anfang der 90er Jahre ein bislang unbekanntes Spähprogramm. Für die Kanzlerin könnte der Begriff “Ragtime” wichtig werden. Von Katja Gloger
“Hallo, Merkel am Apparat.”: Womöglich landen auf den Servern der NSA auch Handydaten der Kanzlerin. Mit dem Programm “Ragtime” spioniert die NSA Kommunikation von Regierungen aus.
© Rainer Jensen/DPA/LBN
Die Zusammenarbeit des Bundesnachrichtendienstes BND und der amerikanischen National Security Agency (NSA) bei der Nutzung von Spähsoftware war offenbar schon in den 90er Jahren intensiver als bislang bekannt. In einem Gespräch mit dem stern sagte der langjährige NSA-Mitarbeiter William Binney, der BND habe neben “Xkeyscore” noch ein weiteres NSA-Ausspähprogramm genutzt. Der Entschlüsselungsspezialist arbeitete mehr als 30 Jahre in leitender Funktion bei der NSA und war viele Jahre auch für die technische Zusammenarbeit mit dem BND zuständig.
BND hatte den Quellcode
Laut Binney soll die Zusammenarbeit im Bereich der Spähsoftware bereits Anfang der 90er Jahre begonnen haben. 1999 habe der BND von der NSA den Quellcode zum damals entwickelten Spähprogramm “Thin Thread” erhalten, zu Deutsch “dünner Faden”.
“Thin Thread” sollte die Erfassung und Analyse von Verbindungsdaten wie Telefondaten, E-Mails oder Kreditkartenrechnungen weltweit ermöglichen. “Mein Ziel war es, den Datenverkehr der ganzen Welt zu erfassen”, so Binney zum stern. Der BND sei “bis heute einer unserer wichtigsten Partner”.
Auf der Basis von “Thin Thread” wurde eine Vielzahl von Abhör- und Spähprogrammen entwickelt. Eines der wichtigsten davon soll das Dachprogramm “Stellar Wind” (“Sternwind”) sein, dem nach Angaben von Binney mindestens 50 Spähprogramme Daten zugeliefert haben – auch die durch Edward Snowden bekannt gewordene Software “Prism” zur direkten Erfassung von Telefon- und Internetdaten bei Telekommunikationsunternehmen. “Stellar Wind” war mindestens bis 2009, möglicherweise auch bis 2011 im Einsatz. Es werde, so Binney, heute wahrscheinlich unter anderem Namen fortgeführt.
Neues Datenzentrum kann 100 Jahre der globalen Kommunikation speichern
Nach Schätzung von Binney speichert die NSA mittlerweile zwischen 40 und 50 Billionen Telefonate und E-Mails aus der ganzen Welt, vor allem Verbindungsdaten, aber auch Inhalte. Das von der NSA zur Zeit gebaute Datenzentrum in Bluffdale im US-Bundesstaat Utah könne aufgrund seiner Kapazitäten “mindestens 100 Jahre der globalen Kommunikation speichern”, sagte Binney dem stern. “Dieser Ort sollte uns endgültig in Angst und Schrecken versetzen. Die NSA will alles. Jederzeit.” Und fügte hinzu: “Diese Macht gefährdet unsere Demokratie.”
Neben William Binney äußern sich im stern zwei weitere ehemalige ranghohe NSA-Mitarbeiter, die zu Whistleblowern (“Enthüllern”) wurden: J. Kirk Wiebe, der für die Datenanalyse zuständig war, und Thomas Drake, der zur Führungsebene des Geheimdienstes gehörte. Binney trat im Oktober 2001 aus Protest gegen die NSA-Spähprogramme unter der Regierung von George W. Bush von seinem Posten zurück.
Auch Merkels Handydaten womöglich auf NSA-Servern
Die Ex-Geheimdienstler halten es für möglich, dass selbst Daten von Kanzlerin Angela Merkels Handy auf den Servern der NSA landen. “Prism ist nur die Spitze des Eisbergs”, so Drake zum stern. “Ihre Kanzlerin könnte sich einmal für das Programm “Ragtime” interessieren. Es dient unter anderem der Abschöpfung von Regierungskommunikation durch die NSA”. Auch Binney hält das Ausspionieren von Merkels Verbindungsdaten für nicht ausgeschlossen: “Ich würde sogar sagen, dass es durchaus möglich ist.”
24. Juli 2013, 16:51 Uhr
Find this story at 24 July 2013
© stern.de
Skandale, Organisation, Geschichte NSA, Mossad und die verräterische Nackttänzerin – so spionieren die Geheimdienste14 augustus 2013
Eine Chronik der Geheimdienstarbeit: Von Meisterspionin Mata Hari bis zur Cyber-Spionage der NSA
Geheimdienste wie NSA, Mossad oder BND scheinen tun zu können, was sie wollen: Überwachen, ausspionieren, töten – ihre Methoden sind dabei nicht immer legal. FOCUS Online zeigt die interessantesten Geheimdienste der Welt, ihre Organisation, ihre Geschichte, ihre Skandale.
Die Enthüllungen des ehemaligen Geheimdienstlers Edward Snowden zeigen, wie zügellos und weit verbreitet heute abgehört wird. Dabei richtet sich die Arbeit der Geheimdienste nicht nur gegen Offizielle und Politiker. Auch ganz normale Bürger werden überwacht. Die Öffentlichkeit ist besorgt, Fragen nach der Kontrolle der Behörden drängen sich auf, die Menschen fordern Konsequenzen.
Dabei galten Geheimdienste schon immer als mysteriös und spannend. Doch die Realität ihrer Arbeit hat oft wenig mit den Meisterspionen a la James Bond oder „Mission Impossible“-Held Ethan Hunt zu tun. Die Behörden sammeln Daten, werten sie aus, informieren, desinformieren, verhandeln und tauschen. Ihr Netz haben sie über die ganze Welt ausgeworfen. Das zeigen nicht erst die Enthüllungen von Prism und Edward Snowden.
Eines der ältesten Gewerbe der Welt
„Spionage ist eines der ältesten Gewerbe der Welt“, erklärt der Historiker und Geheimdienstexperte Siegfried Beer im Gespräch mit FOCUS Online. Beer leitet das österreichische Center für „Intelligence, Propaganda & Security Studies“, kurz ACIPSS, in Graz. Das Wissen um den Feind sei für jeden Staat von entscheidender Bedeutung. Schon Alexander der Große, der makedonische Heeresführer, dessen Reich ungeheure Ausmaße annahm, verließ sich auf Spionage.
Das wurde ihm beinahe zum Verhängnis, wie Wolfgang Krieger in seiner „Geschichte der Geheimdienste“ zeigt: 333 v. Christus, bei Issus „berühmter Keilerei“, wurde Alexander falsch informiert. Seine Agenten sagten ihm, der Perserkönig und sein Heer seien noch weit entfernt – Tatsache war, dass sie aneinander vorbeimarschiert waren. Und Alexander so in umgekehrter Schlachtformation kämpfen musste – doch er siegte.
Eine Folge der Industrialisierung
„Organisierte, moderne Spionage gibt es aber erst seit etwa 130 Jahren“, erklärt der Geheimdienst-Experte Beer vom ACIPSS. „Großbritannien nahm eine Vorreiterrolle ein.“ Die Briten begannen in den 1870er-Jahren mit dem Aufbau eines Nachrichtendienstes: aus Angst vor den unterdrückten und rebellischen Iren. Das brachte die anderen Länder unter Zugzwang: Alle europäischen Großmächte des 19. Jahrhunderts gründeten ihrerseits nach und nach Geheimdienste.
„Die moderne Spionage ist eine Folge der Industrialisierung“, sagt Beer. Wegen der verbesserten Kommunikation, den schnellen Transportwegen und der beginnenden Globalisierung mussten die Regierungen umdenken. In den Weltkriegen und dem Kalten Krieg entwickelten sie neue Methoden, um ihre Feinde besser zu überwachen und sich entscheidende Vorteile zu sichern. Heute hat jedes Land eigene Geheimdienste. Nicht nur zur Spionage und Gegenspionage, sondern auch zur Sicherung eigener Daten. Und, vor allem nach 9/11, zur Terrorismusbekämpfung.
Geschichten aus Hunderten Jahren Spionage
Doch die Prism-Enthüllung ist nur eine in einer langen Reihe vergleichbarer Skandale. Seien es Spione, die überliefen, die gefährlichen Methoden des Mossad oder die Meisterspione des KGB. Seitdem es organisierte Spionage gibt, werden die verborgenen Tätigkeiten in regelmäßigen Abständen enthüllt. Und immer bieten sie genug Stoff für spektakuläre Geschichten. FOCUS Online stellt eine Auswahl der aktivsten und gefährlichsten Geheimdienste der Welt und ihre Methoden vor – und zeigt ihre brisantesten Skandale und berühmtesten Spione.
Deutschland – BND, BfV, MAD
Montage/Panther
In Deutschland sammelt unter anderem der Bundesnachrichtendienst Informationen
Organisation der deutschen Nachrichtendienste
Drei Nachrichtendienste teilen sich in Deutschland den Schutz der Bürger: Das Bundesamt für Verfassungsschutz (BfV) beobachtet das Inland, der Bundesnachrichtendienst das Ausland (BND), der militärische Abschirmdienst (MAD) kümmert sich um den Schutz der Armee. Die drei Behörden arbeiten großteils getrennt.
Geschichte des BND
Die Alliierten gaben 1949 die Struktur des Geheimdienstes in der Bundesrepublik vor. Dabei zogen sie vor allem die Lehren aus dem System des NS-Regiems: Die Geheime Staatspolizei, kurz Gestapo, hatte dort die Möglichkeit, eigenmächtig Verhaftungen durchzuführen. Das darf der Verfassungsschutz in Deutschland nicht. Die Nachrichtendienste haben generell keine polizeilichen Befugnisse.
Der BND ist als deutscher Auslandsgeheimdienst dem Kanzleramt unterstellt und wurde 1956 gegründet. Zu den Aufgabenbereichen gehört die Beobachtung mutmaßlicher Terroristen, der organisierten Kriminalität, illegaler Finanzströme, des Rauschgifthandels, der Weitergabe von ABC-Waffen und Rüstungsgütern sowie von Krisenregionen wie Afghanistan oder Pakistan. Dazu wertet der BND Informationen von menschlichen Quellen, elektronische Kommunikation sowie Satelliten- und Luftbilder aus. Er zählt etwa 6000 Mitarbeiter – vom Fahrer bis zum Nuklearphysiker. Wie viel Geld der BND für Spionage ausgeben darf, hält die Behörde streng geheim.
1950 wurde in der Deutschen Demokratischen Republik wohl einer der bekanntesten Geheimdienste der Welt gegründet: Das Ministerium für Staatssicherheit, kurz Stasi. Angegliedert an die Stasi war der Auslandsgeheimdienst Hauptverwaltung Aufklärung, die sich vor allem mit dem westlichen Bruder beschäftigte. Die Stasi mauserte sich zu einem entscheidenden Machtinstrument der sozialistischen Regierung. Sie unterdrückte Andersdenkende, warb sogenannte Spitzel an, inhaftierte Dissidenten – die Bevölkerung hatte Angst vor der Behörde. Das lag daran, dass die Behörde polizeiliche Befugnisse hatte. Bis heute läuft die Aufarbeitung über das Ausmaß der Stasi-Überwachung.
Spektakuläres über den BND
Deutsche Spione à la James Bond? Falsch. Beim BND sind Fremdsprachenexperten, Informatiker, Juristen, Biologen, Ingenieure und Islamwissenschaftler gefragt, keine Superagenten. Sie werden innerhalb von zwei bis drei Jahren zum Agenten ausgebildet – und dann als Tarifbeschäftigte, Soldaten und Beamten angestellt.
2006 erschütterte ein Bericht über die Arbeit des BND die Bundesrepublik: Im großen Stil hörte der Dienst Journalisten ab. Gerade in den Achtzigern war der Bedarf an Informationen besonders hoch, namhafte Autoren bei Zeitungen wie Stern, Spiegel oder FOCUS standen unter Beobachtung.
Welche Rolle spielte der BND im Irak-Krieg 2003? Hartnäckig halten sich Gerüchte, dass der Dienst einen Informanten hatte, der behauptete, dass der Irak Massenvernichtungswaffen und Biolabore besessen haben soll. Weiterhin haben Agenten des BND, so zeigt Alexandra Sgro in ihrem Buch „Geheimdienste der Welt“, angeblich strategische Informationen über irakische Verteidigungsstellungen und Truppenbewegungen an die USA weitergegeben. Die Bundesregierung hatte offiziell verlauten lassen, dass sich Deutschland aus dem Irak-Krieg heraushält – lässt sich dieser Status nach den Enthüllungen noch halten?
Türkei – MIT
Colourbox/Montage
Die Türkei hat nur einen Nachrichtendienst: den „Millî Istihbarat Teşkilâti“
Organisation türkischen Geheimdienstes
Der Millî Istihbarat Teşkilâti (MIT) ist der einzige Nachrichtendienst der Türkei. Er ist für innere Sicherheit und Spionageabwehr zuständig. Außerdem hat er die Pflicht, für den Schutz der Landesgrenzen zu sorgen. Der Geheimdienst untersteht direkt dem Premierminister und ist dafür verantwortlich, bedrohliche Gruppierungen im In- und Ausland zu beobachten. Dabei gibt es häufig gewaltsame Konflikte mit Anhängern der verbotenen Arbeiterpartei Kurdistans PKK. Denn diese kämpfen für die Autonomie der kurdischen Gebiete der Türkei.
Geschichte des MIT
Schon vor der Gründung der Türkei gab es Geheimdienste. 1913 wurde Teşkilât-I Mahsusa als erster zentralisierter und organisierter türkischer Nachrichtendienst gegründet. Er sollte die Aktivitäten von Separatisten eindämmen. Während des Ersten Weltkrieges erlebte die Behörde ihre Blütezeit und war militärisch und paramilitärisch aktiv. Das Ende des Krieges bedeutete auch das Ende des Geheimdienstes.
Sein Nachfolger war Karakol Cemiyeti, der Zivilpersonen und kleine Gruppierungen ab 1919 im türkischen Unabhängigkeitskrieg mit Waffen ausstattete. So gelang es, die Besatzungsmächte zu besiegen. Als die Briten im Jahr 1920 Istanbul besetzten, lösten sie auch den Nachrichtendienst auf. Danach gab es viele verschiedene Geheimdienste, die nie lange Bestand hatten. Bis 1965 der Millî Istihbarat Teşkilâti gegründet wurde.
Spektakuläres über den MIT
Wie Sgro in ihrem Buch „Geheimdienste der Welt“ schreibt, werden beim türkischen Geheimdienst nur schriftliche Bewerbungen angenommen, die per Post eingesendet werden – eine Vorbereitung auf die Spionagetätigkeit? Die frisch gebackenen Agenten bekommen ihren Arbeitsort dann per Losverfahren zugeteilt.
In den Neunzigern machten Berichte die Runde, der türkische Geheimdienst würde militante Separatisten bekämpfen. Allerdings nicht nur im eigenen Land, sondern auch in Deutschland. Dabei schüchterten die Agenten angeblich Oppositionelle ein, bedrohten Asylbewerber und kündigten Repressalien gegen die in der Türkei lebenden Verwandten an.
Ein anderes Ziel hatte laut Spekulationen sogenannter Experten der türkische Geheimdienst Mitte der 2000er-Jahre: Zu diesem Zeitpunkt war gerade die sogenannte Sauerland-Gruppe verhaftet worden. Sie plante offenbar einen Bombenanschlag in Deutschland, unterstützt von dem Türken Mevlüt K. – laut Medienberichten ein Informant des türkischen Geheimdienstes. Fakt ist: Er ist untergetaucht und wird per internationalem Haftbefehl gesucht.
Frankreich – DGSE
Motage/Panther
Frankreichs Geheimdienst DGSE
Organisation des französischen Geheimdienstes
Der französische Geheimdienst nennt sich „Direction Générale de la Sécurité Extérieure“, kurz DGSE. Spezialoperationen des DGSE müssen von oberster Stelle genehmigt werden: Seit 2009 darf sie nur der französische Präsident bewilligen. Wer eingestellt wird, entscheidet das Verteidigungsministerium. Schwerpunkt des Geheimdienstes mit Sitz in Paris: Terrorismusbekämpfung. Außerdem haben die Geheimdienstler ein Auge auf Länder, in denen Massenvernichtungswaffen hergestellt und vertrieben werden.
Geschichte des DGSE
Die Geschichte des DGSE beginnt mit Charles de Gaulle. Der spätere Ministerpräsident Frankreichs ließ 1940 aus dem Exil einen Geheimdienst zusammenstellen. Er sollte für die Widerstandsbewegung „France Libre“ gegen das NS-Regime spionieren. Nach dem Krieg wurde ein neuer Geheimdienst gegründet, der Service de Documentation Extérieure et de Contre-Espionnage (SDECE). Seine Aufgaben: ausländische Berichterstattung und Gegenspionage. 1982 löste ihn der DGSE ab.
Die Schwerpunkte des DGSE sind stark von Frankreichs Geschichte als Kolonialmacht geprägt. Denn zu seinen ehemaligen Kolonien pflegt Frankreich auch heute noch wirtschaftliche Beziehungen. Die Regierungen sollten also stabil bleiben. Wo Frankreich Fundamentalismus fürchtete, griff der Geheimdienst ein. So wie Ende der 1980er-Jahre in Algerien. Angeblich ermordete der DGSE 1992 den algerischen Präsidenten Muhammad Boudiaf. Und auch in Syrien könnte sich die Behörde 2012 eingemischt haben, Sgro. Agenten sollen dem syrischen General Manaf Tlass bei der Flucht geholfen haben. Der stand einst Machthaber Assad nahe.
Spektakuläres über den DGSE
Die wohl legendärste Doppelspionin überhaupt war für die Franzosen im Einsatz: Mata Hari. Die Nackttänzerin ließ sich zur Zeit des Ersten Weltkriegs von den Deutschen dafür bezahlen, französischen Militärs Geheimnisse zu entlocken. Gleichzeitig spionierte sie für die Franzosen in den von den Deutschen besetzten Gebieten. Die schöne Niederländerin wurde schließlich von den Franzosen zum Tode verurteilt, weil sie auch an Deutschland Geheimnisse verraten haben soll. Was genau sie wem erzählt hat, ist bis heute nicht bekannt. Erst 2017 wird der französische Staat die Akten freigegeben.
In den 1980er-Jahren kämpfte der französische Geheimdienst gegen Greenpeace. Die französische Regierung testete zu dieser Zeit im Mururoa-Atoll im Pazifik Atomwaffen. Greenpeace-Aktivisten wollten dagegen protestieren. Agenten des DGSE gelang es, auf dem Greenpeace-Schiff Sprengsätze anzubringen. Bei der Explosion starb ein Mensch. Bewilligt wurde die Aktion angeblich vom damaligen Präsidenten François Mitterand. Der Verteidigungsminister rechtfertigte das Vorgehen: Anders hätte man den Protest nicht verhindern können.
Großes Aufsehen erregte auch der Vorgänger des DGSE, der SDECE: 1965 verschwand Ben Barka, ein Marokkaner im französischen Exil – bis heute ist nicht geklärt, wer ihn entführt hat. Im Verdacht stehen französische Agenten. Sie hätten damit dem marokkanischen König geholfen und zugleich den Einfluss Frankreichs auf Marokko gesichtert. Bakra war in Marokko wegen Hochverrats verurteilt worden, weil er den König scharf kritisiert hatte. Er soll vom marokkanischen Innenminister getötet worden sein.
Brasilien – Abin
dpa/Montage
Brasiliens Nachrichtendienst heißt „Agência Brasiliera de Inteligência“
Organisation des brasilianischen Geheimdienstes
Der brasilianische Geheimdienst heißt Agência Brasileira de Inteligência (Abin) und ist dem Präsidenten unterstellt. Die Aufgaben umfassen Spionage- und Terror-Abwehr, Informationsbeschaffung und Schutz der Bürger.
Geschichte der Albin
Schon 1927 wurde die militärische Behörde Conselho de Defesa Nacional gegründet, die sich zunächst mit geheimdienstlichen Aufgaben beschäftigte. Nachdem die Folgeorganisation die Arbeit in den Wirren des Militärputsches von 1964 schon wieder einstellte und durch einen regimehörigen Dienst ersetzt wurde, bestand die Behörde bis 1990. Die Abin wurde 1999 gegründet und übernimmt seitdem die Aufgabe des In- und Auslands-Geheimdienstes – im Gegensatz zu seinem Vorgänger als zivile Behörde.
Spektakuläres über die Albin
Nachwuchsarbeit bei Zehn bis 15-Jährigen? Warum nicht, muss sich die Abin gedacht haben. 2005, so beschreibt es Sgro in ihrem Buch, habe eine Informationsveranstaltung stattgefunden, bei der Jugendlichen die Arbeit von Agenten nahegebracht wurde. Dieses Programm soll weitergeführt werden und sich in Zukunft verstärkt an Schüler und Studenten richten.
Es muss eine skurrile Situation gewesen sein: 1983 entdeckte ein Maler im Büro des damaligen Präsidenten eine Wanze mit aktivem Sender. Brasilianische Zeitungen machten schnell den Schuldigen aus: den Geheimdienst. Der habe sich derartige Abhör-Vergehen schon öfters zuschulden kommen lassen, so die Argumentation. Die wahren Hintergründe bleiben unbekannt.
Im Juli diesen Jahres kam im Zuge des weltweiten Abhörskandals heraus, dass auch Brasilien im Fadenkreuz der NSA stand: Millionen Emails und Telefonate seien abgehört worden. Nach Informationen der Zeitung „O Blobo“ ist Brasilien das am meiste ausgespähte Land Lateinamerikas.
Syrien – Abteilung für militärische Aufklärung
AFP
Syriens Geheimdienst ist in der Hand des Machthabers Baschar al-Assad
Organisation des syrischen Geheimdienstes
Etwas unübersichtlich stellt sich die Situation in Syrien dar: Fünf Behörden teilen die Geheimdienst-Aufgaben unter sich auf. Es gibt einen allgemeinen zivilen Nachrichtendienst, einen Nachrichtendienst der Luftwaffe, das Direktorat für Staatssicherheit sowie das Direktorat für politische Sicherheit im Innenministerium – in den Zeiten des Umbruchs ist aber vor allem eine Behörde wichtig: die Abteilung für Aufklärung. Sie unterstützt die militärischen Truppen und soll Dissidentengruppen zerschlagen – und soll dabei an illegalen Aktionen beteiligt gewesen sein.
Geschichte der Abteilung für Militärische Aufklärung
Die Gründung der Abteilung für Militärische Aufklärung datiert auf das Jahr 1969. In der westlichen Welt wurde der Geheimdienst allerdings erst in den 2000er-Jahren bekannt. Im Kampf gegen die Auswirkungen des arabischen Frühlings in Syrien koordinierte die Abteilung ab 2010 die Niederschlagung von Demonstrationen und die Diskreditierung der Rebellen.
Doch auch in westliche Staaten entsendete der Geheimdienst seine Agenten: So soll ein Deutsch-Libanese über mehrere Jahre hinweg Informationen über syrische Oppositionelle in der Bundesrepublik gesammelt und an den syrischen Geheimdienst weitergegeben haben. Und auch der BND hat offenbar gute Kontakte nach Syrien: Die Tagesschau berichtete im Mai, dass der BND-Präsident an einem Treffen mit syrischen Geheimdienstlern teilgenommen haben soll.
Spektakuläres über die Abteilung für Militärische Aufklärung
Wenig ist über die Arbeit des syrischen Geheimdienstes bekannt. Doch ein Name steht wohl in direktem Zusammenhang mit einer Aktion syrischer Agenten im Jahr 2011: Oberstleutnant Hussein Harmusch. Er rief in einem Internetvideo dazu auf, sich gegen die syrische Regierung zu stellen und setzte sich in die Türkei ab. Kurze Zeit später verschwand er spurlos. Was war passiert? Sgro schildert die Geschichte folgendermaßen: Am Tag seines Verschwindens traf sich Harmusch mit einem türkischen Agenten, der ihn mit dem Auto abholte, aber nach Eigenaussage wenige Minuten später wieder absetzte.
Mehr als zwei Wochen nach dieser Episode strahlte das syrische Staatsfernsehen ein Video aus, in dem Harmusch seinen Aufruf zum Widerstand widerrief. Experten erkennen einen tiefverängstigten Mann, sie gehen davon aus, dass er gezwungen wurde. Harmusch verschwindet daraufhin von der Bildfläche, bis heute weiß niemand, wo er ist. Nur die türkische Regierung äußerte sich noch einmal zu dem Fall: Sie ließ verlauten, dass der angebliche türkische Agent tatsächlich aus Syrien stammte.
Mit welcher Grausamkeit der syrische Geheimdienst beispielsweise gegen Dissidenten vorgeht, zeigen Berichte aus dem Jahr 2012: Menschenrechtsorganisationen sprechen bei den Geheimdienstzentren in Damaskus von der „Hölle auf Erden“. „Human Rights Watch“ erfasste zahlreiche Fälle, in denen Familien ihre vermissten Angehörigen nur noch tot finden konnten: Mit Brandflecken und Blutergüssen übersät. Überlebende berichten von Methoden, die man aus dem europäischen Mittelalter kennt: Sie wurden an den Händen aufgehangen, dann wurden sie geschlagen und geschnitten. Oder sie wurden auf Kreuz-ähnliche Holzbretter geschnallt und von Häschern auf die Fußsohlen geschlagen. Andere berichten von Stromschocks im Genitalbereich und weiteren Foltermethoden.
Die Beobachtergruppe „Violations Documentation Center“ spricht von über 25 000 Syrern, die seit 2011 verhaftet worden sind. Weniger als ein Fünftel sei bislang freigelassen worden. Experten gehen allerdings von weiter höheren Zahlen aus: Sie sprechen von Hunderttausenden Inhaftierten.
Russland – KGB, FSB, SWR, GRU
Colourbox/Montage
Der FSB ist nur einer von Russlands Geheimdiensten
Organisation des russischen Geheimdienstes
Russland verlässt sich seit dem Zerfall der Sowjetunion auf diese Geheimdienst-Behörden: Den Inlandsgeheimdienst FSB, den Auslandsnachrichtendienst SWR, den Schutzdienst FSO und den Militärnachrichtendienst GRU. Die Aufgaben des SWR umfassen dabei Gegenspionage und Fernaufklärung, der Dienst umfasst rund 13 000 Mitarbeiter. Spannend ist aber vor allem der Inlandsgeheimdienst FSB, da er als Nachfolger des berüchtigten KGB gilt.
Geschichte des russischen Geheimdienstes
Die Wirren um die Abdankung des Zaren Nikolaus II. in der Februarrevolution 1917 forderten ein ganzes Land heraus: Eine provisorische Regierung wurde gebildet, die Oktoberrevolution brach aus, schon bald übernahmen kommunistische Bolschewiken die Macht. Der starke Mann Lenin regte die Gründung eines neuen Geheimdienstes an, um die Konterrevolution und Klassenfeinde zu bekämpfen.
Nach einigen Umstrukturierungen und dem Zweiten Weltkrieg entstand 1954 der KGB als eigenständiges Ministerium. Erst 1991, mit dem Ende der Sowjetunion, hörte er auf zu existieren – wobei der Geheimdienst in Weißrussland noch immer KGB heißt. Der sowjetische KGB arbeitete dabei sowohl nach innen als auch nach außen, dazu gehörten Gegenspionage, Auslandsspionage, Bekämpfung von Regimegegnern, Sicherung der Parteimitglieder. SWR und FSB wurden in den 1990-Jahren gegründet und teilen sich wiederum in eigene Büros und Organe auf.
Spektakuläres über den russischen Geheimdienst
Normalerweise sind es Geschichtsbegeisterte, die Geheimdiensten Verschwörungstheorien andichten. In den 80er-Jahren, so schreibt Sgro in ihrem Buch, war es allerdings der KGB selbst, der für Furore sorgte: Tüchtige Sowjet-Agenten setzten das Gerücht in Umlauf, dass die US-Amerikaner den HI-Virus hergestellt und aus Versehen freigesetzt hätten. Der Plan: die USA damit zu diskreditieren. Selbst die deutsche Zeitung „taz“ griff die These auf. 1987 entschuldigte sich der Staatschef Gorbatschow bei US-Diplomaten, die Zeitung brauchte 20 Jahre länger und entschuldigte sich 2010.
Unabhängig davon unterstanden dem KGB einige der berühmtesten Spione des 20. Jahrhunderts: Beispielsweise sorgte der Journalist Richard Sorge dafür, dass sich die Sowjets auf die deutschen und japanischen Angriffspläne einstellen konnten – weil der überzeugte Kommunist Dokumente weitergab. Aldrich Ames dagegen arbeitete eigentlich beim CIA, dort leitete der die Abteilung „Gegenspionage UDSSR“. Was niemand wusste: Ames spionierte für Russland. Er bekam Geld, die Sowjets die Namen von US-Spitzeln. Und dann wären da noch das Spionage-Ehepaar Rosenberg, der Doppel-Agent Heinz Felfe, der Atomwaffen-Physiker Klaus Fuchs und und und.
Wie im Kalten Krieg: Erst im Juli stand ein russisches Agenten-Ehepaar vor dem Gericht in Stuttgart. Das Ehepaar firmierte unter den Decknamen Andreas und Heidrun Anschlag. Auch wenn die beiden nicht als klassische Spione gearbeitet haben sollen, hatten sie wohl als eine Art Briefkasten gedient. Das Paar wurde 2011 von Beamten des BKA und der GSG9 aufgespürt und festgenommen, nachdem sie 20 Jahre lang unentdeckt geblieben waren. Derzeit verhandeln russische und deutsche Behörden über einen Austausch der beiden Russen gegen einen deutschen Agenten.
Dass auch der moderne russische Geheimdienst an traditionellen Methoden festhält, zeigt eine Meldung der russischen Zeitung „Iswestija“. Zum Schutz streng geheimer Informationen schreiben russische Geheimdienste auf Schreibmaschinen, nicht digital, auch handschriftliche Aufzeichnungen seien üblich. Besonders beliebt: das deutsche Modell Triumph-Adler Twen 180. Dabei hat jede Schreibmaschine eine eigene Signatur, so dass jedes Dokument der Maschine zugeordnet werden kann, auf der es geschrieben wurde.
Neuseeland – GCSB
Colourbox/Montage
„Government Communications Security Bureau“ heißt der Geheimdienst Neuseelands
Organisation des neuseeländischen Geheimdienstes
Neuseeland hat zwei Geheimdienstbehörden: Den Security Intelligence Service und das nachgeordnete Government Communications Security Bureau (GCSB). Das GCSB kümmert sich um die nationale Sicherheit, überwacht ausländische Datenströme, stellt Sicherheitssysteme für die Regierung zusammen – Einheimische und Zugezogene mit ständigem Wohnsitz dürfen dabei nicht überwacht werden. Die Behörde ist dem Premierminister unterstellt.
Geschichte des GCSB
Im Jahr 1977 wünschte sich der neuseeländische Premierminister einen Geheimdienst – vergleichsweise spät im Vergleich zu anderen Staaten. Schnell wurden Anlagen für die Überwachung in Waihopai und in Tangimoana gebaut. Bis dahin arbeiteten Angestellte des Auslands- und Verteidigungsministeriums an der Nachrichtenbeschaffung. Um besser reagieren zu können, baute die Regierung das GCSB auf.
Vor den Augen der Öffentlichkeit im Verteidigungsministerium versteckt, wurde die Behörde in den Anfang der 80er-Jahren zunächst nur der Politik vorgestellt. 1984 erfuhr die neuseeländische Öffentlichkeit von der Existenz des Geheimdienstes.Bis das GCSB aber eine eigene Behörde wurde, sollten noch mehrere Jahrzehnte vergehen: 2003, durch einen Erlass, wurde das GCSB als öffentliche Dienstleistungsabteilung eingerichtet.
Spektakuläres über das GCSB
Ausgerechnet ein Deutscher mit doppelter Staatsbürgerschaft – er hat auch einen finnischen Pass – wurde zum Politikum in Neuseeland: Kim Schmitz, auch bekannt als Kim Dotcom, geriet aufgrund zwielichtiger Online-Geschäfte in das Fadenkreuz des GCSB. Schmitz wurde im Januar 2012 aufgrund des Verdachts auf Urheberrechtsverletzungen sowie Geldwäsche verhaftet, doch bereits zuvor hörten neuseeländische Agenten Mr Dotcom ab – ohne Einverständnis der Regierung, allerdings im Auftrag der Polizei.
Die Auswertung von Emails und Telefonaten, so zeichnet Sgro in ihrem Buch „Geheimdienste der Welt“ nach, brachte die Behörde auf die Spur der meisten Mitangeklagten. Das Problem: langjährige Bewohner Neuseelands dürfen nicht bespitzelt werden. Das Ergebnis: Die gesammelten Daten waren illegal erworben, der Premierminister entschuldigte sich bei Schmitz und dem neuseeländischen Volk.
Österreich – HNA, HAA, BVT
Motage/Panther
Einer der österreichischen Geheimdienste, das Abwehramt
Organisation des österreichischen Geheimdienstes
In Österreich gibt es drei Geheimdienste: Der Auslandsnachrichtendienst ist das Heeresnachrichtenamt (HNaA oder HNA). Sein Gegenstück ist das Heeres-Abwehramt (HAA oder HabwA) als militärischer Inlandsnachrichtendienst. Beide unterstehen dem Bundesministerium für Landesverteidigung und Sport. Das Bundesamt für Verfassungsschutz und Terrorismusbekämpfung (BVT) ist die dritte Behörde.
Geschichte der österreichischen Geheimdienste
Militärische Nachrichtendienste gibt es in Österreich seit den Napoleonischen Kriegen. Napoleon veränderte damals mit seiner „Grande Armée“ die Kriegsführung, die Truppen waren beweglicher und agierten schneller. Die österreichische Monarchie musste darauf reagieren und begann, ein strukturiertes „militärisches Nachrichtenwesen“ aufzubauen. 1850 wurde der erste offizielle Nachrichtendienst in der österreichischen Monarchie eingerichtet: das Evidenzbüro. Ende des 19. Jahrhunderts überwachten dann die ersten „Geheimen Polizeiagenten“ hauptsächlich die öffentliche Sittlichkeit.
Diese Struktur änderte sich bis zum Anschluss Österreichs an das Deutsche Reich im Jahr 1938 kaum. Danach spionierte die Gestapo im Inland, der Sicherheitsdienst war für das Ausland zuständig und die Abwehr für militärische Spionage. Sie galten auch in Österreich als mächtiges Instrument der Nationalsozialisten. Eine der ersten Amtshandlungen nach dem Zweiten Weltkrieg war die Gründung einer österreichischen Staatspolizei. Erst 1955 gründete das Bundesheer einen militärischen Geheimdienst.
1972 wurde dieser in das heutige Heeres-Nachrichtenamt (HNaA) umgebaut. Zunächst beschäftigte sich dieses sowohl mit Auslandsaufklärung als auch mit Abwehr. 1985 wurde vom HNaA das Abwehramt abgespalten, weil das Heeresnachrichtenamt zu mächtig geworden war. Heute ist das Heeresnachrichtenamt vor allem im Einsatz gegen Terrorismus, Organisierte Kriminalität und irreguläre Migration.
Spektakuläres über die österreichischen Geheimdienste
Im Parlament ist ein ständiger Unterausschuss des Landesverteidigungsausschuss für die Kontrolle des Heeresnachrichtenamtes zuständig, die Parlamentarier sind aber auf strenge Verschwiegenheit vereidigt. Das HNaA soll eng mit US-amerikanischen Geheimdiensten zusammenarbeiten und vor allem in der Zeit des Kalten Krieges wichtige Informationen über Vorgänge in den Balkanstaaten an die USA weitergegeben haben. 1968 waren es österreichische Agenten des Heeresnachrichtenamtes, die als erste über den Einmarsch der Truppen des Warschauer Pakts in die Tschechoslowakei Bescheid wussten.
Das Stillschweigen rund um die Arbeit des Heeresnachrichtenamtes verlieh dem Nachrichtendienst zwischenzeitlich große Macht. Das ging so weit, dass sogar Verteidigungsminister ausspioniert worden sein sollen. Als Verteidigungsminister Friedhelm Frischenschlager das zufällig erfuhr, soll er so erbost gewesen sein, dass er im Jahr 1985 das Heeresnachrichtenamt reformieren und das Heeres-Abwehramt davon abspalten ließ. Die beiden Nachrichtendienste sind bis heute politisch verfeindet: Das HNaA wird der Österreichischen Volkspartei zugeordnet, das HAA den österreichischen Sozialdemokraten. Diese sollen sich seit ihrem Bestehen immer wieder gegenseitig ausspionieren.
USA – CIA, FBI, NSA, DEA
Montage/Colourbox
Zwei der US-Geheimdienste: FBI und CIA
Organisation des US-amerikanischen Geheimdienstes
Über keinen Geheimdienst gibt es derart viele Informationen wie über den US-amerikanischen. Der Auslandsgeheimdienst CIA, die inländische Spionageabwehr FBI, die weltweit operierende NSA, die amerikanische Bundespolizei, die Drogenbehörde DEA und elf weitere Dienste bilden die sogenannte United States Intelligence Community (IC). Insgesamt sollen dort etwa 200 000 Menschen arbeiten mit einem Gesamtbudget von 30 Milliarden Euro.
Geschichte des CIA und der NSA
Mit Gründung des Amts der Marineaufklärung begann 1882 die offizielle geheimdienstliche Aufklärung der USA. Doch schon unter George Washington hatten Agenten in geheimen Operationen, Aufklärung und Spionage gearbeitet. Die bekannteste Einrichtung, die Central Intelligence Agency, wurde 1947 ins Leben gerufen. Sie ist die Folgeorganisation des Office of Strategic Services, das im Laufe des Zweiten Weltkriegs aufgebaut wurde. Das Ziel: Die Sammlung strategisch wertvoller Informationen, aber auch Sabotage und Spionageabwehr. Mit dem National Security Act übernahm die Behörde Aufgaben, die FBI-Chef J. Edgar Hoover zunächst für seine Agenten vorgesehen hatte. ACIPSS-Experte Siegfried Beer erklärt, dass die USA zwar sehr spät mit der Errichtung eines Auslandsgeheimdienstes begonnen haben, dieser heute aber zu den effizientesten weltweit gehört.
Doch eine andere Behörde macht derzeit Schlagzeilen: Die National Security Agency (NSA). Ihr Aufgabengebiet ist die weltweite, nachrichtliche Aufklärung. Die Wurzeln der Behörde reichen bis in die 40er-Jahre zurück, die offizielle Gründung datiert auf das Jahr 1952. Seitdem hält die NSA mit den technologischen Entwicklungen von Satellit bis Internet Schritt. In den Mittelpunkt einer weltweiten Diskussion über Datenschutz rückte die NSA, weil der Geheimdienstler Edward Snowden brisante Informationen über die weltweite Überwachung und die Kenntnisnahme europäischer Politiker von den Abhör-Programmen der Behörde veröffentlichte.
Spektakuläres über die CIA
„Bis in die frühen Siebziger hinein hatte die CIA weitgehend freie Hand“, sagt Beer. Und das nutzte die Agency voll aus: Waren CIA-Agenten am Attentat an John F. Kennedy beteiligt? Welche Rolle spielte die CIA bei den Anschlägen von 2001? Verdient die Behörde an weltweiten Drogen- und Geldwäschegeschäften? Für Verschwörungstheoretiker ist der US-Geheimdienst eine wahre Pandora-Kiste hanebüchener Geschichten. Dabei gibt es zahlreiche verbriefte Operationen: 1961 war die CIA beispielsweise an der Invasion in der Schweinebucht beteiligt, bei der Exilkubaner auf Kuba landen und die Regierung Castros stürzen wollten – und scheiterte spektakulär.
Viele weitere Operationen mit dem Ziel, Machthaber zu stürzen, wurden von der CIA angeleiert. In Afghanistan warben CIA-Agenten ab 1979 bis zu 100 000 Einheimische an, trainierten sie, unterstützten sie mit Waffen und Geld und schickten sie in den Kampf gegen sowjetische Truppen. Wohl einer der Hauptgründe für die gegenwärtige Stärke der Taliban in dem befreiten Land. Nicht immer nutzt die Agency bei ihren Operationen legale Mittel, Menschenrechtsorganisationen werfen der Behörde Verletzung internationalen Rechts und Folter vor.
Großbritannien – MI5, MI6
Motage/Panther
Großbritanniens MI5 und MI6
Organisation des englischen Geheimdienstes
Neun Behörden kümmern sich in Großbritannien um die Geheimdienstarbeit, organisiert im Secret Service Bureau. Am bekanntesten sind sicherlich der Security Service und der Secret Intelligence Service, kurz: MI5 und SIS oder MI6. Während sich der Blick des MI5 in das eigene Land richtet, kümmert sich der MI6 um das Ausland. Hinlänglich bekannt wurde der MI6 durch die Arbeit des wohl berühmtesten Spions James Bond, auch wenn dieser natürlich nur ein Roman- und Filmheld und kein echter Agent ist.
Geschichte des MI6
Ursprünglich war der MI6 für die Marine zuständig, als er 1909 gegründet wurde. Zunehmend spezialisierte sich der Dienst aber auf das Ausland, im Ersten Weltkrieg sammelten Agenten Informationen über das Deutsche Reich und kämpften gegen den Kommunismus in Russland. Nach der Machtübernahme durch die Nationalsozialisten arbeitete der SIS unter anderem an der Entschlüsselung der Geheim-Codes der Nazis.
Im Kalten Krieg versuchte sich die Behörde in der Anwerbung sowjetischer Offizieller oder an Staatsstreichen, über die Erfolgsrate schweigt sie sich bis heute aus. Seit 1994 sind die Zuständigkeiten im Intelligence Services Act geregelt. Auch die Überwachung von Telefonaten und Internetaktivitäten Verdächtiger gehört zur Aufgabe der Behörde. Könnten Sie ein MI6-Agent sein?
Spektakuläres über den MI6
Eine der bekanntesten und schillerndsten Personen in der Geschichte der Geheimdienste ist Thomas Edward Lawrence, auch bekannt als Lawrence von Arabien. Der studierte Archäologe begab sich 1914 offiziell zur Kartographierung in den Nahen Osten, unter der Hand ging es um militärisches Auskundschaften. Aufgrund seiner Erfolge und Fähigkeiten wurde er schnell vom britischen Geheimdienst angeworben – und integrierte sich derart gut in die einheimischen Beduinenvölker, dass er sie zum Aufstand gegen die Fremdherrschaft durch die Türken führte. Ganz im Sinne seines Heimatlandes. Noch zu Lebzeiten wurde Lawrence zum Mythos – und zu einem beliebten Gesprächsgegenstand der englischen Aristokratie.
Eine spektakuläre Mordtheorie geistert seit dem 3. August 1997 durch Großbritannien: Wurde Prinzessin Diana, die Ex-Frau des britischen Thronfolgers Prinz Charles, vom MI6 beseitigt? Sgro schreibt dazu, dass das britische Königshaus Angst vor einem muslimischen Schwiegervater des zukünftigen Königs gehabt hatte und Lady Di zu allem Überfluss auch noch schwanger gewesen sein soll. Diana war seit kurzem mit Dodi Al-Fayed zusammen, dem Sohn des Harrod-Geschäftsführers Mohamed Al-Fayed. Bis heute ist der Fall nicht aufgeklärt, Gerüchte über vertauschte Blutproben, eine überschnelle Einbalsamierung zur Vertuschung der Schwangerschaft und den Einsatz einer Stroboskop-Lichtkanone zur Blendung des Limousinen-Fahrers machen noch immer die Runde.
Spanien – CNI
panther/Montage
CNI, das Kürzel des spanischen Geheimdienstes, steht für „Centro Nacional de Inteligencia“
Organisation des spanischen Geheimdienstes
In Spanien kümmert sich der Centro Nacional de Inteligencia (CNI) um Spionage-Dinge. Der Geheimdienst ist Teil des spanischen Verteidigungsministeriums. Seine Aufgaben umfassen die Informationsbeschaffung und Abwehr, aber auch wirtschaftliche Analysen und politische Risikobewertungen. Der spanische Ministerrat fungiert einerseits als Kontrollorgan, andererseits bestimmt er jährlich die Ziele der Behörde neu. Der CNI umfasst etwa 600 Mitarbeiter.
Geschichte des CNI
Die Wurzeln der Behörde liegen in der Zeit des spanischen Bürgerkriegs: 1935 gründete die Zweite Republik einen Geheimdienst, der – überrascht vom Beginn des Krieges – allerdings nie seine Arbeit aufnahm. Bis zu acht verschiedene Dienste arbeiteten bis in die 70er-Jahre gleichzeitig, zum Teil beschafften sie sogar dieselben Informationen.
Erst 1972 gründete sich der erste offizielle Geheimdienst in Spanien, der sogenannte Zentrale Dokumentationsdienst – noch unter der Diktatur des Generals Francisco Franco. Hauptzweck war der Schutz der Diktatur und die Aufdeckung von Umsturzplänen. 1977, zwei Jahre nach dem Tod des Diktators, wurde der Geheimdienst reformiert und dem Verteidigungsministerium angegliedert.
Spektakuläres über das CNI
„Sieben spanische Agenten im Irak getötet“ – diese Nachricht ging 2003 um die Welt. Mit einem Schlag verlor der spanische Geheimdienst praktisch alle Experten in dem Land. Und alles nur, weil die Agenten offenbar einem irakischen Doppelagenten zum Opfer fielen. An einem Samstag im November trafen sich vier dort stationierte CNI-Agenten mit ihren Kollegen, die sie ablösen sollten. Mit dabei: ihre Kontaktperson und Informanten – und ein Maulwurf, der die Spanier an Saddams Truppen verriet. Ein tödlich verwundeter Agent rief offenbar noch während des Hinterhalts bei der CNI-Zentrale an und flehte mit letzter Kraft: „Sie bringen uns um. Schickt Hubschrauber herbei!“.
Ein schwieriges Verhältnis hat der CNI zum spanischen Königshaus: Als sich König Juan Carlos in den 2000ern eine Geliebte leistete, musste Spaniens Geheimdienstchef vor dem Parlament antanzen und Auskunft geben – offiziell zum Schutz der Monarchie und des Wohl des Königs. Doch eigentlich ging es um die Frage, ob die „enge Freundin“ des Königs auf Staatskosten ausgehalten wurde. Die Befragung verlief allerdings hinter verschlossenen Türen und ergab nichts Erhellendes. Erst ein Mitarbeiter der Polizeigewerkschaft erhärtete die Gerüchte und so wurde das Verhältnis zum Politikum – ohne Beteiligung des CNI.
Israel – Mossad
AFP/Montage
Israels berüchtigter Geheimdienst Mossad
Organisation des israelischen Geheimdienstes
In Israel gibt es vier Behörden, die sich um nachrichtendienstliche Belange kümmern: Den militärischen Geheimdienst Aman, den wissenschaftlichen Nachrichtendienst Lakam, den Inlandsgeheimdienst Schin Bet und den – sicherlich am bekanntesten – Auslandsgeheimdienst Mossad. Das Hauptquartier des Mossad befindet sich in Tel Aviv, laut Schätzungen arbeiten in der Behörde etwa 1200 Geheimdienstler. Darunter aktive Agenten, die sogenannten Katsas, und freiwillige Helfer, die sogenannten Sjanim – organisiert in einem weltweiten Netz israelischer Spione. Der Mossad kümmert sich um die Sicherheit des Landes und des Militärs, gilt aber auch als operativer Arm der Regierung – Geschichten über Liquidierungen und Entführungen durch Mossad-Agenten gibt es seit jeher.
Geschichte des Mossad
Israel ist ein vergleichsweise junger Staat: 1947 teilte die UN Palästina in einen jüdischen und einen arabischen Staat – um einen Lebensraum für die Überlebenden des Holocausts zu schaffen. Für die arabische Bevölkerung stellten die Pläne jedoch eine Provokation dar: Einer der zentralen Konflikte des 20. Jahrhunderts war geschaffen. Kriegerische Auseinandersetzungen folgten, gleichzeitig arbeiteten inoffizielle Organisationen daran, arabische Aufstände zu vermeiden. 1949 gründete der damalige Premierminister David Ben-Gurion dann den ersten offiziellen Geheimdienst, zunächst dem Außenministerium zugeordnet, später Teil des Büros des Premierministers.
Spektakuläres über den Mossad
Wie Alexandra Sgro in ihrem Buch „Geheimdienste der Welt“ beschreibt, wählte der Mossad seine Bewerber besonders streng aus: Angehende Agenten mussten ihre Geschicklichkeit unter Beweis stellen, indem sie an gut einsehbaren Stellen Bomben platzieren sollten – ohne, dass sie dabei gesehen werden. Wer geschickt genug war, wurde Agent. Heute steht am Beginn lediglich ein medizinischer und psychologischer Check, die Ausbildung dauert drei Jahre – mit einem Stundenplan aus Ausfragen, Leeren toter Briefkästen, Durchführung von Anschlägen und die spezielle israelische Kampfkunst Krav Maga.
Doch das sollte nicht darüber hinwegtäuschen, dass der Mossad einer der effizientesten Geheimdienste weltweit ist, erklärt der Experte Beer. Eine der spektakulärsten – und ersten großen – Operationen des Mossads war die Gefangennahme des nach Argentinien geflohenen Nazis Adolf Eichmann. Er war als Mitglied des Reichsicherheitshauptamtes maßgeblich an der Deportation und Ermordung der Juden im „Dritten Reich“ beteiligt. Er tauchte in Südamerika unter, wurde allerdings vom Mossad aufgespürt und 1960 verhaftet. Nach einem neunmonatigen Prozess wurde er zum Tode verurteilt und 1962 hingerichtet.
Zehn Jahre später kam es bei den Olympischen Spiele in München zur Katastrophe: Eine palästinensische Terror-Gruppe ermordete elf israelische Sportler – die israelische Führung schwor Rache. Die Sonderheinheit „Caesarea“ jagte die acht Mörder über den gesamten Globus und vollendete die Hatz mit dem Mord an dem letzten Attentäter im Jahr 1979. Die Operation „Zorn Gottes“ ging in die Geschichte ein – wohl auch deshalb, weil ein Unschuldiger sterben musste. Mossad-Agenten töteten den Marokkaner Ahmed Bouchiki. Sie verwechselten ihn mit einem der palästinensischen Attentäter.
Und auch heute noch scheint der Mossad sehr aktiv zu sein. 2012 machte ein Medienbericht die Runde, wonach sich israelische Agenten Mitte der 2000er als CIA-Spione ausgegeben haben sollen, um eine Rebellen-Organisation zu Anschlägen im Iran anzustiften. Es war eine der „besonderen“ Methoden im geheimen Atomkrieg. Von 2010 bis 2012 wurden vier iranische Atom-Wissenschaftler ermordet – von Israel, so Beobachter.
China – Ministerium für Staatssicherheit
Colourbox
In China ist das Ministerium für Staatssicherheit als Geheimpolizei tätig
Organisation des chinesischen Geheimdienstes
Der Geheimdienst in der Volksrepublik China teilt sich in das Ministerium für Staatssicherheit und den Militärnachrichtendienst auf. Das Ministerium kümmert sich dabei um in- wie ausländische Belange und gilt als einer der größten Geheimdienste weltweit. Die Methoden wie Netzzensur, Verletzung von Menschenrechten und zum Teil gewalttätige Überwachung von Dissidenten zeigt, dass das Ministerium ein Dienst mit polizeilichen Befugnissen zu sein scheint.
Geschichte des Ministeriums für Staatssicherheit
Dass Geheimdienste nicht erst ein Phänomen der Moderne sind, zeigt das riesige Netzwerk von Geheimdiensten in der Ming-Dynastie. Die Agenten wurden von Eunuchen angeführt, zumeist einfache Männer aus dem Volk. Die Ming-Herrscher sahen sich im 16. Jahrhundert zunehmend bedroht durch die Macht der Geheimtruppen und ihren Führern. Alle Maßnahmen kamen schließlich zu spät, die große Ming-Dynastie zerbrach. Unter anderem wegen des Konflikts zwischen hohen Beamten und den aus niedriger Herkunft stammenden Eunuchen.
Im Jahr 1949 gründete die Kommunistische Partei den Vorläufer des Sicherheitsministeriums. Die Behörde sollte die Granden der Partei über weltweite Vorkommnisse unterrichten, basierend auf Nachrichten der Presseagenturen und einer limitierten Zahl Zeitungen und Bücher. Mit der Konsolidierung der Macht der Kommunistischen Partei wuchs auch die Aufgabe des Geheimdienstes, die jäh durch die Kulturrevolution unterbrochen wurde. In den Siebziger Jahren wurde die Arbeit wieder aufgenommen und die Behörde in kurzer Zeit massiv erweitert, bis sie 1983 in das Ministerium für Staatssicherheit überformt wurde – um alles abzuwehren, was dem sozialistischen System Chinas gefährlich werden könnte.
Spektakuläres über das Ministerium für Staatssicherheit
Die größte Bedrohung geht von Chinas Cyberspionage aus: Erst im Mai hatte eine US-Expertenkommission eine Liste von militärischen Projekten veröffentlicht, die vom chinesischen Geheimdienst über das Internet ausspioniert wurde. Darunter derart wichtige strategische Objekte wie das Patriot-Raketenabwehrsystem, Flugzeuge und Kriegsschiffe. Aber auch das Videosystem für Drohnen, Nanotechnologie, Nachrichtenverbindungen – der Schaden sei kaum absehbar, so die Kommission. Der Hintergrund sind offenbar die Modernisierungsbemühungen der chinesischen Armee.
Doch auch vor Ort scheinen chinesische Spione ihrer subversiven Tätigkeit nachzugehen: Etwa 120 Agenten arbeiten in den USA, Kanada, Japan, West-, Ost- und Nord-Europa als Geschäftsleute, Industrie-Arbeiter, Banker, Wissenschaftler, Journalisten.
Finnland – Supo
Motage/Panther
Der „Supo“, der zivile Nachrichtendienst, ist nur einer von Finnlands Geheimdiensten
Organisation des finnischen Geheimdienstes
In Finnland gibt es zwei offizielle Nachrichtendienste: Zum einen die „Suojelupoliisi“ (Supo), den zivilen Nachrichtendienst, und das „Pääesikunnan tiedusteluosasto“, den militärischen Nachrichtendienst. Die Supo ist ein Teil der finnischen Polizei und untersteht dem Innenminister, ihr Hauptquartier steht in Helsinki. Etwa 220 Geheimdienstler arbeiten dort an Terrorismus-Bekämpfung, Gegenspionage und allgemein der Bekämpfung von Verbrechen, die sich gegen die Regierung und die Politik richten.
Das „Pääesikunnan tiedusteluosasto“ dagegen untersteht dem finnischen Verteidigungsminister. Die Behörde ist mit dem Schutz des finnischen Hoheitsgebiets beauftragt. Ein zentrales Mittel für die Überwachung ist die Funkaufklärung: Sie sitzt in der zentralfinnischen Kleinstadt Tikkakoski.
Geschichte der Supo
Finnland litt schon immer unter seiner exponierten Lage: Über Jahrhunderte hinweg führten Schweden und Russland ihre kriegerischen Konflikte auf dem finnischen Festland aus, erst im 19. Jahrhundert konnten die Finnen die Fremdherrschaft abschütteln und zu einem eigenständigen Staat werden, obgleich eine starke Abhängigkeit zu Russland auch weiterhin bestand. 1917 rief Finnland seine Unabhängigkeit aus, eine tiefe Kluft zwischen rechten und linken politischen Kräften durchzog jedoch das Land.
Darin fußt die Geschichte der Geheimdienste: Rechte Kräfte gründeten eine Vorläufer-Organisation der Supo, um die „Roten“ zu überwachen. Nach dem Ende der Konflikte 1919 wurde die Geheimdienstarbeit dem Innenministerium unterstellt. Ab da lässt sich eine durchgehende Spionage-Tätigkeit bis in die Gegenwart verfolgen. Doch die politische Entzweiung brodelte weiter: 1949 wurde die Supo gegründet, um die mit Kommunisten besetzte Staatspolizei abzulösen. Die Organisation hat kein eigenes Einsatzkommando. Sie kann allerdings auf das „Karhu“-Team zurückgreifen, ähnlich dem amerikanischen Swat-Team.
Spektakuläres über die Supo
Eine der spektakulärsten Einsätze ist sicherlich Operation Stella Polaris: Im Zweiten Weltkrieg wurde Finnland erneut Dreh- und Angelpunkt östlicher und westlicher Machtinteressen. Einerseits verbündete sich Finnland zwar mit Nazi-Deutschland, andererseits fürchtete die Führung sowohl eine Invasion der Wehrmacht als auch der sowjetischen Truppen. Die Lösung war eine geheime Operation mit den Vereinigten Staaten: Mehrere finnische Spione setzten sich in das benachbarte Schweden ab und verkauften Informationen über das „Dritte Reich“ und die Sowjetunion an die USA.
1942, bei einem Besuch Heinrich Himmlers, spionierte der finnische Geheimdienst den damaligen Reichsführer SS aus – und rettete so wohl 2000 Juden das Leben, wie die Historikerin Janne Könönen 2002 herausfand. Die heimlich abfotografierte Liste mit den Namen einheimischer Juden wurde dem damaligen Staatspräsidenten ausgehändigt – dieser sprach sich vehement gegen eine Auslieferung der Juden aus und bewahrte sie so vor der sicheren Deputation in deutsche Lager.
Die schwierige Quellenlage
Das Internet ist voll brisanter Informationen über die Geheimdienste der Welt. Teilweise ist die Quellenlage mysteriös – und oft falsch. Behörden, die im Geheimen agieren, haben es natürlich an sich, zu den wildesten Verschwörungstheorien einzuladen, die Grenzen zwischen Wahrheit und Fiktion verwischen gerne. Doch es gibt auch seriöse und wissenschaftliche Ansätze – eine Übersicht:
Einen pragmatischen und sehr überblicksreichen Ansatz bietet das Buch „Geheimdienste der Welt“ von Alexandra Sgro, 2013 erschienen im Compact Verlag. Sgro fasst die wichtigsten Informationen zu bekannten Geheimdiensten wie MI6, BND, CIA aber auch unbekannteren Behörden wie Schwedens Säkerhetspolisen oder Griechenlands Ethniki Ypiresia Pliroforion zusammen und reichert die Berichte mit Geschichten zu den größten Skandalen und bekanntesten Spionen an.
Auf der wissenschaftlichen Seite schreibt der emeritierte Professor Dr. Wolfgang Krieger in seiner Monographie „Geschichte der Geheimdienste. Von den Pharaonen bis zur CIA“, 2010 in der zweiten Auflage bei C.H. Beck erschienen. Wie der Titel vermuten lässt, beginnt Krieger seine historische Suche nach den Wurzeln der Spionage in der Antike und verfolgt sie bis in die Gegenwart. Die aktuellsten Entwicklungen zu Snowden und der NSA fanden dabei aufgrund des Veröffentlichungszeitpunktes nicht in das Buch. Spannend: Trotz allem schreibt Krieger über Bürgerrechtsverletzungen, versteckte Kooperationen der internationalen Geheimdienste und „Whistleblower“.
Das „Austrian Center for Intelligence, Propaganda & Security Studies“ (ACIPSS) ist eine wissenschaftliche Plattform unter der Ägide von Professor Dr. Siegfried Beer. Das ACIPSS bietet Tagungsberichte, wissenschaftliche Studien und Interviews zu aktuellen Phänomenen – wie beispielsweise zum Abhör-Skandal. Außerdem beschäftigt sich das Center mit der Geschichte der Geheimdienste im europäischen Westen sowie den USA.
Von FOCUS-Online-Redakteur Julian Rohrer , FOCUS-Online-Autor Johannes Ruprecht und FOCUS-Online-Autorin Lisa Kohn
Find this story at Augustus 2013
© FOCUS Online 1996-2013
Datenspionage in Deutschland; BND schnüffelte millionenfach für US-Geheimdienste14 augustus 2013
Ist der Bundesnachrichtendienst ein Handlanger der US-Geheimdienste? Einem Bericht des “Spiegel” zufolge leiten die deutschen Agenten noch weit mehr Daten an die US-Kollegen weiter als angenommen.
Eine Demonstrantin vor dem Gebäude des Bundesnachrichtendienstes
Der Bundesnachrichtendienst (BND) übermittelt nach einem “Spiegel”-Bericht in großem Umfang Metadaten aus der eigenen Fernmeldeaufklärung an die wegen ihrer Datensammelwut umstrittene US-Behörde NSA. Der deutsche Auslandsgeheimdienst gehe inzwischen davon aus, dass sich sein Standort im bayerischen Bad Aibling hinter einer der beiden Datensammelstellen (Sigads) verbergen könnte, über die der US-Geheimdienst laut Unterlagen aus dem Archiv des US-Informanten Edward Snowden allein im Dezember 2012 unter der Überschrift “Germany – Last 30 days” rund 500 Millionen Metadaten erfasste. Das schreibt das Hamburger Magazin in seiner neuen Ausgabe.
Anzeige
Der BND betonte, man arbeite mit der NSA seit über 50 Jahren zusammen – “insbesondere bei der Aufklärung der Lage in Krisengebieten, zum Schutz der dort stationierten deutschen Soldatinnen und Soldaten und zum Schutz und zur Rettung entführter deutscher Staatsangehöriger. Genau diesen Zielen dient auch die Zusammenarbeit mit der NSA in Bad Aibling, die in dieser Form seit über zehn Jahren erfolgt und auf einer Vereinbarung aus dem Jahr 2002 basiert.” Nach wie vor gebe es “keine Anhaltspunkte dafür, dass die NSA in Deutschland personenbezogene Daten deutscher Staatsangehöriger erfasst”, betonte der Geheimdienst-Sprecher.
Man gehe davon aus, “dass die Sigad US-987LA und -LB” den Stellen “Bad Aibling und der Fernmeldeaufklärung in Afghanistan zugeordnet sind”, teilte der BND laut “Spiegel” mit. “Vor der Weiterleitung von auslandsbezogenen Metadaten werden diese in einem mehrstufigen Verfahren um eventuell darin enthaltene personenbezogene Daten Deutscher bereinigt.” Deutscher Telekommunikationsverkehr werde nicht erfasst, so der BND.
Unterlagen aus dem Snowden-Archiv zufolge unterhalten NSA-Abhörspezialisten auf dem Gelände der Mangfall-Kaserne in Bad Aibling eine eigene Kommunikationszentrale und eine direkte elektronische Verbindung zum Datennetz der NSA, so “Der Spiegel”. Die Weiterleitung der Metadaten in diesem Umfang wirft laut Magazin neue Fragen auf, etwa nach der rechtlichen Grundlage für einen derart weitgehenden Austausch.
Dem BND zufolge laufen “alle Aktivitäten im Rahmen von Kooperationen mit anderen Nachrichtendiensten unter Einhaltung der Gesetze, insbesondere des BND-Gesetzes und des G-10-Gesetzes”. Die Übermittlung personenbezogener Daten deutscher Staatsangehöriger erfolge auch “nicht massenhaft, sondern nur im Einzelfall und nach Vorgaben des G-10-Gesetzes. Im Jahr 2012 wurden lediglich zwei Datensätze eines deutschen Staatsangehörigen im Rahmen eines derzeit noch laufenden Entführungsfalls an die NSA übermittelt.”
3. August 2013, 20:34 Uhr
Find this story at 3 August 2013
© stern.de
NSA use of bases in Germany remains murky14 augustus 2013
More than 20 years after the end of the Cold War, the US still has several military bases in Germany. Experts think that they could play a key role for the NSA’s activities.
“German law applies on German soil and anyone operating here needs to adhere to it,” German Chancellor Angela Merkel said at a news conference before the summer recess. Merkel made the comment in connection with alleged US intelligence activities in Germany.
After Merkel had gone off on holiday, UK daily The Guardian published fresh revelations on the NSA software XKeyscore. The article showed a graphic that pointed to data being mined by US intelligence from servers in Germany rather than just from servers based in the US.
There is now speculation that the NSA and other US intelligence agencies obtain access to German Internet hubs via US military bases in Germany. More than 50,000 US soldiers are still based in Germany – more than the entire armed forces of Belgium. Worldwide, the US has several hundred bases.
Gaycken: Spying from US military basis likely
It helps to be close by
IT specialist Sandro Gaycken from the Free University Berlin says it is highly likely that the US uses its military bases to gain access to cables. “It helps to be physically close to the data hubs you want to mine from,” he told DW. “It does make sense,” he added.
But can US intelligence really gain access without the German government’s knowledge? Gaycken says it is possible, but unlikely. “If it’s servers in allied countries, it could be that special contracts allow you direct and legal access to those systems,” he explains.
Legal basis for spying
And there are agreements regulating US intelligence activities on US military bases in Germany. In 1968, the G10 law was passed, regulating the surveillance of postal and telecommunications services by German intelligence agencies.
The law also included an administrative agreement that allowed wiretapping and surveillance by the allied forces in Germany for the purpose of protecting the troops.
On Friday (02.08.2013) Germany’s Foreign Ministry declared that “the administrative agreement from 1968/69 in connection with the G10 law” with the US and the UK was being suspended “by mutual consent.”
German Foreign Minister Guido Westerwelle called it “a necessary and correct consequence resulting from the recent debates about privacy.”
The German government suspended an agreement with the US
Purely symbolic?
But the announcement has not changed anything, as the agreement has long been obsolete, according to a government spokesman, who said on July 8 that it had not been applied since reunification in 1990.
And so the speculating continues as to the legality of the NSA’s activities in Germany. What is clear is that US intelligence agencies operate on US military bases in Germany.
The German Defense Ministry issued a paper listing companies that profited from discounts available to those who do business with US forces in Germany. The paper names 207 companies that were granted discounts “for analytical services.”
“Senior intelligence systems analyst” or “signal intelligence analyst” are two job descriptions that would have fit the bill, according to the paper.
The German government told reporters on July 31 that “analytical activities” included technical, military services. But they said they were not exactly sure what that entails.
The firm whistleblower Edward Snowden worked for, Booz Allen Hamilton, was granted a license for “intelligence operations” in Germany, according to a German Foreign Ministry source from November 28, 2008.
Scmidt-Eenboom: NSA is an all too powerful force
What happened in the Dagger complex?
Some of the companies eligible for those discounts may well be working for the NSA in the Dagger complex in Griesheim near Darmstadt. More than 1,000 US intelligence agents work in this predominantly underground complex.
“Germany could demand for the US to close down a facility like the one in Griesheim – if Germany took the view that the Americans are violating Germans’ civil rights,” says intelligence expert Erich Schmidt-Eenboom.
“But that would mean confrontation, also between the various agencies. And that’s something the relatively small [German Foreign Intelligence Service] BND cannot afford.”
Date 03.08.2013
Author Marcus Lütticke / ng
Editor Richard Connor
Find this story at 3 August 2013
© 2013 Deutsche Welle
Überwachung; BND leitet massenhaft Metadaten an die NSA weiter14 augustus 2013
Die NSA verfügt über Millionen Verbindungsdaten aus Deutschland – nach SPIEGEL-Recherchen übermittelt der Bundesnachrichtendienst viele der Informationen. Auch die technische Kooperation der beiden Geheimdienste ist enger als bislang bekannt.
Hamburg – Der Bundesnachrichtendienst (BND) übermittelt in großem Umfang Metadaten aus der eigenen Fernmeldeaufklärung an die NSA. Der deutsche Auslandsgeheimdienst geht inzwischen davon aus, dass sich sein Standort in Bad Aibling hinter einer der beiden Datensammelstellen (Sigads) verbergen könnte, über die der US-Geheimdienst laut Unterlagen aus dem Archiv des Whistleblowers Edward Snowden allein im Dezember vergangenen Jahres unter der Überschrift “Germany – Last 30 days” rund 500 Millionen Metadaten erfasste.
Man gehe davon aus, “dass die Sigad US-987LA und -LB” den Stellen “Bad Aibling und der Fernmeldeaufklärung in Afghanistan zugeordnet sind”, erklärte der BND gegenüber dem SPIEGEL. Unter Metadaten versteht man bei Telefonaten, E-Mails oder SMS die Verbindungsdaten, also unter anderem die Informationen, wann welche Anschlüsse miteinander verbunden waren.
“Vor der Weiterleitung von auslandsbezogenen Metadaten werden diese in einem mehrstufigen Verfahren um eventuell darin enthaltene personenbezogene Daten Deutscher bereinigt.” Deutscher Telekommunikationsverkehr werde nicht erfasst, so der BND. Zudem habe man bislang “keine Anhaltspunkte, dass die NSA personenbezogene Daten deutscher Staatsangehöriger in Deutschland erfasst”. Ob die NSA noch weitere Metadaten aus Deutschland sammelt, und wenn ja auf welchem Wege, ist weiterhin unbekannt.
Unterlagen aus dem Snowden-Archiv zufolge unterhalten NSA-Abhörspezialisten auf dem Gelände der Mangfall-Kaserne in Bad Aibling eine eigene Kommunikationszentrale und eine direkte elektronische Verbindung zum Datennetz der NSA.
Die Weiterleitung der Metadaten in diesem Umfang wirft neue Fragen auf, etwa nach der rechtlichen Grundlage für einen derart weitgehenden Austausch. Dem BND zufolge laufen “alle Aktivitäten im Rahmen von Kooperationen mit anderen Nachrichtendiensten unter Einhaltung der Gesetze, insbesondere des BND-Gesetzes und des G-10-Gesetzes”.
BND gab NSA Kopie zweier Programme
Auch die technische Kooperation ist enger als bekannt. Unterlagen aus dem Snowden-Archiv zufolge gaben NSA-Spezialisten Vertretern von BND und Bundesamt für Verfassungsschutz ein Training im Umgang mit den neuesten Analysemethoden des Programms XKeyscore – dem Material zufolge soll es dabei unter anderem um Verhaltenserkennung (“behavior detection”) gehen.
Umgekehrt zeigten sich NSA-Analysten schon vor Jahren an Systemen wie Mira4 und Veras interessiert, die beim BND vorhanden waren. “In einigen Punkten haben diese Werkzeuge Fähigkeiten, die die US-Sigint-Möglichkeiten übertreffen”, heißt es in den Unterlagen. Sigint bedeutet nachrichtendienstliche Informationsgewinnung. Weiter heißt es, dass der BND “positiv auf die NSA-Bitte nach einer Kopie von Mira4 und Veras” geantwortet habe.
Der BND teilte am Abend als Reaktion auf den SPIEGEL-Bericht mit, er arbeite seit über 50 Jahren mit der NSA zusammen, insbesondere bei der Aufklärung der Lage in Krisengebieten. Diesem Ziel diene auch die Kooperation in Bad Aibling, die seit mehr als zehn Jahren erfolge und auf gesetzlicher Grundlage stattfinde. Personenbezogene Daten deutscher Staatsangehöriger würden nur im Einzelfall übermittelt.
03. August 2013, 18:06 Uhr
Find this story at 3 August 2013
© SPIEGEL ONLINE 2013
NSA-Skandal empört Datenschützer; Schaar will Schnüffel-Server notfalls persönlich aufspüren14 augustus 2013
Die NSA soll für ihre Schnüffelei auch Server in Deutschland nutzen. Datenschützer Peter Schaar verlangt darüber Auskunft von den Telekomanbietern. Weil diese schweigen, droht er mit Kontrollbesuchen.
“Die Tätigkeit von ausländischen Nachrichtendiensten auf deutschem Boden muss geklärt werden”: Deutschlands oberster Datenschützer Peter Schaar.
Die USA halten uns hin, die Bundesregierung weiß angeblich von nichts und Kanzlerin Merkel gibt sich mit solchen Details nicht ab: Manchmal scheint es, als wäre der Bundesdatenschutzbeauftragte Peter Schaar der einzige Offizielle, der wirklich an der Aufklärung der NSA-Spähaffäre interessiert ist. Tief besorgt über die offenbar fast grenzenlosen Möglichkeiten zur Überwachung des Internets durch den US-Auslandsgeheimdienst zeigte sich Deutschlands oberster Datenschützer am Freitag in der ARD. “Das versetzt uns in Alarm, zurecht”, sagte Schaar. Das Programm “XKeyscore” sei “nicht nur so ein Stück Software”. Es handele sich offensichtlich um ein System, das aus einem Programm und weltweit verteilten Servern besteht.
Anzeige
“Was mich besonders beunruhigt, sind die Meldungen darüber, dass es auch in Deutschland entsprechende Server geben soll, über die entsprechende Informationen über den Internetverkehr abgegriffen werden”, erklärte Schaar. Dieser Frage gehe er derzeit nach. Er habe sich an die entsprechenden Telekommunikationsunternehmen gewandt – aber “bisher kaum Antworten gekriegt”. Er und seine Mitarbeiter hätten jedoch das Recht, sich dies vor Ort anzuschauen, warnte der Bundesbeauftragte die Telekomanbieter. “Und gegebenenfalls werden wir davon auch Gebrauch machen.”
Von der Bundesregierung erwartet er dabei offenbar mehr Unterstützung und ein selbstbewussteres Auftreten gegenüber der US-Regierung und der NSA: “Auch die Tätigkeit von ausländischen Nachrichtendiensten auf deutschem Boden, etwa im Rhein-Main-Gebiet, wo sich die wichtigsten Internetknoten befinden, muss geklärt werden”, forderte er in der “Berliner Zeitung”.
“Unsere Grundrechte werden ausgehebelt”
Die eigene Regierung griff Schaar in der NSA-Affäre ungewöhnlich scharf an. “Wie Herr Pofalla zu sagen, die deutschen Nachrichtendienste hielten zu 100 Prozent den Datenschutz ein, ist sehr mutig”, sagte er der Zeitung mit Bezug auf die jüngsten Beschwichtigungen von Kanzleramtsminister Ronald Pofalla (CDU). “Wenn Sie meine Tätigkeitsberichte lesen, werden Sie feststellen, dass da auch nicht alles zu 100 Prozent datenschutzkonform gelaufen ist.”
Da in- und ausländische Nachrichtendienste ihre Informationen offenbar austauschten, bestehe der begründete Verdacht, “dass auf diese Weise unsere Grundrechte ausgehebelt werden, selbst wenn es bei uns eine gesetzliche Begrenzung auf 20 Prozent der Übertragungskapazität gibt”. Klärungsbedarf sieht Schaar nach wie vor, da nicht nur das Parlamentarische Kontrollgremium – in dem Pofalla jüngst vorgesprochen hatte – Anspruch auf Informationen habe. “Wir brauchen mehr Transparenz”, sagte er der Zeitung, “nicht nur gegenüber Geheimgremien, sondern in der Öffentlichkeit”. Eine Kontrolle im Geheimen sei nur “sehr begrenzt wirksam”.
“Ich habe Friedrichs Äußerung nicht verstanden”
Tadelnde Worte richtete Schaar auch an Bundesinnenminister Hans-Peter Friedrich (CSU), der im Zusammenhang mit den aufgedeckten Überwachungsprogrammen von einem “Supergrundrecht” auf Sicherheit gesprochen hatte. “Ich habe diese Äußerung nicht verstanden”, sagte der zum Jahresende aus dem Amt scheidende Datenschutzbeauftragte. “Es gibt im Grundgesetz ein einziges Supergrundrecht, und das ist die Menschenwürde.” Sicherheit sei wichtig, dürfe aber nicht über allem stehen. Schaar zufolge muss eine Demokratie den Anspruch haben, “hier steuernd einzugreifen und die Überwachung zurückzufahren”.
2. August 2013, 11:32 Uhr
Find this story at 2 August 2013
© stern.de
NSA: permission to spy in Germany14 augustus 2013
Germany has been under surveillance by the United States for decades, and German leaders have been fully aware of it, says historian Josef Foschepoth. The reason? Secret post-war accords.
Deutsche Welle: The NSA spy scandal continues to ruffle feathers in Germany, Mr. Foschepoth. As a historian, you say the surveillance has been going on since the early days of post-war Germany. So, the revelations of Edward Snowden were not a surprise to you?
Josef Foschepoth: No, not really. I was surprised instead by the initial reactions, in particular, from the political side. They were as if this had happened for the first time, as if it was something terribly bad and unique. But that is not the case. From my own research, I know that this happened countless times in the 1960s in Germany.
How do you explain the rather low-key response from the German government?
Well, such affairs are always very uncomfortable because they bring to light something that had functioned in the shadows. And this function should not be disturbed, so it’s played down. But now, this is no longer the case because it is an instance of severe and intensive surveillance. And moreover: it has been conducted by a friendly state.
This surveillance, as you’ve said, has been going on for decades, since the beginning of the Federal Republic of Germany in 1949. What rights did the occupation forces – among them, the Americans – have at that time?
Let’s be clear that the victorious forces were in Germany to occupy the country. They wanted to make sure that Germany would never again be a threat as it was during the Nazi dictatorship. But, after the victory over Nazi Germany, a further conflict began with the Soviet Union and the Cold War was born. It was a two-fold conflict that required a new strategy from the United States. A policy of double containment ensued: containment of the Soviet Union on the one hand and Germany on the other. And an essential element of this policy was surveillance.
The so-called General Treaty, which regulated ties between Germany and the three allied powers, went into effect in 1955. The Federal Republic was to have the full powers of sovereignty over its domestic and foreign affairs. What did that mean for the surveillance strategy of the Americans?
These formulations, of course, are always very nice and are meant for the public, more than anything. Ten years after the end of World War Two, the Germans felt the fundamental urge to be a sovereign state once again. But that was not the case at all because in the treaties from 1955 – it was volumes of treaties – were secret supplemental agreements which guaranteed key rights for the Western allied forces; among them, the right to monitor telephone and postal communications.
What was the motivation for the German side behind all this?
The Americans exerted massive pressure. They did not want to give up this territory, which was geostrategically important for its surveillance operations. German leaders, of course, wanted to be able to say that we now had a bit more sovereignty; in other words, a few strokes for the reawakening national psyche. Of course, what they didn’t say was we had to accept the same circumstances we had in the past under the occupation in the future as well, due to the international treaties and secret agreements. And these agreements are still valid and binding for every German government, even today.
How could these agreements survive all these years?
They were secret. The US had build a little America with its bases, in which the German government could not govern. When then-chancellor Helmut Kohl worked to clinch German reunification, he realized that this issue was a little difficult and controversial, so he said let’s just ignore it, and so, there were no negotiations over America’s special status rights. Therefore, these supplemental agreements are still in effect.
Chancellor Merkel stresses that Germany is not a ‘big brother’ society. You say that Germany is one of the most closely monitored countries in Europe.
The phrase ‘big brother society’ is certainly a bit polemical. But let me put it this way: The fall from grace happened in 1955 when Konrad Adenauer agreed to the special status rights in negotiations with the allied forces. The recognition of these rights by the chancellor meant that there was no going back to the sanctity and privacy of post and telecommunications, as it is written in the German constitution. That is how the large German-allied intelligence complex arose.
That is interesting in that Germans are known for being very private about their data and it’s why they put great emphasis on data privacy.
In the early years of the Federal Republic that was even more pronounced than it is today. That is why it was kept secret in the first place.
Professor Josef Foschepoth is a historian at the University of Freiburg and author of the book “Überwachtes Deutschland. Post- und Telefonüberwachung in der alten Bundesrepublik” (Vandenhoeck & Ruprecht, Göttingen, 2012)
Find this story at 29 July 2013
© 2013 Deutsche Welle
Rumors of NSA surveillance outpost in Wiesbaden persist14 augustus 2013
Is a new building under construction at US Army headquarters in Wiesbaden also designed to house NSA spies? There are rumors, but the army says the facility is strictly for military intelligence units.
One of the US Army’s most important facilities in Europe since the end of World War Two is in Wiesbaden, west of Frankfurt. During the Berlin blockade, this is where US planes took off in 1949 to supply Berlin with food, fuel and aid in what became known as the Berlin airlift. Today, the US Army in Europe (USAREUR) has its headquarters in Wiesbaden and is reportedly building a new military intelligence center that may also be used by the US National Security Agency (NSA.)
The chief of Germany’s Federal Intelligence Service (BND), Gerhard Schindler, is said to have disclosed the plans during a closed-door meeting of parliament’s internal affairs committee. The BND, however, denied a subsequent German newspaper report on the planned surveillance outpost,and refused further comment.
Mayor Gerich held lengthy talks with the US
The army applied for a building permit for the high-tech structure, the Consolidated Intelligence Center (CIC), in 2008. The building is expected to be completed by the end of 2015, and will cost 124 million euros ($163 million). In the wake of mounting outrage at disclosures that the NSA was spying on allied governments and their citizens, Wiesbaden Mayor Sven Gerich wanted more information on the new surveillance outpost at Clay Barracks. Gerich met earlier this week for four hours of talks with Colonel David Carstens, commander of the US garrison in Wiesbaden.
Friendly clarification
The US military did not react angrily when asked about a possible NSA presence, the Wiesbaden mayor told DW. They understand how sensitive the issue is in Germany, Gerich said: “Colonel Carstens literally told me, this is purely a US Army facility, not an NSA facility.”
But how credible is this information? “I do not have the impression that Colonel Carstens was lying,” the German mayor said, adding that the building was designed to house elements of a brigade currently at a base in Darmstadt. The US Army’s military intelligence brigade is being given better working conditions and more space to gather information for the safety of US troops in Europe. Larger structures, including antennas are not planned, Mayor Gerich said and made it clear that the city is in no position to object, anyway.
The former NSA monitoring base in Bad Aibling near Munich
New openness
The meeting with the US military had an element of surprise, Gerich said. Media have reported the new surveillance structure in Wiesbaden will be completely sealed off, with access only by US personnel and even construction firms and material shipped from the US. However, it appears this secrecy is to be loosened somewhat by new information polices to accommodate concern among the population. Colonel Carstens offered to invite the media once construction of a good part of the surveillance center was finished. He wants people to realize that there are no subterranean facilities.
Under certain circumstances the German government could have the site shut down
The NSA site in Griesheim near Darmstadt has quite a few underground, or secret, facilities. Intelligence groups formerly set up in the Bavarian town of Bad Aibling work at the so-called Dagger Complex. That facility was closed in 2004, due to political pressure by former Bavarian state premier Edmund Stoiber. There was concern American intelligence services were using the Echelon intelligence collection and analysis network at the Bad Aibling station for industrial espionage in Germany. “They did not just have an eye on the Balkans, Afghanistan and Iraq,” German espionage expert Erich Schmidt-Eenboom told Deutsche Welle.
Probably no NSA in Wiesbaden
According to the expert, the Griesheim units are predominantly involved in satellite tracking. Depending on intelligence priorities, satellites are repositioned in their orbit, and moved to cover new areas of a crisis. NSA experts help with the data analysis. “If it is true that the Griesheim unit is not being moved to Wiesbaden, the information the US colonel gave the mayor is correct: NSA staff will not be working in the new surveillance building,” Schmidt-Eenboom said. The Wiesbaden mayor’s office confirmed authorities always noted military intelligence units from Darmstadt would move to Wiesbaden, there was never mention of the NSA in Griesheim .
Satellite trackers reposition satelites
Schmidt-Eenboom pointed out, however, that should the US Army’s information turn out to be false after all, the German government has the right to demand the site be shut down. Under the NATO Status of Forces Agreement, intelligence installations are not meant to provide protection to one individual nation, but to all member states.
Should US spying activities actually target Germany, a difficult situation would arise – in theory. In reality, according to information spread by US whistleblower Edward Snowden, German and American intelligence services cooperate closely. Thus, and despite official disclaimers, experts are convinced NSA workers come and go at US bases across Germany.
Date 26.07.2013
Author Wolfgang Dick / db
Editor Gregg Benzow
Find this story at 26 July 2013
© 2013 Deutsche Welle
Police investigate ‘United Stasi of America’ artist14 augustus 2013
Berlin police are investigating whether an artist who projected “United Stasi of America” onto the US embassy in the German capital earlier this week could be charged with a criminal offence.
German artist Oliver Bienkowski projected the message, along with a picture of internet tycoon and online activist Kim Dotcom onto the US embassy in Berlin on Sunday night.
He was likening reported sweeping internet surveillance by Washington and London to spying by the former East German secret police. And while the image was projected onto the building for 30 seconds on Sunday night, the action has caused quite a stir.
An investigation has been launched into whether the action constituted “slander against the organizations and representatives of a foreign state,” the Berlin-based Der Tagesspiegel newspaper reported on Thursday.
Bienkowski’s lawyer Fabian Eickstädt pointed out that the projection was onto the US embassy, which is technically US territory. “For me it is not even clear whether German law would apply,” he said.
And Der Tagesspiegel said that a criminal case of slander could only be launched if the victim were to make a formal complaint. The US embassy told the paper it had no interest in a prosecution.
While Dotcom had no problem claiming the projection. “I defaced the U.S. embassy in Berlin with a truth-projection last night. 0Wned!” he tweeted. The video on YouTube has garnered nearly 80,000 hits.
Dotcom, a German national, is the founder of file-sharing website Megaupload that was shut down by US authorities who seek to extradite him on charges of racketeering, fraud, money laundering and copyright theft.
Dotcom, born Kim Schmitz, denies any wrongdoing and is free on bail in New Zealand ahead of his extradition hearing.
US intelligence leaker Edward Snowden, in limbo at a Moscow airport, is also seeking to evade US justice after leaking explosive details about a vast US electronic surveillance programme and bugging of European missions.
Germany has reacted with particular alarm to the revelations about the US and British spy programmes, given its history of state surveillance under the Nazis and the communist East German regime.
Published: 11 Jul 2013 11:51 CET | Print version
Find this story at 11 July 2013
© The Local Europe GmbH
Im Namen von „Kim Dotcom“ bestrahlte er die US-Botschaft; Dieser Freimaurer verübte den Licht-Anschlag14 augustus 2013
Berlin – Er ist bekennender Freimaurer, Sympathisant der Hacker-Gruppe „Anonymous“ – und er hat den Licht-Anschlag auf die US-Botschaft in Berlin für „Kim Dotcom“ verübt.
Oliver Bienkowski (31), Chef einer Düsseldorfer Guerilla-Werbeagentur, projizierte den Schriftzug „United Stasi of America“ auf das Botschaftsgebäude. Für die Aktion brauchte er mehrere Wochen Vorbereitung, dazu drei Tage lang in der Hauptstadt, um sich den Ort anzuschauen.
Sonntagnacht schlägt er zu: Plötzlich blitzt gegenüber dem Berliner Holocaust-Mahnmal die Licht-Botschaft auf. Darunter ein Bild von Internet-Betrüger Kim Schmitz (39), alias „Kim Dotcom“.
► Die Licht-Parole auf der US-Botschaft soll ein Protest gegen die Abhör-Aktivitäten der USA sein. Und weil Bienkowski ein Fan von „Kim Dotcom“ ist, schrieb er ihm per Mail von der Idee. Bienkowski zu BILD.de: „Er hat gesagt, dass wir sein Bild benutzen dürfen. Der Slogan stammt von ihm.“ Hacker „Kim Dotcom“ lebt in Neuseeland und betrieb dort die illegale Daten-Tauschbörse „Megaupload“.
Der Licht-Anschlag kostete 5000 Euro, inklusive digitalem Beamer. Bienkowski hat alles aus eigener Tasche bezahlt. Auf YouTube stellte der Künstler ein Video der Aktion ein.
Schließlich wurde er von der Polizei verjagt, eine Anzeige fürchtet der Lichtmaler, wie er sich nennt, aber nicht. Für die Grünen strahlte er bereits das Kanzleramt an, beim „Festival of Lights“ zauberte er einen Regenbogen aufs Brandenburger Tor.
„Kim Dotcom“ freute sich seinerseits über die Aufmerksamkeit und postete den ersten BILD-Artikel bei Twitter.
Ein Sprecher der US-Botschaft über die Aktion: „Sehr lustig, aber wer so einen Vergleich anstellt, kennt weder die Stasi noch Amerika.“
08.07.2013 – 18:09 Uhr
Von SOLVEIG RATHENOW
Find this story at 8 July 2013
© BILD.de
System XKeyscore: US-Privatfirmen suchen Überwachungsfachleute14 augustus 2013
Das Spionagewerkzeug XKeyscore, das NSA und BND einsetzen, hat viele Fans – auch in privaten US-Unternehmen. In Stellenanzeigen suchen die Firmen ganz offen nach Fachleuten für diverse NSA-Programme. Wichtige Einstellungsbedingung: ein bestandener Lügendetektortest.
Washington/Fort Meade – Die National Security Agency ist eine gewaltige Behörde. Der “Washington Post” zufolge arbeiten derzeit etwa 33.000 Menschen für den US-Geheimdienst, der auf Spionage, Verteidigung und Angriff in Netzwerken spezialisiert ist. Die NSA unterhält nicht nur eine riesige Zentrale in Fort Meade, Maryland, sondern auch noch zahlreiche Stützpunkte in den USA und anderswo. Im britischen Menwith Hill sollen demnächst bis zu 2500 NSA-Bedienstete arbeiten. In Bluffdale, Utah, baut der Geheimdienst derzeit das vermutlich größte Rechenzentrum des Planeten.
Doch all diese Einrichtungen sind nur ein Teil des tatsächlichen Geheimdienstapparats – andere Teile der US-Sicherheitsarchitektur sind längst outgesourct. In einem großangelegten Bericht über diese Schattenbranche schätzte die “Washington Post” schon 2010, dass von 854.000 Personen mit der Sicherheitsfreigabe “Top Secret” 265.000 Vertragsangestellte von Privatunternehmen waren.
Noch immer suchen sowohl die NSA als auch die knapp 500 privaten Firmen, mit denen sie zusammenarbeitet, ganz offen nach weiterem Fachpersonal für Überwachung, Spionage und Cyberwar. Eine ganze Reihe von Stellenanzeigen der NSA selbst für Positionen etwa im Bereich Computer Network Operations beginnt jeweils mit der gleichen, erstaunlich offenen Passage:
“Unsere Nation ist in eine neue Ära eingetreten, die tiefgreifende Veränderungen hinsichtlich der Operationsweise der National Security Agency mit sich bringt. Die explosive Ausbreitung des World Wide Web verlangt nach einer Mission im Bereich Computer Network Operations. Diese wichtige Mission besteht aus drei Teilen: Netzwerkverteidigung, Netzwerkattacken und Erschließung von Computernetzwerken. Um diese Funktionen zu erfüllen, sucht die NSA Menschen, die mit hoher Sachkunde und Leidenschaft den Krieg im Cyberspace gewinnen wollen.”
Dass der Geheimdienst den “Krieg im Cyberspace” als gegeben betrachtet, lässt tief blicken. Die NSA verschickt solche Stellenanzeigen sogar über einen eigenen Twitteraccount.
Doch die NSA selbst ist bei weitem nicht die einzige Organisation, die in Online-Stellenanzeigen freimütig mit dem eigenen Bedarf an Arbeitskräften hausieren geht. Eine ganze Reihe von Unternehmen sucht beispielsweise Analysten, Techiker, Programmierer, die mit dem als streng geheim eingestuften System XKeyscore umgehen können, das SPIEGEL-Informationen zufolge auch der Bundesnachrichtendienst (BND) und der Verfassungsschutz (BVF) einsetzen.
Doch nicht nur nach Fachleuten im Umgang mit dieser NSA-Software wird gesucht. In zahlreichen Stellenanzeigen tauchen Programmnamen auf, die man von den bislang publizierten NSA-Folien – etwa über das Prism-Programm – kennt. Andere stehen auf einer Liste mit NSA-Programmnamen, die der Geheimdienst-Fachmann William Arkin schon im März 2012 veröffentlichte.
Einige Beispiele:
Der Rüstungskonzern L3 Communications (nicht zu verwechseln mit dem Telekommunikationskonzern Level 3 Communications) sucht für seine Sicherheitssparte einen Systems Integration Engineer am Standort Maryland / Fort Meade – dort ist auch die NSA zu Hause. Mit Programmen wie XKeyscore sollte sich der Bewerber auskennen, vor allem mit dem Entwickeln von Zusatzprogrammen, sogenannten Plug-ins.
Als Netzwerk-Spezialist ist man gefragt bei Tasc. Die Firma mit mehreren tausend Mitarbeitern und laut “Washington Post” schon 2009 einem Jahresumsatz von zwei Milliarden Dollar bietet IT-Lösungen für Geheimdienste und Militär an. Mitbringen sollen Bewerber Kenntnisse von NSA-Programmen wie XKeyscore, Tuningfork, Discoroute oder Marina. Letzteres dient den Prism-Folien zufolge der Auswertung von Internetverbindungsdaten. Die potentiellen Mitarbeiter werden mit der Aussicht gelockt, “Schutz und Sicherheit zu verbessern und die Grundwerte der Gesellschaft zu schützen”.
Das Unternehmen CyTech sucht einen Analysten, der sich auf das Auswerten verschiedener Quellen versteht – mit NSA-Programmen wie Anchory/Maui, Pathfinder oder Skywriter. Pluspunkte sind Kenntnisse von Pinwale und XKeyscore. Pinwale ist ein Analyseprogramm für Video-Inhalte, das ebenfalls auf den Prism-Folien auftaucht.
Die Liste ließe sich fortsetzen: Auch andere einschlägige Unternehmen wie Saic, Raytheon oder BAE Systems suchen nach qualifizierten Fachkräften für Überwachungssoftware, die man nun als NSA-Werkzeuge kennt. Umgekehrt preisen im Business-Netzwerk LinkedIn Dutzende Mitglieder ihre Erfahrung mit XKeyscore und anderen NSA-Programmen als Qualifikation an.
Was Bewerber in der Regel mitbringen müssen: eine Sicherheitsfreigabe “mit Lügendetektor”. Die Kandidaten müssen Dokumente der höchsten Geheimhaltungsstufe einsehen dürfen, außerdem eine Überprüfung durchlaufen haben, um auch mit besonders gesicherten Informationen zu arbeiten.
Auch auf den XKeyscore- und den Prism-Folien steht stets “Top Secret” – die Unternehmen aus dem Dunstkreis der US-Geheimdienste suchen dennoch ganz offen nach Fachleuten. Womöglich nach solchen, die wiederum die NSA selbst ausgebildet hat. Für sein “Digital Network Exploitation Analyst Development Program” (DDP) wirbt der Geheimdienst etwa mit den Worten: “Wegen ihres Fachwissens und der Bandbreite ihrer Erfahrungen herrscht intensive Nachfrage nach Personen mit einem Abschluss in diesem Programm.”
Tatsächlich wandern ständig junge, gut ausgebildete Leute von den US-Diensten zu privaten Unternehmen ab, die einfach besser bezahlen – um dann über Outsourcing-Verträge doch wieder für NSA oder CIA zu arbeiten. So war es auch bei Edward Snowden: Er arbeitete für die CIA, bevor er sich von der privaten Firma Booz Allen Hamilton anheuern ließ, um dann für ein sechsstelliges Gehalt als Systemadministrator zu arbeiten. Bis er sich mit Tausenden NSA-Dokumenten aus dem Staub machte.
22. Juli 2013, 18:08 Uhr
Von Christian Stöcker und Ole Reißmann
Mitarbeit: Judith Horchert
Find this story at 22 July 2013
© SPIEGEL ONLINE 2013
‘Key Partners’; Secret Links Between Germany and the NSA14 augustus 2013
Chancellor Angela Merkel has repeatedly said she knew nothing about American surveillance activities in Germany. But documents seen by SPIEGEL show that German intelligence cooperates closely with the NSA and even uses spy software provided by the US. By SPIEGEL
It was a busy two days for the surveillance specialists of the Bundesnachrichtendienst (BND), Germany’s foreign intelligence agency. At the end of April, a team of 12 senior BND officials flew to the United States, where they visited the heart of the global American surveillance empire: the National Security Agency (NSA). The purpose of their mission can be read in a “top secret” NSA document which SPIEGEL has seen — one of the trove of files in the possession of whistleblower Edward Snowden.
According to the document, BND President Gerhard Schindler repeatedly expressed an “eagerness” to cooperate more closely with the NSA. The Germans, the document reads, were looking for “guidance and advice.”
Their wish was fulfilled. Senior employees with the NSA’s Foreign Affairs Directorate were assigned to look after the German delegation. The Americans organized a “strategic planning conference” to bring their German partners up to speed. In the afternoon, following several presentations on current methods of data acquisition, senior members of a division known as Special Source Operations, or SSO, spoke to their German guests. The SSO, one of the most secretive groups within the intelligence community, is the division that forms alliances with US companies, especially in the IT sector, for data mining purposes. Snowden describes this elite unit as the NSA’s “crown jewels”.
The journey to Washington wasn’t the first educational trip by German intelligence officials across the Atlantic this spring — nor was it the last. Documents from Snowden that SPIEGEL has seen show that cooperation between Berlin and Washington in the area of digital surveillance and defense has intensified considerably during the tenure of Chancellor Angela Merkel. According to one document, the Germans are determined to “strengthen and expand bilateral cooperation.”
Completely Unaware?
This is awkward news for Merkel, who is running for re-election as the head of the center-right Christian Democrats. The German campaign had been relatively uneventful until recently, but now a new issue seems to have emerged: the Americans’ lust for data. Opposition politicians have intensified their attacks in recent days. First Peer Steinbrück, the Social Democratic candidate for the Chancellery, accused Merkel of having violated her oath of office for failing to protect the basic rights of Germans. Not long later, SPD Chairman Sigmar Gabriel referred to Merkel as a “spin doctor who is trying to placate the population.” According to Gabriel, it has since been proven that the German government knew about the NSA’s activities.
But the attacks from the SPD are not the chancellor’s biggest worry; the real threat comes from within. At a very early juncture, Merkel insisted that her government had been completely unaware of the NSA’s activities. It is a position she reiterated before starting her summer vacation last Friday.
She will now be judged on the basis of those statements. Internally, Merkel’s advisors argue that she had no choice but to take such a clear position. After all, both the head of the BND and the president of the Federal Office for the Protection of the Constitution (BfV), Germany’s domestic intelligence agency, had said that they had had no detailed knowledge of the Prism surveillance program and the extent of American data collection. On what basis could Merkel have contradicted them?
But with each day, fears are growing at the Chancellery that a paper could eventually turn up that clearly shows the government’s knowledge of the NSA activities.
But does that really matter? What is worse? To be governed by a cabinet that conceals its connivance from citizens? Or to have a chancellor and ministers whose intelligence agencies exist in a parallel world, beyond the supervision of the government and parliament? Internal NSA documents show that the Americans and German intelligence agencies are cooperating more closely than previously known. The repeated assertions by the government and intelligence agencies in recent weeks that they were not fully aware of what US surveillance specialists were doing appear disingenuous in the extreme in light of the documents SPIEGEL has seen from the collection secured by Snowden.
‘Key Partners’
According to those documents, the BND, the BfV and the Bonn-based Federal Office for Information Security (BSI) all play a central role in the exchange of information among intelligence agencies. The NSA refers to them as “key partners.”
The Americans provided the BfV with one of their most productive spying tools, a system called “XKeyscore.” It’s the same surveillance program that the NSA uses to capture a large share of the up to 500 million data sets from Germany, to which it has access each month, according to internal documents seen and reported on by SPIEGEL on the first of this month.
The documents also reveal the lengths to which the German agencies and German politicians were willing to go to develop an even closer relationship with the Americans. This is especially applicable to the G-10 law, which establishes the conditions under which surveillance of German citizens is permissible. In one classified document — under a section titled “Success Stories” — it reads: “The German government modifies its interpretation of the G-10 privacy law … to afford the BND more flexibility in sharing protected information with foreign partners.”
The claim that German intelligence agencies knew nothing was already hard to believe given that they have been cooperating with American agencies for decades. According to an NSA document from this January, cooperation between the offensive divisions of the NSA and the BND’s “Technical Reconnaissance” unit began long ago in 1962.
The Americans are extremely satisfied with the Germans. For decades, Washington poked fun at the conscientious German spies, who always had a legal decree on hand to justify why they were regrettably unable to participate in an especially delicate operation. This was a source of annoyance to the Americans, but ultimately they had no choice but to accept it.
More recently, however, that has changed, as the Snowden documents indicate: The German bureaucrats have become real spies.
During the course of 2012, in particular, the Germans showed great “eagerness and desire” to improve their surveillance capacities and even “to take risks and to pursue new opportunities for cooperation with the US,” according to the NSA documents to which SPIEGEL was given access.
A Close Link
The shift to a more offensive German security policy began in 2007, when Merkel’s conservatives were in power in a coalition with the SPD, the so-called “Grand Coalition.” Based on information the NSA had passed on to the BfV, German authorities discovered a group of Islamists led by convert Fritz Gelowicz, known as the Sauerland cell. Gelowicz and several of his friends had planned to detonate bombs in Germany. To this day, the German government is grateful to the Americans for the tip.
According to the NSA document, the successful operation created “a significant level of trust” between the NSA and the BfV. Since then, the document reads, there have been “regular US-German analytic exchanges and closer cooperation in tracking both German and non-German extremist targets.” The documents show that the NSA also provided several training sessions for BfV agents. The aim was “to improve the BfV’s ability to exploit, filter and process domestic data.” The hope was to create interfaces so that data could be exchanged on a larger scale — a cooperation “that could benefit both Germany and the US,” the paper reads.
The pact also intensified on German soil. An NSA analyst accredited as a diplomat at the US Embassy in Berlin uses an office at the BfV once a week. According to the document, the analyst’s job is to “nurture” the thriving relationship with the BfV. The agent also “facilitates US requirements.” In addition, the Germans set up a “communications link” to the NSA to improve ties between agencies.
Personal relationships also intensified. In May alone, just a few weeks before the Snowden revelations began, BfV President Hans-Georg Maassen, Interior Minister Hans-Peter Friedrich and the 12-member BND delegation paid a visit to NSA headquarters. In the same month, NSA Director General Keith Alexander traveled to Berlin, where he made a stop at the Chancellery, which supervises the BND.
The cooperation went beyond high level visits. According to the papers from the Snowden files which SPIEGEL has seen, the NSA provided the BfV with XKeyscore, and BND officials were also very familiar with the tool, given that their job was to instruct their counterparts with German domestic intelligence on how to use the spy program. The main reason the BfV was to be provided with XKeyscore was to “expand their ability to support NSA as we jointly prosecute CT (counter-terrorism) targets.”
A “top secret” presentation dated Feb. 25, 2008, which almost reads like an advertising brochure (the American spies are apparently very proud of the system), reveals all the things XKeyscore was capable of doing already five years ago.
NSA Pleased with German ‘Eagerness’
According to the presentation, the system is easy to use and enables surveillance of raw data traffic “like no other system.”
An NSA transparency titled “What is XKeyscore?” describes a buffer memory that enables the program to absorb a “full take” of all unfiltered data for a number of days. In other words, XKeyscore doesn’t just track call connection records, but can also capture the contents of communication, at least in part.
In addition, the system makes it possible to retroactively view which key words targeted individuals enter into Internet search engines and which locations they search for on Google Maps.
The program, for which there are several expansions known as plug-ins, apparently has even more capabilities. For instance, “user activity” can be monitored practically in real time and “anomalous events” traced in Internet traffic. If this is true, it means that XKeyscore makes almost total digital surveillance possible.
From the German perspective, this is especially troubling. Of the roughly 500 million data sets from Germany to which the NSA has access each month, XKeyscore captured about 180 million in December 2012.
This raises several questions. Does this mean that the NSA doesn’t just have access to hundreds of millions of data sets from Germany, but also — at least for periods of days — to a so-called “full take,” meaning to the content of communication in Germany? Can the BND and the BfV access the NSA databases with their versions of XKeyscore, which would give them access to the data on German citizens stored in those databases?
If this were the case, the government could hardly claim that it had no knowledge of the Americans’ vigorous data acquisition activities.
German ‘Eagerness’ Is ‘Welcomed’
SPIEGEL put these questions to both agencies and the Chancellery, but it received no answers on the use of the system. The BND merely issued a brief statement, saying that it was regrettably unable to comment publicly on the details of intelligence activities.
The NSA and the White House were similarly curt in their responses to SPIEGEL inquiries, merely noting that they had nothing to add to the remarks President Barack Obama made during his recent visit to Berlin.
The new revelations also shine a spotlight on the presidents of the BND and the BfV, Gerhard Schindler and Hans-Georg Maassen. Both men are relatively new in their positions. But BND President Schindler in particular, in office since January 2012, has already made his mark. He embodies the new, more offensive approach being taken by the foreign intelligence agency, which the NSA has expressly praised. Schindler’s “eagerness,” according to the NSA documents, was “welcomed” already in 2012.
When he came into office, the outspoken head of the BND encapsulated the new willingness to take risks. Internally, he asked each BND department to submit three proposals for joint operations with the US intelligence agencies.
Of course, there are also positive sides to this closer cooperation with the Americans. One of the BND’s responsibilities is to protect German soldiers and prevent terrorist attacks. Doing so adequately is impossible without help from the Americans. Conversely, the BND’s reputation has improved among US intelligence agencies, especially after it proved to be helpful in the Kunduz region of northern Afghanistan, where the German military, the Bundeswehr, is stationed. The Germans are now the third-largest procurer of information there.
They don’t just share their information with the NSA, but also with 13 other Western countries. Some time ago, the agency brought its technical equipment in Afghanistan up to the latest standard. Results have been especially good since then, and the NSA is pleased.
In recent years, the BND has had the capability to listen in on phone conversations on a large scale in northern Afghanistan, aiding in the arrests of more than 20 high-ranking members of the Taliban — including Mullah Rahman, once the shadow governor of Kunduz.
Relaxed Interpretation of Privacy Laws
According to an NSA document dated April 9, Germany, as part of the surveillance coalition in Afghanistan, has developed into the agency’s “most prolific partner.” The Germans are similarly successful in North Africa, where they also have special technical capabilities of interest to the NSA. The same applies in Iraq.
But according to the documents, the German foreign intelligence agency went even further in its effort to please the Americans. “The BND has been working to influence the German government to relax interpretation of the privacy laws to provide greater opportunities of intelligence sharing,” the NSA agents noted with satisfaction in January.
Indeed, when Schindler took office, BND officials were divided over whether it was legal to pass on information to partner intelligence agencies that had been obtained in accordance with the German G-10 law. Schindler decided that it was, and the United States was pleased.
The surveillance base in Bad Aibling, a well-known American listening post in southern Germany, also shows how close ties are between the BND and the NSA. It was a symbol of technical espionage during the Cold War. Most recently, the NSA referred to the listening post by the code name “garlic.” Although the last parts of the base were officially handed over to the BND in May 2012, NSA officials still come and go.
The NSA chief for Germany is still stationed at the local Mangfall Barracks. Some 18 Americans were still working at the surveillance station at the beginning of the year, 12 from the NSA and six working for private contractors. The office is expected to be scaled back during the course of the year, with the plans ultimately calling for only six NSA employees to remain at the base. According to the Snowden documents, their work will be to “cultivate new cooperation opportunities with Germany.”
To be sure, intensive cooperation in counterterrorism activities is part of the core mission of Germany’s foreign intelligence agency. But did lawmakers know about the scope of cooperation with the Americans? And, if they did, since when?
Making Things Worse
So far, the BND has been able to count on support from the Chancellery for its new approach. But things seem to be changing. The surveillance scandal has the potential to shake public confidence in the German government and in Chancellor Merkel — and could negatively effect her chances for re-election.
The NSA’s activities, of course, are not exactly driving the German people into the streets in droves. Nevertheless, revelations as to the extent of America’s surveillance abroad are chipping away at Merkel’s image as a reliable manager of the government. Some 69 percent of Germans are dissatisfied with her efforts to shed light on the issue, a number that has alarmed the Chancellery. Until the end of last week, Merkel had tried to distance herself from the subject, issuing only sparse statements. Instead of Merkel, Interior Minister Friedrich was expected to handle the delicate matter.
But Friedrich only made things worse, returning largely empty-handed from his trip to Washington. Instead, he seemed extremely proud of the fact that he had been allowed to speak with US Vice President Joe Biden.
To make matters worse, Friedrich had hardly returned to Germany before making the remark that “security” was a “Supergrundrecht,” a new concept that implies that security trumps other civil rights. A minister charged with upholding the constitution who suddenly invented an interpretation of the German constitution that suits the NSA’s purposes? At that moment, Merkel must have realized that she couldn’t leave things entirely to her interior minister.
Last Friday, shortly before leaving for her summer vacation, Merkel unveiled an eight-point plan intended to provide more data security. But most of her points felt more like placebos. How, for example, are European intelligence agencies to agree on common data privacy guidelines if British and French intelligence agents are already snickering over the Germans’ obsession with data privacy?
In a Bind
Merkel is in a bind. On the one hand, she doesn’t want to give the impression that she is doing nothing about the Americans’ lust for information. On the other hand, this also brings the scandal closer to the chancellor. In the end, it will revolve around the question of how much the government knew about the Americans’ surveillance activities. Last Friday, the BND insisted, once again, that it had “no knowledge of the name, scope and extent of the NSA ‘Prism’ project being discussed.”
But even if that’s true, Prism was only a part of the NSA’s surveillance system, and the new documents show that Germany was indeed extremely familiar with the agency’s comprehensive ability to spy. They benefited from it, and they wanted more.
But Merkel claims that she knew nothing about the Americans’ surveillance software. “I became aware of programs like Prism through current news reports,” she told the left-leaning weekly newspaper Die Zeit last week. According to Merkel’s staff, when she uses such language, she is relying on statements made by the German intelligence chiefs.
But what does that mean? Does the German government still have its intelligence agencies under control? Or have they become a kind of state-within-a-state?
And who exactly keeps track of whether the agencies, in their zeal to enforce the “Supergrundrecht” of security, haven’t already gone too far?
The place where the activities of domestic and foreign intelligence agencies ought to be debated is the Parliamentary Control Panel in the German Bundestag. By law, the government is required to regularly and “comprehensively” inform the 11 members of the board, which meets in secret, about the work of the BND and the BfV, and explain “procedures with special importance.”
Oddly enough, the board has met four times since the beginning of the NSA scandal, and, four times, lawmakers have learned little about the global data surveillance programs. Instead, they were forced to listen to long-winded lectures by those responsible, the essence of which generally was: We really don’t know anything.
Spotlight on Merkel
Over the years, the board has mutated into a stage for large egos and is no longer particularly secret. The problem is that many panel members don’t have sufficient time or expertise to truly understand the kind of activities the intelligence agencies are engaged in. It is a perfect situation for Germany’s spies: The less the public learns about their activities, the more they can go about their business undisturbed.
“Monitoring of the agencies is purely theoretical,” says Hans-Christian Ströbele, the Green Party representative on the board. “We don’t learn about the truly explosive issues until they’ve been exposed by the media.” This isn’t surprising, given the vagueness of statutory provisions on the supervision of intelligence agencies.
The agencies enjoy “complete freedom,” says attorney Wolfgang Neškovi, who once spent many years on the control board for the Left Party. The CDU, its Bavarian sister party, the Christian Social Union (CSU), and the liberal Free Democratic Party (FDP) have now agreed to establish an intelligence body to monitor the intelligence agencies. But in light of recent events, CDU domestic policy expert Clemens Binninger believes that a “major solution” is needed. He favors the idea of a parliamentary intelligence official, to be provided with his own powers and staff.
There is also growing mistrust of the intelligence agencies within Merkel’s government, a situation which led to a memorable scene in the federal press conference last Wednesday. According to a NATO document that had been circulated before the press conference, the German military was indeed aware of the existence of Prism. Government spokesman Steffen Seibert stated that it was the BND’s assessment that the program in question had nothing to do with NSA spy software. But he made sure to keep a distance from the intelligence agency’s assessment. Later, the Defense Ministry issued a statement of its own which directly contradicted the BND statement.
It is an awkward situation for Merkel. In the midst of an election campaign, her government suddenly looks to be characterized by chaos. Of course, if it turns out that the intelligence agencies were deceiving her, she could clean house. BND chief Schindler would seem to be in the front of the firing line, with Ronald Pofalla, who, as Merkel’s chief of staff, is tasked with monitoring the intelligence agencies, not far behind.
But the Chancellery staff has no illusions. The SPD and the Greens will continue putting Merkel in the NSA spotlight no matter what happens. “The chancellor is more interested in defending the interests of the US intelligence agencies in Germany than German interests in the United States,” says SPD Chairman Gabriel. It seems unlikely that the opposition will stand down any time between now and election day, on Sept. 22.
BY RENÉ PFISTER, LAURA POITRAS, MARCEL ROSENBACH, JÖRG SCHINDLER and HOLGER STARK
Translated from the German by Christopher Sultan
07/22/2013 12:19 PM
Find this story at 22 July 2013
© SPIEGEL ONLINE 2013
Nach Offenlegung von NSA-Unterlagen; BND und Verfassungsschutz haben Spähsoftware “getestet”14 augustus 2013
Die Präsidenten der deutschen Geheimdienste haben Vorwürfe dementiert, wonach sie mittels NSA-Spähsoftware im großen Stil Daten gesammelt hätten. Die Software sei nur zu Testzwecken verwendet worden.
Hans-Georg Maaßen, der Präsident des Bundesamtes für Verfassungsschutz, gerät nach Enthüllungen über eine in Deutschland verwendete NSA-Spähsoftware zusehends unter Druck
Der Präsident des Bundesamtes für Verfassungsschutz (BfV), Hans-Georg Maaßen, und der Präsident des Bundesnachrichtendienstes (BND), Gerhard Schindler, haben sich gegen die Vorwürfe gewehrt, ihre Dienste hätten in großem Umfang mit dem US-Geheimdienst NSA (National Security Agency) zusammengearbeitet. Zu einem Bericht des Nachrichtenmagazins “Der Spiegel”, wonach das BfV NSA-Software zur großflächigen Ausspähung von Daten verwende, sagte Maaßen der Zeitung “Bild am Sonntag”, dass dies nur zur Testzwecken geschehe. Die zur Verfügung gestellte Software werde “derzeit” aber nicht für die Arbeit des BfV eingesetzt.
Anzeige
Auch BND-Chef Schindler sagte der Zeitung, es gebe keine “millionenfache monatliche Weitergabe von Daten aus Deutschland an die NSA” durch seinen Dienst. 2012 seien zwei einzelne personenbezogene Datensätze deutscher Staatsbürger an die NSA übermittelt worden. Die Zusammenarbeit mit der NSA habe er jüngst im Parlamentarischen Kontrollgremium vorgetragen.
Riexinger fordert Suspendierung der Geheimdienst-Chefs
“Der Spiegel” hatte am Samstag vorab aus seiner jüngsten Ausgabe berichtet, der Verfassungsschutz habe der NSA mit der Schnüffelsoftware “Xkeyscore” beim Datensammeln geholfen. Mit dem Programm könne unter anderem sichtbar gemacht werden, welche Begriffe eine Zielperson in eine Suchmaschine eingegeben habe. Auch sei das System in der Lage, teilweise auf Kommunikationsinhalte zuzugreifen.
Der Vorsitzende der Partei Die Linke, Bernd Riexinger, forderte die Suspendierung Maaßens und Schindlers “bis zur vollständigen Klärung der Vorwürfe”. Alles spreche dafür, dass die deutschen Geheimdienste die “systematische Aushebelung von Grundrechten” betrieben hätten. Auch die Klärung der politischen Verantwortung müsse ohne Ansehen der Person vorangetrieben werden. Im kommenden Bundestag werde seine Partei deshalb die Einsetzung eines Untersuchungsausschusses beantragen, fügte Riexinger hinzu.
Grüne fordern Änderung des Grundgesetzes
Als Konsequenz aus der NSA-Datenaffäre fordern die Grünen eine Änderung des Grundgesetzes. In einem Beitrag für die “Frankfurter Rundschau” schreiben die Spitzenkandidaten Katrin Göring-Eckardt und Jürgen Trittin: “Was für Briefe gilt, muss für jede E-Mail und SMS gelten.” Deshalb wollen die Grünen “den Artikel 10 Grundgesetz – das Postgeheimnis – ausbauen, zu einem Kommunikations- und Mediennutzungsgeheimnis auch für die digitale Welt”.
21. Juli 2013, 10:30 Uhr
Find this story at 21 July 2013
© stern.de
Deutschland tiefer in US-Spionage verstrickt als angenommen; BND und Verfassungsschutz „testen“ NSA-Spähsoftware14 augustus 2013
Der BND wisse seit Jahren von der nahezu totalen Datenerfassung
Der Auslandsgeheimdienst BND und das Bundesamt für Verfassungsschutz nutzen laut eines Medienberichts eine Spähsoftware des US-amerikanischen Geheimdienstes NSA. Es gilt als eines der ergiebigsten Spionage-Programme und ermöglicht nahezu digitale Totalüberwachung.
Was wissen Angela Merkel und ihre Minister in der Abhör-Affäre? Laut einem Bericht des Nachirchtenmagazins „Spiegel“ nutzen der Auslandsgeheimdienst BND und das Bundesamt für Verfassungsschutz eine Spähsoftware des US-amerikanischen Geheimdienstes NSA. Das berichtet das Magazin am Samstag auf seiner Internetseite. Das gehe aus geheimen Unterlagen der NSA hervor, die dem Magazin vorlägen. Demnach habe sich der BND um die Schulung des Verfassungsschutzes mit dem Umgang des Programms gekümmert. Der Verfassungsschutz, so das Magazin weiter, habe die NSA bei der Terrorbekämpfung unterstützt.
Das System „XKeyscore“, um das es sich handele, sei ein ergiebiges Spionagewerkzeug, so der „Spiegel“ weiter. Es ermögliche die digitale Totalüberwachung und könne beispielsweise sichtbar machen, nach welchen Begriffen Zielpersonen im Internet gesucht haben. Von rund 500 Millionen Datensätzen aus Deutschland, auf die die NSA monatlich Zugriff habe, seien im Dezember 2012 etwa 180 Millionen von „Xkeyscore“ erfasst worden.
Verantwortungslose Heuchelei
In der Meldung des „Spiegel“ heißt es außerdem, dass sich die „Zusammenarbeit deutscher Dienste mit der NSA zuletzt intensiviert“ hätte. Weiterhin hätten die Amerikaner die deutschen Kollegen und den BND-Präsidenten Gerhard Schindler für ihren Eifer gelobt. In Afghanistan, so zitiert das Magazin aus einem internen Papier, sei der BND der „fleißigste Partner“ in Sachen Informationsbeschaffung. BND und Verfassungsschutz hätten sich auf Anfragen des „Spiegels“ aber nicht zum Einsatz des Spionagewerkzeugs geäußert.
Die Hinweise auf eine Einbindung europäischer Nachrichtendienste in die Ausspähprogramme des US-Geheimdienstes NSA verdichten sich also. Nach Darstellung des früheren NSA-Chefs Michael Hayden im ZDF hatten die USA ihre Kooperation mit den Europäern nach den Anschlägen vom 11. September 2001 massiv ausgeweitet – und dabei keinen Zweifel an den Zielen gelassen: „Wir waren sehr offen zu unseren Freunden.“ Zu dieser Zeit regierten in Deutschland SPD und Grüne. Sie dringen nun auf rasche Aufklärung. Die CDU warf der Opposition deshalb „verantwortungslose Heuchelei“ vor.
Samstag, 20.07.2013, 18:46
dpa / Paul Zinken
Find this story at 20 July 2013
© FOCUS Online 1996-2013
Merkel denies US spying ‘old news’ to army14 augustus 2013
The German government Wednesday denied a report claiming that the nation’s military knew for years about the US surveillance programme PRISM revealed by fugitive former intelligence analyst Edward Snowden.
Germany’s foreign intelligence service BND said that a separate programme with the same name existed for NATO forces in Afghanistan to share intelligence.
The spokesman for Chancellor Angela Merkel, who faces elections on September 22, said he had no reason to doubt the BND statement.
The issue is sensitive for Merkel, who said last week she only learnt about the scope of the US National Security Agency (NSA) snooping through media reports.
Many Germans are angry that their emails, phone calls, web searches and other data have been captured and stored under the NSA programme.
Any suggestion that the government failed to stop it or was complicit in it
would spell political danger for Merkel, whose chancellery oversees Germany’s
secret services.
The mass-circulation daily Bild reported earlier that the German military
command for northern Afghanistan had been informed of PRISM in September 2011
in a letter from the Kabul command of the NATO-led International Security
Assistance Force.
According to Bild the letter mentioned that the programme was for phone
and email surveillance and run by the NSA.
However, the BND later said in a brief statement: “The programme referred
to as PRISM in today’s Bild newspaper is a NATO/ISAF programme that is not
identical to the PRISM programme of the NSA. It is also not classified as
secret.”
The BND also stressed that it “had no knowledge of the name, scope and extent of the NSA programme”.
Merkel has testily told Washington that “we are not in the Cold War anymore” but also defended the role of secret services in keeping citizens safe and preventing terrorist attacks.
Snowden, on the run from the US government, has been marooned at a Moscow
airport since June 23 and on Tuesday filed an application for temporary asylum
in Russia. Venezuela, Bolivia and Nicaragua have said they would be open to
offering refuge to Snowden.
Published: 17 Jul 2013 17:00 CET | Print version
Find this story at 17 July 2013
© The Local Europe GmbH
Spähaffäre; Deutsche Geheimdienste außer Kontrolle14 augustus 2013
Der NSA-Skandal geht in Woche sechs, doch die Aufklärung läuft schleppend. Die Spähaffäre wirft ein Schlaglicht auf das Geflecht von Bundesregierung, Parlament und Agenten-Apparat. Kann man Geheimdienste überhaupt kontrollieren?
Berlin – Die Bundesregierung gerät im Skandal um amerikanische Spähaktivitäten zunehmend unter Druck – und zieht sich auf drei Formeln zurück. Erstens: Deutsche und ausländische Nachrichtendienste arbeiten zusammen. Zweitens: Von der Dimension der Spähprogramme habe man erst durch den Whistleblower Edward Snowden erfahren. Drittens: Details über die Arbeit deutscher Geheimdienste werden nicht öffentlich, sondern in Gremien beraten.
In einem dieser Gremien ging die Debatte um die Spionageaffäre am Dienstag in die nächste Runde: Innenminister Hans-Peter Friedrich (CSU) war im Parlamentarischen Kontrollgremium zu Gast – eine vertraulich tagende Gruppe, die die deutschen Geheimdienste überwachen soll. Dreimal tagte das Gremium in den vergangenen Wochen. Viel klüger ist man allerdings noch immer nicht.
Der NSA-Skandal wirft ein Licht auf das undurchsichtige Geflecht von Bundesregierung, Parlament und Geheimdiensten: Wer informiert wen? Kann man Nachrichtendienste überhaupt kontrollieren? Wie geht es jetzt weiter?
Die wichtigsten Fragen und Antworten:
1. Warum tagt das Gremium geheim?
Die elf Mitglieder des Parlamentarischen Kontrollgremiums (PKG) setzen sich aus Innen- und Sicherheitsexperten aller Bundestagsfraktionen zusammen. Sie treffen sich in einem abhörsicheren, fensterlosen Raum in einem Nebengebäude des Reichstags, unweit der Kantine. Da die Arbeit der Geheimdienste naturgemäß geheim bleiben soll, ist die Gruppe zur Verschwiegenheit verpflichtet, auch gegenüber anderen Abgeordneten.
Innenminister Friedrich berichtete am Dienstag dem PKG, was er während seines Besuchs in Washington an Informationen bekam. Ähnlich wie beim Bundessicherheitsrat, der über Rüstungsexporte entscheidet, dringen aber nur selten Details nach draußen, so auch dieses Mal.
Bei der letzten Sitzung war Kanzleramtsminister Ronald Pofalla geladen, der unter anderem für die Koordinierung der Geheimdienste zuständig ist. Dazu die Chefs der drei Geheimdienste: Bundesnachrichtendienst (BND), Militärischer Abschirmdienst (MAD), Bundesamt für Verfassungsschutz (BfV). Die Grünen fordern, die Kanzlerin selbst müsse vor dem Gremium erscheinen. Das soll in absehbarer Zeit allerdings nicht passieren.
Die Regierung muss das Gremium über die Arbeit der Geheimdienste und besondere Vorgänge unterrichten. Die Gruppe darf Geheimakten einsehen und Mitarbeiter der Dienste befragen.
So weit die Theorie. In der Praxis kann die Arbeit frustrierend sein, denn was Bundesregierung und Geheimdienste für berichtenswert halten, entscheiden sie zunächst einmal selbst. Die Folge: Von wirklich heiklen Vorfällen oder möglichen Skandalen erfahren die Bundestagskontrolleure oft erst aus den Medien.
2. Kann man Geheimdienste überhaupt kontrollieren?
Zwar mag die Kontrolle hierzulande besser sein als anderswo. Doch eine echte Überwachung der Geheimdienste ist kaum möglich. Wie sollen elf Parlamentarier auch überblicken, was Zehntausende Agenten im In- und Ausland treiben?
Der Grünen-Abgeordnete Hans-Christian Ströbele, Dienstältester im PKG, sagte einmal: “Wie sollen wir die Geheimdienste kontrollieren, wenn wir keine Informationen bekommen?” Der Abgeordnete Wolfgang Neskovic, der für die Linken bis 2012 im PKG saß, nannte das Kontrollniveau “erbärmlich”, das Gremium einen “Wachhund ohne Gebiss”. Geheimdienstler würden die Sitzungen als “Märchenstunde” verspotten.
Neben dem PKG ist aber auch noch die beim Bundestag angesiedelte sogenannte G-10-Kommission für die Kontrolle der Geheimdienste zuständig. Der Name bezieht sich auf das “Gesetz zur Beschränkung des Brief-, Post- und Fernmeldegeheimnisses” (Artikel-10-Gesetz). Auch dieses Gremium tagt geheim. Es hat vier Mitglieder, die vom PKG bestellt werden. Sie müssen keine Bundestagsabgeordneten sein. Derzeit sitzt dem Gremium der SPD-Politiker Hans de With vor, der einst Parlamentarischer Staatssekretär im Justizministerium war.
Die G-10-Kommission muss ihre Genehmigung erteilen, wenn Geheimdienste Computer oder Telefone anzapfen wollen, um deutsche Staatsbürger auszuspähen. Auch die Durchsuchung von Kommunikationsdaten nach bestimmten verdächtigen Schlagworten muss die Kommission genehmigen.
2011 soll das Gremium den Inlandsgeheimdiensten insgesamt 156 Abhörmaßnahmen bewilligt haben. Die Gründe dafür sind im Gesetz festgelegt, unter anderem geht es um Terrorabwehr, Waffen- und Drogenschmuggel sowie organisierte Geldwäsche.
Allerdings kann auch der Auslandsgeheimdienst BND bei der G-10-Kommission beantragen, im großen Stil Daten an den internationalen Internetknotenpunkten abzufischen. Eine flächendeckende Überwachung ist verboten, das Gesetz sieht eine Grenze von 20 Prozent vor. Die wird angeblich nicht ausgeschöpft, sondern “pendelt bei etwa fünf Prozent”, sagte jüngst Kommissionschef de With.
3. Was wussten deutsche Agenten vom US-Lauschangriff?
Darauf gibt es bislang keine abschließende Antwort. Die hiesigen Geheimdienstler sagen, sie hätten keine Hinweise darauf, dass an deutschen Kommunikationsknotenpunkten Daten abgesaugt wurden. Es gebe zwar eine Zusammenarbeit mit den US-Behörden. Über massenhafte Lauscheinsätze gegen deutsche Bürger sei man aber nicht informiert gewesen.
Der Whistleblower Snowden hatte im SPIEGEL angegeben, deutsche und amerikanische Geheimdienste steckten in Sachen Internetüberwachung “unter einer Decke”. Auch ein Bericht der “Bild”-Zeitung wirft neue Fragen auf. Demnach wusste der BND angeblich seit Jahren von der nahezu kompletten Datenerfassung durch die Amerikaner und griff in Gefahrenlagen aktiv darauf zu.
Derzeit kann nichts nachgewiesen, aber Zweifel können auch nicht ausgeräumt werden. Wenn deutsche Geheimdienste von den Aktionen der US-Dienste gewusst und diese möglicherweise unterstützt haben, wäre das nach deutschem Recht strafbar.
4. Wie geht es jetzt weiter?
Die Kanzlerin telefonierte mit US-Präsident Barack Obama, mehrere Fragenkataloge wurden verfasst, zwei Delegationen nach Washington geschickt. Zur Zeit wird gewartet: Darauf, dass die USA einige als geheim eingeordnete Dokumente deklassifizieren, also aus der Geheimhaltungsstufe herausheben. Von diesem Schritt verspricht sich Berlin Aufschluss über das Ausmaß der NSA-Aktivitäten. Weitere Besuche und Gespräche sind geplant.
Teile der Opposition fordern einen parlamentarischen Untersuchungsausschuss. Schnelle Antworten gäbe es durch den aber auch nicht. Im EU-Parlament beschäftigt sich der Innenausschuss mit der Materie und will bis Ende des Jahres einen Bericht vorlegen. Zu einem Sonderausschuss konnte man sich in Straßburg nicht durchringen. Sechs Wochen nach den Enthüllungen sind also wichtige Fragen noch immer offen. Gut möglich, dass das Thema den Wahlkampf mitbestimmen wird – vor allem, wenn noch weitere Details herauskommen sollten.
16. Juli 2013, 14:25 Uhr
Von Annett Meiritz und Philipp Wittrock
Find this story at 16 July 2013
© SPIEGEL ONLINE 2013
Daten über Entführte; Deutscher Geheimdienst profitierte von NSA-Sammelwut14 augustus 2013
Noch immer behauptet die Bundesregierung eisern, sie habe von den US-Schnüffelprogrammen erst kürzlich erfahren. Nun wird klar, dass der BND schon vor Jahren gezielt in den USA nach gespeicherten Daten von entführten Deutschen fragte – und sie auch bekam.
Berlin – Der Bundesnachrichtendienst (BND) hat in den vergangenen Jahren immer wieder von der Sammelwut der US-Geheimdienste im Internet profitiert und offenkundig von der kompletten Speicherung auch deutscher Daten gewusst. Unter Berufung auf US-Geheimdienstler berichtete die “Bild”-Zeitung am Montag, der deutsche Dienst habe bei Geiselnahmen im Jemen und Afghanistan in den vergangenen Jahren mehrfach gezielt um die von der NSA gespeicherten Internetdaten der Entführten gebeten. So sollten die letzten Kontakte der Gekidnappten und mögliche Hintergründe des Verschwindens recherchiert werden.
Was sich wie eine selbstverständliche Amtshilfe unter befreundeten Diensten anhört, hat weitreichende Implikationen. Da der BND sich direkt wegen der gespeicherten Daten an die US-Kollegen wandte, müssen die Deutschen von dem Speicherprogramm der Amerikaner gewusst haben. Ebenso muss dem Geheimdienst klar gewesen sein, dass die USA auch deutsche Kommunikation standardmäßig speichern.
Die neuen Fakten passen nicht zur angeblichen Ahnungslosigkeit der deutschen Regierung bis hoch ins Kanzleramt. Diesem ist der BND direkt unterstellt. Von dort ließ Kanzlerin Merkel noch in der vergangenen Woche mitteilen, sie habe erst aus der Presse vom Abhörprogramm Prism erfahren. Seit Anfang Juni enthüllt der Ex-Geheimdienstmitarbeiter Edward Snowden immer wieder Details über die Praktiken der internationalen Geheimdienste (eine Chronik der Affäre finden Sie hier).
Für den BND waren die US-Daten sicherlich hilfreich. Bei Entführungen sind vor allem die letzten E-Mails und Telefongespräche wichtig. An ihnen kann man ablesen, ob die Opfer bedroht wurden, es geschäftliche Probleme im Vorfeld gab oder ob gar das Umfeld der Gekidnappten an der Verschleppung beteiligt sein könnte.
Die Daten der NSA flossen laut “Bild”-Zeitung mehrfach in die Arbeit deutscher Krisenstäbe ein, um entführte Deutsche zu befreien. US-Regierungs- und Geheimdienstkreise betonen laut der Zeitung ebenfalls, dass der BND seit Jahren von der nahezu totalen Datenerfassung weiß, in Gefahrenlagen darauf zugreifen konnte – und dies auch aktiv tat.
Auch in Zukunft sollen die Daten fließen
Die Bundesregierung reagierte ausweichend auf diese Enthüllungen. Ein Regierungssprecher sagte lediglich, es sei “bekannt, dass es zwischen den deutschen Nachrichtendiensten und US-Diensten eine langjährige Kooperation gibt”.
Tatsächlich aber bangen die Dienste derzeit um diese Kooperation. So bat Innenminister Hans-Peter Friedrich bei seiner US-Reise hinter verschlossenen Türen eindringlich, dass die USA trotz der Affäre auch in Zukunft NSA-Informationen weitergeben. Dies verlautete aus seinem Ministerium. Aus Friedrichs Sicht sind die US-Daten – ganz gleich wo sie herkommen – für die Gefahrenabwehr in Deutschland extrem wichtig. Öffentlich erwähnt hat er seine Bitte an die USA jedoch in keinem der vielen Statements während und nach der Reise.
15. Juli 2013, 11:16 Uhr
Find this story at 15 July 2013
© SPIEGEL ONLINE 2013
Indispensible Exchange; Germany Cooperates Closely with NSA14 augustus 2013
German authorities insist they knew nothing of the NSA’s Internet spying operations. But SPIEGEL research shows how closely US and German agencies work together. The German opposition is asking uncomfortable questions 11 weeks ahead of a general election.
Chancellor Angela Merkel’s government faces uncomfortable questions about German involvement in American and British Internet and telephone surveillance after whistleblower Edward Snowden told SPIEGEL that German agencies and the NSA are “in bed together.”
With a general election due in 11 weeks, the controversy has opened up a new battleground in the campaign, and the opposition center-left Social Democrats (SPD) and the Green Party are charging onto it.
SPD leader Sigmar Gabriel said it could be that Merkel “knows more than has become known so far.”
Thomas Oppermann, a senior member of the SPD, called on the government to cancel surveillance cooperation agreements with the United States. Hans-Christian Ströbele, a lawmaker with the Greens, said he didn’t believe the government’s statements that it didn’t know about the spying.
“For me it’s just a matter of time before the government admits something,” he told SPIEGEL ONLINE. Petra Pau of the Left Party said Merkel should stop “pretending she knew nothing.”
For the last four weeks, the German government has been insisting that it didn’t know that the United States has spent years monitoring vast quantities of Internet traffic, emails and telephone calls.
The parliament’s oversight committee monitoring German intelligence activities has met three times since the revelations came to light, and each time senior government representatives who had been called to testify shrugged their shoulders.
The Federal Office for the Protection of the Constitution — Germany’s domestic intelligence agency — the BND foreign intelligence agency, and Merkel’s Chancellery were all apparently unaware of what has been going on. Interior Minister Hans-Peter Friedrich said he knew nothing but made clear that the data fishing by Germany’s American friends was bound to be OK. Criticism of it, he said, amounted to “anti-Americanism.”
Germany Cooperates Closely With NSA
But Snowden told SPIEGEL that the BND knew more about the activities of the NSA in Germany than previously known.
SPIEGEL reporting also indicates that cooperation between the NSA and Germany’s foreign intelligence service, the BND, is more intensive than previously known.
A lot is at stake for Europe and the US. This week talks will begin on the planned trans-Atlantic free trade agreement, the Transatlantic Trade and Invesment Partnership (TTIP). The Americans’ snooping could endanger the project.
The Snowden case is entering its next round. At first he revealed how the NSA spes on data networks. Last week SPIEGEL reported that the US was also spying on its allies including Germany. Now the controversy has broadened to include whether the allies themselves are involved in the snooping.
There are times when the inner workings of the world suddenly come to light. Veils fall to the ground and the world suddenly looks different. These are such times.
A man does something that represents the best traditions of the West — he enlightens people, points out wrongdoing and opens eyes. That’s what Edward Snowden has done. And what’s happening to him? The West’s leading nation, the US, is hunting him down, and almost every country is going along with it, especially the rest of the West.
Western Nations Kow-Towing to US
Fear is governing the world, fear of the wrath of the US, fear of President Barack Obama who was once hailed as a global savior. Few seem ready to dare to take on the political and economic superpower.
The West is making itself look ridiculous through submissiveness, by failing to live up to its own values. Meanwhile, states like China or Russia, the constant focus of Western moral finger-wagging, were the first where Snowden sought shelter.
Last Wednesday, Merkel and Obama had a telephone conversation in which both tried to play down the row. There would be “opportunities for an intense exchange about these questions,” officials said afterwards. That wasn’t the tough talking that 78 percent of Germans are demanding of Merkel in her dealings with the US on the issue, according to a recent opinion poll by Infratest Dimap.
This week a German government delegation will travel to Washington for talks with the Department of Homeland Security, the NSA and the US administration. They hope to glean information on what has been going on. When German opposition parties complained that the delegation only consisted of second-tier officials, Interior Minister Friedrich hastily decided to join them.
9/11 Silenced Criticism of ‘Echelon’ Spying System
Foreign data snooping has caused outrage in Germany and Europe before. Twelve years ago, a European Parliament committee criticized “Echelon,” which it described as a “global surveillance system for private and business communcations.” In a 200-page report, the committee said that within Europe, all communications via email, telephone and fax were regularly monitored by the intelligence services of the US, Britain, Canada and Australia.
The European lawmakers recommended a series of rules and agreements to curb the snooping. But two months later, terrorists flew planes into the World Trade Center and it quickly emerged that some of them had lived in Germany. All criticism of “Echelon” fell abruptly silent.
But the German government, despite all its current protestations of ignorance and innocence, cannot be unaware that US surveillance specialists remain active on German soil. At present the NSA is expanding its presence in Germany considerably.
The best-known monitoring facility is in the Bavarian town of Bad Aibling, extensively described in the “Echelon” report. Officially, the Americans gave up the listening post in 2004. But the white domes of the “Echelon” system, known as radomes, are still there. When the site was officially turned over to civilian use, that didn’t apply to the area with the snooping technology. A connecting cable now transmits the captured signals to the site of the Mangfall army base a few hundred meters away. This is officially a German army communications base — but in truth it belongs to the BND. Cooperating closely with a handful of NSA surveillance specialists, the German foreign intelligence service analyzes telephone calls, faxes and everything else transmitted via satellite.
BND Admits Monitoring Cooperation With NSA
Officially, the BND post in Bad Aibling doesn’t exist, and neither does the local cooperation with the Americans. But in a confidential meeting with the parliament’s intelligence oversight committee, BND head Gerhard Schindler last Wednesday confirmed the cooperation with the US service,
There are other locations in Germany where the Americans engage in data monitoring. The US army runs a top secret lstening post in the town of Griesheim near Darmstadt, in western Germany. Five radomes stand on the edge of the August-Euler airfield, hidden behind a little forest. If you drive past “Dagger Complex” you get suspicious looks from security guards. It’s forbidden to take photos. Inside, soldiers analyze information for the armed forces in Europe. The NSA supports the analysts.
The need for data appears to be so great that the US army is building a new Consolidated Intelligence Center in the nearby city of Wiesbaden. The $124 million building will house bug-proof offices and a high-tech control center. As soon as it’s completed, “Dagger Complex” will be shut down. Only US construction firms are being used. Even the building materials are being brought in from the US and closely guarded along the way.
Is it really conceivable that the German government knows nothing of what the NSA is doing on its own doorstep? Last month Interior Minister Friedrich said in a parliamentary debate on the NSA snooping: “Germany has fortunately been spared big attacks in recent years. We owe that in part to the information provided by our American friends.” Sentences like that reveal a pragmatic view of the US surveillance apparatus: What the NSA gets up to in detail is secondary — what counts is what its snooping reveals. And that information, intelligence officials admit, is indispensable.
Without the tip-offs provided by the Americans, authorities would be partly blind in the fight against terrorism. While the BND and the Federal Office for the Protection of the Constitution are bound by strict rules, foreign intelligence agencies operating in Germany are largely uncontrolled in what they do, as long as it serves the war on terror.
Frankfurt’s Role as East-West Data Crossroads
The example of Frankfurt, Germany’s financial center, illustrates that. Frankfurt is a major crossroads for digital data. This where fiber-optic cables from Eastern Europe and Central Asia meet data lines from Western Europe. Emails, photos, telepone calls and tweets from crisis-hit countries in the Middle East also pass through Frankfurt. This is where international providers — companies like Deutsche Telekom or US firm Level 3, which claims to transmit a third of the world’s Internet traffic — operate digital hubs.
For agencies like the NSA or BND, Frankfurt is an inexhaustible source of information. Documents provided by Snowden show that the NSA accesses half a billion pieces of communication each month. The BND also helps itself to data here. It is allowed to tap up to 20 percent of it. The service feeds data from five hubs in Germany for analysis to its headquarters in Pullach near Munich. Its analysts comb through the data for phone calls, emails or Internet messages that might uncover a nuclear smuggling deal or an al-Qaida plot.
The BND uses the NSA’s help to analyze Internet traffic from the Middle East. The Americans provide the Germans with special tools that work with Arabic search terms. Does the US agency get access to the data in return? The BND denies this. All cooperation is in the form of assessing “finished intelligence,” or completed intelligence reports, it insists.
But relations between the BND and NSA are closer than publicly admitted. They work together on clearly defined individual joint operations abroad when it comes to fighting terrorism or monitoring weapons shipments. At the Bad Aibling listening post, an NSA team works closely with BND agents. The BND uses Bad Aibling mainly to monitor Thuraya satellite phones used in remote regions of Pakistan and Afghanistan. The Americans help the Germans in this work. Is it really conceivable that with such close cooperation the one partner didn’t know what the other was doing?
US Need Not Fear Much German Criticism
“We have no information so far that Internet hubs in Germany were spied on by the NSA,” says the president of the Federal Office for the Protection of the Constitution, Hans-Georg Maassen. He also has no information on any snooping on the German government by the US. The agency has set up a working group to investigate Snowden’s allegations.
In the end it’s relatively insignificant whether any light will be shed on the outflow of German Internet data to the US. The German authorities are unlikely to criticize the Americans too harshly. “We can be blackmailed,” said a high-ranking security official. “If the NSA shut off the tap, we’d be blind.”
The US isn’t just a friend, it’s an all-powerful force one can choose to be friends with or not. The Snowden case shows how closely intertwined friendship and submissiveness can be.
SVEN BECKER, THOMAS DARNSTÄDT, JENS GLÜSING, HUBERT GUDE, FRITZ HABEKUSS, KONSTANTIN VON HAMMERSTEIN, MARC HUJER, DIRK KURBJUWEIT, MATHIEU VON ROHR, MARCEL ROSENBACH, MATTHIAS SCHEPP, JÖRG SCHINDLER, GREGOR PETER SCHMITZ, CHRISTOPH SCHULT, HOLGER STARK
07/08/2013 05:47 PM
Find this story at 8 july 2013
© SPIEGEL ONLINE 2013
Police go in search of online pranksters14 augustus 2013
Too much data surveillance?
Not everybody has a sense of irony. Some people simply lack the ability to read between the lines. A funny, ironical remark left online could see the police come knocking at your door.
“I’m known for my sense of irony. But even I would not have come to think of putting a statue of liberty in New York Harbor,” Irish Nobel Prize winner of Literature George Bernard Shaw once said. But, as far as we know, he got away with this sharp-tongued comment when trying to enter US territory, a comment that implicitly made fun of the US’ idea of liberty.
But maybe he was only left alone because in the early 20th century, border officials did not yet have access to the vast amount of data about people desiring to cross into their countries as they do today. Today, every visitor seems transparent; and harmless but remarks are often interpreted as evil intentions. Shaw’s fellow countryman just experienced that.
US Homeland security strike
The young Irishman was denied entry by the US homeland security agency DHS at Los Angeles airport. The reason: an ironic remark on Twitter. The sender insists he wasn’t even targeting the US. On the contrary, he wanted to tell his followers that he was going to “party to the extreme in LA,” and he described it by saying that “digging out Marilyn Monroe” and “destroying America” were part of his plan. But immigration officers didn’t care much about his sense of humor. He spent 12 hours detained in a cell.
Security comes first during border controls in the US
“I can only advise against such remarks, even if you’re sure you’re being ironic,” said Klaus Lodigkeit, a Hamburg-based IT law specialist. “Americans store almost all our phonecalls, they store a lot online, and make backup copies. And if they search for a name or a nickname online and find such posts they can link to a certain person then you represent a danger for the security of the United States. So be careful.”
Cheeky teenager
But offhand and ironic remarks online can also be misinterpreted outside of airports’ immigration zones. Just before the verdict for security guard George Zimmerman was announced, the killer of black teenager Trayvon Martin, a 15-year-old in the small town of Zion in Illinois posted a comment online. If Zimmerman was acquitted, he wrote, he would shoot dead every single person in Zion and then also be acquitted of charges.
A short while later, local police detained the teenager. After an examination, the officers were convinced he didn’t constitute a threat. “He doesn’t own any weapons and doesn’t have access to any either,” a police report said.
Crazy or just foolish?
18-year-old US citizen Justin Carter wasn’t that lucky. According to his parents, he had a fight with other users while playing a fantasy role-playing game online. When the users then wrote on Facebook that he was “a lunatic, crazy, and off his head,” Carter replied: “Yeah, sure I’m a total mess, I will go and shoot children at a school and eat their beating hearts.”
He must have instantly realized that remarks like that are often misunderstood. He quickly added a ‘LOL’ [‘Laughing out loud’] and a ‘JK’ [‘Just Kidding’]. But it didn’t help: He spent several months in prison because of that comment on Facebook. He has been released on bail.
“If you publish a concrete threat to life or physical condition online, the threat itself constitutes a criminal offence,” according to IT legal expert Lodigkeit. “It’s enough to be convicted. And you’re remanded in custody while investigations are conducted because you’re considered a flight risk.”
The Pirate party criticizes online spying and surveillance activities by governments
But does that give security agencies in Germany and the US the right to spy on private communication? “No,” said Mario Tants, spokesman for online freedom advocates the Pirate party in the German state of Schleswig-Holstein. “In the cases we’ve talked about, security authorities in the US didn’t screen private communication. Instead, what happened was that somebody who knew the respective perpetrator or potential perpetrator gave them hints. And if a real person gives a real hint, then security agencies are obliged to examine what’s going on.”
‘NSA spy protection league’
The latest case from Germany is slightly more confusing in comparison. 28-year-old Daniel Bangert invited others on facebook to join him on a “Walk to the Dagger complex.” It’s a US-American installation near Darmstadt in the German state of Hesse, where the NSA is said to have underground offices. Bangert clearly used an ironic tone, calling his group the “NSA spy protection league,” inviting others to “explore and observe.”
But the US military police in Germany apparently don’t share Bangert’s sense of humor. The Americans informed German security agencies who then visited the young man early in the morning and interrogated him. State security were also involved and asked Bangert questions about his “political leanings,” as he put it.
“That’s exactly what we’re critical of,” said Mario Tants from the Pirates’ party. “In future, any citizen writing anything anywhere has to expect a visit by the police or state protection. That’s the problem in surveillance states, and we’re actually effectively already there.”
Date 21.07.2013
Author Marcus Lütticke / nh
Editor Jessie Wingard
Find this story at 21 July 2013
© 2013 Deutsche Welle
Spaziergang in Grieshei; Neue Spion-Safari am Dagger Complex14 augustus 2013
Wegen eines angekündigten Spaziergangs zum streng geheimen Dagger Complex bekam Daniel Bangert Besuch vom Staatsschutz. Das schreckt ihn nicht ab: Jetzt lädt er zu einer zweiten Erkundungstour nach Griesheim, um “NSA-Spione” zu beobachten.
Selten hat ein Spaziergang für so viel Aufsehen gesorgt: Der Griesheimer Daniel Bangert hatte auf Facebook scherzhaft dazu eingeladen, einen Erkundungsgang zum streng geheimen Dagger Complex zu unternehmen. Vor der abgeschotteten US-Einrichtung in der Nähe von Darmstadt wolle man “gemeinsam den bedrohten Lebensraum der NSA-Spione erforschen”.
Der ironische Aufruf stieß auf Facebook zunächst nicht auf viele Interessenten, dafür aber bei der Polizei. Die US-Militärpolizei, die für die Sicherheit auf dem Dagger Complex zuständig ist, hatte die deutsche Polizei eingeschaltet – die Bangert prompt aus dem Bett klingelte. Danach kam auch noch der Staatsschutz vorbei und brachte Bangert dazu, seinen Spaziergang als Demo anzumelden, was er auch tat. Schließlich spazierten 70 Leute in Begleitung zweier Streifenwagen zu der abgeschotteten US-Einrichtung.
Trotz oder wegen des ganzen Wirbels soll es nun einen weiteren Erkundungsgang geben. “Der Vorstand des NSA-Spion-Schutzbundes lädt Sie recht herzlich zum zweiten Entdecken und Beobachten Wochenende am Dagger Complex ein”, heißt es in einer öffentlichen Einladung auf Facebook.
Ein Picknick auf der Straße
Schließlich war die letzte demonstrative Entdeckertour zwar ein großer Medienerfolg, vom “wissenschaftlichen” Standpunkt aus gesehen aber ein Reinfall: “Ein Teil der Gruppe hat mit allerlei Lockrufen versucht, die NSA-Spione aus ihrem Bau zu locken”, schreibt Bangert in einem Rückblick auf Facebook. Leider habe man aber “keine echten NSA-Spione zu sehen” bekommen. Deshalb wolle man dieses Mal “im Anschluss an den Spaziergang ein Picknick auf der Straße vor dem Dagger Complex machen”. Vielleicht ließen sich die Spione ja “durch den Duft diverser Köstlichkeiten aus ihrem Bau locken”.
Es sollen wieder viele Kameras mitgebracht werden, Papier und Stift, Verpflegung fürs Picknick und Blumen, “um den Lebensraum der NSA-Spione etwas aufzupeppen”. Verkleidungen sind erwünscht, und Theaterrequisiten, etwa in Form von Edward-Snowden-Masken, sind ausdrücklich erlaubt.
Klingt alles wie beim letzten Mal – nur dürften sich diesmal wohl ein paar mehr spazierende Demonstranten einfinden, die aus den Medien vom Wirbel um den ersten Erkundungsgang erfahren haben. Deshalb steht in der aktuellen Einladung außerdem: Der Spaziergang und das anschließende Picknick seien selbstverständlich angemeldet.
Die Teilnehmerzahl ist nicht abzuschätzen
“Wie viele Teilnehmer es werden, ist völlig unberechenbar”, sagt Initiator Daniel Bangert, “das habe ich auch der Polizei gesagt: Es können 50 werden oder auch 1000, wobei ich das nicht glaube.” Er habe diesmal Kooperationsgespräche geführt, und wieder sei der Staatsschutz dabei gewesen, erzählt er. Auch wenn das womöglich in Darmstadt so üblich sei, irritiere ihn das.
Trotzdem tut er sich den ganzen Stress gern an, angefangen bei den Formalitäten bis hin zu den Fragen der vielen Journalisten. “Ich finde einfach, dass da bei den Leuten mehr Interesse herrschen könnte”, begründet er seine Motivation. Und seine Geschichte zeige doch, “dass ein Einzelner sehr wohl etwas erreichen kann, auch ohne Mittel”.
Ansonsten hofft er auf ein bisschen Hilfe durch die anderen selbsternannten Spion-Forscher: Es stünden mehr Ordner zur Verfügung; doch es wäre gut, wenn ein paar Teilnehmer Warnwesten mitbrächten.
19. Juli 2013, 14:19 Uhr
Von Judith Horchert
Find this story at 19 July 2013
© SPIEGEL ONLINE 2013
Spy-spotter: joke about scary visit came true14 augustus 2013
A German man who called on Facebook friends concerned about American secret service operations to join him in a walk around a US army spy centre near his home, found secret service men at his door checking his political leanings.
Daniel Bangert, 28, told The Local he had joked about US spies reading what he had written – and had even told his friends he was waiting for a knock on the door – when it actually came.
“I was still very sleepy when the phone rang – it was 7.17 in the morning – and a police officer started asking questions about what I was planning,” he said.
“Then the doorbell rang and I saw out the window that a police van was parked outside. The officer on the phone said I should open the door to the others.”
He put on a “Team Edward” T-shirt with a picture of NSA whistle-blower Edward Snowden, and answered scores of questions about his plans.
Bangert, a veteran of the Blockupy protests in Frankfurt, had set up a group calling itself “NSA spy protection league” (NSA Spion Schutzbund), as if the US spies were an endangered species of birds.
He wanted, he said, to take a walk with some friends to “observe them in their natural habitat” – the Dagger Complex in Griesheim near Darmstadt. This is one base where the NSA (US National Security Agency) is said to operate from. The authority stands accused of monitoring much of Germany’s internet traffic.
The uniformed police seemed satisfied with his answers about the expected number of people on the walk – 32 had shown an interest, Bangert told The Local. But despite there being no specific agenda, and no plans for a rally or speeches, he was told he had to register the event.
“I asked them why, but they could not really explain it to me. They couldn’t help me understand what the difference was between going for a walk and meeting up to play football – which you don’t have to register,” he said.
A few hours later, his phone rang again, and one of the police officers who had been at his house that morning, told him the state security wanted to talk with him.
“She said I should call them, that it was important that I did. So I did, and they asked me again about the Facebook entry, and how many people were expected and so on. Then they asked if I would go to see them or if they could come to see me for a personal conversation.”
He said a state security agent arrived with a local police officer, and asked him a load of questions about his political activities and his opinions, and whether he had any connection to activists willing to use violence. They suggested his Facebook entry could be interpreted in different ways, but he said he was really just organizing a walk.
“Then they told me I should not put the meeting on the internet, that I should not write about it,” he added.
They seemed to be concerned that the walk could get out of control if lots of people showed up – like the Facebook parties which are hijacked by hoodlums. “But I was not offering anything for free like at the parties,” he said.
“And in any case, all there is, is a fence, with nothing behind it – everything is underground. No-one is interested.”
In the end around 80 people showed up on Saturday to take a walk, have a talk and look at the US base.
The “NSA spy protection league” Facebook page says of the day: “A group of people young and old gathered at the Griesheim market square and walked to the NSA spy complex, in the most fabulous weather. On the way there, surveillance methods were discussed … and possible behaviour of the NSA spies was the subject of consideration.”
It said some of the group had tried with various calls to tempt the NSA spies from the building, but none showed themselves. “Taking part in the walk was not enough, just to know that NSA spies are there – everyone agreed they wanted to see NSA spies with their own eyes. We will see what we can do.”
Hannah Cleaver
Published: 15 Jul 2013 17:44 CET | Print version
Find this story at 15 July 2013
© The Local Europe GmbH
When states monitored their citizens we used to call them authoritarian. Now we think this is what keeps us safe10 juli 2013
The internet is being snooped on and CCTV is everywhere. How did we come to accept that this is just the way things are?
These days we are all supects, or at least consumers. Photograph: Alamy
America controls the sky. Fear of what America might do can make countries divert planes – all because Edward Snowden might be on one.
Owning the sky has somehow got to me more than controlling the internet. Maybe because I am a simpleton and sometimes can only process what I can see – the actual sky, rather than invisible cyberspace in which data blips through fibre-optic cables.
Thus the everyday internet remains opaque to all but geeks. And that’s where I think I have got it wrong. My first reaction to the Prism leaks was to make stupid jokes: Spies spy? Who knew? The fact that Snowden looked as if he came from central casting didn’t help. Nor did the involvement of Julian Assange, a cult leader who should be in Sweden instead of a cupboard in an embassy.
What I failed to grasp, though, was quite how much I had already surrendered my liberty, not just personally but my political ideals about what liberty means. I simply took for granted that everyone can see everything and laughed at the idea that Obama will be looking at my pictures of a cat dressed as a lobster. I was resigned to the fact that some random FBI merchant will wonder at the inane and profane nature of my drunken tweets.
Slowly but surely, The Lives of Others have become ours. CCTV cameras everywhere watch us, so we no longer watch out for each other. Public space is controlled. Of course, much CCTV footage is never seen and often useless. But we don’t need the panopticon once we have built one in our own minds. We are all suspects.
Or at least consumers. iTunes thinks I might like Bowie; Amazon thinks I want a compact tumble dryer. Really? Facebook seems to think I want to date men in uniform. I revel in the fact that the algorithms get it as wrong as the man who knocks on my door selling fish out of a van. “And not just fish,” as he sometimes says mysteriously.
But how did I come to accept that all this data gathered about me is just the way it is? Wasn’t I once interested in civil liberties? Indeed, weren’t the Lib Dems? Didn’t freedom somehow incorporate the idea of individual privacy? When the state monitored all its citizens as though they were suspects – whether in East Germany or North Korea – we called it authoritarianism. Now we think it is what keeps us safe.
In 2009 I sat on a panel with Vince Cable at the cross-party Convention on Modern Liberty. Cable told us that a recession could provide the preconditions for fascism. Gosh, I thought, that’s a bit strong. Then the recession hit and austerity became the narrative that subsumed all debates about freedom. No one poor is free, and it is no coincidence that the poor are the most snooped on of all.
What Snowden, who is no spy, has revealed is the nature of the game: that surveillance is a huge private industry; that almost full control of the internet has been achieved already; that politicians here and in the US have totally acquiesced to industrial-scale snooping. There is a generation now made up of people who will never have had a private conversation online or by phone. These are my children. And should they or anyone else want to organise against the powers that be, they will be traceable. We have sleepwalked into this because liberty remains such an alien concept, still. But the US has the fourth amendment: “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizure, shall not be violated.”
It has been violated. Bradley Manning is in prison, Guantánamo remains open, CIA agents who spoke out about waterboarding are banged up. And there are other kinds of whistleblowers who conveniently kill themselves. The letter from Daniel Somers, who served in Iraq, says he was made to do things he could not live with. He described his suicide as a mercy killing and reminded us that 22 veterans kill themselves every day. This is not whistleblowing. It is screaming into a void.
But we remain passive while other European countries are angry at what Snowden has told us. We maintain the special relationship. For Snowden, the truth will not set him free, it will imprison him for ever. We now debate whether we should exchange liberty for security, but it is too late. As John Locke said: “As soon as men decide all means are permitted to fight an evil, then their good becomes indistinguishable from the evil they set out to destroy.” He could have been talking about our passivity.
When did you surrender your freedom to communicate, something that was yours and yours alone, whether an email to a lover or a picture of your child? Ask yourself, do you feel safer now you know that you have no secrets? Now, the intimacies that are of no import to anyone but you have been subject to virtual extraordinary rendition. Because, fundamentally, your government does not trust you. Why therefore should you trust it?
Suzanne Moore
The Guardian, Wednesday 3 July 2013 20.00 BST
Find this story at 3 July 2013
© 2013 Guardian News and Media Limited or its affiliated companies. All rights reserved.
Job Title Key to Inner Access Held by Snowden10 juli 2013
WASHINGTON — Intelligence officials refer to Edward J. Snowden’s job as a National Security Agency contractor as “systems administrator” — a bland name for the specialists who keep the computers humming. But his last job before leaking classified documents about N.S.A. surveillance, he told the news organization The Guardian, was actually “infrastructure analyst.”
It is a title that officials have carefully avoided mentioning, perhaps for fear of inviting questions about the agency’s aggressive tactics: an infrastructure analyst at the N.S.A., like a burglar casing an apartment building, looks for new ways to break into Internet and telephone traffic around the world.
That assignment helps explain how Mr. Snowden got hold of documents laying bare the top-secret capabilities of the nation’s largest intelligence agency, setting off a far-reaching political and diplomatic crisis for the Obama administration.
Even as some members of Congress have challenged the N.S.A.’s collection of logs of nearly every phone call Americans make, European officials furiously protested on Sunday after Mr. Snowden’s disclosure that the N.S.A. has bugged European Union offices in Washington and Brussels and, with its British counterpart, has tapped the Continent’s major fiber-optic communications cables.
On Sunday evening, The Guardian posted an article saying documents leaked by Mr. Snowden show 38 embassies and missions on a list of United States electronic surveillance targets. Some of those offices belong to allies like France, Italy, Japan and Mexico, The Guardian said.
Mr. Snowden, who planned his leaks for at least a year, has said he took the infrastructure analyst position with Booz Allen Hamilton in Hawaii in March, evidently taking a pay cut, to gain access to a fresh supply of documents.
“My position with Booz Allen Hamilton granted me access to lists of machines all over the world the N.S.A. hacked,” he told The South China Morning Post before leaving Hong Kong a week ago for Moscow, where he has been in limbo in the transit area of Sheremetyevo airport. “That is why I accepted that position about three months ago.”
A close reading of Mr. Snowden’s documents shows the extent to which the eavesdropping agency now has two new roles: It is a data cruncher, with an appetite to sweep up, and hold for years, a staggering variety of information. And it is an intelligence force armed with cyberweapons, assigned not just to monitor foreign computers but also, if necessary, to attack.
After the 2001 terrorist attacks, the documents suggest, the N.S.A. decided it was too risky to wait for leads on specific suspects before going after relevant phone and Internet records. So it followed the example of the hoarder who justifies stacks of paper because someday, somehow, a single page could prove vitally important.
The agency began amassing databases of “metadata” — logs of all telephone calls collected from the major carriers and similar data on e-mail traffic. The e-mail program was halted in 2011, though it appears possible that the same data is now gathered in some other way.
The documents show that America’s phone and Internet companies grew leery of N.S.A. demands as the years passed after 9/11, fearing that customers might be angry to find out their records were shared with the government. More and more, the companies’ lawyers insisted on legal orders to compel them to comply.
So the N.S.A. came up with a solution: store the data itself. That is evidently what gave birth to a vast data storage center that the N.S.A. is building in Utah, exploiting the declining cost of storage and the advance of sophisticated search software.
Those huge databases were once called “bit buckets” in the industry — collections of electronic bits waiting to be sifted. “They park stuff in storage in the hopes that they will eventually have time to get to it,” said James Lewis, a cyberexpert at the Center for Strategic and International Studies, “or that they’ll find something that they need to go back and look for in the masses of data.” But, he added, “most of it sits and is never looked at by anyone.”
Indeed, an obscure passage in one of the Snowden documents — rules for collecting Internet data that the Obama administration wrote in secret in 2009 and that the Foreign Intelligence Surveillance Court approved — suggested that the government was concerned about its ability to process all the data it was collecting. So it got the court to approve an exception allowing the government to hold on to that information if it could not keep up. The rules said that “the communications that may be retained” for up to five years “include electronic communications acquired because of the limitation on the N.S.A.’s ability to filter communications.”
As one private expert who sometimes advises the N.S.A. on this technology put it: “This means that if you can’t desalinate all the seawater at once, you get to hold on to the ocean until you figure it out.”
Collecting that ocean requires the brazen efforts of tens of thousands of technicians like Mr. Snowden. On Thursday, President Obama played down Mr. Snowden’s importance, perhaps concerned that the manhunt was itself damaging the image and diplomatic relations of the United States. “No, I’m not going to be scrambling jets to get a 29-year-old hacker,” the president said during a stop in Senegal.
Mr. Obama presumably meant the term to be dismissive, suggesting that Mr. Snowden (who turned 30 on June 21) was a young computer delinquent. But as an N.S.A. infrastructure analyst, Mr. Snowden was, in a sense, part of the United States’ biggest and most skilled team of hackers.
The N.S.A., Mr. Snowden’s documents show, has worked with its British counterpart, Government Communications Headquarters, to tap into hundreds of fiber-optic cables that cross the Atlantic or go on into Europe, with the N.S.A. helping sort the data. The disclosure revived old concerns that the British might be helping the N.S.A. evade American privacy protections, an accusation that American officials flatly deny.
And a secret presidential directive on cyberactivities unveiled by Mr. Snowden — discussing the primary new task of the N.S.A. and its military counterpart, Cyber Command — makes clear that when the agency’s technicians probe for vulnerabilities to collect intelligence, they also study foreign communications and computer systems to identify potential targets for a future cyberwar.
Infrastructure analysts like Mr. Snowden, in other words, are not just looking for electronic back doors into Chinese computers or Iranian mobile networks to steal secrets. They have a new double purpose: building a target list in case American leaders in a future conflict want to wipe out the computers’ hard drives or shut down the phone system.
Mr. Snowden’s collection of pilfered N.S.A. documents has cast an awkward light on officials’ past assurances to Congress and the public about their concern about Americans’ privacy.
It was only in March that James R. Clapper Jr., the director of national intelligence, told a Senate committee that the N.S.A. did not collect data on millions of Americans. Mr. Snowden’s records forced Mr. Clapper to backtrack, admitting his statement was false.
Last week, two senators challenged even the accuracy of a fact sheet prepared by the N.S.A. to counter Mr. Snowden’s claims about the phone data and Internet collection programs. Agency officials did not defend themselves; the fact sheet simply disappeared, without explanation, from the agency’s Web site.
Newly disclosed slides from an N.S.A. PowerPoint presentation on the agency’s Prism database of Internet data, posted on Saturday by The Washington Post, reveal that the F.B.I. plays a role as middleman between the N.S.A. and Internet companies like Google and Yahoo. The arrangement provides the N.S.A. with a defense, however nominal, against claims that it spies on United States soil.
Even in the unaccustomed spotlight after the N.S.A. revelations, intelligence officials have concealed more than they have revealed in careful comments, fearful of alerting potential eavesdropping targets to agency methods. They invariably discuss the N.S.A.’s role in preventing terrorist attacks, an agency priority that the public can easily grasp.
In fact, as Mr. Snowden’s documents have shown, the omnivorous agency’s operations range far beyond terrorism, targeting foreigners of any conceivable interest. British eavesdroppers working with the N.S.A. penetrated London meetings of the Group of 20 industrialized nations, partly by luring delegates to fake Internet cafes, and the N.S.A. hacked into computers at Chinese universities.
At Fort Meade, on the N.S.A.’s heavily guarded campus off the Baltimore-Washington Parkway in Maryland, such disclosures are seen as devastating tip-offs to targets. The disclosure in Mr. Snowden’s documents that Skype is cooperating with orders to turn over data to the N.S.A., for example, undermined a widespread myth that the agency could not intercept the voice-over-Internet service. Warned, in effect, by Mr. Snowden, foreign officials, drug cartel leaders and terrorists may become far more careful about how, and how much, they communicate.
“We’re seeing indications that several terrorist groups are changing their communications behavior based on these disclosures,” one intelligence official said last week, speaking on the condition of anonymity. “We’re going to miss tidbits that could be useful in stopping the next plot.”
Mr. Snowden’s breach is an unplanned test of the N.S.A.’s decades-old conviction that it can operate effectively only under absolute secrecy. The agency is conducting a damage assessment — a routine step after major leaks — but the assessment itself is likely to remain classified.
The N.S.A.’s assessment of Mr. Snowden’s case will likely also consider what has become, for intelligence officials, a chilling consideration: there are thousands of people of his generation and computer skills at the agency, hired in recent years to keep up with the communications boom.
The officials fear that some of them, like young computer aficionados outside the agency, might share Mr. Snowden’s professed libertarian streak and skepticism of the government’s secret power. Intelligence bosses are keeping a closer eye on them now, hoping that there is not another self-appointed whistle-blower in their midst.
June 30, 2013
By SCOTT SHANE and DAVID E. SANGER
Find this story at 30 June 2013
© 2013 The New York Times Company
Our Government has No Right to Hide Its Actions10 juli 2013
Postscript ||: Our Government has No Right to Hide Its Actions
This is a guest post by Jesse Stavis, another one of the students at the NSA session. The first postscript by me (Madiha) available below.
My name is Jesse Stavis. I’m a Ph.D. candidate in the Department of Slavic Languages and Literature at the University of Wisconsin-Madison, and I was the male student in the recording. Madiha has graciously invited me to share some final thoughts on our confrontation with the NSA. I’ll try to keep this brief:
1. I have never been involved in anything that’s come anywhere close to receiving the exposure that this incident has. I will admit that it was exciting to see this story go quasi-viral. The fact that comments that were made in a room with perhaps twenty audience members eventually reached hundreds of thousands of people speaks to the power that the internet has as a tool for political and social advocacy. This should remind us of why it’s so important to protect the openness of the internet and the privacy of our communications on it.
2. A few days after this story broke, my feelings of excitement and pride in what we had accomplished gave way to a lingering feeling of depression. To put it bluntly, this should not have been a big story. The big story should have been about congressional representatives asking tough questions of the people at the top levels of the NSA. We should have been reading about Lt. Gen. Clapper being investigated for perjury. The fact that a few graduate students peppering recruiters with tough questions received so much attention speaks to the utterly dysfunctional condition of our political system as a whole and of the Democratic Party in particular.
3. While most people have been supportive of what we did, a number of commenters have suggested that we were wrong to confront low-level employees who were just doing their job. I want to make one thing clear: These were not low-level employees. They were what I would describe as upper mid-level managers. They told us that they had a combined fifty-five years of experience at the NSA. Without the support and consent of people like this, the surveillance machine could not exist. I don’t think that they are stupid people or evil people. I do think that they are people who have abdicated their moral agency and thus allowed for something very scary and very evil to come into existence. It’s our responsibility as educated citizens to remind these people that they do have the power to effect real change.
4. A number of people have written that they wished that there were a video recording of this event. I’m not so sure that they would have liked what they would have seen. They would have seen three people aggressively challenging the recruiters while fifteen or twenty other people who were actually considering working at the NSA sat stone-faced and bored, waiting for this unfortunate interruption to end. They would have seen the high school teacher sitting next to me muttering through a clenched jaw about how indescribably rude we were being. They would have seen just how much more we have to accomplish when it comes to convincing our fellow citizens that our government has no right to hide its actions from its citizens.
5. Finally, at the risk of stating the obvious, I want to make it clear that I take very little credit for anything that was accomplished at that meeting. Without someone as brave, informed, and articulate as Madiha Tahir, this wouldn’t have been a story at all. I am deeply, deeply impressed by her, and I hope that you are too.
Tagged government, nsa, prism, surveillance
Jul 07 2013
32 Comments
Multitudes, The Terror Wars
Postscript: The Present through a PRISM
See also guest post by Jesse Stavis
Since I posted about our engagement with NSA recruiters who were visiting the campus at the Univ of
Good Muslim anyone? (Internal flap of NSA brochure)
Wisconsin, I’ve been inundated with hundreds upon hundreds of tweets, emails and messages from people, both Americans, but also folks from Germany, the UK, France, Pakistan and elsewhere. They have been overwhelmingly positive, heartfelt messages (with a few nastier comments thrown in, but I imagine that is par for the course). I’ve tried my best to keep up and respond to, and/or acknowledge the messages in some way, but once again: Thank you for all of your messages of support.
It has been inspiring for us to hear from all of you!
When we posed our questions to the NSA recruiters, we did not expect to go viral. But some time soon after tweeting out my post, my blog crashed. So did the blog PrivacySOS (follow @onekade!) who had posted about it. By next afternoon, Huffpo had picked it up. Numerous blogs, local sites and news sites also reported the story including: Business Insider, The Guardian, Firedoglake, Sueddeutsche Zeitung (the largest German-language daily in Germany), WORT Radio, NBC15 (Wisconsin’s local channel which also features Jesse Stavis @tolstoved. Means one who studies Tolstoy), one of the other students who spoke), WeAct Radio, Isthmus, Wisconsin Reporter, Wonkette, ActivistPost, Daily Kos and Truthdig, among others. There have been some Youtube videos posted as well.
I’ve made the audio downloadable as per several requests.
Here, I want to add some things I left out in my initial post (because I wasn’t expecting so many people to read it), make some corrections, and finally make some notes on a few things I thought were interesting:
1. The recruiters in question were seasoned employees of the NSA, not newbies. They told us that together, they had 55 years of experience with the NSA. The female recruiter worked on South Asia and implied that she was in a senior position in that office. That was the impression others I’ve spoken with also had. The male recruiter worked on China and Korea.
2. Anybody can be an “adversary.” That means foreign governments, allies, and American citizens. Anyone can become an adversary at any time as far as the American government is concerned. That means OWS anarchists, socialists, activists and leftists of various stripes, environmentalists or just stupid kids. That means Anwar al-Awlaki because his opinions were reprehensible, or his teenage son –also an American citizen– who was killed in a drone attack just because, or Tarek Mehanna, or Fahad Hashmi, or the Muslim Students’ Association, or Muslims generally, or me or you. As Atlantic Wire reported last month,
And the NSA would never abuse its awesome surveillance power, right? Wrong. In 2008, NSA workers told ABC News that they routinely eavesdropped on phone sex between troops serving overseas and their loved ones in America. They listened in on both satellite phone calls and calls from the phone banks in Iraq’s Green Zone where soldiers call home. Former Navy Arab linguist, David Murfee Faulk described how a coworker would say, “Hey, check this out… there’s good phone sex or there’s some pillow talk, pull up this call, it’s really funny, go check it out.” Faulk explained they would gossip about the best calls during breaks. “It would be some colonel making pillow talk and we would say, ‘Wow, this was crazy.’”
In a word: creepy. But, what’s more worrisome to me than the eavesdropping on the pillow talk of American troops is the differential burden that the surveillance state levies on the marginalized. For example, it is not accidental that the names on my little list above are largely Muslim. When bureaucrats or the government or the police are managing large populations, they narrow down categories of presumed suspects through racial profiling. That is why stop-and-frisk disproportionately
Sent to me by dminkler.com
affects African-Americans and Latinos. And, it’s the same reason why –when hunting for ‘terrorists’– American security forces obsess over Islam, and the mainstream media tends to present Muslims as the face of terror even though white hate groups are on the rise. In fact in 2009, conservatives so heavily criticized the Department of Homeland Security when it “reported that white supremacy is the US’s biggest threat for domestic terror” (ThinkProgress) that Janet Napolitano ended up withdrawing its report.
So, there’s a racial politics to the surveillance state. The marginalized, poor and non-white are likely to bear the brunt of the state’s violence. But, in the end, it affects the entire social space. First of all, it has a chilling effect on dissent, particularly in these communities.
Secondly, for the police or the FBI or the NSA or the drones to come for some of us requires that the rest of us agree or at least, remain silent. I think that silence is produced: through the jingoism of television whether it’s the evening news or shows like NCIS, 24, or Homeland as well as through attacks on education, research and dissent. Finally, there are all the smaller ways of disciplining people into silence, things we even do to each other. You are told it’s rude to ask questions. This is not the right time. This is not the right space. Those are not the right people. Shut up. Shut up. SHUT UP.
That kind of social space kills independent thought. It produces thinking that is vehemently opposed to asking questions of NSA recruiters and by extension, the state. Such thinking is more angered by the whistle-blowing than what it reveals. To paraphrase a dead French guy badly, the surveillance state has to change people/populations into the kind of group that basically remains silent. That is what is needed first in order to make the unthinkable possible and finally, normal.
This is why, when they come for some of us, they actually come for all of us.
Therefore, a critical response can only succeed if it is able to understand the entire structure as a whole, that is, as long as we continue to draw distinctions between people that ought to be surveilled and those that should not be surveilled, we will fail. The point –and the real test– is learning to stand in solidarity with people who are not like you or me or us.
3. “The globe is our playground.” A little nugget of honesty about the worldview of the intelligence and military community.
4. They are just doing their jobs. I’m not sure why this is a defense. It didn’t work at Nuremberg. And, it shouldn’t work now. This is not to compare what is happening now as somehow equal to or better or worse than the German holocaust, but to underscore a philosophical point Hannah Arendt made about the nature of modern evil: It’s banal. That means it hasn’t got a pitchfork or horns sprouting out of its head. Rather, it is thousands of ordinary people just doing their jobs.
The question of whether they are “good” people and love their families or “bad” people is irrelevant here. The routinization of such work into small tasks turns the victims of that work into an
Sent to me by dminkler.com
abstraction or a mathematical problem for the people-just-doing-their-jobs. (Thanks to a commenter at the Guardian, the prior link is to a discussion of how the NSA reconfigures issues into an abstract mathematical problem that is then handed over to its mathematicians –none of whom actually know the real-world ‘problem’ that they are working on or to what end their mathematical solutions will be applied. For another instance, take the discussion of drone attacks in Pakistan, Yemen and Somalia. In the mainstream media, it is a discussion that lacks imagination and has been reduced to counting up the dead and categorizing them as “civilian” or “militant” –effectively turning it into a numbers problem: are we killing more of the “bad” ones than the “good” ones or vice versa? Needless to say, this is a terrible, even a horrifying kind of question.)
So, some people go on just doing their jobs and other people go on not asking questions for fear of appearing rude (Jesse talks about how the high school teacher sitting next to him during the session kept muttering about our ‘rudeness’), enraged, irrational, naive. This is how, together, we build monsters.
What has struck me about the anti-war movement in America in these last few years –perhaps it is different elsewhere and perhaps it was different before– is generally how polite it has been. How ironic to chant, “Whose streets! Our streets!” while politely walking into pens and free speech zones. How strange to demand an end to the war while politely conceding to the demands of the NYPD that protesters not use Central Park, that they only march on these streets and not those streets so that order can be maintained, so that things can carry on as if there were no protest at all. I am not arguing for blind rage, but I think anger –articulate, politically engaged, critically minded anger that holds the line– can be a virtue in these times.
5. Edward Snowden should’ve stuck it out instead of “running away.” This is interesting to me because I think this speaks to a kind of Christian imaginary: the hero as martyr, like Jesus, who should hang on the cross. That is apparently what will redeem the worth of these revelations. I am not saying that the people who make this claim are Christian; I am only observing that long after secularization, forms of Christian thought and habit hang around, and I think this is one of them. It is a very specific kind of typology for a hero, and one that only makes sense in a context where people (whether they be actually Christians or Muslims or Hindus or Jews or atheists or whatever) are habituated to the idea of Jesus’ martyrdom for our redemption. It’s out there in the social space. Hell, think about the end of Harry Potter.
6. To the people telling me to grow up, I’m 5 ft 1.75 inches, and I’m pretty sure I’m not growing any taller. And to those wondering if I’m a “foreigner,” well, if I am one, so are you. I do get how my name trips up your black-and-white world though. If it helps, you can call me Maddie.
Some links I thought were worth sharing:
Prism Break
Restore the Fourth
Mass Surveillance in America: A Timeline
Let’s not forget about the corporations who surveil us too.
PRISM by the numbers
Security Data-Mining and Other Forms of Witchcraft
Finally, once again thank you so much for your messages. It has been inspiring for us.
Onwards!
Tagged europe, muslims, nsa, race, secrecy, surveillance
Jul 02 2013
336 Comments
Multitudes, The Terror Wars
The NSA Comes Recruiting
Some students and I had an exchange with NSA recruiters today. The audio and a rough transcript below.
The NSA came to recruit at a language program at the University of Wisconsin where I am spending my summer learning a language. Two recruiters, a redhead who looked more like a middle-aged mother (listed as “NSA_F” below) and a portly, balding man (“NSA_M”), began to go through slides explaining the NSA and its work.
I had intended to go simply to hear how the NSA is recruiting at a moment when it’s facing severe challenges, what with the Edward Snowden and all. Dismayingly, however, a local high school teacher had thought it was good to bring 5 of his students to the session. They were smartly dressed, some of them even wearing ties as if there might be a job interview, young faces in a classroom of graduate students. They sat across from me at the roundtable. It was really their presence that goaded me–and I think a couple of other students–into an interaction with the recruiters.
Roughly half an hour into the session, the exchange below began. I began by asking them how they understood the term “adversary” since the surveillance seems to be far beyond those the American state classifies as enemies, and their understanding of that ties into the recruiters’ earlier statement that “the globe is our playground.” I ended up asking them whether being a liar was a qualification for the NSA because:
@Madi_Hatter a 2008 slideshow for college seniors considering CIA careers asked potential applicants: “Are you good at manipulating people?”
— David Mehnert (@Savants) July 2, 2013
The NSA’s instrumental understanding of language as well as its claustrophobic social world was readily apparent. One of the recruiters discussed how they tend to socialize after work, dressing up in costumes and getting drunk (referenced below). I can imagine that also exerts a lot of social pressure and works as a kind of social closure from which it would be difficult to escape. The last thing I want to point out –once again– their defense seems to be that it’s legal. What is legal is not just.
Someone else happened to record it on an iPhone, hence the audio quality. It’s been edited mainly to cut garbled audio or audio that wouldn’t have made sense and edit out questions and comments from people who didn’t explicitly say it was ok to post their audio.You’ll hear the sound drop out for a second to mark the cuts.
Rough Transcript
Me: You said earlier that the two tasks that you do: one is tracking down the communications of your adversaries and the other is protecting the communications of officials. So, do you consider Germany and the countries the US has been spying on to be adversaries or are you, right now, not speaking the truth?
Me: I mean do you consider European countries, etc, adversaries or are you, right now, not telling us the truth and lying when you say that actually you simply track – you keep focusing on that, but clearly the NSA is doing a lot more than that, as we know, so I’m just asking for a clarification.
NSA_F: I’m focusing on what our foreign intelligence requires of [garbled] so, I mean you know, You can define adversary as enemy and clearly, Germany is not our enemy but would we have foreign
national interest from an intelligence perspective on what’s going on across the globe. Yeah, we do. That’s our requirements that come to us as an intelligence community organization from the policymakers, from the military, from whoever –our global so–
Me: So adversary –adversaries you actually mean anybody and everybody. There’s nobody then by your definition that is not an adversary. Is that correct?
NSA_F: That is not correct.
Me: Who is not an adversary?
NSA_F: Well, ok. I can answer your questions but the reality is—
Me: No, I’m just trying to get a clarification because you told us what the two nodes of your work are but it’s not clear to me what that encompasses and you’re being fairly unclear at the moment. Apparently it’s somebody who’s not just an enemy. It’s something broader than that. And yet, it doesn’t seem to encompass everyone.
NSA_M: So for us, umm, our business is apolitical. Ok. We do not generate the intelligence requirements. They are levied on us so, if there is a requirement for foreign intelligence concerning this issue or this region or whatever then that is. If you wanna use the word adversary, you ca– we
This is not a tampon.
might use the word ‘target.’ That is what we are going after. That is the intelligence target that we are going after because we were given that requirement. Whether that’s adversary in a global war on terrorism sense or adversary in terms of national security interests or whatever – that’s for policymakers, I guess to make that determination. We respond to the requirements we are given, if that helps. And there’s a separation. As language analysts, we work on the SIG INT side of the house. We don’t really work on the information assurance (?) side of the house. That’s the guy setting up, protecting our communications.
Me: I’m just surprised that for language analysts, you’re incredibly imprecise with your language. And it just doesn’t seem to be clear. So, adversary is basically what any of your so-called “customers” as you call them –which is also a strange term to use for a government agency– decide if anybody wants, any part of the government wants something about some country, suddenly they are now internally considered or termed an ‘adversary.’ That’s what you seem to be saying.
[Pause]
NSA_M: I’m saying you can think about it using that term.
NSA_F: But the reality is it’s our government’s interest in what a foreign government or foreign country is doing.
Me: Right. So adversary can be anyone.
NSA_M: As long as they levy their requirement on us thru the right vehicle that exists for this and that it is defined in terms of a foreign intelligence requirement, there’s a national framework of foreign intelligence – what’s it called?
NSA_F: nipa
NSA_M: the national prioritization of intelligence framework or whatever that determines these are the issues that we are interested in, these are how they are prioritized.
Me: Your slide said adversary. It might be a bit better to say “target” but it’s not just a word game. The problem is these countries are fairly –I think Afghanistan is probably not shocked to realize they’re on the list. I think Germany seems to be quite shocked at what has been going on. This is not just a word game and you understand that as well as I do. So, it’s very strange that you’re selling yourself here in one particular fashion when it’s absolutely not true.
NSA_F: I don’t think we’re selling ourselves in an untrue fashion.
Me: Well, this is a recruiting session and you are telling us things that aren’t true. We also know that the NSA took down brochures and fact sheets after the Snowden revelations because those brochures also had severe inaccuracies and untruths in them. So, how are we supposed to believe what you’re saying?
[pause]
Student A (female): I have a lifestyle question that you seem to be selling. It sounds more like a colonial expedition. You know the “globe is our playground” is the words you used, the phrasing that you used and you seem to be saying that you can do your work. You can analyze said documents for your so-called customers but then you can go and get drunk and dress up and have fun without thinking of the repercussions of the info you’re analyzing has on the rest of the world. I also want to know what are the qualifications that one needs to become a whistleblower because that sounds like a much more interesting job. And I think the Edward Snowdens and the Bradley Mannings and Julian Assanges of the world will prevail ultimately.
NSA_M: I’m not sure what the –
Me: The question here is do you actually think about the ramifications of the work that you do, which is deeply problematic, or do you just dress up in costumes and get drunk? [This is in reference to an earlier comment made by the recruiters in which NSA_F said: they do heady work and then they go down to the bar and dress up in costume and do karaoke. I tweeted it earlier.]
NSA_M: That’s why, as I was saying, reporting the info in the right context is so important because the consequences of bad political decisions by our policymakers is something we all suffer from.
Student A: And people suffer from the misinformation that you pass along so you should take responsibility as well.
NSA_M: We take it very seriously that when we give info to our policy makers that we do give it to them in the right context so that they can make the best decision with the best info available.
Student B: Is that what Clapper was doing when he perjured himself in front of Congress? Was he giving accurate information when he said we do not collect any intelligence on the US citizens that it’s only occasionally unintentionally or was he perjuring himself when he made a statement before Congress under oath that he later declared to be erroneous or at least, untruthful the least truthful answer? How do you feel personally having a boss whose comfortable perjuring himself in front of Congress?
NSA_F: Our director is not general Clapper.
Student B: General Alexander also lied in front of Congress.
NSA_F: I don’t know about that.
Student B: Probably because access to the Guardian is restricted on the NSA’s computers. I am sure they don’t encourage people like you to actually think about these things. Thank God for a man like Edward Snowden who your organization is now part of a manhunt trying to track down, trying to put him in a little hole somewhere for the rest of his life. Thank god they exist.
Student A: and why are you denigrating anything else with language? We don’t do this; we don’t do that; we don’t read cultural artifacts, poetry? There are other things to do with language other than joining this group, ok. [last line of this comment was directed at the high school students.]
NSA_M: This job is not for everybody. Academia is a great career for people with language.
Me: So is this job for liars? Is this what you’re saying? Because, clearly, you’re not able to give us forthright answers. Given the way the way the NSA has behaved, given the fact that we’ve been lied to as Americans, given the fact that fact sheets have been pulled down because they clearly had untruths in them, given the fact that Clapper and Alexander lied to Congress — is that a qualification for being in the NSA? Do you have to be a good liar?
NSA_F: I don’t consider myself to be a liar in any fashion and the reality is I mean, this was billed as if you are potentially interested in an NSA career come to our session. If you’re not, if this is your personal belief and you’re understanding of what has been presented then there is nothing that says you need to come and apply and work for us. We are not here — our role as NSA employees is not to represent NSA the things that are in the press right now about the NSA. That’s not our role at all. That’s not my area of expertise. I have not read–
Me: Right, but you’re here recruiting so you’re selling the organization. I mean I’m less interested in what your specialized role is within in the NSA. I don’t care. The fact is you’re here presenting a public face for the NSA and you’re trying to sell the organization to people that are as young as high schoolers and trying to tell us that this is an attractive option in a context in which we clearly know that the NSA has been telling us complete lies. So, I’m wondering is that a qualification?
NSA_F: I don’t believe the NSA is telling complete lies. And I do believe that you know, people can, you can read a lot of different things that are portrayed as fact and that doesn’t make them fact just because they’re in newspapers.
Student A: Or intelligence reports.
NSA_F: That’s not really our purpose here today and I think if you’re not interested in that. There are people here who are probably interested in a language career.
Me: The trouble is we can’t opt out of NSA surveillance and we don’t get answers. It’s not an option. You’re posing it as a choice like ‘oh you know people who are interested can just sit here and those of us who are not interested can just leave.’ If I could opt out of NSA surveillance and it was no longer my business, that would be fine. But it is my business because all of us are being surveilled so we’re here.
NSA_F: That is incorrect. That is not our job. That is not our business.
Me: That doesn’t seem to be incorrect given the leaks. Right, and the NSA has not been able to actually put out anything that is convincing or contrary to that.
[pause]
Student A: I don’t understand what’s wrong with having some accountability.
NSA_F: We have complete accountability and there is absolutely nothing that we can or have done without approval of the 3 branches of the government. The programs that we’re enacting–
Student B: Did you read the NY Times? Did you read about the illegal wiretapping? Why are you lying?
NSA_M: Did you read the Senate judiciary report that said there have only been 15 (?) instances, and they were all documented and done correctly by the FISA courts–
Student B: I’d love to read the opinion of the FISA court that says that this program one of the NSA’s programs was violating the 4th amendment right of massive amounts of Americans, but it’s a big ‘ol secret and only people like you who will not talk with their wives when they get home about what they do all day are able to…[garbled]…protecting us from the ‘terrorist threat’, but let’s let everyone here hear more information about karaoke.
Find this story at 8 July 2013
NSA recruitment drive goes horribly wrong10 juli 2013
Staff from the National Security Agency got more than they bargained for when they attempted to recruit students to their organisation earlier this week …
A demonstrator holds a sign with a photograph of Edward Snowden during 4 July celebrations in Boston, Massachusetts. Photograph: Brian Snyder/REUTERS
On Tuesday, the National Security Agency called at the University of Wisconsin on a recruitment drive.
Attending the session was Madiha R Tahir, a journalist studying a language course at the university. She asked the squirming recruiters a few uncomfortable questions about the activities of NSA: which countries the agency considers to be “adversaries”, and if being a good liar is a qualification for getting a job at the NSA.
She has posted a recording of the session on Soundcloud, which you can hear above, and posted a rough transcript on her blog, The Mob and the Multitude. Here are some highlights.
The session begins …
Tahir: “Do you consider Germany and the countries that the NSA has been spying upon to be adversaries, or are you, right now, not speaking the truth?”
Recruiter 1: “You can define adversary as ‘enemy’ and, clearly, Germany is not our enemy. But would we have foreign national interests from an intelligence perspective on what’s going on across the globe? Yeah, we do.”
Tahir: “So by ‘adversaries’, you actually mean anybody and everybody. There is nobody, then, by your definition that is not an adversary. Is that correct?”
Recruiter 1: “That is not correct.”
Recruiter 2: “… for us, our business is apolitical, OK? We do not generate the intelligence requirements. They are levied on us … We might use the word ’target’.”
Tahir: “I’m just surprised that for language analysts, you’re incredibly imprecise with your language. And it just doesn’t seem to be clear.”
Later …
Tahir: “… this is a recruiting session and you are telling us things that aren’t true. And we also know that the NSA took down brochures and factsheets after the Snowden revelations because those factsheets also had severe inaccuracies and untruths in them, right? So how are we supposed to believe what you’re saying?”
Even later …
Tahir: “I think the question here is do you actually think about the ramifications of the work that you do, which is deeply problematic, or do you just dress up in costumes and get drunk?” [A reference to an earlier comment the recruiter made about NSA employees working hard and going to the bar to do karaoke.]
Recruiter 2: “… reporting the info in the right context is so important because the consequences of bad political decisions by our policymakers is something we all suffer from.”
Unnamed female student: “And people suffer from the misinformation that you pass along so you should take responsibility as well.”
Later still …
Male student: “General Alexander [head of the NSA] also lied in front of Congress.”
Recruiter 1: “I don’t believe that he did.”
Male student: “Probably because access to the Guardian is restricted on the Department of Defence’s computers. I am sure they don’t encourage people like you to actually think about these things. Thank God for a man like Edward Snowden who your organisation is now part of a manhunt trying to track down, trying to put him in a little hole somewhere for the rest of his life. Thank God they exist.”
And finally …
Recruiter 2: “This job isn’t for everybody, you know …”
Tahir: “So is this job for liars? Is this what you’re saying? Because, clearly, you’re not able to give us forthright answers. I mean, given the way the NSA has behaved, given the fact that we’ve been lied to as Americans, given the fact that factsheets have been pulled down because they clearly had untruths in them, given the fact that Clapper and Alexander lied to Congress – is that a qualification for being in the NSA? Do you have to be a good liar?”
Recruiter 1: I don’t believe the NSA is telling complete lies. And I do believe that you know, I mean people can, you can read a lot of different things that are, um, portrayed as fact and that doesn’t make them fact just because they’re in newspapers.”
Unnamed female student: “Or intelligence reports.”
Recruiter 1: “That’s not really our purpose here today and I think if you’re not interested in that … there are people here who are probably interested in a language career.”
Bim Adewunmi
guardian.co.uk, Friday 5 July 2013 13.15 BST
Find this story at 5 July 2013
© 2013 Guardian News and Media Limited or its affiliated companies. All rights reserved.
<< oudere artikelen nieuwere artikelen >>